Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ming-Lee Gan
@article{DBLP:journals/access/SamiullahGAA23, author = {Fouzia Samiullah and Ming{-}Lee Gan and Sedat Akleylek and Yichiet Aun}, title = {Group Key Management in Internet of Things: {A} Systematic Literature Review}, journal = {{IEEE} Access}, volume = {11}, pages = {77464--77491}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3298024}, doi = {10.1109/ACCESS.2023.3298024}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SamiullahGAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/YichietKGP22, author = {Aun Yichiet and Yen{-}Min Jasmina Khaw and Ming{-}Lee Gan and Vasaki Ponnusamy}, title = {A semantic-aware log generation method for network activities}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {2}, pages = {161--177}, year = {2022}, url = {https://doi.org/10.1007/s10207-021-00547-6}, doi = {10.1007/S10207-021-00547-6}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/YichietKGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/AunKG22, author = {Yichiet Aun and Yen{-}Min Jasmina Khaw and Ming{-}Lee Gan}, title = {A holistic IoT device classification approach through spatial {\&} temporal behaviors modelling}, journal = {Telecommun. Syst.}, volume = {79}, number = {4}, pages = {515--528}, year = {2022}, url = {https://doi.org/10.1007/s11235-021-00867-x}, doi = {10.1007/S11235-021-00867-X}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/AunKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsit/AunKGC22, author = {Yichiet Aun and Yen{-}Min Jasmina Khaw and Ming{-}Lee Gan and Debra Lee Hooi Chern}, title = {A Machine-Learning Ensemble Method for Temporal-aware Sales Forecasting}, booktitle = {5th International Conference on Data Science and Information Technology, {DSIT} 2022, Shanghai, China, July 22-24, 2022}, pages = {1--7}, year = {2022}, crossref = {DBLP:conf/dsit/2022}, url = {https://doi.org/10.1109/DSIT55514.2022.9943925}, doi = {10.1109/DSIT55514.2022.9943925}, timestamp = {Thu, 24 Nov 2022 14:56:16 +0100}, biburl = {https://dblp.org/rec/conf/dsit/AunKGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pris2/AunKGT22, author = {Yichiet Aun and Yen{-}Min Jasmina Khaw and Ming{-}Lee Gan and Ley{-}Ter Tin}, title = {A Machine-Learning Pipeline for Semantic-Aware and Contexts-Rich Video Description Method}, booktitle = {{PRIS} 2022: 4th International Conference on Pattern Recognition and Intelligent Systems, Wuhan, China, July 29 - 31, 2022}, pages = {14--22}, year = {2022}, crossref = {DBLP:conf/pris2/2022}, url = {https://doi.org/10.1145/3549179.3549182}, doi = {10.1145/3549179.3549182}, timestamp = {Tue, 23 Aug 2022 16:09:05 +0200}, biburl = {https://dblp.org/rec/conf/pris2/AunKGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbdcn/AunKGS21, author = {Yichiet Aun and Yen{-}Min Jasmina Khaw and Ming{-}Lee Gan and Low Jun Sheng}, title = {Intent-Based Network Policy to Solution Architecting Recommendations}, journal = {Int. J. Bus. Data Commun. Netw.}, volume = {17}, number = {1}, pages = {55--74}, year = {2021}, url = {https://doi.org/10.4018/IJBDCN.2021010104}, doi = {10.4018/IJBDCN.2021010104}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbdcn/AunKGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aces/AunKGP20, author = {Yichiet Aun and Yen{-}Min Jasmina Khaw and Ming{-}Lee Gan and Vasaki Ponnusamy}, title = {Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud}, booktitle = {Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers}, pages = {523--534}, year = {2020}, crossref = {DBLP:conf/aces/2020}, url = {https://doi.org/10.1007/978-981-33-6835-4\_35}, doi = {10.1007/978-981-33-6835-4\_35}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aces/AunKGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijthi/KoloseniLG19, author = {Daniel Ntabagi Koloseni and Chong Yee Lee and Ming{-}Lee Gan}, title = {Understanding Information Security Behaviours of Tanzanian Government Employees: {A} Health Belief Model Perspective}, journal = {Int. J. Technol. Hum. Interact.