If you made any changes in Pure these will be visible here soon.

Research Output

2005

A Multiple Agents Based Intrusion Detection System

Ma, W. & Sharma, D., 2005, Knowledge-Based Intelligent Information and Engineering Systems. Khosla, Howlett & Jain. (eds.). Germany: Springer, p. 205-211 7 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

5 Citations (Scopus)

On an IT security framework

Sharma, D., Ma, W. & Tran, D., 2005, Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings. Khosla, Howlett & Jain. (eds.). Germany: Springer, p. 226-232 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3681 LNAI).

Research output: A Conference proceeding or a Chapter in BookConference contribution

1 Citation (Scopus)
2006

A Noise Tolerant Spam Email Detection Engine

Tran, D., Ma, W. & Sharma, D., 2006, Proceedings of the 5th Workshop on the Internet, Telecommunications and Signal Processing. Wysocki, B. J. & Wysocki, T. A. (eds.). Hobart, Australia: DSP for Communication Systems, p. 1-5 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

A Novel Approach to Programming: Agent Based Software Engineering

Sharma, D., Ma, W. & Tran, D., 2006, 10th International Conference, KES 2006. Knowledge-Based Intelligent Information and Engineering Systems. Gabrys, B., Howlett, R. J. & Jain, L. C. (eds.). Germany: Springer, p. 1184-1191 8 p. (Lecture Notes in Computer Science; vol. 4253).

Research output: A Conference proceeding or a Chapter in BookConference contribution

2 Citations (Scopus)

A proposed statistical model for spam email detection

Tran, D., Ma, W. & Sharma, D., 2006, 1st International Conference on Theories and Applications of Computer Science 2006, ICTACS 2006. Ho, B. T. (ed.). Vietnam: World Scientific Publishing, p. 15-24 10 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

2 Citations (Scopus)

Detecting Image Based Spam Email By Using OCR and Trigram Method

Ma, W., Tran, D. & Sharma, D., 2006, Proceeding of the Asia-Pacific Workshop on Visual Information Processing. Lu, H. & Xu, C. (eds.). China: National Laboratory of Pattern Recognition, China, p. 94-98 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Detecting Spam Email by Extracting Keywords from Image Attachments

Ma, W., Tran, D. & Sharma, D., 2006, 2006 International Conference on Hybrid Information Technology. Lee, G., Slezak, D., Sloot, P. & Kim, T. (eds.). Korea: SERC and SERSC, Korea, p. 1-10 10 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Fuzzy Normalization for Spam Email Detection

Tran, D. & Ma, W., 2006, Proceedings of the Joint 3rd International Conference on Soft Computing and Intelligent Systems and 7th International Symposium on advanced Intelligent Systems. Kikuchi, Z., Taniguchi, T. & Kang, G. T. (eds.). Tokyo, Japan: Tokyo Institute of Technology, p. 1505-1509 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Password Composition Policy: Does Enforcement Lead to Better Password Choices?

Campbell, J., Kleeman, D. & Ma, W., 2006, Proceedings of the 17th Australasian Conference on Information Systems. Spencer, S. & Jenkins, A. (eds.). South Australia: Association for Information Systems, p. 1-8 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
6 Citations (Scopus)
5 Downloads (Pure)

Tablet PC-Based Handwriting Applications

Tran, D., Ma, W. & Sharma, D., 2006, Proceedings of the Joint 3rd International Conference on Soft Computing and Intelligent Systems and 7th International Symposium on advanced Intelligent Systems. Kikuchi, Z., Taniguchi, T. & Kang, G. T. (eds.). Tokyo, Japan: Tokyo Institute of Technology, p. 1368-1373 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System

Ma, W., Tran, D. & Sharma, D., 2006, 10th International Conference, KES 2006. Knowledge-Based Intelligent Information and Engineering Systems.. Gabrys, B., Howlett, R. J. & Jain, L. C. (eds.). Germany: Springer Verlag, p. 1176-1183 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

2007

A Conceptual Framework for Assessing Password Quality

Ma, W., Campbell, J., Tran, D. & Kleeman, D., 2007, In : IAHS Proceedings and Reports. 7, 1, p. 179-185 7 p.

Research output: Contribution to journalArticle

A Multi-Agent Security Framework for e-health Services

Sulaiman, R., Ma, W., Tran, D. & Sharma, D., 2007, Knowledge-Based Intelligent Information Engineering Systems: KES2007 - WIRN 2007. Apollini, B., Howlett, R. J. & Jain, L. (eds.). Germany: Springer, p. 547-554 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

6 Citations (Scopus)

Concurrent Programming with Multiagents and the Chemical Abstract Machine

Ma, W., Tran, D., Sharma, D. & Lin, H., 2007, Architectural Design of Multi-Agents Systems: Technologies and Techniques. Lin, H. (ed.). United States: Idea Group Reference, p. 26-47 22 p.

Research output: A Conference proceeding or a Chapter in BookChapter

Concurrent programming with multi-agents and the chemical abstract machine

Ma, W., Tran, D., Sharma, D., Lin, H. & Anderson, M., 2007, Architectural Design of Multi-Agent Systems: Technologies and Techniques. Lin, H. (ed.). Hershey, USA: IGI Global, p. 26-47 22 p.

