scispace - formally typeset
C

Chinyang Henry Tseng

Researcher at National Taipei University

Publications -  22
Citations -  381

Chinyang Henry Tseng is an academic researcher from National Taipei University. The author has contributed to research in topics: Optimized Link State Routing Protocol & Intrusion detection system. The author has an hindex of 11, co-authored 21 publications receiving 345 citations. Previous affiliations of Chinyang Henry Tseng include University of California, Davis.

Papers
More filters
Book ChapterDOI

DEMEM: distributed evidence-driven message exchange intrusion detection model for MANET

TL;DR: In this article, the authors propose a Distributed Evidence-driven Message Exchanging intrusion detection model (DEMEM) for MANET that allows the distributed detector to cooperatively detect routing attacks with minimal communication overhead.
Journal Article

DEMEM : Distributed evidence-driven message exchange intrusion detection model for MANET

TL;DR: A Distributed Evidence-driven Message Exchanging intrusion detection Model (DEMEM) for MANET that allows the distributed detector to cooperatively detect routing attacks with minimal communication overhead and allows detectors to exchange evidences only when necessary.
Book ChapterDOI

Cost-sensitive intrusion responses for mobile ad hoc networks

TL;DR: The main contribution of the solution is to keep network connectivity when launching isolation responses and to do so such that good quality of network routing services is maintained.
Book ChapterDOI

A specification-based intrusion detection model for OLSR

TL;DR: In this article, a specification-based intrusion-detection model for ad hoc routing protocols is proposed, in which network nodes are monitored for operations that violate their intended behavior, and a detection mechanism based on finite state automata for checking whether a network node violates the constraints.
Journal Article

A specification-based intrusion detection model for OLSR

TL;DR: This work proposes a specification-based intrusion-detection model for ad hoc routing protocols in which network nodes are monitored for operations that violate their intended behavior and designs a detection mechanism based on finite state automata for checking whether a network node violates the constraints.