• 62 Citations
  • 5 h-Index
20062019
If you made any changes in Pure these will be visible here soon.

Personal profile

External positions

Fingerprint Dive into the research topics where Kok-Seng Wong is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Biometrics Engineering & Materials Science
Authentication Engineering & Materials Science
Data privacy Engineering & Materials Science
Network protocols Engineering & Materials Science
Cloud computing Engineering & Materials Science
Privacy Mathematics
Cryptography Engineering & Materials Science
Privacy Preserving Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2006 2019

  • 62 Citations
  • 5 h-Index
  • 18 Article
  • 8 Conference contribution
  • 3 Chapter

Privacy preserving of IP address through truncation method in network-based intrusion detection system

Chew, Y. J., Ooi, S. Y., Wong, K. S. & Pang, Y. H., Jan 1 2019, ACM International Conference Proceeding Series. Association for Computing Machinery, p. 569-573 5 p. (ACM International Conference Proceeding Series; vol. Part F147956).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Learning systems
Classifiers

Emerging issues and challenges for cloud data at the edge

Wong, K. S. & Kim, M. H., Jan 1 2018, In : International Journal of Web and Grid Services. 14, 2, p. 123-145 23 p.

Research output: Contribution to journalArticle

Data privacy
Bandwidth
Data storage equipment
Processing
Costs

Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system

Chew, Y. J., Ooi, S. Y., Wong, K-S., Pang, Y. H. & Hwang, S. O., Dec 24 2018, In : Journal of Intelligent and Fuzzy Systems. 35, 6, p. 5927 5937 p.

Research output: Contribution to journalArticle

Intrusion detection
Intrusion Detection
Decision trees
Decision tree
Anomaly

Toward a fair indictment for sealed-bid auction with self-enforcing privacy

Wong, K. S. & Kim, M. H., Aug 1 2018, In : Journal of Supercomputing. 74, 8, p. 3801-3819 19 p.

Research output: Contribution to journalArticle

Auctions
Cryptography
Privacy
Polynomials
Polynomial Evaluation
8 Citations (Scopus)

Network failure–aware redundant virtual machine placement in a cloud data center

Zhou, A., Wang, S., Hsu, C. H., Kim, M. H. & Wong, K. S., Dec 25 2017, In : Concurrency Computation. 29, 24, e4290.

Research output: Contribution to journalArticle

Data Center
Virtual Machine
Placement
Nonlinear Integer Programming
Nonlinear programming