Research output: A Conference proceeding or a Chapter in BookChapter

Detecting Image Based Spam Email

Ma, W., Tran, D. & Sharma, D., 2007, Advances in Hybrid Information Technology, Lecture Notes in Artificial Intelligence. Szczuka, M. S., Howard, D., Slezak, D., Kim, H., Kim, T., Ko, I., Lee, G. & Sloot, P. M. A. (eds.). Germany: Springer, p. 168-177 10 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

5 Citations (Scopus)

Fuzzy and Markov Models for Keystroke Biometrics Authentication

Tran, D., Ma, W., Chetty, G. & Sharma, D., 2007, New Advances in Simulation, Modeling and Optimization. Xu, D. (ed.). Beijing, China: World Scientific Publishing, p. 89-94 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access

Fuzzy Normalisation Methods for Typist Verification

Tran, D., Ma, W., Sharma, D. & Chetty, G., 2007, Lecture Notes in Engineering and Computer Science. Ao, S. I. & Castillo, O. (eds.). Hong Kong: Newswood Ltd. International Association of Engineers, p. 212-216 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Fuzzy Vector Quantization for Network Intrusion Detection

Tran, D., Ma, W., Sharma, D. & Nguyen, T., 2007, Proceedings: 2007 IEEE International Conference on Granular Computing (GrC 2007). Lin, T. Y. & Hu, X. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 566-570 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
10 Citations (Scopus)
3 Downloads (Pure)

Hoodwinking Spam Email Filters

Ma, W., Tran, D. & Sharma, D., 2007, Proceedings of WSEAS International Conference on Computer Engineering and Applications (CEA 2007). Pham, T., Sohrab, S. H., Catrakis, H. J., Necasova, S., Sharma, D., Jain, L. C., Tran, D. & Ma, W. (eds.). Queensland, Australia: WSEAS Press, p. 533-577 45 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access

MAITS: A Multi-Agent-Based IT Security Approach

Sharma, D., Ma, W., Tran, D. & Liu, S., 2007, Architectural Design of Multi-Agent Systems: Technologies and Techniques. Lin, H. (ed.). United States: Information Science Reference, p. 189-208 20 p.

Research output: A Conference proceeding or a Chapter in BookChapter

1 Citation (Scopus)

On Extendable Software Architecture for Spam Email Filtering

Ma, W., Tran, D. & Sharma, D., 2007, In : IAENG International Journal of Computer Science. 34, 1, p. 133-139 7 p.

Research output: Contribution to journalArticle

Open Access

Possibility Theory-Based Approach to Spam Email Detection

Tran, D., Ma, W., Sharma, D. & Nguyen, T., 2007, 2007 IEEE International Conference on Granular Computing (GRC 2007). Lin, T. Y. & Hu, X. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 571-575 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
5 Citations (Scopus)
1 Downloads (Pure)

Spam Email Categorization

Ma, W., Tran, D. & Sharma, D., 2007, In : Transactions on Computers Research. 1, 2, p. 87-91 5 p.

Research output: Contribution to journalArticle

Tablet PC Applications in an Academic Environment

Tran, D., Ma, W., Sharma, D. & Liu, S., 2007, 1st International Conference on Theories and Applications of Computer Science 2006, ICTACS 2006. Duc, D. A. (ed.). Vietnam: World Scientific Publishing Co. Pte Ltd, p. 121-133 12 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Text-to-Speech Technology-Based Programming Tool

Tran, D., Ma, W. & Sharma, D., 2007, Lecture Notes in Signal Science, Internet and Education. Lang, C. (ed.). China: Springer, p. 173-176 4 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

The Good and Not So Good of Enforcing Password Composition Rules

Campbell, J., Kleeman, D. & Ma, W., 2007, In : Information Systems Security. 16, 1, p. 2-8 7 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Using Tuple Space to Coordinate multiagent Activities

Ma, W., Tran, D. & Sharma, D., 2007, Knowledge-Based Intelligent Information Engineering Systems KES2007 - WIRN 2007. Apollini, B., Howlett, R. J. & Jain, L. (eds.). Germany: Springer, p. 589-596 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

2008

A Study on the Feature Selection of Network Traffic for intrusion Detection Purpose

Ma, W., Tran, D. & Sharma, D., 2008, Proceedings of the IEEE Intelligence and Security Informatics Conference 2008 (ISI 2008). Yang, C., Chen, W., Hsu, W. & Wu, T. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 245-247 3 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
12 Citations (Scopus)
3 Downloads (Pure)
Open Access

Automated network feature weighting-based anomaly detection

Tran, D., Ma, W. & Sharma, D., 2008, 2008 IEEE International Conference on Intelligence and Security Informatics. IEEE, Institute of Electrical and Electronics Engineers, p. 162-166 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
2 Citations (Scopus)

Automated network feature weighting-based intrusion detection systems

Tran, D., Wanli, M. & Sharma, D., 2008, 2008 IEEE International Conference on System of Systems Engineering, SoSE 2008. Danvers, USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1-6 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
3 Citations (Scopus)

Filtering Spam Email with Flexible Preprocessors

Ma, W., Tran, D. & Sharma, D., 2008, Advances in Communication Systes and Electrial Engineering. Huang, X., Chen, Y-S. & Ao, S. (eds.). New York, USA: Springer, p. 211-227 17 p.

