Name
Papers
Collaborators
MING-YANG SU
35
40
Citations 
PageRank 
Referers 
362
22.26
930
Referees 
References 
480
343
Search Limit
100930
Title
Citations
PageRank
Year
Android Malware Detection Approaches in Combination with Static and Dynamic Features.00.342019
A resilient routing approach for Mobile Ad Hoc Networks00.342015
Permission-based malware detection mechanisms for smart phones20.452014
An efficient and secure approach for a cloud collaborative editing60.502013
A study on the data privacy and operation performance for cloud collaborative editing systems10.362012
A study on the prevention of sniffing nodes in mobile ad hoc networks00.342011
Genetic-fuzzy association rules for network intrusion detection systems10.352011
The Research of Locating Methods for Mobile Stations Based on IEEE 802.16e Multi-hop WMANs00.342011
Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification150.632011
A novel intrusion detection system based on hierarchical clustering and support vector machines1103.162011
Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers160.642011
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks40.472011
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems531.982011
Using Genetic Algorithm to Improve an Online Response System for Anomaly Traffic by Incremental Mining00.342010
An online response system for anomaly traffic by incremental mining with genetic optimization.20.362010
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks301.182010
Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks60.512010
Discovery and prevention of attack episodes by frequent episodes mining and finite state machines80.522010
Prevention of wormhole attacks in mobile ad hoc networks by intrusion detection nodes40.452010
Design of an adaptive positioning system based on WiFi radio signals130.762009
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach260.972009
Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems00.342009
A Real-Time Network Intrusion Detection System Based On Incremental Mining Approach10.362008
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN60.502008
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems10.412008
Anomaly Detection For Web Server Based On Smooth Support Vector Machine10.362008
An Efficient and Secured Internet Key Exchange Protocol Design20.382007
A Surveillance Spyware Detection System Based on Data Mining Methods50.482006
An E-Mail Client Implementation with Spam Filtering and Security Mechanisms00.342005
A general broadcasting scheme for recursive networks with complete connection30.422001
Node-disjoint paths in incomplete WK-recursive networks20.412000
Topological properties of incomplete WK-recursive networks50.461998
A shortest path routing algorithm for incomplete WK-recursive networks100.611997
Broadcasting on incomplete WK-recursive networks100.741996
A Multicast Algorithm for Hypercube Multiprocessors191.491994