Security threats on cloud computing vulnerabilities TS Chou International Journal of Computer Science & Information Technology 5 (3), 79, 2013 | 276 | 2013 |
Network intrusion detection design using feature selection of soft computing paradigms TS Chou, KK Yen, J Luo International Journal of Computer and Information Engineering 2 (11), 3722-3734, 2008 | 131 | 2008 |
Correlation-based feature selection for intrusion detection design TS Chou, KK Yen, J Luo, N Pissinou, K Makki MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 40 | 2007 |
Cloud computing survey on services, enhancements and challenges in the era of machine learning and data science W Hassan, TS Chou, O Tamer, J Pickard, P Appiah-Kubi, L Pagliari International Journal of Informatics and Communication Technology (IJ-ICT) 9 …, 2020 | 25 | 2020 |
Overview of learning cybersecurity through game based systems T Awojana, TS Chou 2019 CIEC, 2019 | 25 | 2019 |
Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks W Hassan, TS Chou, X Li, P Appiah-Kubi, O Tamer Int J Inf & Commun Technol ISSN 2252 (8776), 8776, 2019 | 25 | 2019 |
Fuzzy belief k-nearest neighbors anomaly detection of user to root and remote to local attacks TS Chou, KK Yen 2007 IEEE SMC Information Assurance and Security Workshop, 207-213, 2007 | 25 | 2007 |
Hand-eye: A vision based approach to data glove calibration TS Chou, A Gadd, D Knott Proceedings of Human Interface Technologies 7 (8), 2000 | 25 | 2000 |
Hybrid classifier systems for intrusion detection TS Chou, TN Chou 2009 Seventh Annual Communication Networks and Services Research Conference …, 2009 | 23 | 2009 |
Ensemble of machine learning algorithms for intrusion detection TS Chou, J Fan, S Fan, K Makki 2009 IEEE International Conference on Systems, Man and Cybernetics, 3976-3980, 2009 | 22 | 2009 |
A comparison of network simulation and emulation virtualization tools TS Chou, SK Baker, M Vega-Herrera 2016 ASEE Annual Conference & Exposition, 2016 | 18 | 2016 |
Intelligent factories using fuzzy expert systems ET Lee Kybernetes 25 (3), 51-55, 1996 | 17 | 1996 |
Development of an intrusion detection and prevention course project using virtualization technology TS Chou International Journal of Education and Development using ICT 7 (2), 46-55, 2011 | 12 | 2011 |
Ensemble fuzzy belief intrusion detection design TS Chou Florida International University, 2007 | 12 | 2007 |
Cyber security threats detection using ensemble architecture TS Chou International Journal of Security and Its Applications 5 (2), 17-32, 2011 | 11 | 2011 |
IPV6 diffusion on the Internet reaches a critical point J Pickard, M Angolia, TS Chou The Journal of Technology, Management, and Applied Engineering 34 (1), 2018 | 10 | 2018 |
Developing and evaluating an experimental learning environment for cyber security education TS Chou, J Jones Proceedings of the 19th Annual SIG Conference on Information Technology …, 2018 | 9 | 2018 |
Design of simulation-based laboratories for teaching wireless network technologies TS Chou, PJ Lunsford, K Thomson Proceedings of the 2015 Conference for Industry and Education Collaboration, 1-2, 2015 | 9 | 2015 |
An analysis of packet fragmentation attacks vs. snort intrusion detection system T Fu, TS Chou International Journal of Computer Engineering Science (IJCES), 2012 | 8 | 2012 |
Fuzzy belief reasoning for intrusion detection design TS Chou, KK Yen, N Pissinou, K Makki Third International Conference on Intelligent Information Hiding and …, 2007 | 8 | 2007 |