Skip to main content

Research Repository

Advanced Search

Approaches to the classification of high entropy file fragments. (2013)
Journal Article
Penrose, P., Macfarlane, R., & Buchanan, W. J. (2013). Approaches to the classification of high entropy file fragments. Digital Investigation, 10(4), 372-384. https://doi.org/10.1016/j.diin.2013.08.004

In this paper we propose novel approaches to the problem of classifying high entropy file fragments. We achieve 97% correct classification for encrypted fragments and 78% for compressed. Although classification of file fragments is central to the sci... Read More about Approaches to the classification of high entropy file fragments..

Improving cloud network security using the Tree-Rule firewall (2013)
Journal Article
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024

This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., Listed-Rule firewalls) have their limita... Read More about Improving cloud network security using the Tree-Rule firewall.