Manghui Tu

According to our database1, Manghui Tu authored at least 34 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
The Social Economic, Environmental, Human Health, and Cybersecurity Impacts of Wireless and Mobile Computing.
J. Commun., 2018

Game based Cybersecurity Training for High School Students.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

2017
A secure contact protocol for delay tolerant networks.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
Automated Integration Testing Using Logical Contracts.
IEEE Trans. Reliab., 2016

2015
Data Loss Prevention Management and Control: Inside Activity Incident Monitoring, Identification, and Tracking in Healthcare Enterprise Environments.
J. Digit. Forensics Secur. Law, 2015

2014
Distributed replica placement algorithms for correlated data.
J. Supercomput., 2014

Automated Generation of Integration Test Sequences from Logical Contracts.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Resilience as a New System Engineering for Cloud Computing.
J. Commun., 2013

Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing.
J. Grid Comput., 2013

Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network Availability.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

System resilience modeling and enhancement for the cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

2012
Automated Security Test Generation with Formal Threat Models.
IEEE Trans. Dependable Secur. Comput., 2012

On the Development of Digital Forensics Curriculum.
J. Digit. Forensics Secur. Law, 2012

Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System.
J. Digit. Forensics Secur. Law, 2012

2011
Reach Availability Modeling of Replicated Services.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Secure Data Objects Replication in Data Grid.
IEEE Trans. Dependable Secur. Comput., 2010

Kernel-based Approaches for Collaborative Filtering.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

2009
Allocation of partitioned data by using a neural network based approach.
Neurocomputing, 2009

2008
A Scalable Update Protocol for Peer-to-Peer Data Grids.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2008

Data Integration for Recommendation Systems.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

Recruiting Students to Computer Science Program via Online Games.
Proceedings of the 2008 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2008

2007
Preference update for e-commerce applications: Model, language, and processing.
Electron. Commer. Res., 2007

Correlated Data Placement in Widely Distributed Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

An optimization method for selecting parameters in support vector machines.
Proceedings of the Sixth International Conference on Machine Learning and Applications, 2007

Placement in Dependable and Secure Peer-to-Peer Data Grids.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

A Secure and Scalable Update Protocol for P2P Data Grids.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Allocation of Partitioned Data by Using A Neural Network Based Approach.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Replica Placement Algorithms for Mobile Transaction Systems.
IEEE Trans. Knowl. Data Eng., 2006

2005
A study of the model and algorithms for handling location-dependent continuous queries.
Knowl. Inf. Syst., 2005

M3-Update: A New Update Model for E-Commerce and Web-Based Applications.
Int. J. Comput. Their Appl., 2005

On the Optimal Placement of Secure Data Objects over Internet.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

An Adaptive Multiparty Protocol for Secure Data Protection.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
Transaction Based Dynamic Partial Replication in Mobile Environments.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

2003
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003


  Loading...