Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    An Efficient Algorithm for Fingercode-Based Biometric Identification

    With the emerging trend of incorporating biometrics information in e-financial and e-government systems arisen from international efforts in anti-money laundering and counter-terrorism, biometric identificatio...

    Hong-Wei Sun, Kwok-Yan Lam, Ming Gu in On the Move to Meaningful Internet Systems… (2006)

  2. No Access

    Chapter and Conference Paper

    An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems

    This paper proposes a new algorithm that improves the efficiency of the anomaly detection stage of a vector-based intrusion detection scheme. In general, intrusion detection schemes are based on the hypothesis...

    Hong-Wei Sun, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu in Networking and Mobile Computing (2005)

  3. No Access

    Chapter and Conference Paper

    Anomaly Detection in Grid Computing Based on Vector Quantization

    An efficient and effective intrusion detection model based the Vector Quantization (VQ) technique is proposed. This model is suitable for security monitoring in the grid computing environment. Experimental res...

    Hong-Wei Sun, Kwok-Yan Lam, Siu-Leung Chung in Grid and Cooperative Computing - GCC 2004 (2004)

  4. No Access

    Chapter and Conference Paper

    Enhancing the Scalability of the Community Authorization Service for Virtual Organizations

    Grid computing has emerged as a special form of distributed computing and is distinguished from conventional distributed computing by its focus on dynamic, large-scale resource sharing over a wide geographic d...

    Jian-** Yong, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu, Jia-Guang Sun in Content Computing (2004)

  5. No Access

    Chapter and Conference Paper

    Real-Time Emulation of Intrusion Victim in HoneyFarm

    Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of information about hackers techniques...

    **ng-Yun He, Kwok-Yan Lam, Siu-Leung Chung, Chi-Hung Chi in Content Computing (2004)