Andrew H. Sung
TitleCited byYear
Intrusion detection using neural networks and support vector machines
S Mukkamala, G Janoski, A Sung
Proceedings of the 2002 International Joint Conference on Neural Networks …, 2002
8652002
Identifying important features for intrusion detection using support vector machines and neural networks
AH Sung, S Mukkamala
2003 Symposium on Applications and the Internet, 2003. Proceedings., 209-216, 2003
5082003
Intrusion detection using an ensemble of intelligent paradigms
S Mukkamala, AH Sung, A Abraham
Journal of network and computer applications 28 (2), 167-182, 2005
4072005
Static analyzer of vicious executables (save)
AH Sung, J Xu, P Chavez, S Mukkamala
20th Annual Computer Security Applications Conference, 326-334, 2004
2442004
Identifying significant features for network forensic analysis using artificial intelligent techniques
S Mukkamala, AH Sung
International Journal of digital evidence 1 (4), 1-17, 2003
2252003
Detection of phishing attacks: A machine learning approach
R Basnet, S Mukkamala, AH Sung
Soft Computing Applications in Industry, 373-383, 2008
1692008
Ranking importance of input parameters of neural networks
AH Sung
Expert Systems with Applications 15 (3-4), 405-411, 1998
1681998
Feature selection for intrusion detection with neural networks and support vector machines
S Mukkamala, AH Sung
Transportation research record 1822 (1), 33-39, 2003
1492003
Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images
Q Liu, AH Sung, Z Chen, J Xu
Pattern Recognition 41 (1), 56-66, 2008
1332008
Polymorphic malicious executable scanner by API sequence analysis
JY Xu, AH Sung, P Chavez, S Mukkamala
Fourth International Conference on Hybrid Intelligent Systems (HIS'04), 378-383, 2004
1332004
Intrusion detection: support vector machines and neural networks
S Mukkamala, G Janoski, A Sung
proceedings of the IEEE International Joint Conference on Neural Networks …, 2002
1242002
Intrusion detection using ensemble of soft computing paradigms
S Mukkamala, AH Sung, A Abraham
Intelligent systems design and applications, 239-248, 2003
1192003
Temporal derivative-based spectrum and mel-cepstrum audio steganalysis
Q Liu, AH Sung, M Qiao
IEEE Transactions on Information Forensics and Security 4 (3), 359-368, 2009
1152009
Modeling intrusion detection systems using linear genetic programming approach
S Mukkamala, AH Sung, A Abraham
International Conference on Industrial, Engineering and Other Applications …, 2004
1152004
Intrusion detection systems using adaptive regression spines
S Mukkamala, AH Sung, A Abraham, V Ramos
Enterprise information systems VI, 211-218, 2006
1012006
The feature selection and intrusion detection problems
AH Sung, S Mukkamala
Annual Asian Computing Science Conference, 468-482, 2004
992004
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Q Liu, AH Sung, B Ribeiro, M Wei, Z Chen, J Xu
Information Sciences 178 (1), 21-36, 2008
982008
Computationally intelligent agents for distributed intrusion detection system and method of practicing same
AH Sung, S Mukkamala, JL Lassez
US Patent 7,941,855, 2011
962011
Predicting injection profiles using ANFIS
M Wei, B Bai, AH Sung, Q Liu, J Wang, ME Cather
Information Sciences 177 (20), 4445-4461, 2007
882007
A comparative study of techniques for intrusion detection
S Mukkamala, AH Sung
Proceedings. 15th IEEE International Conference on Tools with Artificial …, 2003
852003
The system can't perform the operation now. Try again later.
Articles 1–20