Chien-Ting Kuo

According to our database1, Chien-Ting Kuo authored at least 14 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service.
Future Generation Comp. Syst., 2018

2016
The Effect of Screen Size of Mobile Devices on Reading Efficiency.
Proceedings of the Human Aspects of IT for the Aged Population. Design for Aging, 2016

2015
How to detect a compromised SDN switch.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

2014
Keeping an Eye on Your Security Through Assurance Indicators.
Proceedings of the SECRYPT 2014, 2014

A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line.
Proceedings of the Intelligent Systems and Applications, 2014

2013
Voting-Based Motion Estimation for Real-Time Video Transmission in Networked Mobile Camera Systems.
IEEE Trans. Industrial Informatics, 2013

2012
Rate and Quality Control With Embedded Coding for Mobile Robot With Visual Patrol.
IEEE Systems Journal, 2012

An Analysis of Security Patch Lifecycle Using Google Trend Tool.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
A Mechanism on Risk Analysis of Information Security with Dynamic Assessment.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
Temporal Sampling and Spatial Coding for Rate Control of Video Transmission on Mobile Cameras.
Proceedings of the IEEE International Conference on Control Applications, 2010

2009
Analysis of Priority Queue-Based Scheme to Alleviate Malicious Flows from Distributed DoS Attacks.
Proceedings of the Communication and Networking, 2009

Intelligent video transmission control for mobile cameras.
Proceedings of the IEEE International Conference on Control Applications, 2009

2008
An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Safeguard Intranet Using Embedded and Distributed Firewall System.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008


  Loading...