UCSY

Dr.  Mie Mie Su Thwin

Ph,D(IT)
Professor
:Faculty of Information Science
:Cyber Security Research
:University of Computer Studies , Yangon
:miemiesuthwin@ucsy.edu.mm

Academic Qualifications:

  • B.Sc..(Physics)    from   University of Yangon    at   9/6/1994
  • B.Sc.(Hons)(Phys.)    from   University of Yangon    at   9/6/1996
  • M.I.Sc.(Credit)    from   University of Computer Studies, Yangon    at   9/6/2000
  • Ph.D (IT)    from   University of Computer Studies, Yangon    at   1/4/2004

List of Publications

  1. " Domain Model Mapping Using Unified Modeling Language in Modeling Environments "  , 1st International Conference on Computer Applications [ICCA 2003],January 2003  
  2. " Impact Analysis Study of Dependency Relationships of UML "  , International Conference on Internet Information Retrieval [IRC 2003]] October 2003  
  3. " Impact Analysis of UML Diagrams based on Relationships of UML "  , International Conference for Software Engineering, [IASTED],September 2004  
  4. " An Impact Analysis on Diagram Types and Relationships of UML "  , 2nd International Conference on Computer Applications [ICCA 2004],January 2004  
  5. " A Study on Variations of UML CASE Tools "  , 2nd International Conference on Computer Applications [ICCA 2004],January 2004  
  6. " An Impact Analysis on Changes of the Artifacts of UML "  , International Conference on Internet Information Retrieval [IRC 2004] November 2004  
  7. " Comparison between Two-Phase Commit Protocol and Three-Phase Commit Protocol: Practical Approach "  , 5th International Conference on Computer Applications [ICCA 2004],January 2004  
  8. " Semantic XML Clustering Using K-Mean AlgorithmTheint Theint Shwe "  , 1st International Conference on Applied Information and Communication Technology September 2008  
  9. " Improving Source Code behind the Scenes "  , 1st International Conference on Applied Information and Communication Technology September 2008  
  10. " Practical Approach: Importance of Database Integrity Constraints in the Distributed Database Systems "  , 1st International Conference on Applied Information and Communication Technology September 2008  
  11. " Update Propagation on Lazy and Eager Replication with Master and Group Replication Databases. "  , 1st International Conference on Applied Information and Communication Technology September 2008  
  12. " An Adaptive System for the Personalized Access to Music "  , 1st International Conference on Applied Information and Communication Technology, September 2008  
  13. " MISTY1 Encryption System with RSA Key Distribution "  , 1st International Conference on Applied Information and Communication Technology September 2008  
  14. " Extracting Semantic Net from a Domain Corpus "  , 1st International Conference on Applied Information and Communication Technology September 2008  
  15. " Developing a Java Based Application Analyzer "  , 1st International Conference on Applied Information and Communication Technology September 2008  
  16. " Multi Database Mining: Identifying Relevant Databases "  , 1st International Conference on Applied Information and Communication Technology September 2008  
  17. " Comparative Study of Levenshtein Distance and Needleman-Wunsch English Spelling Checking Algorithms "  , 2nd International Conference on Applied Information and Communication Technology November 2009  
  18. " Using Business Process Re-engineering (BPR) for Electronic Voting "  , 2nd International Conference on Applied Information and Communication Technology November 2009  
  19. " Proposed Myanmar Word Tokenizer based on LIPIDIPIKAR treatise "  , International Conference on Computer Engineering and Technology [ICCET] April 2010  
  20. " Semantic Web Information Retrieval in XML by mapping to RDF schema "  , Networking and Information Technology [ICNIT], 2010 International Conference June 2010  
  21. " Framework for multi-purpose web log access analyzer "  , 2nd International Conference on Computer Engineering and Technology [ICCET] November 2010  
  22. " Analysis of Myanmar Word Using Statistical Approach "  , The second International Workshop on Spoken Languages Technologies for Under-resourced languages (SLTU) May 2010  
  23. " Answering Top-k Keyword Queries on Relational Databases. "  , International Journal of Information Retrieval Research ,Nov, 2012  
  24. " Record Searching Using Dynamic Blocking for Entity Resolution Systems "  , The 9th International Conference on Computing and Information Technology 2013  
  25. " Effective Blocking for Combining Multiple Entity Resolution Systems "  , INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ENGINEERING 2013  
  26. " Application of Mobile Agent and Cryptography For The Security of Job Applicants on Mobile Phones "  , 3rd International Conference on Computational Techniques and Artificial Intelligence (ICCTA) 2014  
