Skip to main content

Research Repository

Advanced Search

All Outputs (4)

A framework for data security in cloud using collaborative intrusion detection scheme (2017)
Conference Proceeding
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017). A framework for data security in cloud using collaborative intrusion detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks (188-193). https://doi.org/10.1145/3136825.3136905

Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go feature which is based on measured usage and can be compared to other utility se... Read More about A framework for data security in cloud using collaborative intrusion detection scheme.

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis (2017)
Conference Proceeding
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/I​SPA Conference Proceedings. https://doi.org/10.1109/trustcom/bigdatase/icess.2017.340

This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was designed and applied in this work to extract hidden correlations from traffic rel... Read More about An Intrusion Detection System Based on Polynomial Feature Correlation Analysis.

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay (2017)
Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2017). An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. In 2016 IEEE Trustcom/BigDataSE/I​SPA (178-184). https://doi.org/10.1109/trustcom.2016.0061

The firewalls were invented since 1990s [1] and have been developed to operate more secure and faster. From the first era of the firewalls until today, they still regulate packet based on a listed rule. The listed rule is the set of rule sequence whi... Read More about An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay.

Security for Cyber-Physical Systems in Healthcare (2017)
Book Chapter
Saleem, K., Tan, Z., & Buchanan, W. (2017). Security for Cyber-Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (233-251). Springer. https://doi.org/10.1007/978-3-319-47617-9_12

The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients with secure and reliable healthcare experience, the security issues of cyber-... Read More about Security for Cyber-Physical Systems in Healthcare.