default search action
Te-Shun Chou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c12]Wajid Hassan, Te-Shun Chou, Leslie R. Pagliari, John Pickard, Tamer Omar:
Is Public Cloud Computing Adoption Strategically the Way to Go for All the Enterprises? BigDataSecurity/HPSC/IDS 2019: 310-320 - 2018
- [j4]Te-Shun Chou:
Course Design and Project Evaluation of a Network Management Course Implemented in On-Campus and Online Classes. Int. J. Online Pedagog. Course Des. 8(2): 44-56 (2018) - [c11]Te-Shun Chou, John Jones:
Developing and Evaluating an Experimental Learning Environment for Cyber Security Education. SIGITE 2018: 92-97 - [c10]Tolulope Awojana, Te-Shun Chou, Nicholas Hempenius:
Review of the Existing Game Based Learning System in Cybersecurity. SIGITE 2018: 144 - [c9]Nicholas Hempenius, Te-Shun Chou, Lee Toderick:
Cybersecurity Competitive Labs-as-a-Service: Automated Score and Message Board Design. SIGITE 2018: 148 - 2017
- [j3]Wajid Hassan, Patrick Appiah-Kubi, Te-Shun Chou:
Performance Metrics for Virtualized Telecommunication Environments. J. Commun. 12(9): 518-523 (2017) - [j2]Te-Shun Chou, Aaron Vanderbye:
The Impact of Hands-On Simulation Laboratories on Teaching of Wireless Communications. J. Inf. Technol. Educ. Innov. Pract. 16: 69-90 (2017) - 2015
- [c8]Te-Shun Chou, Evan Hoke:
Theoretical Research Project vs. Hands-on Project in a Network Management Course. SIGITE 2015: 145-148 - 2010
- [j1]Jun Lu, Te-Shun Chou, Jean H. Andrian:
Semi-Blind Channel Estimation and Multi-User Data Detection for Downlink MC-CDMA. Int. J. Commun. Networks Inf. Secur. 2(3) (2010)
2000 – 2009
- 2009
- [c7]Te-Shun Chou, Tsung-Nan Chou:
Hybrid Classifier Systems for Intrusion Detection. CNSR 2009: 286-291 - [c6]Te-Shun Chou, Jeffrey Fan, Sharon Fan, Kia Makki:
Ensemble of Machine Learning Algorithms for Intrusion Detection. SMC 2009: 3976-3980 - 2008
- [c5]Charles C. Castello, Jeffrey Fan, Te-Shun Chou, Hong-Ming Kuo:
Integration and Implementation of Secured IP Based Surveillance Networks. APSCC 2008: 117-122 - [c4]Te-Shun Chou, Sharon Fan, Wei Zhao, Jeffrey Fan, Asad Davari:
Intrusion Aware System-on-a-Chip Design with Uncertainty Classification. ICESS 2008: 527-531 - [c3]Jun Luo, Jean H. Andrian, Chi Zhou, Te-Shun Chou:
Soft parallel interference cancellation for a turbo coded uplink MC-CDMA system. WTS 2008: 145-150 - 2007
- [c2]Te-Shun Chou, Kang K. Yen, Niki Pissinou, Kia Makki:
Fuzzy Belief Reasoning for Intrusion Detection Design. IIH-MSP 2007: 621-624 - [c1]Te-Shun Chou, Kang K. Yen, Liwei An, Niki Pissinou, Kia Makki:
Fuzzy belief pattern classification of incomplete data. SMC 2007: 535-540
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint