关注
Thu Yein (Thomas) Win
标题
引用次数
引用次数
年份
Big data based security analytics for protecting virtualized infrastructures in cloud computing
TY Win, H Tianfield, Q Mair
IEEE Transactions on Big Data 4 (1), 11-25, 2017
782017
Virtualization security combining mandatory access control and virtual machine introspection
TY Win, H Tianfield, Q Mair
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014
552014
Detection of malware and kernel-level rootkits in cloud computing environments
TY Win, H Tianfield, Q Mair
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
252015
Detection of phishing websites using generative adversarial network
P Robic-Butez, TY Win
2019 IEEE international Conference on Big data (Big data), 3216-3221, 2019
122019
Virtual machine introspection
TY Win, H Tianfield, Q Mair, TA Said, OF Rana
Proceedings of the 7th International Conference on Security of Information …, 2014
112014
Protect: Container process isolation using system call interception
TY Win, FP Tso, Q Mair, H Tianfield
2017 14th International Symposium on Pervasive Systems, Algorithms and …, 2017
82017
A method for determining the flow front velocity of a plastic melt in an injection molding process
H Mensler, S Zhang, T Win
Polymer Engineering & Science 59 (6), 1132-1145, 2019
42019
Sample reduction for physiological data analysis using principal component analysis in artificial neural network
CMS Adolfo, H Chizari, TY Win, S Al-Majeed
Applied Sciences 11 (17), 8240, 2021
32021
TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection
C Lo, J Christie, TY Win, Z Rezaeifar, Z Khan, P Legg
2024
Digital Twins in Industry 4.0 Cyber Security
C Lo, TY Win, Z Rezaeifar, Z Khan, P Legg
2023 IEEE Smart World Congress (SWC), 1-4, 2023
2023
Privacy-Preserving Pandemic Monitoring
TY Win, H Tianfield
Data Science Advancements in Pandemic and Outbreak Management, 194-206, 2021
2021
Virtualisation security in cloud computing
TY Win
Glasgow Caledonian University, 2016
2016
Malware and Kernel-Level Rootkits in Cloud Computing Environments. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, 3-5 November 2015, New York …
TY Win, H Tianfield, Q Mair
系统目前无法执行此操作,请稍后再试。
文章 1–13