Follow
YW Chong
YW Chong
Verified email at usm.my
Title
Cited by
Cited by
Year
Energy harvesting for wearable devices: A review
YW Chong, W Ismail, K Ko, CY Lee
IEEE Sensors Journal 19 (20), 9047-9062, 2019
632019
A review on the role of blockchain technology in the healthcare domain
HD Zubaydi, YW Chong, K Ko, SM Hanshi, S Karuppayah
Electronics 8 (6), 679, 2019
512019
Comparative performance analysis of classification algorithms for intrusion detection system
M Anbar, R Abdullah, IH Hasbullah, YW Chong, OE Elejla
2016 14th Annual Conference on Privacy, Security and Trust (PST), 282-288, 2016
282016
Detection techniques of distributed denial of service attacks on software-defined networking controller–a review
MA Aladaileh, M Anbar, IH Hasbullah, YW Chong, YK Sanjalawe
IEEE Access 8, 143985-143995, 2020
232020
Security mechanism for IPv6 stateless address autoconfiguration
S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ...
2015 International Conference on Automation, Cognitive Science, Optics …, 2015
232015
Optimized access point selection with mobility prediction using hidden Markov model for wireless network
KL Yap, YW Chong
2017 ninth international conference on ubiquitous and future networks (ICUFN …, 2017
172017
Securing duplicate address detection on IPv6 using distributed trust mechanism
S Praptodiyono, IH Hasbullah, MM Kadhum, CY Wey, RK Murugesan, ...
Int J Simulation—Systems, Sci Technol 17 (26), 2016
162016
Proposed statistical-based approach for detecting distribute denial of service against the controller of software defined network (SADDCS)
MA Al-Adaileh, M Anbar, YW Chong, A Al-Ani
MATEC Web of Conferences 218, 02012, 2018
132018
An optimized flow management mechanism in OpenFlow network
ETB Hong, CY Wey
2017 International Conference on Information Networking (ICOIN), 143-147, 2017
122017
Network security situation assessment: a review and discussion
YB Leau, S Manickam, YW Chong
Information Science and Applications, 407-414, 2015
122015
Enhanced handover mechanism using mobility prediction in wireless networks
KL Yap, YW Chong, W Liu
PloS one 15 (1), e0227982, 2020
112020
Hybrid monitoring technique for detecting abnormal behaviour in rpl-based network.
M Alzubaidi, M Anbar, YW Chong, S Al-Sarawi
J. Commun. 13 (5), 198-208, 2018
112018
Adaptive path finding algorithm in dynamic environment for warehouse robot
MK Ng, YW Chong, K Ko, YH Park, YB Leau
Neural Computing and Applications 32 (17), 13155-13171, 2020
102020
Software-defined networking techniques to improve mobile network connectivity: technical review
KL Yap, YW Chong
IETE Technical review 35 (3), 292-304, 2018
92018
Comparative Performance Analysis of classification algorithm for Internal Intrusion Detection
M Anbar, R Abdulah, IH Hasbullah, YW Chong, OE Elejla
2016 14th Annual Conference on Privacy Security and Trust (PCT), 2016
92016
Improving security of duplicate address detection on IPv6 local network in public area
S Praptodiyono, IH Hasbullah, MM Kadhum, RK Murugesan, CY Wey, ...
2015 9th Asia Modelling Symposium (AMS), 123-128, 2015
82015
Comparative study on hybrid header compression over satellite-wireless networks
YW Chong, TC Wan
IETE Technical Review 30 (6), 461-472, 2013
82013
Entropy-based approach to detect DDoS attacks on software defined networking controller
M Aladaileh, M Anbar, IH Hasbullah, YK Sanjalawe, YW Chong
CMC-COMPUTERS MATERIALS & CONTINUA 69 (1), 373-391, 2021
52021
Efficient acoustic echo cancellation joint with noise reduction framework
SM Hanshi, YW Chong, S Ramadass, AN Naeem, KC Ooi
2014 International Conference on Computer, Communications, and Control …, 2014
52014
Concepts and types of peer-to-peer network topology for live video streaming
AW AlTuhafi, S Ramadass, YW Chong
2013 IEEE International Conference on RFID-Technologies and Applications …, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20