|
Dr.
Mie Mie Su Thwin
 |
Ph,D(IT)
Professor
|
 | : | Faculty of Information Science |
 | : | Cyber Security Research |
 | : | University of Computer Studies , Yangon |
 | : | miemiesuthwin@ucsy.edu.mm |
|
Academic Qualifications:
- B.Sc..(Physics) from
University of Yangon at
9/6/1994
- B.Sc.(Hons)(Phys.) from
University of Yangon at
9/6/1996
- M.I.Sc.(Credit) from
University of Computer Studies, Yangon at
9/6/2000
- Ph.D (IT) from
University of Computer Studies, Yangon at
1/4/2004
List of Publications
-
" Domain Model Mapping Using Unified Modeling Language in Modeling Environments " , 1st International Conference on Computer Applications [ICCA 2003],January 2003
-
" Impact Analysis Study of Dependency Relationships of UML " , International Conference on Internet Information Retrieval [IRC 2003]]
October 2003
-
" Impact Analysis of UML Diagrams based on Relationships of UML " , International Conference for Software Engineering, [IASTED],September 2004
-
" An Impact Analysis on Diagram Types and Relationships of UML " , 2nd International Conference on Computer Applications [ICCA 2004],January 2004
-
" A Study on Variations of UML CASE Tools " , 2nd International Conference on Computer Applications [ICCA 2004],January 2004
-
" An Impact Analysis on Changes of the Artifacts of UML " , International Conference on Internet Information Retrieval [IRC 2004]
November 2004
-
" Comparison between Two-Phase Commit Protocol and Three-Phase Commit Protocol: Practical Approach " , 5th International Conference on Computer
Applications [ICCA 2004],January 2004
-
" Semantic XML Clustering Using K-Mean AlgorithmTheint Theint Shwe " , 1st International Conference on Applied Information and Communication Technology
September 2008
-
" Improving Source Code behind the Scenes " , 1st International Conference on Applied Information and Communication Technology
September 2008
-
" Practical Approach: Importance of Database Integrity Constraints in the Distributed Database Systems " , 1st International Conference on Applied Information and Communication Technology
September 2008
-
" Update Propagation on Lazy and Eager Replication with Master and Group Replication Databases. " , 1st International Conference on Applied Information and Communication Technology
September 2008
-
" An Adaptive System for the Personalized Access to Music " , 1st International Conference on Applied Information and Communication Technology,
September 2008
-
" MISTY1 Encryption System with RSA Key Distribution " , 1st International Conference on Applied Information and Communication Technology
September 2008
-
" Extracting Semantic Net from a Domain Corpus " , 1st International Conference on Applied Information and Communication Technology
September 2008
-
" Developing a Java Based Application Analyzer " , 1st International Conference on Applied Information and Communication Technology
September 2008
-
" Multi Database Mining: Identifying Relevant Databases " , 1st International Conference on Applied Information and Communication Technology
September 2008
-
" Comparative Study of Levenshtein Distance and Needleman-Wunsch English Spelling Checking Algorithms " , 2nd International Conference on Applied Information and Communication Technology
November 2009
-
" Using Business Process Re-engineering (BPR) for Electronic Voting " , 2nd International Conference on Applied Information and Communication Technology
November 2009
-
" Proposed Myanmar Word Tokenizer based on LIPIDIPIKAR treatise " , International Conference on Computer Engineering and Technology [ICCET]
April 2010
-
" Semantic Web Information Retrieval in XML by mapping to RDF schema " , Networking and Information Technology [ICNIT], 2010 International Conference
June 2010
-
" Framework for multi-purpose web log access analyzer " , 2nd International Conference on Computer Engineering and Technology [ICCET]
November 2010
-
" Analysis of Myanmar Word Using Statistical Approach " , The second International Workshop on Spoken Languages Technologies for Under-resourced languages (SLTU) May 2010
-
" Answering Top-k Keyword Queries on Relational Databases. " , International Journal of Information Retrieval Research ,Nov, 2012
-
" Record Searching Using Dynamic Blocking for Entity Resolution Systems " , The 9th International Conference on Computing and Information Technology
2013
-
" Effective Blocking for Combining Multiple Entity Resolution Systems " , INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ENGINEERING
2013
-
" Application of Mobile Agent and Cryptography For The Security of Job Applicants on Mobile Phones " , 3rd International Conference on Computational Techniques and Artificial Intelligence (ICCTA) 2014
-
" Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Key Agreement Protocol " , International Journal of Engineering Research & Technology (IJERT),Vol. 2 Issue 1, Januaryr- 2013
-
" International Journal of Engineering Research & Technology (IJERT)
Vol. 2 Issue 1, Januaryr- 2013 " , International Conference
on Advances in Engineering and Technology (ICAET) 2014
-
" Heuristic Rules for Attack Detection Charged by NSL KDD Dataset: " , International Conference on Genetic and Evolutionary Computing, (ICGEC) 2015
-
" Effective Anomaly Detection Hidden Semi Markov Model " , 14th International Conference on Computer Applications [ICCA 2015] January 2015
-
" Anomalous Behavior Detection in Mobile Network " , International Conference on Genetic and Evolutionary Computing, (ICGEC) 2015
-
" Proposed Workable Process Flow with Analysis Framework for Android Forensics in Cyber-Crime Investigation " , The International Journal Of Engineering And Science (IJES)
-
" Proposed Applicable Android Forensics Tool Suite (ANDROSICS) for Cybercrime Investigation in Myanmar " , Conference on Science and Technology Development,2017, pp 460-463
-
" Forensics Investigation on Android Social Applications " , 17th International Conference on Computer
Applications [ICCA 2018] January 2015
-
" Evidence Data Collection with ANDROSICS Tool for Android Forensics " , 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Bali
-
" Malware Analysis and Classification for Detection of Advanced Persistent Threat (APT) " , 13th International Conference on Computer Applications
-
" Proposed Applicable Framework for Extracting Rootkits Features and Clustering through Dynamic Analysis for Incident Handling Systems " , Proceedings of The 15th International Conference on Computer Applications 2017,
pp-342-350
-
" Effective Malicious Feature Extraction and Classification using Random Forest Machine Learning Classifier " , The 16th International Conference on Computer Applications 2018
-
" Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar " , The 15th International Conference on
Computer Applications 2017,pp- 335-341
-
" Comparative Study of Big Data Predictive Analytics Frameworks " , The 15th International Conference on
Computer Applications 2017Pp 363-369
-
" M2M Security Approach for Hardening DNS enumeration attack by using I2P Encryption Method " , International Conference on Business, Information, Tourism, and Economics Bangkok Thailand, August 8-10, 2018
-
" Crucial Evidence Collection and Analysis on MySQL Database for Crime Investigation in Myanmar " , The 16th International Conference on
Computer Applications 2018
-
" Proposed Holistic Approach for Prevention, Detection and Mitigation of Layer-wise Attacks " , The 16th International Conference on
Computer Applications 2018
-
" Modification of AES Algorithm by Using Second Key and Modified SubBytes Operation for Text Encryption " , ICCST 2018 The Fifth International Conference on Computational Science and Technology August, 2018
-
" Evidence Effecting on Analysis Time in Database Forensics " , International Conference on Science and Technology for Sustainable Development, November 2018
-
" Proposed Effective Solution for CyberCrime Investigation in Myanmar " , The International Journal of Engineering and Science
-
" HACKFOSICS: Forensics Tool for Extract Live Remnant Data and Examine Dead Artifact " , International Conference on Broadband and Wireless Computing, Communication and Applications
-
" The Threats of Cyberspace and Utilization of Open Source Forensics Tool for Cybercrime Investigation in Myanmar " , Proceedings of Conference on Science and Technology Development
-
" Hybrid Framework for Integrated Malware Analysis to Detect Advanced Persistent Threat " , ICCA2016 International Conference on Computer Applications
-
" Informative Content Extraction By Using Eifce [Effective Informative Content Extractor " , INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 2, ISSUE 6, JUNE 2013
-
" Malicious Software Family Classification using Machine Learning Multi-class Classifiers " , The Fifth International Conference on Computational Science and Technology 2018 (ICCST2018)
-
" Modification of AES Algorithm by Using Second Key and Modified SubBytes Operations for Text Encryption " , 5th ICCST 2018, Kota Vinabalm, Malaysia, 29-30, August 2018
-
" Secure Data Transmission by modified AES Algorithm and PKI SubBytes Operations for Text Encryption " , Proceedings of 2017 International Workshop on Computer Science and Engineering
(WCSE 2017)
|
News |
[Previous Programming Contests]
|
Computer Universities |
|
Contact us |
Contact:
No.(4) Main Road , Shwe Pyi Thar Township, Yangon, Myanmar.
Fax: +95 01 610633
Phone: +95 01 610655
Email: ucsy.admin@ucsy.edu.mm
Facebook page: https://www.facebook.com/ucsygn/
|
|
|