17 results

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment

Conference Proceeding
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014)
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (205-211). https://doi.org/10.1109/trustcom.2014.31
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovat...

Intrusion Detection Using Geometrical Structure

Conference Proceeding
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. (2009)
Intrusion Detection Using Geometrical Structure. In Fourth International Conference on Frontier of Computer Science and Technology, 2009. FCST '09 (327-333). https://doi.org/10.1109/fcst.2009.97
We propose a statistical model, namely Geometrical Structure Anomaly Detection (GSAD) to detect intrusion using the packet payload in the network. GSAD takes into account the ...

A Stateful Mechanism for the Tree-Rule Firewall

Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014)
A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (122-129). https://doi.org/10.1109/trustcom.2014.20
In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewal...

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay

Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2017)
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. In 2016 IEEE Trustcom/BigDataSE/I​SPA, (178-184). https://doi.org/10.1109/trustcom.2016.0061
The firewalls were invented since 1990s [1] and have been developed to operate more secure and faster. From the first era of the firewalls until today, they still regulate pac...

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors

Conference Proceeding
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, (89-98). https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning

Conference Proceeding
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014)
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications,, (174-181). https://doi.org/10.1109/trustcom.2014.26
The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish ...

Network Intrusion Detection based on LDA for payload feature selection

Conference Proceeding
Tan, Z., Jamdagni, A., He, X., & Nanda, P. (2010)
Network Intrusion Detection based on LDA for payload feature selection. In 2010 IEEE Globecom Workshopshttps://doi.org/10.1109/glocomw.2010.5700198