Date


Output Type

Download Available

93 results

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Exploring coupled images fusion based on joint tensor decomposition

Journal Article
Lu, L., Ren, X., Yeh, K., Tan, Z., & Chanussot, J. (2020)
Exploring coupled images fusion based on joint tensor decomposition. Human-Centric Computing and Information Sciences, 10, https://doi.org/10.1186/s13673-020-00215-z
Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion al...

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset

Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...

An authentication protocol based on chaos and zero knowledge proof

Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020)
An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authentica...

Double-Arc Parallel Coordinates and its Axes re-Ordering Methods

Journal Article
Lu, L., Wang, W., & Tan, Z. (2020)
Double-Arc Parallel Coordinates and its Axes re-Ordering Methods. Mobile Networks and Applications, 25(4), 1376-1391. https://doi.org/10.1007/s11036-019-01455-9
The Parallel Coordinates Plot (PCP) is a popular technique for the exploration of high-dimensional data. In many cases, researchers apply it as an effective method to analyze ...

PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing

Journal Article
Zhu, R., Yu, T., Tan, Z., Du, W., Zhao, L., Li, J., & Xia, X. (2019)
PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing. IEEE Access, 8, 1475-1485. https://doi.org/10.1109/ACCESS.2019.2962066
Outlier detection over sliding window is a fundamental problem in the domain of streaming data management, which has been studied over 10 years. The key of supporting outlier ...

Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication

Journal Article
Hawbani, A., Torbosh, E., Wang, X., Sincak, P., Zhao, L., & Al-Dubai, A. (2021)
Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication. IEEE Transactions on Fuzzy Systems, 29(3), 612-626. https://doi.org/10.1109/tfuzz.2019.2957254
This paper modeled the multihop data-routing in Vehicular Ad-hoc Networks(VANET) as Multiple Criteria Decision Making (MCDM) in four steps. First, the criteria which have an i...

Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs

Journal Article
Alsarhan, A., Kilani, Y., Al-Dubai, A., Zomaya, A. Y., & Hussain, A. (2020)
Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs. IEEE Transactions on Vehicular Technology, 69(2), 1568-1581. https://doi.org/10.1109/TVT.2019.2956228
Different studies have recently emphasized the importance of deploying clustering schemes in Vehicular ad hoc Network (VANET) to overcome challenging problems related to scala...

MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features

Journal Article
Saha, R., Geetha, G., Kumar, G., Kim, T., & Buchanan, W. J. (2019)
MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weigh...

PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme

Journal Article
Khan, R., Zakarya, M., Tan, Z., Usman, M., Jan, M. A., & Khan, M. (2019)
PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme. International Journal of Communication Systems, 32(18), https://doi.org/10.1002/dac.4144
Heterogeneous wireless sensor networks (WSNs) consist of resource-starving nodes that face a challenging task of handling various issues such as data redundancy, data fusion, ...