28 results

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network

Conference Proceeding
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (2020)
A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)https://doi.org/10.1109/WF-IoT48130.2020.9221036
The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as ...

A framework for data security in cloud using collaborative intrusion detection scheme

Conference Proceeding
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017)
A framework for data security in cloud using collaborative intrusion detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks. , (188-193). https://doi.org/10.1145/3136825.3136905
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...

A 3D Smooth Random Walk Mobility Model for FANETs

Conference Proceeding
Lin, N., Gao, F., Zhao, L., Al-Dubai, A., & Tan, Z. (2019)
A 3D Smooth Random Walk Mobility Model for FANETs. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00075
The number of Unmanned Aerial Vehicles (UAVs) applications has increased over the past few years. Among all scenarios, UAV group consisting multi-UAVs is normally used to prov...

Reviving legacy enterprise systems with microservice-based architecture within cloud environments

Conference Proceeding
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019)
Reviving legacy enterprise systems with microservice-based architecture within cloud environments. In Computer Science Conference Proceedingshttps://doi.org/10.5121/csit.2019.90713
Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most eff...

A Stateful Mechanism for the Tree-Rule Firewall

Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014)
A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (122-129). https://doi.org/10.1109/trustcom.2014.20
In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewal...

A Novel Feature Selection Approach for Intrusion Detection Data Classification

Conference Proceeding
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F., & Nagar, U. T. (2014)
A Novel Feature Selection Approach for Intrusion Detection Data Classification. https://doi.org/10.1109/trustcom.2014.15
Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats...

Towards Continuous User Authentication Using Personalised Touch-Based Behaviour

Conference Proceeding
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2020)
Towards Continuous User Authentication Using Personalised Touch-Based Behaviour. In 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00023
In this paper, we present an empirical evaluation of 30 features used in touch-based continuous authentication. It is essential to identify the most significant features for e...

A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking

Conference Proceeding
Zhao, L., Liu, Y., Al-Dubai, A., Tan, Z., Min, G., & Xu, L. (2019)
A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking. https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00082
With the rapid development of mobile applications, networking technologies have been constantly evolved to offer a more convenient way of sharing information and online-commun...

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples

Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (2020)
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. https://doi.org/10.1109/CEC48606.2020.9185668
Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this,...

Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection

Conference Proceeding
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2012)
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. https://doi.org/10.1109/trustcom.2012.284
Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. Ho...