YW Chong
YW Chong
Verified email at usm.my
Title
Cited by
Cited by
Year
Comparative performance analysis of classification algorithms for intrusion detection system
M Anbar, R Abdullah, IH Hasbullah, YW Chong, OE Elejla
2016 14th Annual Conference on Privacy, Security and Trust (PST), 282-288, 2016
162016
Security mechanism for IPv6 stateless address autoconfiguration
S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ...
2015 International Conference on Automation, Cognitive Science, Optics …, 2015
152015
A review on the role of blockchain technology in the healthcare domain
HD Zubaydi, YW Chong, K Ko, SM Hanshi, S Karuppayah
Electronics 8 (6), 679, 2019
132019
Securing duplicate address detection on IPv6 using distributed trust mechanism
S Praptodiyono, IH Hasbullah, MM Kadhum, CY Wey, RK Murugesan, ...
Int. J. Simulation--Systems, Sci. Technol 17 (26), 2016
122016
Optimized access point selection with mobility prediction using hidden Markov model for wireless network
KL Yap, YW Chong
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN …, 2017
102017
Comparative study on hybrid header compression over satellite-wireless networks
YW Chong, TC Wan
IETE Technical Review 30 (6), 461-472, 2013
82013
Software-Defined Networking Techniques to Improve Mobile Network Connectivity: Technical Review
KL Yap, YW Chong
IETE Technical review 35 (3), 292-304, 2018
72018
An optimized flow management mechanism in OpenFlow network
ETB Hong, CY Wey
2017 International Conference on Information Networking (ICOIN), 143-147, 2017
72017
Energy harvesting for wearable devices: A review
YW Chong, W Ismail, K Ko, CY Lee
IEEE Sensors Journal 19 (20), 9047-9062, 2019
62019
Improving security of duplicate address detection on ipv6 local network in public area
S Praptodiyono, IH Hasbullah, MM Kadhum, RK Murugesan, CY Wey, ...
2015 9th Asia Modelling Symposium (AMS), 123-128, 2015
62015
Efficient Acoustic Echo Cancellation joint with noise reduction framework
SM Hanshi, YW Chong, S Ramadass, AN Naeem, KC Ooi
2014 International Conference on Computer, Communications, and Control …, 2014
62014
Network security situation assessment: A review and discussion
YB Leau, S Manickam, YW Chong
Information Science and Applications, 407-414, 2015
42015
Header Compression Scheme over Hybrid Satellite-WiMAX Network
YW Chong, IJ Mohamad, TC Wan
Trends in Network and Communications, 167-176, 2011
42011
Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network
M Alzubaidi, M Anbar, YW Chong, S Al-Sarawi
Journal of Communications 13 (5), 2018
32018
Proposed statistical-based approach for detecting distribute denial of service against the controller of software defined network (SADDCS)
MA Al-Adaileh, M Anbar, YW Chong, A Al-Ani
MATEC Web of Conferences 218, 02012, 2018
32018
Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol
IH Hasbullah, MM Kadhum, YW Chong, K Alieyan, A Osman
2016 14th Annual Conference on Privacy, Security and Trust (PST), 275-281, 2016
32016
LTE peak data rate estimation using modified alpha-shannon capacity formula
AA Bin-Salem, TC Wan, YW Chong, IJ Mohamad
Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference, 9-14, 2014
32014
Concepts and types of peer-to-peer network topology for live video streaming
AW AlTuhafi, S Ramadass, YW Chong
2013 IEEE International Conference on RFID-Technologies and Applications …, 2013
32013
Header Compression Scheme in Point-to-Point Link Model over Hybrid Satellite-Wimax Network
YW Chong, TC Wan
International Journal of Ad hoc, Sensor & Ubiquitous Computing 2 (3), 113, 2011
32011
REVIEW OF ACOUSTIC ECHO CANCELLATION TECHNIQUES FOR VOICE OVER IP.
SM Hanshi, YWEY CHONG, AN NAEEM
Journal of Theoretical & Applied Information Technology 77 (1), 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20