If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where John Yen is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

Learning from experts' experience: Toward automated cyber security data triage

Zhong, C., Yen, J., Liu, P. & Erbacher, R. F., Mar 2019, In : IEEE Systems Journal. 13, 1, p. 603-614 12 p., 8360965.

Research output: Contribution to journalArticle

  • A cyber security data triage operation retrieval system

    Zhong, C., Lin, T., Liu, P., Yen, J. & Chen, K., Jul 2018, In : Computers and Security. 76, p. 12-31 20 p.

    Research output: Contribution to journalArticle

  • 2 Scopus citations

    Local graph clustering by multi-network random walk with restart

    Yan, Y., Luo, D., Ni, J., Fei, H., Fan, W., Yu, X., Yen, J. & Zhang, X., Jan 1 2018, Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings. Webb, G. I., Phung, D., Ganji, M., Rashidi, L., Tseng, V. S. & Ho, B. (eds.). Springer Verlag, p. 490-501 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10939 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Retrieval of relevant historical data triage operations in security operation centers

    Lin, T., Zhong, C., Yen, J. & Liu, P., Jan 1 2018, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 227-243 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11170 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths

    Sun, X., Dai, J., Liu, P., Singhal, A. & Yen, J., Oct 2018, In : IEEE Transactions on Information Forensics and Security. 13, 10, p. 2506-2521 16 p.

    Research output: Contribution to journalArticle

  • 15 Scopus citations