Alex Hai Wang

Affiliations:
  • The Pennsylvania State University


According to our database1, Alex Hai Wang authored at least 15 papers between 2004 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2014
Twitter spammer detection using data stream clustering.
Inf. Sci., 2014

2013
Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Netw. Comput. Appl., 2013

2011
Costco: Robust Content and Structure Constrained Clustering of Networked Documents.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2011

2010
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures.
Proceedings of the SECRYPT 2010, 2010

Don't Follow Me - Spam Detection in Twitter.
Proceedings of the SECRYPT 2010, 2010

Machine Learning for the Detection of Spam in Twitter Networks.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems.
Proceedings of the ARES 2010, 2010

2009
Pairwise Constrained Clustering for Sparse and High Dimensional Feature Spaces.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

A Stochastic Model of the Damage Propagation in Database Systems.
Proceedings of the 2009 International Conference on Security & Management, 2009

2007
Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies.
Int. J. Inf. Comput. Secur., 2007

2006
Real-time data attack isolation for commercial database applications.
J. Netw. Comput. Appl., 2006

Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System.
Proceedings of the Computer Security, 2006

2005
Towards Database Firewalls.
Proceedings of the Data and Applications Security XIX, 2005

2004
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery.
Proceedings of the Information Security, 7th International Conference, 2004


  Loading...