Alex Hai Wang
Alex Hai Wang
Apple, Hitachi, Verisign, Penn State
Nessuna email verificata - Home page
Titolo
Citata da
Citata da
Anno
Don't follow me: Spam detection in twitter
AH Wang
2010 international conference on security and cryptography (SECRYPT), 1-10, 2010
6502010
Detecting spam bots in online social networking sites: a machine learning approach
AH Wang
IFIP Annual Conference on Data and Applications Security and Privacy, 335-342, 2010
2582010
Twitter spammer detection using data stream clustering
Z Miller, B Dickinson, W Deitrick, W Hu, AH Wang
Information Sciences 260, 64-73, 2014
2512014
Modeling and evaluating the survivability of an intrusion tolerant database system
H Wang, P Liu
Computer Security–ESORICS 2006, 207-224, 2006
402006
Towards database firewalls
K Bai, H Wang, P Liu
Data and Applications Security XIX, 924-924, 2005
252005
Machine learning for the detection of spam in twitter networks
AH Wang
International Conference on E-Business and Telecommunications, 319-333, 2010
232010
A semi-markov survivability evaluation model for intrusion tolerant database systems
AH Wang, S Yan, P Liu
2010 International Conference on Availability, Reliability and Security, 104-111, 2010
202010
Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies
H Wang, P Liu, L Li
International Journal of Information and Computer Security 1 (3), 315-340, 2007
152007
Modeling of pollution in p2p file sharing systems
Q Gu, K Bai, H Wang, P Liu, CH Chu
2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006 …, 2006
132006
Real-time data attack isolation for commercial database applications
P Liu, H Wang, L Li
Journal of network and computer applications 29 (4), 294-320, 2006
112006
Quantitative survivability evaluation of three virtual machine-based server architectures
Y Yang, Y Zhang, AH Wang, M Yu, W Zang, P Liu, S Jajodia
Journal of network and computer applications 36 (2), 781-790, 2013
92013
Evaluating the impact of intrusion detection deficiencies on the cost-effectiveness of attack recovery
H Wang, P Liu, L Li
Information Security, 146-157, 2004
82004
Pairwise constrained clustering for sparse and high dimensional feature spaces
S Yan, H Wang, D Lee, C Giles
Advances in Knowledge Discovery and Data Mining, 620-627, 2009
52009
Evaluating survivability and costs of three virtual machine based server architectures
M Yu, AH Wang, W Zang, P Liu
2010 International Conference on Security and Cryptography (SECRYPT), 1-8, 2010
42010
Costco: Robust content and structure constrained clustering of networked documents
S Yan, D Lee, AH Wang
International Conference on Intelligent Text Processing and Computational …, 2011
22011
A Stochastic Model of the Damage Propagation in Database Systems.
AH Wang, S Yan
Security and Management, 3-9, 2009
22009
Don’t follow me
AH Wang
Pennsylvania State University, US, 0
1
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–17