Research explorer tool

25 results

A Multi-attributes-based Trust Model of Internet of Vehicle

Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security. , (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...

A 3D Smooth Random Walk Mobility Model for FANETs

Conference Proceeding
Lin, N., Gao, F., Zhao, L., Al-Dubai, A., & Tan, Z. (2019)
A 3D Smooth Random Walk Mobility Model for FANETs. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00075
The number of Unmanned Aerial Vehicles (UAVs) applications has increased over the past few years. Among all scenarios, UAV group consisting multi-UAVs is normally used to prov...

Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection

Conference Proceeding
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2012)
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. https://doi.org/10.1109/trustcom.2012.284
Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. Ho...

Reviving legacy enterprise systems with microservice-based architecture within cloud environments

Conference Proceeding
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019)
Reviving legacy enterprise systems with microservice-based architecture within cloud environments. In Computer Science Conference Proceedingshttps://doi.org/10.5121/csit.2019.90713
Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most eff...

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples

Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (2020)
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. https://doi.org/10.1109/CEC48606.2020.9185668
Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this,...

A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking

Conference Proceeding
Zhao, L., Liu, Y., Al-Dubai, A., Tan, Z., Min, G., & Xu, L. (2019)
A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking. https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00082
With the rapid development of mobile applications, networking technologies have been constantly evolved to offer a more convenient way of sharing information and online-commun...

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning

Conference Proceeding
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014)
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications,, (174-181). https://doi.org/10.1109/trustcom.2014.26
The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish ...

A Novel Feature Selection Approach for Intrusion Detection Data Classification

Conference Proceeding
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F., & Nagar, U. T. (2014)
A Novel Feature Selection Approach for Intrusion Detection Data Classification. https://doi.org/10.1109/trustcom.2014.15
Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats...

A Stateful Mechanism for the Tree-Rule Firewall

Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014)
A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (122-129). https://doi.org/10.1109/trustcom.2014.20
In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewal...

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors

Conference Proceeding
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, (89-98). https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...