2008 |
20 | EE | Wanli Ma,
Dat Tran,
Dharmendra Sharma:
Negative Selection with Antigen Feedback in Intrusion Detection.
ICARIS 2008: 200-209 |
19 | EE | Dat Tran,
Wanli Ma,
Dharmendra Sharma:
Automated network feature weighting-based anomaly detection.
ISI 2008: 162-166 |
18 | EE | Wanli Ma,
Dat Tran,
Dharmendra Sharma:
A study on the feature selection of network traffic for intrusion detection purpose.
ISI 2008: 245-247 |
2007 |
17 | EE | Dat Tran,
Wanli Ma,
Dharmendra Sharma,
Thien Nguyen:
Fuzzy Vector Quantization for Network Intrusion Detection.
GrC 2007: 566-570 |
16 | EE | Dat Tran,
Wanli Ma,
Dharmendra Sharma,
Thien Nguyen:
Possibility Theory-Based Approach to Spam Email Detection.
GrC 2007: 571-575 |
15 | | Dat Tran,
Wanli Ma,
Dharmendra Sharma,
Girija Chetty:
Fuzzy Normalisation Methods for Typist Verification.
IMECS 2007: 212-216 |
14 | | Wanli Ma,
Dat Tran,
Dharmendra Sharma:
On Extendable Software Architecture for Spam Email Filtering.
IMECS 2007: 924-928 |
13 | EE | Rossilawati Sulaiman,
Dharmendra Sharma,
Wanli Ma,
Dat Tran:
A Multi-agent Security Framework for e-Health Services.
KES (2) 2007: 547-554 |
12 | EE | Wanli Ma,
Dat Tran,
Dharmendra Sharma:
Using Tuple Space to Coordinate Multiagent Activities.
KES (2) 2007: 589-596 |
11 | EE | John Campbell,
Dale Kleeman,
Wanli Ma:
The Good and Not So Good of Enforcing Password Composition Rules.
Information Systems Security 16(1): 2-8 (2007) |
10 | EE | Dat Tran,
Wanli Ma,
Dharmendra Sharma:
Fuzzy Observable Markov Models for Pattern Recognition.
JACIII 11(6): 662-667 (2007) |
9 | EE | Dat Tran,
Wanli Ma,
Dharmendra Sharma:
Handwriting Recognition Applications for Tablet PCs.
JACIII 11(7): 787-792 (2007) |
2006 |
8 | EE | Wanli Ma,
Dat Tran,
Dharmendra Sharma:
Detecting Image Based Spam Email.
ICHIT 2006: 168-177 |
7 | EE | Wanli Ma,
Dat Tran,
Dharmendra Sharma,
Abhishek Mathur:
Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System.
KES (3) 2006: 1176-1183 |
6 | EE | Dharmendra Sharma,
Wanli Ma,
Dat Tran,
Mary Anderson:
A Novel Approach to Programming: Agent Based Software Engineering.
KES (3) 2006: 1184-1191 |
2005 |
5 | EE | Wanli Ma,
Dharmendra Sharma:
A Multiple Agents Based Intrusion Detection System.
KES (1) 2005: 205-211 |
4 | EE | Dharmendra Sharma,
Wanli Ma,
Dat Tran:
On an IT Security Framework.
KES (1) 2005: 226-232 |
1996 |
3 | EE | Wanli Ma,
C. W. Johnson,
Richard P. Brent:
Programming with transactions and chemical abstract machine.
ISPAN 1996: 562-564 |
1994 |
2 | | Mehmet A. Orgun,
Wanli Ma:
An Overview of Temporal and Modal Logic Programming.
ICTL 1994: 445-479 |
1 | | Kang Zhang,
Wanli Ma:
Graphical Assistance in Parallel Program Development.
VL 1994: 168-170 |