A cooperative botnet profiling and detection in virtualized environment SW Hsiao, YN Chen, YS Sun, MC Chen 2013 IEEE Conference on Communications and Network Security (CNS), 154-162, 2013 | 18 | 2013 |
Behavior grouping of Android malware family SW Hsiao, YS Sun, MC Chen 2016 IEEE International Conference on Communications (ICC), 1-6, 2016 | 17 | 2016 |
ANTSdroid: Automatic malware family behaviour generation and analysis for Android apps YS Sun, CC Chen, SW Hsiao, MC Chen Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 14 | 2018 |
Cross-level behavioral analysis for robust early intrusion detection SW Hsiao, YS Sun, MC Chen, H Zhang 2010 IEEE International Conference on Intelligence and Security Informatics …, 2010 | 14 | 2010 |
Hardware-assisted MMU redirection for in-guest monitoring and API profiling SW Hsiao, YS Sun, MC Chen IEEE Transactions on Information Forensics and Security 15, 2402-2416, 2020 | 12 | 2020 |
Slow-paced persistent network attacks analysis and detection using spectrum analysis LM Chen, SW Hsiao, MC Chen, W Liao IEEE Systems Journal 10 (4), 1326-1337, 2014 | 10 | 2014 |
Virtual machine introspection based malware behavior profiling and family grouping SW Hsiao, YS Sun, MC Chen arXiv preprint arXiv:1705.01697, 2017 | 9 | 2017 |
Combining dynamic passive analysis and active fingerprinting for effective bot malware detection in virtualized environments SW Hsiao, YN Chen, YS Sun, MC Chen Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 9 | 2013 |
Malware Family Characterization with Recurrent Neural Network and GHSOM Using System Calls CF Liu, SW Hsiao, F Yu 2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018 | 8 | 2018 |
Behavior profiling for robust anomaly detection SW Hsiao, YS Sun, MC Chen, H Zhang 2010 IEEE International Conference on Wireless Communications, Networking …, 2010 | 7 | 2010 |
Tagging malware intentions by using attention-based sequence-to-sequence neural network YT Huang, YY Chen, CC Yang, Y Sun, SW Hsiao, MC Chen Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019 | 6 | 2019 |
A Secure Proxy-Based Cross-Domain Communication for Web Mashups SW Hsiao, YS Sun, MC Chen Journal of Web Engineering 12 (3&4), 291-316, 2013 | 6 | 2013 |
A secure proxy-based cross-domain communication for web mashups SW Hsiao, YS Sun, FC Ao, MC Chen 2011 IEEE Ninth European Conference on Web Services, 57-64, 2011 | 6 | 2011 |
AI-Based online P2P lending risk assessment on social network data with missing value LT Lam, SW Hsiao 2019 IEEE International Conference on Big Data (Big Data), 6113-6115, 2019 | 5 | 2019 |
Mitigating DDoS with PoW and game theory KY Sung, SW Hsiao 2019 IEEE International Conference on Big Data (Big Data), 6223-6225, 2019 | 4 | 2019 |
IoT malware dynamic analysis profiling system and family behavior analysis CY Chen, SW Hsiao 2019 IEEE International Conference on Big Data (Big Data), 6013-6015, 2019 | 3 | 2019 |
Attention-aware multi-modal rnn for deception detection SW Hsiao, CY Sun 2022 IEEE International Conference on Big Data (Big Data), 3593-3596, 2022 | 2 | 2022 |
Scalable long-term network forensics for epidemic attacks LM Chen, MC Chen, YS Sun, SW Hsiao, V Sekar, H Zhang 2009 International Conference on Network and Service Security, 1-6, 2009 | 2 | 2009 |
Attack Tactic Identification by Transfer Learning of Language Model LH Lin, SW Hsiao arXiv preprint arXiv:2209.00263, 2022 | 1 | 2022 |
Sequence Feature Extraction for Malware Family Analysis via Graph Neural Network SW Hsiao, PY Chu arXiv preprint arXiv:2208.05476, 2022 | 1 | 2022 |