Showing results 13 to 32 of 36
< previous
next >
Issue Date | Title | Author(s) |
2020-06-07 | Gel immobilization: A strategy to improve the performance of anaerobic ammonium oxidation (anammox) bacteria for nitrogen-rich wastewater treatment. | Ahmad, HA; Ni, S-Q; Ahmad, S; Zhang, J; Ali, M; Ngo, HH; Guo, W; Tan, Z; Wang, Q |
2020 | Hybrid Tree-rule Firewall for High Speed Data Transmission | Chomsiri, T; He, XS; Nanda, P; Tan, Z |
2020-01-01 | IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities | Li, S; Choo, KKR; Tan, Z; He, X; Hu, J; Qin, T |
2016-01-01 | An improvement of tree-rule firewall for a large network: Supporting large rule size and low delay | Chomsiri, T; He, X; Nanda, P; Tan, Z |
2014-01-01 | Improving cloud network security using the Tree-Rule firewall | He, X; Chomsiri, T; Nanda, P; Tan, Z |
2014-01-01 | Intrusion detection method based on nonlinear correlation measure | Ambusaidi, MA; Tan, Z; He, X; Nanda, P; Lu, LF; Jamdagni, A |
2017-09-07 | An intrusion detection system based on polynomial feature correlation analysis | Li, Q; Tan, Z; Jamdagni, A; Nanda, P; He, X; Han, W |
2009-12-01 | Intrusion detection using geometrical structure | Jamdagni, A; Tan, Z; Nanda, P; He, X; Liu, R |
2010-08-06 | Intrusion detection using GSAD model for HTTP traffic on web services | Jamdagni, A; Tan, Z; Nanda, P; He, X; Liu, RP |
2010-12-01 | Mahalanobis Distance Map approach for Anomaly Detection of web-based attacks | Jamdagni, A; Tan, Z; Nanda, P; He, X; Liu, RP |
2018-01-01 | Moving towards highly reliable and effective sensor networks | Jan, MA; Tan, Z; He, X; Ni, W |
2011-11-17 | Multivariate correlation analysis technique based on Euclidean distance map for network traffic characterization | Tan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP |
2010-12-01 | Network intrusion detection based on LDA for payload feature selection | Tan, Z; Jamdagni, A; He, X; Nanda, P |
2012-01 | A Nonlinear Correlation Measure for Intrusion Detection | Ambu Saidi, MA; Lu, L; Tan, T; He, S; Jamdagni, A; Nanda, P; Ambusaidi, M; Lu, LF; He, X; Tan, Z; Jamdagni, A; Nanda, P |
2015-01-15 | A novel feature selection approach for intrusion detection data classification | Ambusaidi, MA; He, X; Tan, Z; Nanda, P; Lu, LF; Nagar, UT |
2022-01-01 | PAR: Political Actor Representation Learning with Social Context and Expert Knowledge | Feng, S; Tan, Z; Chen, Z; Wang, N; Yu, P; Zheng, Q; Chang, X; Luo, M |
2018-06-01 | Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait | Khan, F; ur Rehman, A; Usman, M; Tan, Z; Puthal, D |
2013-02-26 | RePIDS: A multi tier Real-time Payload-based Intrusion Detection System | Jamdagni, A; Tan, Z; He, X; Nanda, P; Liu, RP |
2015-01-15 | A robust authentication scheme for observing resources in the internet of things environment | Jan, MA; Nanda, P; He, X; Tan, Z; Liu, RP |
2015-01-15 | A stateful mechanism for the tree-rule firewall | Chomsiri, T; He, X; Nanda, P; Tan, Z |