  27. " Security Control System for the Integration of Mobile Agent and Web Services based on Certificateless Cryptography and Key Agreement Protocol "  , International Journal of Engineering Research & Technology (IJERT),Vol. 2 Issue 1, Januaryr- 2013  
  28. " International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 1, Januaryr- 2013 "  , International Conference on Advances in Engineering and Technology (ICAET) 2014  
  29. " Heuristic Rules for Attack Detection Charged by NSL KDD Dataset: "  , International Conference on Genetic and Evolutionary Computing, (ICGEC) 2015  
  30. " Effective Anomaly Detection Hidden Semi Markov Model "  , 14th International Conference on Computer Applications [ICCA 2015] January 2015  
  31. " Anomalous Behavior Detection in Mobile Network "  , International Conference on Genetic and Evolutionary Computing, (ICGEC) 2015  
  32. " Proposed Workable Process Flow with Analysis Framework for Android Forensics in Cyber-Crime Investigation "  , The International Journal Of Engineering And Science (IJES)  
  33. " Proposed Applicable Android Forensics Tool Suite (ANDROSICS) for Cybercrime Investigation in Myanmar "  , Conference on Science and Technology Development,2017, pp 460-463  
  34. " Forensics Investigation on Android Social Applications "  , 17th International Conference on Computer Applications [ICCA 2018] January 2015  
  35. " Evidence Data Collection with ANDROSICS Tool for Android Forensics "  , 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Bali  
  36. " Malware Analysis and Classification for Detection of Advanced Persistent Threat (APT) "  , 13th International Conference on Computer Applications  
  37. " Proposed Applicable Framework for Extracting Rootkits Features and Clustering through Dynamic Analysis for Incident Handling Systems "  , Proceedings of The 15th International Conference on Computer Applications 2017, pp-342-350  
  38. " Effective Malicious Feature Extraction and Classification using Random Forest Machine Learning Classifier "  , The 16th International Conference on Computer Applications 2018  
  39. " Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar "  , The 15th International Conference on Computer Applications 2017,pp- 335-341  
  40. " Comparative Study of Big Data Predictive Analytics Frameworks "  , The 15th International Conference on Computer Applications 2017Pp 363-369  
  41. " M2M Security Approach for Hardening DNS enumeration attack by using I2P Encryption Method "  , International Conference on Business, Information, Tourism, and Economics Bangkok Thailand, August 8-10, 2018  
  42. " Crucial Evidence Collection and Analysis on MySQL Database for Crime Investigation in Myanmar "  , The 16th International Conference on Computer Applications 2018  
  43. " Proposed Holistic Approach for Prevention, Detection and Mitigation of Layer-wise Attacks "  , The 16th International Conference on Computer Applications 2018  
  44. " Modification of AES Algorithm by Using Second Key and Modified SubBytes Operation for Text Encryption "  , ICCST 2018 The Fifth International Conference on Computational Science and Technology August, 2018  
  45. " Evidence Effecting on Analysis Time in Database Forensics "  , International Conference on Science and Technology for Sustainable Development, November 2018  
  46. " Proposed Effective Solution for CyberCrime Investigation in Myanmar "  , The International Journal of Engineering and Science  
  47. " HACKFOSICS: Forensics Tool for Extract Live Remnant Data and Examine Dead Artifact "  , International Conference on Broadband and Wireless Computing, Communication and Applications  
  48. " The Threats of Cyberspace and Utilization of Open Source Forensics Tool for Cybercrime Investigation in Myanmar "  , Proceedings of Conference on Science and Technology Development  
  49. " Hybrid Framework for Integrated Malware Analysis to Detect Advanced Persistent Threat "  , ICCA2016 International Conference on Computer Applications  
  50. " Informative Content Extraction By Using Eifce [Effective Informative Content Extractor "  , INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 2, ISSUE 6, JUNE 2013  
  51. " Malicious Software Family Classification using Machine Learning Multi-class Classifiers "  , The Fifth International Conference on Computational Science and Technology 2018 (ICCST2018)  
  52. " Modification of AES Algorithm by Using Second Key and Modified SubBytes Operations for Text Encryption "  , 5th ICCST 2018, Kota Vinabalm, Malaysia, 29-30, August 2018  
  53. " Secure Data Transmission by modified AES Algorithm and PKI SubBytes Operations for Text Encryption "  , Proceedings of 2017 International Workshop on Computer Science and Engineering (WCSE 2017)  
News

[Previous Programming Contests]

Computer Universities
Contact us
Contact:
No.(4) Main Road ,
Shwe Pyi Thar Township,
Yangon, Myanmar.
Fax: +95 01 610633
Phone: +95 01 610655
Email: ucsy.admin@ucsy.edu.mm
Facebook page: https://www.facebook.com/ucsygn/