Skip to main content

Research Repository

Advanced Search

Dr Thomas Tan's Outputs (123)

Deriving ChaCha20 Key Streams From Targeted Memory Analysis (2019)
Journal Article
McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019). Deriving ChaCha20 Key Streams From Targeted Memory Analysis. Journal of Information Security and Applications, 48, Article 102372. https://doi.org/10.1016/j.jisa.2019.102372

There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly resistant to side-channel attacks, cryptographic artefacts may exist in memo... Read More about Deriving ChaCha20 Key Streams From Targeted Memory Analysis.

Reviving legacy enterprise systems with microservice-based architecture within cloud environments (2019)
Presentation / Conference Contribution
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019, June). Reviving legacy enterprise systems with microservice-based architecture within cloud environments. Presented at 5th International Conference on Software Engineering (SOFT 2019), Copenhagen, Denmark

Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most effective means to re-architect legacy enterprise systems and to reengineer th... Read More about Reviving legacy enterprise systems with microservice-based architecture within cloud environments.

A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers (2019)
Journal Article
Han, T., Jan, S., Tan, T., Usman, M., Jan, M., Khan, R., & Xu, Y. (2020). A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers. Concurrency and Computation: Practice and Experience, 32(16), Article e5300. https://doi.org/10.1002/cpe.5300

Software Dened Network (SDN) and Network Virtualization (NV) are emerged paradigms that simplied the control and management of the next generation networks, most importantly, Internet of Things (IoT), Cloud Computing, and Cyber-Physical Systems. The... Read More about A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers.

Decrypting Live SSH Traffic in Virtual Environments (2019)
Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019). Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010

Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts required for decrypting secure communications. This paper develops the MemDe-... Read More about Decrypting Live SSH Traffic in Virtual Environments.

SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. (2019)
Journal Article
Jan, M. A., Zhang, W., Usman, M., Tan, Z., Khan, F., & Luo, E. (2019). SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. Journal of Network and Computer Applications, 137, 1-10. https://doi.org/10.1016/j.jnca.2019.02.023

The Internet of Things (IoT) has the potential to transform communities around the globe into smart cities. The massive deployment of sensor-embedded devices in the smart cities generates voluminous amounts of data that need to be stored and processe... Read More about SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application..

Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop (2019)
Journal Article
Babar, M., Arif, F., Jan, M. A., Tan, Z., & Khan, F. (2019). Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. Future Generation Computer Systems, 96, 398-409. https://doi.org/10.1016/j.future.2019.02.035

The unbroken amplfi cation of a versatile urban setup is challenged by huge Big Data processing. Understanding the voluminous data generated in a smart urban environment for decision making is a challenging task. Big Data analytics is performed to ob... Read More about Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop.

ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System (2019)
Journal Article
Javaid, S., Afzal, H., Babar, M., Arif, F., Tan, Z., & Jan, M. A. (2019). ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System. IEEE Access, 1-1. https://doi.org/10.1109/access.2019.2897095

Putting trust in the world of the Internet of Things, where served and serving entities are often unknown, is very hard especially when personal and business information is often being exchanged for providing and consuming services. Moreover, the iss... Read More about ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System.

Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning (2018)
Journal Article
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2019). Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, 128, 56-63. https://doi.org/10.1016/j.jnca.2018.12.002

Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce users to click and then redirect them to a phishing webpage. To protect IoT systems, email classification is an essential mechanism to classify spam and l... Read More about Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning.

NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification (2018)
Journal Article
Yazdania, S., Tan, Z., Kakavand, M., & Lau, S. (2022). NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification. Wireless Networks, 28(3), 1251-1261. https://doi.org/10.1007/s11276-018-01909-0

Research in financial domain has shown that sentiment aspects of stock news have a profound impact on volume trades, volatility, stock prices and firm earnings. With the ever growing social inetworking and online marketing sites, the reviews obtained... Read More about NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification.

Copy-move forgery detection using combined features and transitive matching (2018)
Journal Article
Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H., & Tan, Z. (2019). Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications, 78(21), 30081-30096. https://doi.org/10.1007/s11042-018-6922-4

Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be tampered easily. Therefore, the research of multimedia forensics is necessary... Read More about Copy-move forgery detection using combined features and transitive matching.

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services (2018)
Journal Article
Zhang, S., Li, X., Tan, Z., Peng, T., & Wang, G. (2019). A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Generation Computer Systems, 94, 40-50. https://doi.org/10.1016/j.future.2018.10.053

With the rapid pervasion of location-based services (LBSs), protection of location privacy has become a significant concern. In most continuous LBSs' privacy-preserving solutions, users need to transmit the location query data to an untrusted locatio... Read More about A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.

An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules (2018)
Journal Article
Habibullah, S., Liu, X., & Tan, Z. (2018). An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules. International Journal of Computer Theory and Engineering, 10(5), 164-169. https://doi.org/10.7763/ijcte.2018.v10.1219

Evolving legacy enterprise systems into a lean system architecture has been on the agendas of many enterprises. Recent advance in legacy system evaluation is in favour of microservice technologies, which not only significantly reduce the complexity i... Read More about An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules.

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors (2018)
Presentation / Conference Contribution
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018, July). A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. Presented at The 15th International Joint Conference on e-Business, Porto, Portugal

Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every year in many developing countries, especially south-Asian countries. Althoug... Read More about A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors.

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment (2018)
Journal Article
Babar, M., Khan, F., Iqbal, W., Yahya, A., Arif, F., Tan, Z., & Chuma, J. (2018). A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access, 6, 43088-43099

Smart societies have an increasing demand for quality-oriented services and infrastructure in an Industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numerous challenges. Among them, secured energy Demand Side Management (DSM) is o... Read More about A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment.

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors (2018)
Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., Prasad, M., Raja, R., & Tripathi, S. S. (2018). Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760

Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to form a network (well known as wireless sensor networks) to complete IoT Inf... Read More about Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.

Moving Towards Highly Reliable and Effective Sensor Networks. (2018)
Journal Article
Ahmad, M., Tan, Z., He, X., & Ni, W. (2018). Moving Towards Highly Reliable and Effective Sensor Networks. Ad-hoc & sensor wireless networks, 40(3-4), 163-168

Wireless Sensor Networks (WSNs) have been the preferred choice for the design and deployment of next generation monitoring and control systems [1]. In these networks, the sensor nodes forward their sensed data towards a centralized base station. The... Read More about Moving Towards Highly Reliable and Effective Sensor Networks..

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait (2018)
Journal Article
Khan, F., ur Rehman, A., Usman, M., Tan, Z., & Puthal, D. (2018). Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait. Mobile Networks and Applications, https://doi.org/10.1007/s11036-018-1020-4

The enormous developments in the field of wireless communication technologies have made the unlicensed spectrum bands crowded, resulting uncontrolled interference to the traditional wireless network applications. On the other hand, licensed spectrum... Read More about Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait.

A framework for data security in cloud using collaborative intrusion detection scheme (2017)
Presentation / Conference Contribution
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017, October). A framework for data security in cloud using collaborative intrusion detection scheme. Presented at Proceedings of the 10th International Conference on Security of Information and Networks - SIN '17, Jaipur, India

Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go feature which is based on measured usage and can be compared to other utility se... Read More about A framework for data security in cloud using collaborative intrusion detection scheme.

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis (2017)
Presentation / Conference Contribution
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017, August). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. Presented at 2017 IEEE Trustcom/BigDataSE/ICESS

This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was designed and applied in this work to extract hidden correlations from traffic rel... Read More about An Intrusion Detection System Based on Polynomial Feature Correlation Analysis.

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay (2017)
Presentation / Conference Contribution
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016, August). An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. Presented at 2016 IEEE Trustcom/BigDataSE/ISPA

The firewalls were invented since 1990s [1] and have been developed to operate more secure and faster. From the first era of the firewalls until today, they still regulate packet based on a listed rule. The listed rule is the set of rule sequence whi... Read More about An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay.