关注
Te-Shun Chou
Te-Shun Chou
在 ecu.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Security threats on cloud computing vulnerabilities
TS Chou
International Journal of Computer Science & Information Technology 5 (3), 79, 2013
2762013
Network intrusion detection design using feature selection of soft computing paradigms
TS Chou, KK Yen, J Luo
International Journal of Computer and Information Engineering 2 (11), 3722-3734, 2008
1312008
Correlation-based feature selection for intrusion detection design
TS Chou, KK Yen, J Luo, N Pissinou, K Makki
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
402007
Cloud computing survey on services, enhancements and challenges in the era of machine learning and data science
W Hassan, TS Chou, O Tamer, J Pickard, P Appiah-Kubi, L Pagliari
International Journal of Informatics and Communication Technology (IJ-ICT) 9 …, 2020
252020
Overview of learning cybersecurity through game based systems
T Awojana, TS Chou
2019 CIEC, 2019
252019
Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
W Hassan, TS Chou, X Li, P Appiah-Kubi, O Tamer
Int J Inf & Commun Technol ISSN 2252 (8776), 8776, 2019
252019
Fuzzy belief k-nearest neighbors anomaly detection of user to root and remote to local attacks
TS Chou, KK Yen
2007 IEEE SMC Information Assurance and Security Workshop, 207-213, 2007
252007
Hand-eye: A vision based approach to data glove calibration
TS Chou, A Gadd, D Knott
Proceedings of Human Interface Technologies 7 (8), 2000
252000
Hybrid classifier systems for intrusion detection
TS Chou, TN Chou
2009 Seventh Annual Communication Networks and Services Research Conference …, 2009
232009
Ensemble of machine learning algorithms for intrusion detection
TS Chou, J Fan, S Fan, K Makki
2009 IEEE International Conference on Systems, Man and Cybernetics, 3976-3980, 2009
222009
A comparison of network simulation and emulation virtualization tools
TS Chou, SK Baker, M Vega-Herrera
2016 ASEE Annual Conference & Exposition, 2016
182016
Intelligent factories using fuzzy expert systems
ET Lee
Kybernetes 25 (3), 51-55, 1996
171996
Development of an intrusion detection and prevention course project using virtualization technology
TS Chou
International Journal of Education and Development using ICT 7 (2), 46-55, 2011
122011
Ensemble fuzzy belief intrusion detection design
TS Chou
Florida International University, 2007
122007
Cyber security threats detection using ensemble architecture
TS Chou
International Journal of Security and Its Applications 5 (2), 17-32, 2011
112011
IPV6 diffusion on the Internet reaches a critical point
J Pickard, M Angolia, TS Chou
The Journal of Technology, Management, and Applied Engineering 34 (1), 2018
102018
Developing and evaluating an experimental learning environment for cyber security education
TS Chou, J Jones
Proceedings of the 19th Annual SIG Conference on Information Technology …, 2018
92018
Design of simulation-based laboratories for teaching wireless network technologies
TS Chou, PJ Lunsford, K Thomson
Proceedings of the 2015 Conference for Industry and Education Collaboration, 1-2, 2015
92015
An analysis of packet fragmentation attacks vs. snort intrusion detection system
T Fu, TS Chou
International Journal of Computer Engineering Science (IJCES), 2012
82012
Fuzzy belief reasoning for intrusion detection design
TS Chou, KK Yen, N Pissinou, K Makki
Third International Conference on Intelligent Information Hiding and …, 2007
82007
系统目前无法执行此操作,请稍后再试。
文章 1–20