Ching-Hao Mao

According to our database1, Ching-Hao Mao authored at least 31 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Identifying HID-based attacks through process event graph using guilt-by-association analysis.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

A multi-channel cybersecurity news and threat intelligent engine - SecBuzzer.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Detection of DNS Tunneling by Feature-Free Mechanism.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Graph Edit Distance.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation.
Soft Comput., 2017

Ziffersystem: A novel malware distribution detection system.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2015
AD2: Anomaly detection on active directory log data for insider threat monitoring.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Sec-Buzzers: a Web Service for Exploring Cyber Security Emerging Topics based on Social Network Mining.
Proceedings of the ASE BigData & SocialInformatics 2015, 2015

2014
MalSpot: Multi2 Malicious Network Behavior Patterns Analysis.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Detecting Malware in Malicious Virtual Machines Using Tensor Analysis Techniques.
Proceedings of the Intelligent Systems and Applications, 2014

2013
Clustering of Similar Malware Behavior via Structural Host-Sequence Comparison.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection.
J. Inf. Sci. Eng., 2012

Android Malware Detection via a Latent Network Behavior Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Cloud SSDLC: Cloud Security Governance Deployment Framework in Secure System Development Life Cycle.
Proceedings of the 11th IEEE International Conference on Trust, 2012

RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Real-Time Fast-Flux Identification via Localized Spatial Geolocation Detection.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

DroidMat: Android Malware Detection through Manifest and API Calls Tracing.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Adaptive e-mails intention finding system based on words social networks.
J. Netw. Comput. Appl., 2011

C&C tracer: Botnet command and control behavior tracing.
Proceedings of the IEEE International Conference on Systems, 2011

2010
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks
Proceedings of the Proceedings Fourth International Workshop on Testing, 2010

SBAD: Sequence Based Attack Detection via Sequence Comparison.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Finding Abnormal Events in Home Sensor Network Environment Using Correlation Graph.
Proceedings of the IEEE International Conference on Systems, 2009

Semi-supervised co-training and active learning based approach for multi-view intrusion detection.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2007
Adaptive e-mail intention finding mechanism based on e-mail words social networks.
Proceedings of the 2007 Workshop on Large Scale Attack Defense, 2007

A Self-adaptive Evolutionary Negative Selection Approach for Home Anomaly Events Detection.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

2006
Network Motif Model: An Efficient Approach for Extracting Features from Relational Data.
Proceedings of the IEEE International Conference on Systems, 2006

Semantic Similarity Measurement of Chinese Financial News Titles Based on Event Frame Extracting.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

2005
An Intelligent Extracting Web Content Agent on the Internet.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2004
Intelligent Control Model of Information Appliances.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004


  Loading...