How to detect a compromised SDN switch PW Chi, CT Kuo, JW Guo, CL Lei Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015 | 110 | 2015 |
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service CT Kuo, PW Chi, V Chang, CL Lei Future Generation Computer Systems 86, 1424-1436, 2018 | 33 | 2018 |
Methods, systems, electronic devices, and non-transitory computer readable storage medium media for behavior based user interface layout display (build) W Wen-Nan, CT Kuo, CY Ho, W Feng-Sheng, AT CHANG, S Hsu, ... US Patent App. 14/220,312, 2015 | 30 | 2015 |
Method for pre-testing software compatibility and system thereof SJ Chen, CT Kuo US Patent 9,146,839, 2015 | 27 | 2015 |
Phishing processing method and system and computer readable storage medium applying the method FH Hsu, SJ Chen, CT Kuo, JS Wu, CS Wang US Patent 8,516,581, 2013 | 24 | 2013 |
Backup method, pre-testing method for environment updating and system thereof CT Kuo, SJ Chen US Patent App. 14/536,745, 2016 | 13 | 2016 |
An AMI threat detection mechanism based on SDN networks PW Chi, CT Kuo, HM Ruan, SJ Chen, CL Lei Proc. SECURWARE, 208-211, 2014 | 13 | 2014 |
Safeguard intranet using embedded and distributed firewall system CH Lin, JC Liu, CT Kuo, MC Chou, TC Yang 2008 Second International Conference on Future Generation Communication and …, 2008 | 11 | 2008 |
Phishing detecting system and method operative to compare web page images to a snapshot of a requested web page SJ Chen, CT Kuo US Patent 8,776,220, 2014 | 9 | 2014 |
An analysis of security patch lifecycle using google trend tool CT Kuo, HM Ruan, SJ Chen, CL Lei 2012 Seventh Asia Joint Conference on Information Security, 31-34, 2012 | 9 | 2012 |
A mechanism on risk analysis of information security with dynamic assessment CT Kuo, HM Ruan, CL Lei, SJ Chen 2011 Third International Conference on Intelligent Networking and …, 2011 | 8 | 2011 |
An effective priority queue-based scheme to alleviate malicious packet flows from distributed DoS attacks CH Lin, JC Liu, FC Jiang, CT Kuo 2008 International Conference on Intelligent Information Hiding and …, 2008 | 8 | 2008 |
Keeping an eye on your security through assurance indicators M Ouedraogo, CT Kuo, S Tjoa, D Preston, E Dubois, P Simoes, T Cruz 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-8, 2014 | 6 | 2014 |
Information security audit method, system and computer readable storage medium for storing thereof CT Kuo, HM Ruan, CL Lei US Patent App. 13/686,897, 2014 | 6 | 2014 |
Sensitive data discrimination method and data loss prevention system using the sensitive data discrimination method JS Wu, S Chong, CT Kuo US Patent 9,965,646, 2018 | 4 | 2018 |
A feasibility analysis for edge computing fusion in LPWA IoT environment with SDN structure CT Kuo, V Chang, CL Lei 2017 International Conference on Engineering and Technology (ICET), 1-6, 2017 | 4 | 2017 |
Priority Queue-based Scheme to Maintain Quality of Service for Normal Users Suffering from Large DDoS Attacks CH Lin, JC Liu, CT Kuo International Journal of Future Generation Communication and Networking 3 (2 …, 2010 | 3 | 2010 |
System, method and non-transitory computer readable medium for software testing CT Kuo, SJ Chen US Patent 9,830,252, 2017 | 2 | 2017 |
Authentication method and authentication system FAN Chuan-Yen, CT Kuo US Patent 10,162,957, 2018 | 1 | 2018 |
AUTHENTICATION METHOD AND AUTHENTICATION SYSTEM C Fan, C Kuo US Patent App. 15/371,176, 2018 | 1* | 2018 |