40 results

A Practical Steganographic Approach for Matroska Based High Quality Video Files

Conference Proceeding
Pitropakis, N., Lambrinoudakis, C., Geneiatakis, D., & Gritzalis, D. (2013)
A Practical Steganographic Approach for Matroska Based High Quality Video Files. In 2013 27th International Conference on Advanced Information Networking and Applications Workshopsdoi:10.1109/waina.2013.39
Several steganographic algorithms have been proposed for protecting message secrecy against unauthorized "reads". The most used method for hiding a message relies on embedding...

A nonlinear correlation measure for Intrusion Detection

Presentation / Conference
Ambusaidi, M., Lu, L. F., He, X., Tan, Z., Jamdagni, A., & Nanda, P. (2012, November)
A nonlinear correlation measure for Intrusion Detection. Paper presented at The 7th International Conference on Frontier of Computer Science and Technology (FCST-12
The popularity of using internet contains some risks of network attacks. It has attracted the attention of many researchers to overcome this problem. One of the effective ways...

Towards OWL 2 Natively Supported Fuzzy Cloud Ontology

Conference Proceeding
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012)
Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. In 6th IEEE International Workshop Quality-Oriented Reuse of Software (IEEE QUORS’12), (328-333). https://doi.org/10.1109/compsacw.2012.66
Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applicati...

RePIDS: A multi tier Real-time Payload-based Intrusion Detection System

Journal Article
Jamdagni, A., Tan, Z., He, X., Nanda, P., & Liu, R. P. (2013)
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Computer Networks, 57(3), 811-824. https://doi.org/10.1016/j.comnet.2012.10.002
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of ex...

Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection

Conference Proceeding
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2012)
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. https://doi.org/10.1109/trustcom.2012.284
Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. Ho...

GLBM: A new QoS aware multicast scheme for wireless Mesh network

Journal Article
Zhao, L., Al-Dubai, A., & Min, G. (2010)
GLBM: A new QoS aware multicast scheme for wireless Mesh network. Journal of Systems and Software, 83, 1318-1326. https://doi.org/10.1016/j.jss.2010.01.044
Wireless mesh networks (WMNs) have been attracting significant attention due to their promising technology. The WMN technology is becoming a major avenue for the fourth genera...

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...

A multi-channel hybrid MAC protocol for wireless Mesh networks.

Conference Proceeding
Romdhani, I., & Al-Dubai, A. (2007)
A multi-channel hybrid MAC protocol for wireless Mesh networks. In Proceedings of the IEEE 8th International Symposium on Computer Networks (ISCN?08), Istanbul, Turkey

Covert channel analysis and detection using reverse proxy servers.

Presentation / Conference
Buchanan, W. J., & Llamas, D. (2004, June)
Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC), London
Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls...

An agent based Bayesian forecasting model for enhanced network security.

Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...