Follow
Thu Yein (Thomas) Win
Title
Cited by
Cited by
Year
Big data based security analytics for protecting virtualized infrastructures in cloud computing
TY Win, H Tianfield, Q Mair
IEEE Transactions on Big Data 4 (1), 11-25, 2017
772017
Virtualization security combining mandatory access control and virtual machine introspection
TY Win, H Tianfield, Q Mair
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014
522014
Detection of malware and kernel-level rootkits in cloud computing environments
TY Win, H Tianfield, Q Mair
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
272015
Detection of phishing websites using generative adversarial network
P Robic-Butez, TY Win
2019 IEEE International Conference on Big Data (Big Data), 3216-3221, 2019
132019
Virtual machine introspection
TY Win, H Tianfield, Q Mair, TA Said, OF Rana
Proceedings of the 7th International Conference on Security of Information …, 2014
102014
Protect: Container process isolation using system call interception
TY Win, FP Tso, Q Mair, H Tianfield
2017 14th International Symposium on Pervasive Systems, Algorithms and …, 2017
82017
A method for determining the flow front velocity of a plastic melt in an injection molding process
H Mensler, S Zhang, T Win
Polymer Engineering & Science 59 (6), 1132-1145, 2019
42019
Sample Reduction for Physiological Data Analysis Using Principal Component Analysis in Artificial Neural Network
CMS Adolfo, H Chizari, TY Win, S Al-Majeed
Applied Sciences 11 (17), 8240, 2021
22021
Privacy-Preserving Pandemic Monitoring
TY Win, H Tianfield
Data Science Advancements in Pandemic and Outbreak Management, 194-206, 2021
2021
Virtualisation security in cloud computing
TY Win
Glasgow Caledonian University, 2016
2016
Malware and Kernel-Level Rootkits in Cloud Computing Environments. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, 3-5 November 2015, New York …
TY Win, H Tianfield, Q Mair
The system can't perform the operation now. Try again later.
Articles 1–11