A Multi-attributes-based Trust Model of Internet of Vehicle
Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security. , (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method
Conference Proceeding
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., Jia, W., & Yeh, W. (2010)
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. In Information and Communications Security. , (459-471). https://doi.org/10.1007/978-3-642-17650-0_32
The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detecti...
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors
Conference Proceeding
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, (89-98). https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...
Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method
Conference Proceeding
Ou, W., Deng, M., Luo, E., Shi, W., Tan, Z., & Bhuiyan, M. (2019)
Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method. In 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). , (687-693). https://doi.org/10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00131
Proof of Work (PoW) is used to provide a consensus mechanism for Bitcoin. In this mechanism, the process of generating a new block in the blockchain is referred to as mining. ...
Network Intrusion Detection based on LDA for payload feature selection
Conference Proceeding
Tan, Z., Jamdagni, A., He, X., & Nanda, P. (2010)
Network Intrusion Detection based on LDA for payload feature selection. In 2010 IEEE Globecom Workshopshttps://doi.org/10.1109/glocomw.2010.5700198