Research explorer tool

14 results

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network

Conference Proceeding
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (2020)
A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)https://doi.org/10.1109/WF-IoT48130.2020.9221036
The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as ...

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites

Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2020)
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. In Applications of Evolutionary Computation. EvoApplications 2020. , (117-132). https://doi.org/10.1007/978-3-030-43722-0_8
In the field of metamorphic malware detection, training a detection model with malware samples that reflect potential mutants of the malware is crucial in developing a model r...

Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme

Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2019)
Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme. In Dependability in Sensor, Cloud, and Big Data Systems and Applications. , (369-382). https://doi.org/10.1007/978-981-15-1304-6_29
The ability to detect metamorphic malware has generated significant research interest over recent years, particularly given its proliferation on mobile devices. Such malware i...

Evaluation on multivariate correlation analysis based denial-of-service attack detection system

Conference Proceeding
Tan, Z., Jamdagni, A., Nanda, P., He, X., & Liu, R. P. (2012)
Evaluation on multivariate correlation analysis based denial-of-service attack detection system. In SecurIT '12 Proceedings of the First International Conference on Security of Internet of Things, 160-164. https://doi.org/10.1145/2490428.2490450
In this paper, a Denial-of-Service (DoS) attack detection system is explored, where a multivariate correlation analysis technique based on Euclidean distance is applied for ne...

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization

Conference Proceeding
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011)
Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization. In S. Qing, W. Susilo, G. Wang, & D. Liu (Eds.), Information and Communications Security. , (388-398). https://doi.org/10.1007/978-3-642-25243-3_31
The quality of feature has significant impact on the performance of detection techniques used for Denial-of-Service (DoS) attack. The features that fail to provide accurate ch...

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis

Conference Proceeding
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017)
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/I​SPA Conference Proceedingshttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...

A 3D Smooth Random Walk Mobility Model for FANETs

Conference Proceeding
Lin, N., Gao, F., Zhao, L., Al-Dubai, A., & Tan, Z. (2019)
A 3D Smooth Random Walk Mobility Model for FANETs. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00075
The number of Unmanned Aerial Vehicles (UAVs) applications has increased over the past few years. Among all scenarios, UAV group consisting multi-UAVs is normally used to prov...

A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking

Conference Proceeding
Zhao, L., Liu, Y., Al-Dubai, A., Tan, Z., Min, G., & Xu, L. (2019)
A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking. https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00082
With the rapid development of mobile applications, networking technologies have been constantly evolved to offer a more convenient way of sharing information and online-commun...

Reviving legacy enterprise systems with microservice-based architecture within cloud environments

Conference Proceeding
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019)
Reviving legacy enterprise systems with microservice-based architecture within cloud environments. In Computer Science Conference Proceedingshttps://doi.org/10.5121/csit.2019.90713
Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most eff...

Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method

Conference Proceeding
Ou, W., Deng, M., Luo, E., Shi, W., Tan, Z., & Bhuiyan, M. (2019)
Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method. In 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). , (687-693). https://doi.org/10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00131
Proof of Work (PoW) is used to provide a consensus mechanism for Bitcoin. In this mechanism, the process of generating a new block in the blockchain is referred to as mining. ...