Showing results 4 to 23 of 36
< previous
next >
Issue Date | Title | Author(s) |
2011-11-28 | Denial-of-service attack detection based on multivariate correlation analysis | Tan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP |
2020-07 | Deployment of Artificial Intelligence in Real-World Practice: Opportunity and Challenge. | He, M; Li, Z; Liu, C; Shi, D; Tan, Z |
2015-09-01 | Detection of Denial-of-Service Attacks Based on Computer Vision Techniques | Tan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP; Hu, J |
2013 | Detection of denial-of-service attacks based on computer vision techniques | Tan, Z |
2014-01-01 | Enhancing big data security with collaborative intrusion detection | Tan, Z; Nagar, UT; He, X; Nanda, P; Liu, RP; Wang, S; Hu, J |
2014-09-01 | Enhancing Big Data Security with Collaborative Intrusion Detection | Tan, Z; Nagar, U; He, X; Nanda, P; Liu, R |
2012-12-01 | Evaluation on multivariate correlation analysis based denial-of-service attack detection system | Tan, Z; Jamdagni, A; Nanda, P; He, X; Liu, RP |
2020-01-01 | FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks | Lai, S; Fan, X; Ye, Q; Tan, Z; Zhang, Y; He, X; Nanda, P |
2017-10-13 | A Framework for Data Security in Cloud using Collaborative Intrusion Detection Scheme | Nagar, U; He, X; Nanda, P; Tan, Z |
2020-06-07 | Gel immobilization: A strategy to improve the performance of anaerobic ammonium oxidation (anammox) bacteria for nitrogen-rich wastewater treatment. | Ahmad, HA; Ni, S-Q; Ahmad, S; Zhang, J; Ali, M; Ngo, HH; Guo, W; Tan, Z; Wang, Q |
2020 | Hybrid Tree-rule Firewall for High Speed Data Transmission | Chomsiri, T; He, XS; Nanda, P; Tan, Z |
2020-01-01 | IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities | Li, S; Choo, KKR; Tan, Z; He, X; Hu, J; Qin, T |
2016-01-01 | An improvement of tree-rule firewall for a large network: Supporting large rule size and low delay | Chomsiri, T; He, X; Nanda, P; Tan, Z |
2014-01-01 | Improving cloud network security using the Tree-Rule firewall | He, X; Chomsiri, T; Nanda, P; Tan, Z |
2014-01-01 | Intrusion detection method based on nonlinear correlation measure | Ambusaidi, MA; Tan, Z; He, X; Nanda, P; Lu, LF; Jamdagni, A |
2017-09-07 | An intrusion detection system based on polynomial feature correlation analysis | Li, Q; Tan, Z; Jamdagni, A; Nanda, P; He, X; Han, W |
2009-12-01 | Intrusion detection using geometrical structure | Jamdagni, A; Tan, Z; Nanda, P; He, X; Liu, R |
2010-08-06 | Intrusion detection using GSAD model for HTTP traffic on web services | Jamdagni, A; Tan, Z; Nanda, P; He, X; Liu, RP |
2010-12-01 | Mahalanobis Distance Map approach for Anomaly Detection of web-based attacks | Jamdagni, A; Tan, Z; Nanda, P; He, X; Liu, RP |
2018-01-01 | Moving towards highly reliable and effective sensor networks | Jan, MA; Tan, Z; He, X; Ni, W |