2008 |
10 | EE | Muazzam Siddiqui,
Morgan C. Wang,
Joohan Lee:
Detecting Trojans Using Data Mining Techniques.
IMTIC 2008: 400-411 |
2006 |
9 | EE | Bruce D. Caulkins,
Joohan Lee,
Morgan C. Wang:
Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND).
ACM Southeast Regional Conference 2006: 175-179 |
2005 |
8 | EE | Bruce D. Caulkins,
Joohan Lee,
Morgan C. Wang:
A dynamic data mining technique for intrusion detection systems.
ACM Southeast Regional Conference (2) 2005: 148-153 |
7 | EE | Bruce D. Caulkins,
Joohan Lee,
Morgan C. Wang:
Packet- vs. Session-Based Modeling for Intrusion Detection Systems.
ITCC (1) 2005: 116-121 |
6 | | Jianyong Dai,
Joohan Lee,
Morgan C. Wang:
Analytical Modeling of Data Mining Process Based on Distributed Tuple Space.
PDPTA 2005: 1135-1141 |
5 | | Jianyong Dai,
Joohan Lee,
Morgan C. Wang:
Efficient Parallel Data Mining for Massive Datasets: Parallel Random Forests Classifier.
PDPTA 2005: 1142-1148 |
2004 |
4 | EE | David S. Vogel,
Morgan C. Wang:
1-dimensional splines as building blocks for improving accuracy of risk outcomes models.
KDD 2004: 841-846 |
3 | EE | David S. Vogel,
Eric Gottschalk,
Morgan C. Wang:
Anti-matter detection: particle physics model for KDD Cup 2004.
SIGKDD Explorations 6(2): 109-112 (2004) |
2 | EE | David S. Vogel,
Eric Gottschalk,
Morgan C. Wang:
Protein matching with custom neural network objective functions.
SIGKDD Explorations 6(2): 125-127 (2004) |
1998 |
1 | | Morgan C. Wang:
The On-Line Survey System for Distance Learning Education at the University of Central Florida.
WebNet 1998 |