default search action
Ching-Hao Mao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c28]Shin-Ying Huang, Yen-Wen Huang, Ching-Hao Mao:
A multi-channel cybersecurity news and threat intelligent engine - SecBuzzer. ASONAM 2019: 691-695 - [c27]Chi-Kuan Chiu, Te-En Wei, Hsiao-Hsien Chang, Ching-Hao Mao:
Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network. ICACT 2019: 533-538 - [c26]Chia-Yu Huang, Hahn-Ming Lee, Jiunn-Chin Wang, Ching-Hao Mao:
Identifying HID-based attacks through process event graph using guilt-by-association analysis. ICCSP 2019: 273-278 - 2018
- [c25]Chi-Kuan Chiu, Hsiao-Hsien Chang, Ching-Hao Mao, Te-En Wei:
Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Graph Edit Distance. DSC 2018: 1-2 - [c24]Chia-Min Lai, Bo-Ching Huang, Shin-Ying Huang, Ching-Hao Mao, Hahn-Ming Lee:
Detection of DNS Tunneling by Feature-Free Mechanism. DSC 2018: 1-2 - 2017
- [j3]Kuo-Chan Lee, Chih-Hung Hsieh, Li-Jia Wei, Ching-Hao Mao, Jyun-Han Dai, Yu-Ting Kuang:
Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation. Soft Comput. 21(11): 2883-2896 (2017) - [c23]Tzu-Hsien Chuang, Shin-Ying Huang, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee:
Ziffersystem: A novel malware distribution detection system. DSC 2017: 509-515 - 2015
- [c22]Chih-Hung Hsieh, Kuo-Chen Lee, Ching-Hao Mao, Chia-Min Lai, Chiun-How Kao, Jyun-Han Dai:
Sec-Buzzers: a Web Service for Exploring Cyber Security Emerging Topics based on Social Network Mining. ASE BD&SI 2015: 27:1-27:6 - [c21]Chih-Hung Hsieh, Chia-Min Lai, Ching-Hao Mao, Tien-Cheu Kao, Kuo-Chen Lee:
AD2: Anomaly detection on active directory log data for insider threat monitoring. ICCST 2015: 287-292 - 2014
- [c20]Ting-Yao Chang, Wei-Yu Lai, Tien-Ruey Hsiang, Ching-Hao Mao:
Detecting Malware in Malicious Virtual Machines Using Tensor Analysis Techniques. ICS 2014: 821-830 - [c19]Ching-Hao Mao, Chung-Jung Wu, Evangelos E. Papalexakis, Christos Faloutsos, Kuo-Chen Lee, Tien-Cheu Kao:
MalSpot: Multi2 Malicious Network Behavior Patterns Analysis. PAKDD (1) 2014: 1-14 - 2013
- [c18]Horng-Tzer Wang, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee:
Clustering of Similar Malware Behavior via Structural Host-Sequence Comparison. COMPSAC 2013: 349-358 - 2012
- [j2]Hsing-Kuo Pao, Ching-Hao Mao, Hahn-Ming Lee, Chi-Dong Chen, Christos Faloutsos:
An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection. J. Inf. Sci. Eng. 28(2): 243-262 (2012) - [c17]Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu:
DroidMat: Android Malware Detection through Manifest and API Calls Tracing. AsiaJCIS 2012: 62-69 - [c16]Horng-Tzer Wang, Ching-Hao Mao, Kuo-Ping Wu, Hahn-Ming Lee:
Real-Time Fast-Flux Identification via Localized Spatial Geolocation Detection. COMPSAC 2012: 244-252 - [c15]Tien-Cheu Kao, Ching-Hao Mao, Chien-Yu Chang, Kai-Chi Chang:
Cloud SSDLC: Cloud Security Governance Deployment Framework in Secure System Development Life Cycle. TrustCom 2012: 1143-1148 - [c14]Te-En Wei, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee, Horng-Tzer Wang, Dong-Jie Wu:
Android Malware Detection via a Latent Network Behavior Analysis. TrustCom 2012: 1251-1258 - [c13]Ismail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Ching-Hao Mao, Te-En Wei, Shyi-Ming Chen:
RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis. TrustCom 2012: 1370-1375 - 2011
- [j1]Ching-Hao Mao, Hahn-Ming Lee, Che-Fu Yeh:
Adaptive e-mails intention finding system based on words social networks. J. Netw. Comput. Appl. 34(5): 1615-1622 (2011) - [c12]Meng-Han Tsai, Kai-Chi Chang, Chang-Cheng Lin, Ching-Hao Mao, Huey-Ming Lee:
C&C tracer: Botnet command and control behavior tracing. SMC 2011: 1859-1864 - 2010
- [c11]Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee:
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. AsiaCCS 2010: 101-111 - [c10]Ching-Hao Mao, Hsing-Kuo Pao, Christos Faloutsos, Hahn-Ming Lee:
SBAD: Sequence Based Attack Detection via Sequence Comparison. PSDML 2010: 78-91 - [c9]Yi-Hsun Wang, Ching-Hao Mao, Hahn-Ming Lee:
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks. TAV-WEB 2010: 15-26
2000 – 2009
- 2009
- [c8]Ching-Hao Mao, Hahn-Ming Lee, Devi Parikh, Tsuhan Chen, Si-Yu Huang:
Semi-supervised co-training and active learning based approach for multi-view intrusion detection. SAC 2009: 2042-2048 - [c7]Huey-Ming Lee, Ching-Hao Mao:
Finding Abnormal Events in Home Sensor Network Environment Using Correlation Graph. SMC 2009: 1852-1856 - 2007
- [c6]Huey-Ming Lee, Ching-Hao Mao:
A Self-adaptive Evolutionary Negative Selection Approach for Home Anomaly Events Detection. KES (3) 2007: 325-332 - [c5]Che-Fu Yeh, Ching-Hao Mao, Hahn-Ming Lee, Tsuhan Chen:
Adaptive e-mail intention finding mechanism based on e-mail words social networks. LSAD@SIGCOMM 2007: 113-120 - 2006
- [c4]Ching-Hao Mao, Ta-Wei Hung, Jan-Ming Ho, Hahn-Ming Lee:
Semantic Similarity Measurement of Chinese Financial News Titles Based on Event Frame Extracting. ICEBE 2006: 229-236 - [c3]Chiung-Wei Huang, Ching-Chung Yu, Ching-Hao Mao, Hahn-Ming Lee:
Network Motif Model: An Efficient Approach for Extracting Features from Relational Data. SMC 2006: 5141-5146 - 2005
- [c2]Huey-Ming Lee, Pin-Jen Chen, Yao-Jen Shih, Yuan-Chieh Tsai, Ching-Hao Mao:
An Intelligent Extracting Web Content Agent on the Internet. KES (2) 2005: 1265-1271 - 2004
- [c1]Huey-Ming Lee, Ching-Hao Mao, Shu-Yen Lee:
Intelligent Control Model of Information Appliances. KES 2004: 123-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint