Skip to main content

Research Repository

Advanced Search

All Outputs (71)

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors (2018)
Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., …Tripathi, S. S. (2018). Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109

Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to form a network (well known as wireless sensor networks) to complete IoT Inf... Read More about Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.

Moving Towards Highly Reliable and Effective Sensor Networks. (2018)
Journal Article
Ahmad, M., Tan, Z., He, X., & Ni, W. (2018). Moving Towards Highly Reliable and Effective Sensor Networks. Ad-hoc & sensor wireless networks, 40(3-4), 163-168

Wireless Sensor Networks (WSNs) have been the preferred choice for the design and deployment of next generation monitoring and control systems [1]. In these networks, the sensor nodes forward their sensed data towards a centralized base station. The... Read More about Moving Towards Highly Reliable and Effective Sensor Networks..

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait (2018)
Journal Article
Khan, F., ur Rehman, A., Usman, M., Tan, Z., & Puthal, D. (2018). Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait. Mobile Networks and Applications, https://doi.org/10.1007/s11036-018-1020-4

The enormous developments in the field of wireless communication technologies have made the unlicensed spectrum bands crowded, resulting uncontrolled interference to the traditional wireless network applications. On the other hand, licensed spectrum... Read More about Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait.

Hybrid Tree-rule Firewall for High Speed Data Transmission (2016)
Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016). Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE Transactions on Cloud Computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548

Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create rule conflicts, and slows down the firewall. To overcome this problem, we hav... Read More about Hybrid Tree-rule Firewall for High Speed Data Transmission.

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm (2016)
Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016). Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914

Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification but also prevent a classifier from making accurate decisions, especially when... Read More about Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm.

Intrusion detection method based on nonlinear correlation measure (2014)
Journal Article
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2014). Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. https://doi.org/10.1504/ijipt.2014.066377

Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services, are more widespread and closely related to our daily life. Thus, it has ra... Read More about Intrusion detection method based on nonlinear correlation measure.

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques (2014)
Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015). Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218

Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing approaches based on machine learning and statistical analysis, the proposed... Read More about Detection of Denial-of-Service Attacks Based on Computer Vision Techniques.

Enhancing Big Data Security with Collaborative Intrusion Detection (2014)
Journal Article
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014). Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. https://doi.org/10.1109/mcc.2014.53

Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a data-driven process. The security and privacy of this data, however, have al... Read More about Enhancing Big Data Security with Collaborative Intrusion Detection.

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis (2014)
Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Ping Liu, R. (2014). A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. IEEE Transactions on Parallel and Distributed Systems, 25(2), 447-456. https://doi.org/10.1109/tpd

Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggressive means, denial-of-service (DoS) attacks cause serious impact on these... Read More about A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.

Improving cloud network security using the Tree-Rule firewall (2013)
Journal Article
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024

This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., Listed-Rule firewalls) have their limita... Read More about Improving cloud network security using the Tree-Rule firewall.

RePIDS: A multi tier Real-time Payload-based Intrusion Detection System (2012)
Journal Article
Jamdagni, A., Tan, Z., He, X., Nanda, P., & Liu, R. P. (2013). RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Computer Networks, 57(3), 811-824. https://doi.org/10.1016/j.comnet.2012.10.002

Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of existing systems lack the ability to process data for real-time anomaly detec... Read More about RePIDS: A multi tier Real-time Payload-based Intrusion Detection System.