Zobrazeno 1 - 10
of 73
pro vyhledávání: '"Shou-Hsuan Stephen Huang"'
Autor:
Shou-Hsuan Stephen Huang, Zechun Cao
Publikováno v:
IEEE Access, Vol 8, Pp 208610-208622 (2020)
This project addresses the issue of detecting intruders from hiding behind privacy-protecting anonymity networks. The freely available Tor and the SOCKS proxy services have been popular tools that provide circuit-based anonymous connections to networ
Externí odkaz:
https://doaj.org/article/1cb672ed1f9b44f4b8187ecf5331aeb4
Autor:
Jianhua Yang, Shou-Hsuan Stephen Huang
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 4, Iss 4, Pp 17-22 (2006)
The Design of TCP/IP protocol makes it difficult to reliably traceback to the original attackers if they obscure their identities by logging through a chain of multiple hosts. A thumbprint method based on connection content was proposed in 1995 to tr
Externí odkaz:
https://doaj.org/article/cc495f426e974ca388d01353d666f924
Autor:
Zechun Cao, Shou-Hsuan Stephen Huang
Publikováno v:
Hybrid Intelligent Systems ISBN: 9783031274084
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::da0387b1c035a724ce9ec0d0883cc7fe
https://doi.org/10.1007/978-3-031-27409-1_122
https://doi.org/10.1007/978-3-031-27409-1_122
Publikováno v:
Hybrid Intelligent Systems ISBN: 9783031274084
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::998d7b4a312d12cb45c46fef0685537d
https://doi.org/10.1007/978-3-031-27409-1_121
https://doi.org/10.1007/978-3-031-27409-1_121
Autor:
Shou-Hsuan Stephen Huang, Abraham Báez-Suárez, Juan Arturo Nolazco-Flores, Weidong Shi, Nolan Shah, Omprakash Gnawali
Publikováno v:
ACM Transactions on Multimedia Computing, Communications, and Applications. 16:1-23
Audio fingerprinting techniques were developed to index and retrieve audio samples by comparing a content-based compact signature of the audio instead of the entire audio sample, thereby reducing memory and computational expense. Different techniques
Autor:
Zechun Cao, Shou-Hsuan Stephen Huang
Publikováno v:
Journal of Information Assurance & Security; 2023, Vol. 18 Issue 2, p48-57, 10p
Publikováno v:
Network and System Security ISBN: 9783030369378
NSS
NSS
Our society is facing a growing threat from data breaches where confidential information is stolen from computer servers. In order to steal data, hackers must first gain entry into the targeted systems. Commercial off-the-shelf intrusion detection sy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ea4b2f63a46f38c8949a77bdd93b3046
https://doi.org/10.1007/978-3-030-36938-5_19
https://doi.org/10.1007/978-3-030-36938-5_19
Autor:
Zechun Cao, Shou-Hsuan Stephen Huang
Publikováno v:
TrustCom/BigDataSE
The widely-used Tor network has become the most popular anonymous network that supports circuit-based lowlatency internet connections. However, recent security breach incidents reveal SSH have been used to launch attacks by malicious users. Although
Autor:
Ming-Chih Shih1, Shou-Hsuan Stephen Huang1 shuang@cs.uh.edu, Rachel Donohue2, Chung-Che Chang3, Youli Zu2
Publikováno v:
BMC Genomics. 2013 Suppl 7, Vol. 14, p1-16. 16p. 2 Diagrams, 5 Charts, 11 Graphs.
Publikováno v:
BCB
Flow cytometry, a powerful tool for the diagnosis of hematolymphoid malignancies including B-cell lymphomas, is an innovative technique that measures the fluorescence of suspended cells. Although several computerized methods are available for flow cy