Calculated based on number of publications stored in Pure and citations from Scopus
20012021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    Identifying IoT Devices with SMTP

    Wu, J. S., Hsu, F. H. & Lee, C. H., 2021, 2021 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2021. Institute of Electrical and Electronics Engineers Inc., (2021 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2020

    A Kernel Module Based Mechanism to Establish a TCP/IP Connection When Destination Service Changing

    Hung, R. Y., Hsu, F. H. & Lee, C. H., 28 Sep 2020, 2020 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2020. Institute of Electrical and Electronics Engineers Inc., 9258258. (2020 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The Research of Attacking TOR Network Users

    Huang, Y. W., Lee, C. H. & Hsu, F. H., 2020, Security with Intelligent Computing and Big-Data Services 2019 - Proceedings of the 3rd International Conference on Security with Intelligent Computing and Big-data Services SICBS. Jain, L. C., Peng, S-L. & Wang, S-J. (eds.). Springer, p. 35-38 4 p. (Advances in Intelligent Systems and Computing; vol. 1145 AISC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2019

    Keep rogue IoT away: IoT detector based on diversified tls negotiation

    Ou, C. W., Hsu, F. H. & Lai, C. M., Aug 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 548-555 8 p. 8890436. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Preventing Activity Hijacking Attacks in Android APP

    Wu, M. H., Hsu, F. H., Chang, T. C. & Lin, L. H., May 2019, Proceedings of 2019 IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability, ECBIOS 2019. Meen, T-H. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 170-173 4 p. 8807833. (Proceedings of 2019 IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability, ECBIOS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2016

    The bilateral communication-based dynamic extensible honeypot

    Wang, C. Y., Jhao, Y. L., Wang, C. S., Chen, S. J., Hsu, F. H. & Chen, Y. H., 21 Jan 2016, ICCST 2015 - The 49th Annual IEEE International Carnahan Conference on Security Technology. Institute of Electrical and Electronics Engineers Inc., p. 263-268 6 p. 7389693. (Proceedings - International Carnahan Conference on Security Technology; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2014

    Detecting phishing sites using URLs collected from emails

    Wang, C. S., Hsu, F. H., Chen, S. J., Hwang, Y. L. & Wu, M. H., 2014, Applied Science and Precision Engineering Innovation. p. 916-922 7 p. (Applied Mechanics and Materials; vol. 479-480).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Hawkeye: Finding spamming accounts

    Li, C. H., Hsu, F. H., Chen, S. J., Wang, C. S., Chen, Y. H. & Hwang, Y. L., 23 Dec 2014, APNOMS 2014 - 16th Asia-Pacific Network Operations and Management Symposium. Institute of Electrical and Electronics Engineers Inc., 6996106. (APNOMS 2014 - 16th Asia-Pacific Network Operations and Management Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Serum system: An automatic curing system for worms and buffer overflow-based botnets

    Chen, L. H., Hsu, F. H., Chen, S. J., Lin, C. J. & Hwang, Y. L., 2014, Applied Science and Precision Engineering Innovation. p. 923-927 5 p. (Applied Mechanics and Materials; vol. 479-480).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Defend a system against keyloggers with a privilege-limited account

    Hung, C. W., Hsu, F. H., Chen, S. J., Hwang, Y. L., Tso, C. K. & Hsu, L. P., 2013, Innovation for Applied Science and Technology. p. 3385-3389 5 p. (Applied Mechanics and Materials; vol. 284-287).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • JokerBot - An android-based botnet

    Jiang, R. M., Jhang, J. S., Hsu, F. H., Hwang, Y. L., Huang, P. & Sheu, Y. H., 2013, Innovation for Applied Science and Technology. p. 3454-3458 5 p. (Applied Mechanics and Materials; vol. 284-287).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2012

    A QTE-based solution to keylogger attacks

    Hung, C. W., Hsu, F. H., Chen, S. J., Tso, C. K., Hwang, Y. L., Lin, P. C. & Hsu, L. P., 2012, SECURWARE 2012 - 6th International Conference on Emerging Security Information, Systems and Technologies. p. 62-67 6 p. (SECURWARE 2012 - 6th International Conference on Emerging Security Information, Systems and Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2011

    Reversible watermarking scheme with visibility using randomize distance

    Wu, M. H., Hsu, F. H., Yang, C. H. & Wang, S. J., 2011, Proceedings - 2011 5th International Conference on Genetic and Evolutionary Computing, ICGEC 2011. p. 204-207 4 p. 6042752. (Proceedings - 2011 5th International Conference on Genetic and Evolutionary Computing, ICGEC 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • The perceptions of cooperative learning in computer-assisted language learning environmnets

    Hwang, Y., Huang, P., Chen, S. J. & Hsu, F. H., 2011, 2011 International Conference on Electrical and Control Engineering, ICECE 2011 - Proceedings. p. 6969-6972 4 p. 6056758. (2011 International Conference on Electrical and Control Engineering, ICECE 2011 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • TransSQL: A translation and validation-based solution for SQL-injection attacks

    Zhang, K. X., Lin, C. J., Chen, S. J., Hwang, Y., Huang, H. L. & Hsu, F. H., 2011, Proceedings - 1st International Conference on Robot, Vision and Signal Processing, RVSP 2011. p. 248-251 4 p. 6114949. (Proceedings - 1st International Conference on Robot, Vision and Signal Processing, RVSP 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • 2010

    Actor garbage collection using vertex-preserving actor-to-object graph transformations

    Wang, W. J., Varela, C., Hsu, F. H. & Tang, C. H., 2010, Advances in Grid and Pervasive Computing - 5th International Conference, GPC 2010, Proceedings. p. 244-255 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6104 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Improving histogram-based reversible data hiding by tictactoemidlet predictions

    Yang, C. H., Hsu, F. H., Wu, M. H. & Wang, S. J., 2010, Proceedings - 4th International Conference on Genetic and Evolutionary Computing, ICGEC 2010. p. 667-670 4 p. 5715520. (Proceedings - 4th International Conference on Genetic and Evolutionary Computing, ICGEC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2006

    Scalable network-based buffer overflow attack detection

    Hsu, F. H., Guo, F. & Chiueh, T. C., 2006, ANCS 2006 - Proceedings of the 2006 ACM/IEEE Symposium on Architectures for Networking and Communications Systems. p. 163-171 9 p. (ANCS 2006 - Proceedings of the 2006 ACM/IEEE Symposium on Architectures for Networking and Communications Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • 2004

    CTCP: A transparent centralized TCP/IP architecture for network security

    Hsu, F. H. & Chiueh, T. C., 2004, Proceedings - 20th Annual Computer Security Applications Conference, ACSAC 2004. p. 335-344 10 p. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations