Name
Papers
Collaborators
SHOU-HSUAN STEPHEN HUANG
51
54
Citations 
PageRank 
Referers 
174
59.88
239
Referees 
References 
349
323
Search Limit
100349
Title
Citations
PageRank
Year
Detecting Stepping-Stone Intruders By Identifying Crossover Packets In Ssh Connections10.362016
A Multi-Objective Flow Cytometry Profiling for B-Cell Lymphoma Diagnosis.00.342016
Detecting stepping-stones under the influence of packet jittering00.342013
Automatic B cell lymphoma detection using flow cytometry data.20.522012
Detecting Intruders Using a Long Connection Chain to Connect to a Host20.392011
Detecting Chaff Perturbation on Stepping-Stone Connection10.362011
Packet-based algorithms for stepping-stone detection with chaff perturbation00.342011
Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain00.342010
Detect multi-hop stepping-stone pairs with clock skew20.382010
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching20.402010
Neural networks-based detection of stepping-stone intrusion60.512010
Detecting Stepping-Stone Connection Using Association Rule Mining10.352009
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion20.382009
A Multidimensional Flow Cytometry Data Classification00.342009
Masquerade Detection Using Command Prediction and Association Rules Mining20.402009
Detecting Stepping-Stone Intruders with Long Connection Chains20.402009
An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets70.552008
Monitoring Network Traffic to Detect Stepping-Stone Intrusion70.552008
User Behavior Analysis in Masquerade Detection Using Principal Component Analysis40.582008
Detecting Masqueraders Using High Frequency Commands as Signatures40.462008
Integrating Direct3D Programming into Computer Science Curriculum10.432008
Mining TCP/IP packets to detect stepping-stone intrusion120.672007
Detecting Stepping-Stone with Chaff Perturbations60.562007
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection40.482007
Stepping-stone detection algorithm based on order preserving mapping70.572007
A Dynamic Mobility Management Scheme for VoIP Services20.432006
A clustering-partitioning algorithm to find TCP packet round-trip time for intrusion detection80.612006
Resistance analysis to intruders' evasion of detecting intrusion20.402006
Finding the longest similar subsequence of thumbprints for intrusion detection10.362006
Matching TCP packets and its application to the detection of long connection chains on the Internet171.032005
Improved thumbprint and its application for intrusion detection00.342005
Exploring Similarity among Web Pages Using the Hyperlink Structure10.352004
R2H: A Framework to Transform Relations into Hypertext00.342002
WebLQM : A Web Community Examiner00.342001
An Efficient Parallel Em Algorithm: A Sparse Matrix Compaction Technique00.341999
Inter-Iteration Optimization of Parallel EM Algorithm on Message-Passing Multicomputers20.491998
(R) Edge Embedding of Two-Dimensional Grids in Hypercubes with Dilation Two and Congestion Three00.341996
A New Combinatorial Approach to Optimal Embeddings of Rectangles70.701996
Embedding Two-Dimensional Grids into Hypercubes with Dilation 2 and Congestion 510.361995
DAVID Universal Books Management System46.011991
A sublinear parallel algorithm for some dynamic programming problems10.371990
Parallel dynamic programming50.551990
A VLSI partition algorithm00.341988
Optimal multiway split trees20.421987
Faster construction of optimal binary split trees110.831986
Ordered priority queues00.341986
Height balanced trees of order (beta,gamma,delta)1430.771985
Multidimensional extendible hashing for partial-match queries20.361985
Optimal binary split trees101.081984
Generalized binary split trees81.031984
  • 1
  • 2