An overview of temporal and modal logic programming MA Orgun, W Ma International Conference on Temporal Logic, 445-479, 1994 | 187 | 1994 |
Password entropy and password quality W Ma, J Campbell, D Tran, D Kleeman 2010 fourth international conference on network and system security, 583-587, 2010 | 114 | 2010 |
Using Shannon Entropy as EEG Signal Feature for Fast Person Identification. DQ Phung, D Tran, W Ma, P Nguyen, T Pham ESANN 4 (1), 413-418, 2014 | 92 | 2014 |
Senior health monitoring using Kinect M Parajuli, D Tran, W Ma, D Sharma 2012 Fourth International Conference on Communications and Electronics (ICCE …, 2012 | 87 | 2012 |
Multi-factor EEG-based user authentication T Pham, W Ma, D Tran, P Nguyen, D Phung 2014 International Joint Conference on Neural Networks (IJCNN), 4029-4034, 2014 | 64 | 2014 |
Impact of restrictive composition policy on user password choices J Campbell, W Ma, D Kleeman Behaviour & Information Technology 30 (3), 379-388, 2011 | 64 | 2011 |
A novel spam email detection system based on negative selection W Ma, D Tran, D Sharma 2009 Fourth International Conference on Computer Sciences and Convergence …, 2009 | 50 | 2009 |
Age and gender classification using EEG paralinguistic features P Nguyen, D Tran, X Huang, W Ma 2013 6th International IEEE/EMBS Conference on Neural Engineering (NER …, 2013 | 42 | 2013 |
The good and not so good of enforcing password composition rules J Campbell, D Kleeman, W Ma Information Systems Security 16 (1), 2-8, 2007 | 42 | 2007 |
An optimal sphere and two large margins approach for novelty detection T Le, D Tran, W Ma, D Sharma The 2010 international joint conference on neural networks (IJCNN), 1-6, 2010 | 38 | 2010 |
EEG-based user authentication in multilevel security systems T Pham, W Ma, D Tran, P Nguyen, D Phung Advanced Data Mining and Applications: 9th International Conference, ADMA …, 2013 | 32 | 2013 |
A comprehensive survey of the feature extraction methods in the EEG research MA Rahman, W Ma, D Tran, J Campbell Algorithms and Architectures for Parallel Processing: 12th International …, 2012 | 31 | 2012 |
Negative selection with antigen feedback in intrusion detection W Ma, D Tran, D Sharma Artificial Immune Systems: 7th International Conference, ICARIS 2008, Phuket …, 2008 | 31 | 2008 |
A study on the feasibility of using EEG signals for authentication purpose T Pham, W Ma, D Tran, P Nguyen, D Phung Neural Information Processing: 20th International Conference, ICONIP 2013 …, 2013 | 30 | 2013 |
Investigating the possibility of applying EEG lossy compression to EEG-based user authentication B Nguyen, D Nguyen, W Ma, D Tran 2017 international joint conference on neural networks (IJCNN), 79-85, 2017 | 29 | 2017 |
A study on the stability of EEG signals for user authentication T Pham, W Ma, D Tran, DS Tran, D Phung 2015 7th International IEEE/EMBS Conference on Neural Engineering (NER), 122-125, 2015 | 29 | 2015 |
A security architecture for e-health services R Sulaiman, D Sharma, W Ma, D Tran 2008 10th International Conference on Advanced Communication Technology 2 …, 2008 | 29 | 2008 |
Multiple distribution data description learning method for novelty detection T Le, D Tran, P Nguyen, W Ma, D Sharma The 2011 International Joint Conference on Neural Networks, 2321-2326, 2011 | 28* | 2011 |
A conceptual framework for assessing password quality W Ma, J Campbell, D Tran, D Kleeman International Journal of Computer Science and Network Security 7 (1), 179-185, 2007 | 27 | 2007 |
On the study of EEG-based cryptographic key generation D Nguyen, D Tran, D Sharma, W Ma Procedia computer science 112, 936-945, 2017 | 26 | 2017 |