Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Yen-Hung Hu"'
Publikováno v:
Journal of The Colloquium for Information Systems Security Education. 10:8
Cybersecurity exploits that take advantage of weak passwords continue to succeed in virtually every industry. This motivates interest in empirically determining the extent to which websites that invite visitors to create new user accounts on them enc
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030730994
Technology and the Internet of Things (IoT) has changed the way the world communicates and shares information. Emergent technologies, with their elaborate infrastructures for uploading, commenting, liking, and sharing, have created an almost ideal en
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c382a655cd003221bf2d8bb5a92d06ce
https://doi.org/10.1007/978-3-030-73100-7_45
https://doi.org/10.1007/978-3-030-73100-7_45
Autor:
Yen-Hung Hu, Charles Hu
Publikováno v:
2020 International Conference on Computational Science and Computational Intelligence (CSCI).
Deep learning is a form of artificial intelligence (AI) that has seen rapid development and deployment in computer software as a means to implementing AI functionality with greater efficiency and ease as compared to other alternative AI solutions, wi
Publikováno v:
2020 International Conference on Computational Science and Computational Intelligence (CSCI).
Containers are designed as lightweight alternatives to Virtual Machines (VMs) with faster and more efficient deployment capabilities. As more applications are being run in the cloud, containers’ role in deploying microservices is becoming increasin
Publikováno v:
2019 SoutheastCon.
Some malware variants have the ability to obfuscate and change their activities, which increases the difficulty for classifying their identity. Especially, when there is a lack of systematic analysis of their activities and signature patterns. Machin
Autor:
Yen-Hung Hu, Charles Scott
Publikováno v:
Journal of Computer and Communications. :25-36
Security plays a large role in software development; simply without its existence the software would be vulnerable to many different types of attacks. Software security prevents leaks of data, alternation of data, and unauthorized access to data. Bui
Autor:
Yen-Hung Hu
Publikováno v:
Journal of Electrical & Electronic Systems.
Network traffic traces provide valuable information for researchers to study behaviors of normal and malicious network activities. Although traffic traces are enough to reveal packet-level and connection-level details of most network activities, iden
Autor:
Yen-Hung Hu
Publikováno v:
Journal of Electrical & Electronic Systems.
An open challenge in trustworthy computing is the development of a trustworthy network since network plays an essential role of current computing infrastructure (e.g., grid computing, cloud computing, etc.). In order to have a trustworthy network, se
Autor:
Yen-Hung Hu
Publikováno v:
Proceedings 2007 IEEE SoutheastCon.
As the Internet becomes more mature and a part of our daily life, technologies used to provide continuous services of the Internet under all circumstances become more crucial. Collectively, these technologies ensure that resources are always availabl
Publikováno v:
IWIA
Congestion control in IP networks is typically done at each router through queue management, and the network is entirely dependent on the end hosts to react congestion. However, when misbehaving flows exist and continue to send their packets in very