The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Andrew H. Sung: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala
    Static Analyzer of Vicious Executables (SAVE). [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:326-334 [Conf]
  2. Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung
    Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense). [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:10-14 [Conf]
  3. Srinivas Mukkamala, K. Yendrapalli, R. B. Basnet, Andrew H. Sung
    Detecting Coordinated Distributed Multiple Attacks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:557-562 [Conf]
  4. Andrew H. Sung, Srinivas Mukkamala
    The Feature Selection and Intrusion Detection Problems. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2004, pp:468-482 [Conf]
  5. Jianyun Xu, Andrew H. Sung, Qingzhong Liu
    Detecting Hidden Information in the Wavelet Domain. [Citation Graph (0, 0)][DBLP]
    CISST, 2004, pp:571-577 [Conf]
  6. Jianyun Xu, Andrew H. Sung, Qingzhong Liu
    Online Fraud Detection System Based on Non-Stationery Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:364-370 [Conf]
  7. Mingzhen Wei, Andrew H. Sung, Martha E. Cather
    A New Domain-Independent Field Matching Algorithm for Large Databases. [Citation Graph (0, 0)][DBLP]
    DMIN, 2005, pp:126-131 [Conf]
  8. Andrew Sung, Xiao Qin, Tao Xie 0004
    Integrating Security Requirements into Scheduling for Real-Time Applications in Grid Computing. [Citation Graph (0, 0)][DBLP]
    GCA, 2005, pp:24-30 [Conf]
  9. Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung
    Website Visitor Classification Using Machine Learning. [Citation Graph (0, 0)][DBLP]
    HIS, 2004, pp:384-389 [Conf]
  10. Srinivas Mukkamala, Guadelupe I. Janoski, Andrew H. Sung
    Monitoring System Security Using Neural Networks and Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    HIS, 2001, pp:121-137 [Conf]
  11. Srinivas Mukkamala, Andrew H. Sung
    Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    HIS, 2002, pp:351-364 [Conf]
  12. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
    Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes. [Citation Graph (0, 0)][DBLP]
    HIS, 2003, pp:779-788 [Conf]
  13. Jianyun Xu, Andrew H. Sung, Patrick Chavez, Srinivas Mukkamala
    Polymorphic Malicious Executable Scanner by API Sequence Analysis. [Citation Graph (0, 0)][DBLP]
    HIS, 2004, pp:378-383 [Conf]
  14. Andrew H. Sung
    Role of Soft Computing in Internet Security. [Citation Graph (0, 0)][DBLP]
    HIS, 2002, pp:8- [Conf]
  15. Srinivas Mukkamala, Qingzhong Liu, Rajeev Veeraghattam, Andrew H. Sung
    Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data. [Citation Graph (0, 0)][DBLP]
    ICAISC, 2006, pp:951-961 [Conf]
  16. Guadalupe I. Janoski, Andrew H. Sung
    Alternate Methods in Reservoir Simulation. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2001, pp:253-262 [Conf]
  17. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos
    Intrusion Detection Systems Using Adaptive Regression Splines. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2004, pp:26-33 [Conf]
  18. Willie Chang, Hamdy S. Soliman, Andrew H. Sung
    Fingerprint Image Compression by a Natural Clustering Neural Network. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 1994, pp:341-345 [Conf]
  19. Tao Xie 0004, Xiao Qin, Andrew Sung
    SAREC: A Security-Aware Scheduling Strategy for Real-Time Applications on Clusters. [Citation Graph (0, 0)][DBLP]
    ICPP, 2005, pp:5-12 [Conf]
  20. Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Bernardete Ribeiro
    Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2006, pp:267-270 [Conf]
  21. Jianyun Xu, Andrew H. Sung, Qingzhong Liu
    Tree Based Behavior Monitoring for Adaptive Fraud Detection. [Citation Graph (0, 0)][DBLP]
    ICPR (1), 2006, pp:1208-1211 [Conf]
  22. Srinivas Mukkamala, Andrew H. Sung
    A Comparative Study of Techniques for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2003, pp:570-0 [Conf]
  23. Willie Chang, Hamdy S. Soliman, Andrew H. Sung
    Fingerprint Image Compression by a Clustering Learning Network. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 1994, pp:51-56 [Conf]
  24. Guadalupe I. Janoski, Fansheng Li, Mateusz Pietrzyk, Andrew H. Sung, Shih-Hsien Chang, Reid B. Grigg
    Advances Reservoir Simulation Using Soft Computing. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2000, pp:623-628 [Conf]
  25. Hujun Li, Fangsheng Li, Andrew H. Sung, William W. Weiss
    A Fuzzy Inference Algorithm for Lithology Analysis in Formation Evaluation. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2000, pp:290-295 [Conf]
  26. Srinivas Mukkamala, Andrew H. Sung
    Computational Intelligent Techniques for Detecting Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2004, pp:616-624 [Conf]
  27. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
    Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2004, pp:633-642 [Conf]
  28. Srinivas Mukkamala, Dennis Xu, Andrew H. Sung
    Intrusion Detection Based on Behavior Mining and Machine Learning Techniques. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2006, pp:619-628 [Conf]
  29. Srinivas Mukkamala, Andrew H. Sung
    A Distributed Agent Based IDS for Stealthy Probe Detection. [Citation Graph (0, 0)][DBLP]
    IICAI, 2003, pp:413-422 [Conf]
  30. Jianyun Xu, Andrew H. Sung, Qingzhong Liu, Srinivas Mukkamala
    Fraud Detection System Based on Behavior Mining and Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    IICAI, 2005, pp:3487-3501 [Conf]
  31. Qingzhong Liu, Andrew H. Sung
    Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images. [Citation Graph (0, 0)][DBLP]
    IJCAI, 2007, pp:2808-2813 [Conf]
  32. Mingzhen Wei, Andrew H. Sung, Martha E. Cather
    Detecting Spatial Outliers Using Bipartite Outlier Detection Methods. [Citation Graph (0, 0)][DBLP]
    IKE, 2004, pp:236-244 [Conf]
  33. Tao Xie 0004, Andrew Sung, Xiao Qin
    Dynamic Task Scheduling with Security Awareness in Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  34. A. Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung
    Disassembled code analyzer for malware (DCAM). [Citation Graph (0, 0)][DBLP]
    IRI, 2005, pp:398-403 [Conf]
  35. Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala
    Defeating the Current Steganalysis Techniques (Robust Steganography). [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:440-444 [Conf]
  36. Jianyun Xu, Andrew H. Sung, Peipei Shi, Qingzhong Liu
    JPEG Compression Immune Steganography Using Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:704-708 [Conf]
  37. Andrew H. Sung, Srinivas Mukkamala
    Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. [Citation Graph (0, 0)][DBLP]
    SAINT, 2003, pp:209-217 [Conf]
  38. Srinivas Mukkamala, Andrew H. Sung
    A framework for countering denial of service attacks. [Citation Graph (0, 0)][DBLP]
    SMC (4), 2004, pp:3273-3278 [Conf]
  39. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
    Hybrid multi-agent framework for detection of stealthy probes. [Citation Graph (0, 0)][DBLP]
    Appl. Soft Comput., 2007, v:7, n:3, pp:631-641 [Journal]
  40. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos
    Intrusion Detection Systems Using Adaptive Regression Splines [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  41. Catarina Silva, Bernardete Ribeiro, Andrew H. Sung
    Boosting RVM Classifiers for Large Data Sets. [Citation Graph (0, 0)][DBLP]
    ICANNGA (2), 2007, pp:228-237 [Conf]
  42. Mingzhen Wei, Baojun Bai, Andrew H. Sung, Qingzhong Liu, Jiachun Wang, Martha E. Cather
    Predicting injection profiles using ANFIS. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:20, pp:4445-4461 [Journal]
  43. Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Jianyun Xu
    Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2008, v:41, n:1, pp:56-66 [Journal]
  44. Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
    Intrusion detection using an ensemble of intelligent paradigms. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2005, v:28, n:2, pp:167-182 [Journal]

