Nong Ye

Orcid: 0000-0001-8977-4501

According to our database1, Nong Ye authored at least 57 papers between 1993 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Univariate Distribution Differences and Conditional Variables in Multivariate Data Associations as Network Flow Measures to Detect Network Attacks.
Proceedings of the ICBDC 2021: 6th International Conference on Big Data and Computing, Shenzhen, China, May 22, 2021

2019
Multivariate Metrics of Normal and Anomalous Network Behaviors.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Learning Partial-Value Variable Associations.
Proceedings of the 4th International Conference on Big Data and Computing, 2019

2017
The Partial-Value Association Discovery Algorithm to Learn Multilayer Structural System Models From System Data.
IEEE Trans. Syst. Man Cybern. Syst., 2017

A reverse engineering algorithm for mining a causal system model from system data.
Int. J. Prod. Res., 2017

Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value Association.
Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, 2017

2015
Reverse engineering: Mining structural system models from system data.
Inf. Knowl. Syst. Manag., 2015

2013
The analysis of service provider-user coordination for resource allocation in cloud computing.
Inf. Knowl. Syst. Manag., 2013

System impact characteristics of cyber services, security mechanisms, and attacks with implications in cyber system survivability.
Inf. Knowl. Syst. Manag., 2013

2012
Analysis and modeling of service impacts on system activities, resource workloads and service performance on computer and network systems.
Inf. Knowl. Syst. Manag., 2012

2010
Models of dynamic relations among service activities, system state and service quality on computer and network systems.
Inf. Knowl. Syst. Manag., 2010

2009
Toward Development of Adaptive Service-Based Software Systems.
IEEE Trans. Serv. Comput., 2009

2008
QoS protocols for end-to-end delay guarantee of instantaneous jobs on computer networks.
Inf. Knowl. Syst. Manag., 2008

Developing Service-Based Software Systems with QoS Monitoring and Adaptation.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

2007
Minimization of Job Waiting Time Variance on Identical Parallel Machines.
IEEE Trans. Syst. Man Cybern. Part C, 2007

Attack-norm separation for detecting attack-induced quality problems on computers and networks.
Qual. Reliab. Eng. Int., 2007

Job scheduling methods for reducing waiting time variance.
Comput. Oper. Res., 2007

Job scheduling to minimize the weighted waiting time variance of jobs.
Comput. Ind. Eng., 2007

2006
A Supervised Clustering and Classification Algorithm for Mining Data With Mixed Variables.
IEEE Trans. Syst. Man Cybern. Part A, 2006

A Hybrid SPC Method with the Chi-Square Distance Monitoring Procedure for Large-scale, Complex Process Data.
Qual. Reliab. Eng. Int., 2006

QoS Model of a Router with Feedback Control.
Qual. Reliab. Eng. Int., 2006

An attack-norm separation approach for detecting cyber attacks.
Inf. Syst. Frontiers, 2006

A System-Fault-Risk Framework for cyber attack classification.
Inf. Knowl. Syst. Manag., 2006

Attack profiles to derive data observations, features, and characteristics of cyber attacks.
Inf. Knowl. Syst. Manag., 2006

Batch scheduled admission control for computer and network systems.
Inf. Knowl. Syst. Manag., 2006

2005
A supervised clustering algorithm for computer intrusion detection.
Knowl. Inf. Syst., 2005

Enhancing router QoS through job scheduling with weighted shortest processing time-adjusted.
Comput. Oper. Res., 2005

Web server QoS models: applying scheduling rules from production planning.
Comput. Oper. Res., 2005

A Scientific Approach to Cyberattack Detection.
Computer, 2005

2004
Robustness of the Markov-chain model for cyber-attack detection.
IEEE Trans. Reliab., 2004

EWMA forecast of normal system activity for computer intrusion detection.
IEEE Trans. Reliab., 2004

Data Measures and Collection Points to Detect Traffic Condition Changes on Large-Scale Computer Networks.
Inf. Knowl. Syst. Manag., 2004

QoS Requirements of Network Applications on the Internet.
Inf. Knowl. Syst. Manag., 2004

Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection.
Proceedings of the Intelligence and Security Informatics, 2004

2003
Computer intrusion detection through EWMA for autocorrelated and uncorrelated data.
IEEE Trans. Reliab., 2003

Recent Developments in Chaotic Time Series Analysis.
Int. J. Bifurc. Chaos, 2003

2002
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection.
IEEE Trans. Computers, 2002

QoS-Centric Stateful Resource Management in Information Systems.
Inf. Syst. Frontiers, 2002

Information infrastructure of engineering collaboration in a distributed virtual enterprise.
Int. J. Comput. Integr. Manuf., 2002

2001
Assessment of operation plan performance under uncertainty.
IEEE Trans. Syst. Man Cybern. Syst., 2001

Probabilistic techniques for intrusion detection based on computer audit data.
IEEE Trans. Syst. Man Cybern. Part A, 2001

Decision Tree Classifiers for Computer Intrusion Detection.
Scalable Comput. Pract. Exp., 2001

Robust intrusion tolerance in information systems.
Inf. Manag. Comput. Secur., 2001

A Hierarchical, Distributed Architecture of Command and Control.
Inf. Knowl. Syst. Manag., 2001

A System Architecture for Computer Intrusion Detection.
Inf. Knowl. Syst. Manag., 2001

A process control approach to cyber attack detection.
Commun. ACM, 2001

A Machine Learning Algorithm Based on Supervised Clustering and Classification.
Proceedings of the Active Media Technology, 6th International Computer Science Conference, 2001

2000
Plan performance assessment under uncertainty for command and control.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1999
A comparative study of assembly planning in traditional and virtual environments.
IEEE Trans. Syst. Man Cybern. Part C, 1999

Assembly Planning Effectiveness using Virtual Reality.
Presence Teleoperators Virtual Environ., 1999

1998
The MDS-ANAVA technique for assessing knowledge representation differences between skill groups.
IEEE Trans. Syst. Man Cybern. Part A, 1998

1997
Automatic Setting of Article Format Through Neural Networks.
Int. J. Hum. Comput. Interact., 1997

1996
The presentation of knowledge and state-information for system fault diagnosis.
IEEE Trans. Reliab., 1996

Interaction of Screen Distances, Screen Letter Heights and Source Document Distances.
Interact. Comput., 1996

An objective approach to exploring skill differences in strategies of computer program comprehension.
Behav. Inf. Technol., 1996

1994
Quantitative and qualitative differences between experts and novices in chunking computer software knowledge.
Int. J. Hum. Comput. Interact., 1994

1993
Introducing Problem Solving Strategies of Users into the Interface Design.
Proceedings of the Human-Computer Interaction: Software and Hardware Interfaces, 1993


  Loading...