Ren-Hung Hwang

National Chiao Tung University

1001 University Road

Hsinchu, 1001

Taiwan

SCHOLARLY PAPERS

4

DOWNLOADS

218

TOTAL CITATIONS

0

Scholarly Papers (4)

1.

Improving Quality of Indicators of Compromise Using Stix Graphs

Number of pages: 13 Posted: 16 Jan 2024
National Taipei University of Technology, National Chiao Tung University, National Chiao Tung University, National Chiao Tung University, National Taipei University of Technology and National Taipei University of Technology
Downloads 96 (601,815)

Abstract:

Loading...

Indicators of Compromise (IoC), Threat Intelligence Platform (TIP), Cyber Threat Intelligence (CTI), Structured Threat Information eXpression (STIX), Open Source INTelligence (OSINT)

2.

Sustainable and Lightweight Domain-Based Intrusiondetection System for In-Vehicle Network

Number of pages: 17 Posted: 16 Apr 2023
Edy Kristianto, Po-Ching Lin and Ren-Hung Hwang
National Chung Cheng University, National Chung Cheng University and National Chiao Tung University
Downloads 56 (803,295)

Abstract:

Loading...

lightweight, intrusion detection, automotive ethernet, machine learning, in-vehicle network

3.

Performance Modelling and Optimal Stage Assignment for Multistage P4 Switches

Number of pages: 13 Posted: 11 May 2024
National Chung Cheng University, National Chung Cheng University, National Chiao Tung University, National Chiao Tung University and National Taiwan University of Science and Technology
Downloads 34 (995,295)

Abstract:

Loading...

Network function to stage assignment, P4 queueing model, Average delay minimization

4.

Attack Lifecycle Extraction and Mapping from Ctf Writeups Using an Enhanced Llm Approach

Number of pages: 17 Posted: 15 Mar 2025
National Yang Ming Chiao Tung University, National Chiao Tung University, National Yang Ming Chiao Tung University, National Chiao Tung University, National Taiwan University of Science and Technology and Tunku Abdul Rahman University (UTAR) - Universiti Tunku Abdul Rahman
Downloads 32 (1,016,547)

Abstract:

Loading...

Cybersecurity, Attack lifecycle, MITRE ATT&CK, Capture the flag, LLM, Data augmentation, Synthetic data