Showing 1 - 6 results of 6 for search 'Chin-Tser Huang', query time: 0.03s
Refine Results
-
1
-
2
Signal Processing Applications in Network Intrusion Detection Systems by Chin-Tser Huang, Rocky K. C. Chang, Polly Huang
Published 2009-01-01
Article -
3
A SYN fl ooding attack detection approach with hierarchical policies based on self-information by Jia-Rong Sun, Chin-Tser Huang, Min-Shiang Hwang
Published 2022-04-01
Article -
4
Improving transmission efficiency of large sequence alignment/map (SAM) files. by Muhammad Nazmus Sakib, Jijun Tang, W Jim Zheng, Chin-Tser Huang
Published 2011-01-01
Article -
5
Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus by Xudong He, Qin Liu, Shuang Chen, Chin-Tser Huang, Dejun Wang, Bo Meng
Published 2020-01-01
Article -
6
Efficient and Secure Multicast in WirelessMAN: A Cross-layer Design by Chin-Tser Huang, Manton Matthews, Matthew Ginley, Xinliang Zheng, Chuming Chen, J. Morris Chang
Published 2007-09-01
Article