Research output: A Conference proceeding or a Chapter in BookChapter

3 Citations (Scopus)

Negative Selection with Antigen Feedback in Intrusion Detection

Ma, W., Tran, D. & Sharma, D., 2008, 7th International Conference on Artificial Immune Systems (ICARIS 2008). Bentley, P. J., Lee, D. & Jung, S. (eds.). Germany: Springer, p. 200-209 10 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
5 Citations (Scopus)
1 Downloads (Pure)

Network Intrusion detection Using Subspace Methods

Tran, D., Ma, W. & Sharma, D., 2008, Proceedings of the Second International Conference on communications and Electronics. Trung, N. Q., Zich, R. & Popescu-Zeletin, R. (eds.). Vietnam: IEEE, Institute of Electrical and Electronics Engineers, p. 471-475 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

2009

A Generic Framework for Soft Subspace Pattern Recognition

Tran, D., Ma, W. & Sharma, D., 2009, Theory and Novel Applications of Machine Learning. Er, M. J. & Zhou, Y. (eds.). 1st ed. Croatia: In-Tech, p. 197-208 12 p.

Research output: A Conference proceeding or a Chapter in BookChapter

Open Access
File

A Multi-Agent Security Architecture

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., 2009, Proceedings of the 2009 Third International Conference on Network and System Security (NSS 2009). Xiang, Y., Lopez, J., Wang, H. & Zhou, W. (eds.). Gold Coast, Australia: IEEE, Institute of Electrical and Electronics Engineers, p. 184-191 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
6 Citations (Scopus)

A Novel Spam Email Detection System Based on Negative Selection

Ma, W., Tran, D. & Sharma, D., 2009, Fourth International Conference on Computer Sciences and Convergence Information Technology. Sungwon, Sohn, Kwack, K. D., Um, K., Lee, G. Y. & Ko, F. (eds.). Seoul, Korea: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 987-992 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
15 Citations (Scopus)
24 Downloads (Pure)

Fuzzy Subspace Hidden Markov Models for Pattern Recognition

Tran, D., Ma, W. & Sharma, D., 2009, IEEE-RIVF International Conference on Computing and Communication Technologies: Research, Innovation and Vision for the Future. Cao, T., Kutsche, R-D. & Demaille, A. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 43-48 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
1 Downloads (Pure)
2010

A new fuzzy membership computation method for fuzzy support vector machines

Tran, D., Ma, W. & Sharma, D., 2010, 2010 Third International Conference on Communications and Electronics (ICCE). USA: IEEE, p. 153-157 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
4 Citations (Scopus)
3 Downloads (Pure)

A new support vector machine method for medical image classification

Tran, D., Ma, W. & Sharma, D., 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP). USA: IEEE, p. 165-170 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
5 Citations (Scopus)

An optimal sphere and two large margins approach for novelty detection

Tran, D., Ma, W. & Sharma, D., 2010, 2010 International Joint Conference on Neural Networks (IJCNN). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1-6 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
16 Citations (Scopus)

A practical study on shape space and its occupancy in negative selection

Ma, W., Tran, D. & Sharma, D., 2010, WCCI 2010: IEEE World Congress on Computational Intelligence. Piscataway, N.J., USA: IEEE, p. 623-629 7 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
3 Citations (Scopus)

A study on exploring the expansion of IT WIL programs into non-IT organisations

Ma, W., Boland, G. & Phillips, D., 2010, Australian Collaborative Education Network National Conference 2010: Conference Proceedings: Work Integrated Learning (WIL): responding to challenges. Campbell, M. (ed.). Australia: Australian Collaborative Education Network (ACEN) Incorporated, p. 262-270 9 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access

A theoretical framework for multi-sphere support vector data description

Tran, D., Ma, W. & Sharma, D., 2010, International Conference on Neural Information Processing, ICONIP 2010: Neural Information Processing. Models and Applications. Berlin, Germany: Springer, Vol. 6444. p. 132-142 11 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

10 Citations (Scopus)

Fuzzy feature weighting techniques for vector quantisation

Tran, D., Ma, W. & Sharma, D., 2010, 2010 IEEE World Congress on Computational Intelligence. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1-6 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File

Negative selection as a means of discovering unknown temporal patterns

Ma, W., Tran, D. & Sharma, D., 2010, ICIS 2010: International Conference on Intelligent Systems. Lacity, M., March, S. & Niederman, F. (eds.). Online: World Academy of Science, Engineering and Technology, Vol. 65. p. 996-1002 7 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access

Password Entropy and Password Quality

Ma, W., Campbell, J., Tran, D. & Kleeman, D., 2010, Fourth International Conference on Network and System Security (NSS 2010). USA: IEEE, Institute of Electrical and Electronics Engineers, p. 583-587 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
36 Citations (Scopus)
6 Downloads (Pure)