  45. Video Steganalysis Based on the Expanded Markov and Joint Distribution on the Transform Domains Detecting MSU StegoVideo. [Citation Graph (, )][DBLP]


  46. Distance Metric Learning and Support Vector Machines for Classification of Mass Spectrometry Proteomics Data. [Citation Graph (, )][DBLP]


  47. Learning Manifolds for Bankruptcy Analysis. [Citation Graph (, )][DBLP]


  48. Detecting information-hiding in WAV audios. [Citation Graph (, )][DBLP]


  49. Estimating Monthly Production of Oil Wells. [Citation Graph (, )][DBLP]


  50. Knowledge Based Discovery of Phishing Attacks. [Citation Graph (, )][DBLP]


  51. Recursive Feature Addition for Gene Selection. [Citation Graph (, )][DBLP]


  52. Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods. [Citation Graph (, )][DBLP]


  53. Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting. [Citation Graph (, )][DBLP]


  54. Building resilient classifiers for LSB matching steganography. [Citation Graph (, )][DBLP]


  55. Spectrum Steganalysis of WAV Audio Streams. [Citation Graph (, )][DBLP]


  56. Novel stream mining for audio steganalysis. [Citation Graph (, )][DBLP]


  57. Improved detection and evaluation for JPEG steganalysis. [Citation Graph (, )][DBLP]


  58. Gene Selection for Tumor Classification Using Microarray Gene Expression Data. [Citation Graph (, )][DBLP]


  59. Biased Support Vector Machines and Kernel Methods for Intrusion Detection. [Citation Graph (, )][DBLP]


  60. Classification of Mass Spectrometry Data - Using Manifold and Supervised Distance Metric Learning. [Citation Graph (, )][DBLP]


  61. Using Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis. [Citation Graph (, )][DBLP]


  62. Improving database quality through eliminating duplicate records. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.458secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002