Volgen
Chien-Chih Chen
Chien-Chih Chen
Research Assistent, Academia Sinica
Geverifieerd e-mailadres voor iis.sinica.edu.tw
Titel
Geciteerd door
Geciteerd door
Jaar
A de novo next generation genomic sequence assembler based on string graph and MapReduce cloud computing framework
YJ Chang, CC Chen, CL Chen, JM Ho
BMC Genomics 13 (Suppl 7), S28, 2012
572012
BibPro: A citation parser based on sequence alignment
CC Chen, KH Yang, CL Chen, JM Ho
IEEE Transactions on Knowledge and Data Engineering 24 (2), 236-250, 2010
422010
CloudDOE: a user-friendly tool for deploying Hadoop clouds and analyzing high-throughput sequencing data with MapReduce
WC Chung, CC Chen, JM Ho, CY Lin, WL Hsu, YC Wang, DT Lee, F Lai, ...
PloS one 9 (6), e98146, 2014
372014
CloudRS: An error correction algorithm of high-throughput sequencing data based on scalable framework
CC Chen, YJ Chang, WC Chung, DT Lee, JM Ho
2013 IEEE International Conference on Big Data, 717-722, 2013
302013
BibPro: A Citation parser based on sequence alignment techniques
CC Chen, KH Yang, HY Kao, JM Ho
Advanced Information Networking and Applications-Workshops, 2008. AINAW 2008 …, 2008
302008
Ctracer: Uncover C&C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data
KF Hong, CC Chen, YT Chiu, KS Chou
Big Data (BigData Congress), 2015 IEEE International Congress on, 551-558, 2015
242015
MD-Miner: behavior-based tracking of network traffic for malware-control domain detection
JH Sun, TH Jeng, CC Chen, HC Huang, KS Chou
2017 IEEE Third International Conference on Big Data Computing Service and …, 2017
142017
De novo assembly of high-throughput sequencing data with cloud computing and new operations on string graphs
YJ Chang, CC Chen, JM Ho, CL Chen
2012 IEEE Fifth International Conference on Cloud Computing, 155-161, 2012
132012
Scalable command and control detection in log data through UF-ICF analysis
KF Hong, CC Chen, YT Chiu, KS Chou
2015 International Carnahan Conference on Security Technology (ICCST), 293-298, 2015
92015
Gateway apparatus, detecting method of malicious domain and hacked host thereof, and non-transitory computer readable medium
TH Jeng, CC Chen, JH Sun, K Chang, KS Chou
US Patent 10,574,695, 2020
82020
Doctrina: annotated bipartite graph mining for malware-control domain detection
SY Chen, TH Jeng, CC Huang, CC Chen, KS Chou
Proceedings of the 2017 7th International Conference on Communication and …, 2017
72017
Enhancing De Novo Transcriptome Assembly by Incorporating Multiple Overlap Sizes
CC Chen, WD Lin, YJ Chang, CL Chen, JM Ho
ISRN Bioinformatics 2012, 2012
72012
Cloud computing for malicious encrypted traffic analysis and collaboration
TH Jeng, WY Luo, CC Huang, CC Chen, KH Chang, YM Chen
International Journal of Grid and High Performance Computing (IJGHPC) 13 (3 …, 2021
62021
Optimizing a MapReduce module of preprocessing high-throughput DNA sequencing data
WC Chung, YJ Chang, CC Chen, DT Lee, JM Ho
2013 IEEE International Conference on Big Data, 1-6, 2013
52013
Md-minerp: Interaction profiling bipartite graph mining for malware-control domain detection
TH Jeng, YM Chen, CC Chen, CC Huang
Security and Communication Networks 2020, 1-20, 2020
32020
CC-Tracker: Interaction profiling bipartite graph mining for malicious network activity detection
TH Jeng, YM Chen, CC Chen, CC Huang, KS Chou
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
32018
NetFlowTotal: A cloud service integration platform for malicious traffic analysis and collaboration
TH Jeng, WM Chan, WY Luo, CC Huang, CC Chen, YM Chen
Proceedings of the 2nd International Conference on Computing and Big Data …, 2019
22019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–17