The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nong Ye: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nong Ye, Xiangyang Li
    A Machine Learning Algorithm Based on Supervised Clustering and Classification. [Citation Graph (0, 0)][DBLP]
    Active Media Technology, 2001, pp:327-334 [Conf]
  2. Nong Ye, Vuong Nguyen, George C. Runger
    Plan performance assessment under uncertainty for command and control. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:354-357 [Conf]
  3. Nong Ye, Gavriel Salvendy
    Introducing Problem Solving Strategies of Users into the Interface Design. [Citation Graph (0, 0)][DBLP]
    HCI (2), 1993, pp:873-878 [Conf]
  4. Nong Ye, Joseph Giordano, John Feldman
    A process control approach to cyber attack detection. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:8, pp:76-82 [Journal]
  5. Nong Ye, Toni Farley
    A Scientific Approach to Cyberattack Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:11, pp:55-61 [Journal]
  6. Nong Ye, Esma Senturk Gel, Xueping Li, Toni Farley, Ying-Cheng Lai
    Web server QoS models: applying scheduling rules from production planning. [Citation Graph (0, 0)][DBLP]
    Computers & OR, 2005, v:32, n:, pp:1147-1164 [Journal]
  7. Nong Ye, Zhibin Yang, Ying-Cheng Lai, Toni Farley
    Enhancing router QoS through job scheduling with weighted shortest processing time-adjusted. [Citation Graph (0, 0)][DBLP]
    Computers & OR, 2005, v:32, n:, pp:2255-2269 [Journal]
  8. Nong Ye
    Robust intrusion tolerance in information systems. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:38-43 [Journal]
  9. Nong Ye
    QoS-Centric Stateful Resource Management in Information Systems. [Citation Graph (0, 0)][DBLP]
    Information Systems Frontiers, 2002, v:4, n:2, pp:149-160 [Journal]
  10. Nong Ye, Toni Farley, Deepak Lakshminarasimhan
    An attack-norm separation approach for detecting cyber attacks. [Citation Graph (0, 0)][DBLP]
    Information Systems Frontiers, 2006, v:8, n:3, pp:163-177 [Journal]
  11. Leah K. Hennings, Nong Ye
    Interaction of Screen Distances, Screen Letter Heights and Source Document Distances. [Citation Graph (0, 0)][DBLP]
    Interacting with Computers, 1996, v:8, n:4, pp:311-322 [Journal]
  12. Xiangyang Li, Nong Ye
    A supervised clustering algorithm for computer intrusion detection. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2005, v:8, n:4, pp:498-509 [Journal]
  13. Amarnath Banerjee, Prashant Banerjee, Nong Ye, Fred Dech
    Assembly Planning Effectiveness using Virtual Reality. [Citation Graph (0, 0)][DBLP]
    Presence, 1999, v:8, n:2, pp:204-217 [Journal]
  14. Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilbert
    Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2002, v:51, n:7, pp:810-820 [Journal]
  15. Nong Ye, Prashant Banerjee, Amarnath Banerjee, Fred Dech
    A comparative study of assembly planning in traditional and virtual environments. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 1999, v:29, n:4, pp:546-555 [Journal]
  16. Nong Ye
    The MDS-ANAVA technique for assessing knowledge representation differences between skill groups. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 1998, v:28, n:5, pp:586-600 [Journal]
  17. Nong Ye, Xiangyang Li, Qiang Chen, Syed Masum Emran, Mingming Xu
    Probabilistic techniques for intrusion detection based on computer audit data. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:266-274 [Journal]
  18. Xiangyang Li, Nong Ye
    Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:226-238 [Conf]
  19. Nong Ye, Yebin Zhang, C. M. Borror
    Robustness of the Markov-chain model for cyber-attack detection. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2004, v:53, n:1, pp:116-123 [Journal]
  20. Nong Ye, Qiang Chen, C. M. Borror
    EWMA forecast of normal system activity for computer intrusion detection. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2004, v:53, n:4, pp:557-566 [Journal]
  21. Nong Ye, Sean Vilbert, Qiang Chen
    Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2003, v:52, n:1, pp:75-82 [Journal]

  22. Job scheduling methods for reducing waiting time variance. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002