}, volume = {15}, number = {1}, pages = {15--32}, year = {2019}, url = {https://doi.org/10.4018/IJTHI.2019010102}, doi = {10.4018/IJTHI.2019010102}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijthi/KoloseniLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aces/AunGK19, author = {Yichiet Aun and Ming{-}Lee Gan and Yen{-}Min Jasmina Khaw}, title = {Automatic Attendance Taking: {A} Proof of Concept on Privacy Concerns in 802.11 {MAC} Address Probing}, booktitle = {Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers}, pages = {274--288}, year = {2019}, crossref = {DBLP:conf/aces/2019}, url = {https://doi.org/10.1007/978-981-15-2693-0\_20}, doi = {10.1007/978-981-15-2693-0\_20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aces/AunGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ebimcs/PonnusamyHYAG19, author = {Vasaki Ponnusamy and Wong Choon Hong and Aun Yichiet and Robithoh Annur and Ming{-}Lee Gan}, title = {Keystroke Dynamics in Mobile Platform}, booktitle = {{EBIMCS} 2019: 2nd International Conference on E-Business, Information Management and Computer Science, Kuala Lumpur, Malaysia, August, 2019}, pages = {11:1--11:8}, year = {2019}, crossref = {DBLP:conf/ebimcs/2019}, url = {https://doi.org/10.1145/3377817.3377843}, doi = {10.1145/3377817.3377843}, timestamp = {Fri, 09 Feb 2024 13:02:57 +0100}, biburl = {https://dblp.org/rec/conf/ebimcs/PonnusamyHYAG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cim/LiewTGG18, author = {Soung{-}Yue Liew and Cheng{-}Kiat Tan and Ming{-}Lee Gan and Hock Guan Goh}, title = {A Fast, Adaptive, and Energy-Efficient Data Collection Protocol in Multi-Channel-Multi-Path Wireless Sensor Networks}, journal = {{IEEE} Comput. Intell. Mag.}, volume = {13}, number = {1}, pages = {30--40}, year = {2018}, url = {https://doi.org/10.1109/MCI.2017.2773800}, doi = {10.1109/MCI.2017.2773800}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cim/LiewTGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/LiewG16, author = {Soung{-}Yue Liew and Ming{-}Lee Gan}, title = {Toggling dual label: an exact algorithm for finding the optimal pair of link-disjoint paths in {\(\alpha\)} + 1 path protection}, journal = {Telecommun. Syst.}, volume = {61}, number = {3}, pages = {451--469}, year = {2016}, url = {https://doi.org/10.1007/s11235-014-9964-6}, doi = {10.1007/S11235-014-9964-6}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/LiewG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/SiaGLG15, author = {Yeong Kang Sia and Hock Guan Goh and Soung{-}Yue Liew and Ming{-}Lee Gan}, title = {Spanning Multi-Tree Algorithm for node and traffic Balancing in multi-sink wireless sensor networks}, booktitle = {12th International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2015, Zhangjiajie, China, August 15-17, 2015}, pages = {2190--2195}, year = {2015}, crossref = {DBLP:conf/fskd/2015}, url = {https://doi.org/10.1109/FSKD.2015.7382292}, doi = {10.1109/FSKD.2015.7382292}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/fskd/SiaGLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/LiewGLG14, author = {Soung{-}Yue Liew and Ming{-}Lee Gan and Chong Shen Lim and Hock Guan Goh}, title = {Basketball net - {A} flexible and resilient topology for wireless sensor networks}, booktitle = {Sixth International Conference on Ubiquitous and Future Networks, {ICUFN} 2014, Shanghai, China, July 8-11, 2014}, pages = {87--92}, year = {2014}, crossref = {DBLP:conf/icufn/2014}, url = {https://doi.org/10.1109/ICUFN.2014.6876756}, doi = {10.1109/ICUFN.2014.6876756}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icufn/LiewGLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/GanL13, author = {Ming{-}Lee Gan and Soung{-}Yue Liew}, title = {Effective algorithms for finding optimum pairs of link-disjoint paths in {\(\alpha\)}+1 path protection}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {783--797}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9577-2}, doi = {10.1007/S11235-011-9577-2}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/GanL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/LiewG12, author = {Soung{-}Yue Liew and Ming{-}Lee Gan}, title = {An exact optimum paths-finding algorithm for {\(\alpha\)}+1 path protection}, booktitle = {2012 International Conference on Information Networking, {ICOIN} 2012, Bali, Indonesia, February 1-3, 2012}, pages = {210--215}, year = {2012}, crossref = {DBLP:conf/icoin/2012}, url = {https://doi.org/10.1109/ICOIN.2012.6164379}, doi = {10.1109/ICOIN.2012.6164379}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/LiewG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icumt/GanL10, author = {Ming{-}Lee Gan and Soung{-}Yue Liew}, title = {An optimum paths-finding algorithm for {\(\pm\)}+1 path protection}, booktitle = {Proceedings of the International Conference on Ultra Modern Telecommunications, {ICUMT} 2010, 18-20 October 2010, Moscow, Russia}, pages = {531--537}, year = {2010}, crossref = {DBLP:conf/icumt/2010}, url = {https://doi.org/10.1109/ICUMT.2010.5676586}, doi = {10.1109/ICUMT.2010.5676586}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icumt/GanL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dsit/2022, title = {5th International Conference on Data Science and Information Technology, {DSIT} 2022, Shanghai, China, July 22-24, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSIT55514.2022}, doi = {10.1109/DSIT55514.2022}, isbn = {978-1-6654-9868-5}, timestamp = {Thu, 28 Mar 2024 23:03:38 +0100}, biburl = {https://dblp.org/rec/conf/dsit/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pris2/2022, title = {{PRIS} 2022: 4th International Conference on Pattern Recognition and Intelligent Systems, Wuhan, China, July 29 - 31, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3549179}, doi = {10.1145/3549179}, isbn = {978-1-4503-9608-0}, timestamp = {Thu, 28 Mar 2024 23:03:38 +0100}, biburl = {https://dblp.org/rec/conf/pris2/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aces/2020, editor = {Mohammed Anbar and Nibras Abdullah and Selvakumar Manickam}, title = {Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1347}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-33-6835-4}, doi = {10.1007/978-981-33-6835-4}, isbn = {978-981-33-6834-7}, timestamp = {Thu, 28 Mar 2024 23:03:38 +0100}, biburl = {https://dblp.org/rec/conf/aces/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aces/2019, editor = {Mohammed Anbar and Nibras Abdullah and Selvakumar Manickam}, title = {Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1132}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2693-0}, doi = {10.1007/978-981-15-2693-0}, isbn = {978-981-15-2692-3}, timestamp = {Thu, 28 Mar 2024 23:03:38 +0100}, biburl = {https://dblp.org/rec/conf/aces/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ebimcs/2019, title = {{EBIMCS} 2019: 2nd International Conference on E-Business, Information Management and Computer Science, Kuala Lumpur, Malaysia, August, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3377817}, doi = {10.1145/3377817}, isbn = {978-1-4503-6649-6}, timestamp = {Thu, 28 Mar 2024 23:03:38 +0100}, biburl = {https://dblp.org/rec/conf/ebimcs/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fskd/2015, title = {12th International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2015, Zhangjiajie, China, August 15-17, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7374053/proceeding}, isbn = {978-1-4673-7682-2}, timestamp = {Thu, 28 Mar 2024 23:03:38 +0100}, biburl = {https://dblp.org/rec/conf/fskd/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icufn/2014, title = {Sixth International Conference on Ubiquitous and Future Networks, {ICUFN} 2014, Shanghai, China, July 8-11, 2014}, publisher = {{IEEE}}, year = {2014}, url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6867221}, timestamp = {Thu, 28 Mar 2024 23:03:38 +0100}, biburl = {https://dblp.org/rec/conf/icufn/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icoin/2012, editor = {Younghan Kim and Cheeha Kim and Panjai Tantatsanawong}, title = {2012 International Conference on Information Networking, {ICOIN} 2012, Bali, Indonesia, February 1-3, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6158351/proceeding}, isbn = {978-1-4673-0251-7}, timestamp = {Thu, 28 Mar 2024 23:03:38 +0100}, biburl = {https://dblp.org/rec/conf/icoin/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icumt/2010, title = {Proceedings of the International Conference on Ultra Modern Telecommunications, {ICUMT} 2010, 18-20 October 2010, Moscow, Russia}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5655222/proceeding}, isbn = {978-1-4244-7285-7}, timestamp = {Thu, 28 Mar 2024 23:03:38 +0100}, biburl = {https://dblp.org/rec/conf/icumt/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.