If you made any changes in Pure these will be visible here soon.

Research Output

2007

Fuzzy Vector Quantization for Network Intrusion Detection

Tran, D., Ma, W., Sharma, D. & Nguyen, T., 2007, Proceedings: 2007 IEEE International Conference on Granular Computing (GrC 2007). Lin, T. Y. & Hu, X. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 566-570 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
10 Citations (Scopus)
3 Downloads (Pure)

Hoodwinking Spam Email Filters

Ma, W., Tran, D. & Sharma, D., 2007, Proceedings of WSEAS International Conference on Computer Engineering and Applications (CEA 2007). Pham, T., Sohrab, S. H., Catrakis, H. J., Necasova, S., Sharma, D., Jain, L. C., Tran, D. & Ma, W. (eds.). Queensland, Australia: WSEAS Press, p. 533-577 45 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access

MAITS: A Multi-Agent-Based IT Security Approach

Sharma, D., Ma, W., Tran, D. & Liu, S., 2007, Architectural Design of Multi-Agent Systems: Technologies and Techniques. Lin, H. (ed.). United States: Information Science Reference, p. 189-208 20 p.

Research output: A Conference proceeding or a Chapter in BookChapter

1 Citation (Scopus)

On Extendable Software Architecture for Spam Email Filtering

Ma, W., Tran, D. & Sharma, D., 2007, In : IAENG International Journal of Computer Science. 34, 1, p. 133-139 7 p.

Research output: Contribution to journalArticle

Open Access

Possibility Theory-Based Approach to Spam Email Detection

Tran, D., Ma, W., Sharma, D. & Nguyen, T., 2007, 2007 IEEE International Conference on Granular Computing (GRC 2007). Lin, T. Y. & Hu, X. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 571-575 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
5 Citations (Scopus)
1 Downloads (Pure)

Spam Email Categorization

Ma, W., Tran, D. & Sharma, D., 2007, In : Transactions on Computers Research. 1, 2, p. 87-91 5 p.

Research output: Contribution to journalArticle

Tablet PC Applications in an Academic Environment

Tran, D., Ma, W., Sharma, D. & Liu, S., 2007, 1st International Conference on Theories and Applications of Computer Science 2006, ICTACS 2006. Duc, D. A. (ed.). Vietnam: World Scientific Publishing Co. Pte Ltd, p. 121-133 12 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Text-to-Speech Technology-Based Programming Tool

Tran, D., Ma, W. & Sharma, D., 2007, Lecture Notes in Signal Science, Internet and Education. Lang, C. (ed.). China: Springer, p. 173-176 4 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

The Good and Not So Good of Enforcing Password Composition Rules

Campbell, J., Kleeman, D. & Ma, W., 2007, In : Information Systems Security. 16, 1, p. 2-8 7 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Using Tuple Space to Coordinate multiagent Activities

Ma, W., Tran, D. & Sharma, D., 2007, Knowledge-Based Intelligent Information Engineering Systems KES2007 - WIRN 2007. Apollini, B., Howlett, R. J. & Jain, L. (eds.). Germany: Springer, p. 589-596 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

2006

A Noise Tolerant Spam Email Detection Engine

Tran, D., Ma, W. & Sharma, D., 2006, Proceedings of the 5th Workshop on the Internet, Telecommunications and Signal Processing. Wysocki, B. J. & Wysocki, T. A. (eds.). Hobart, Australia: DSP for Communication Systems, p. 1-5 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

A Novel Approach to Programming: Agent Based Software Engineering

Sharma, D., Ma, W. & Tran, D., 2006, 10th International Conference, KES 2006. Knowledge-Based Intelligent Information and Engineering Systems. Gabrys, B., Howlett, R. J. & Jain, L. C. (eds.). Germany: Springer, p. 1184-1191 8 p. (Lecture Notes in Computer Science; vol. 4253).

Research output: A Conference proceeding or a Chapter in BookConference contribution

2 Citations (Scopus)

A proposed statistical model for spam email detection

Tran, D., Ma, W. & Sharma, D., 2006, 1st International Conference on Theories and Applications of Computer Science 2006, ICTACS 2006. Ho, B. T. (ed.). Vietnam: World Scientific Publishing, p. 15-24 10 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

2 Citations (Scopus)

Detecting Image Based Spam Email By Using OCR and Trigram Method

Ma, W., Tran, D. & Sharma, D., 2006, Proceeding of the Asia-Pacific Workshop on Visual Information Processing. Lu, H. & Xu, C. (eds.). China: National Laboratory of Pattern Recognition, China, p. 94-98 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Detecting Spam Email by Extracting Keywords from Image Attachments

Ma, W., Tran, D. & Sharma, D., 2006, 2006 International Conference on Hybrid Information Technology. Lee, G., Slezak, D., Sloot, P. & Kim, T. (eds.). Korea: SERC and SERSC, Korea, p. 1-10 10 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Fuzzy Normalization for Spam Email Detection

Tran, D. & Ma, W., 2006, Proceedings of the Joint 3rd International Conference on Soft Computing and Intelligent Systems and 7th International Symposium on advanced Intelligent Systems. Kikuchi, Z., Taniguchi, T. & Kang, G. T. (eds.). Tokyo, Japan: Tokyo Institute of Technology, p. 1505-1509 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Password Composition Policy: Does Enforcement Lead to Better Password Choices?

Campbell, J., Kleeman, D. & Ma, W., 2006, Proceedings of the 17th Australasian Conference on Information Systems. Spencer, S. & Jenkins, A. (eds.). South Australia: Association for Information Systems, p. 1-8 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
6 Citations (Scopus)
5 Downloads (Pure)

Tablet PC-Based Handwriting Applications

Tran, D., Ma, W. & Sharma, D., 2006, Proceedings of the Joint 3rd International Conference on Soft Computing and Intelligent Systems and 7th International Symposium on advanced Intelligent Systems. Kikuchi, Z., Taniguchi, T. & Kang, G. T. (eds.). Tokyo, Japan: Tokyo Institute of Technology, p. 1368-1373 6 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System

Ma, W., Tran, D. & Sharma, D., 2006, 10th International Conference, KES 2006. Knowledge-Based Intelligent Information and Engineering Systems.. Gabrys, B., Howlett, R. J. & Jain, L. C. (eds.). Germany: Springer Verlag, p. 1176-1183 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

2005

A Multiple Agents Based Intrusion Detection System

Ma, W. & Sharma, D., 2005, Knowledge-Based Intelligent Information and Engineering Systems. Khosla, Howlett & Jain. (eds.). Germany: Springer, p. 205-211 7 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

5 Citations (Scopus)

On an IT security framework

Sharma, D., Ma, W. & Tran, D., 2005, Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings. Khosla, Howlett & Jain. (eds.). Germany: Springer, p. 226-232 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3681 LNAI).

Research output: A Conference proceeding or a Chapter in BookConference contribution

1 Citation (Scopus)