Nong Ye

Orcid: 0000-0001-8977-4501

According to our database1, Nong Ye authored at least 57 papers between 1993 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Univariate Distribution Differences and Conditional Variables in Multivariate Data Associations as Network Flow Measures to Detect Network Attacks.
Proceedings of the ICBDC 2021: 6th International Conference on Big Data and Computing, Shenzhen, China, May 22, 2021

Multivariate Metrics of Normal and Anomalous Network Behaviors.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Learning Partial-Value Variable Associations.
Proceedings of the 4th International Conference on Big Data and Computing, 2019

The Partial-Value Association Discovery Algorithm to Learn Multilayer Structural System Models From System Data.
IEEE Trans. Syst. Man Cybern. Syst., 2017

A reverse engineering algorithm for mining a causal system model from system data.
Int. J. Prod. Res., 2017

Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value Association.
Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, 2017

Reverse engineering: Mining structural system models from system data.
Inf. Knowl. Syst. Manag., 2015

The analysis of service provider-user coordination for resource allocation in cloud computing.
Inf. Knowl. Syst. Manag., 2013

System impact characteristics of cyber services, security mechanisms, and attacks with implications in cyber system survivability.
Inf. Knowl. Syst. Manag., 2013

Analysis and modeling of service impacts on system activities, resource workloads and service performance on computer and network systems.
Inf. Knowl. Syst. Manag., 2012

Models of dynamic relations among service activities, system state and service quality on computer and network systems.
Inf. Knowl. Syst. Manag., 2010

Toward Development of Adaptive Service-Based Software Systems.
IEEE Trans. Serv. Comput., 2009

QoS protocols for end-to-end delay guarantee of instantaneous jobs on computer networks.
Inf. Knowl. Syst. Manag., 2008

Developing Service-Based Software Systems with QoS Monitoring and Adaptation.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Minimization of Job Waiting Time Variance on Identical Parallel Machines.
IEEE Trans. Syst. Man Cybern. Part C, 2007

Attack-norm separation for detecting attack-induced quality problems on computers and networks.
Qual. Reliab. Eng. Int., 2007

Job scheduling methods for reducing waiting time variance.
Comput. Oper. Res., 2007

Job scheduling to minimize the weighted waiting time variance of jobs.
Comput. Ind. Eng., 2007

A Supervised Clustering and Classification Algorithm for Mining Data With Mixed Variables.
IEEE Trans. Syst. Man Cybern. Part A, 2006

A Hybrid SPC Method with the Chi-Square Distance Monitoring Procedure for Large-scale, Complex Process Data.
Qual. Reliab. Eng. Int., 2006

QoS Model of a Router with Feedback Control.
Qual. Reliab. Eng. Int., 2006

An attack-norm separation approach for detecting cyber attacks.
Inf. Syst. Frontiers, 2006

A System-Fault-Risk Framework for cyber attack classification.
Inf. Knowl. Syst. Manag., 2006

Attack profiles to derive data observations, features, and characteristics of cyber attacks.
Inf. Knowl. Syst. Manag., 2006

Batch scheduled admission control for computer and network systems.
Inf. Knowl. Syst. Manag., 2006

A supervised clustering algorithm for computer intrusion detection.
Knowl. Inf. Syst., 2005

Enhancing router QoS through job scheduling with weighted shortest processing time-adjusted.
Comput. Oper. Res., 2005

Web server QoS models: applying scheduling rules from production planning.
Comput. Oper. Res., 2005

A Scientific Approach to Cyberattack Detection.
Computer, 2005

Robustness of the Markov-chain model for cyber-attack detection.
IEEE Trans. Reliab., 2004

EWMA forecast of normal system activity for computer intrusion detection.
IEEE Trans. Reliab., 2004

Data Measures and Collection Points to Detect Traffic Condition Changes on Large-Scale Computer Networks.
Inf. Knowl. Syst. Manag., 2004

QoS Requirements of Network Applications on the Internet.
Inf. Knowl. Syst. Manag., 2004

Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection.
Proceedings of the Intelligence and Security Informatics, 2004

Computer intrusion detection through EWMA for autocorrelated and uncorrelated data.
IEEE Trans. Reliab., 2003

Recent Developments in Chaotic Time Series Analysis.
Int. J. Bifurc. Chaos, 2003

Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection.
IEEE Trans. Computers, 2002

QoS-Centric Stateful Resource Management in Information Systems.
Inf. Syst. Frontiers, 2002

Information infrastructure of engineering collaboration in a distributed virtual enterprise.
Int. J. Comput. Integr. Manuf., 2002

Assessment of operation plan performance under uncertainty.
IEEE Trans. Syst. Man Cybern. Syst., 2001

Probabilistic techniques for intrusion detection based on computer audit data.
IEEE Trans. Syst. Man Cybern. Part A, 2001

Decision Tree Classifiers for Computer Intrusion Detection.
Parallel Distributed Comput. Pract., 2001

Robust intrusion tolerance in information systems.
Inf. Manag. Comput. Secur., 2001

A Hierarchical, Distributed Architecture of Command and Control.
Inf. Knowl. Syst. Manag., 2001

A System Architecture for Computer Intrusion Detection.
Inf. Knowl. Syst. Manag., 2001

A process control approach to cyber attack detection.
Commun. ACM, 2001

A Machine Learning Algorithm Based on Supervised Clustering and Classification.
Proceedings of the Active Media Technology, 6th International Computer Science Conference, 2001

Plan performance assessment under uncertainty for command and control.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

A comparative study of assembly planning in traditional and virtual environments.
IEEE Trans. Syst. Man Cybern. Part C, 1999

Assembly Planning Effectiveness using Virtual Reality.
Presence Teleoperators Virtual Environ., 1999

The MDS-ANAVA technique for assessing knowledge representation differences between skill groups.
IEEE Trans. Syst. Man Cybern. Part A, 1998

Automatic Setting of Article Format Through Neural Networks.
Int. J. Hum. Comput. Interact., 1997

The presentation of knowledge and state-information for system fault diagnosis.
IEEE Trans. Reliab., 1996

Interaction of Screen Distances, Screen Letter Heights and Source Document Distances.
Interact. Comput., 1996

An objective approach to exploring skill differences in strategies of computer program comprehension.
Behav. Inf. Technol., 1996

Quantitative and qualitative differences between experts and novices in chunking computer software knowledge.
Int. J. Hum. Comput. Interact., 1994

Introducing Problem Solving Strategies of Users into the Interface Design.
Proceedings of the Human-Computer Interaction: Software and Hardware Interfaces, 1993