Showing results 1 to 20 of 34
next >
Issue Date | Title | Author(s) |
2020-07 | Deployment of Artificial Intelligence in Real-World Practice: Opportunity and Challenge. | He, M; Li, Z; Liu, C; Shi, D; Tan, Z |
2020-06-07 | Gel immobilization: A strategy to improve the performance of anaerobic ammonium oxidation (anammox) bacteria for nitrogen-rich wastewater treatment. | Ahmad, HA; Ni, S-Q; Ahmad, S; Zhang, J; Ali, M; Ngo, HH; Guo, W; Tan, Z; Wang, Q |
2020-01-01 | FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks | Lai, S; Fan, X; Ye, Q; Tan, Z; Zhang, Y; He, X; Nanda, P |
2020-01-01 | IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities | Li, S; Choo, KKR; Tan, Z; He, X; Hu, J; Qin, T |
2020 | Hybrid Tree-rule Firewall for High Speed Data Transmission | Chomsiri, T; He, XS; Nanda, P; Tan, Z |
2018-06-01 | Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait | Khan, F; ur Rehman, A; Usman, M; Tan, Z; Puthal, D |
2018-05-31 | Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors | Lenka, RK; Rath, AK; Tan, Z; Sharma, S; Puthal, D; Simha, NVR; Prasad, M; Raja, R; Tripathi, SS |
2018-01-01 | Moving towards highly reliable and effective sensor networks | Jan, MA; Tan, Z; He, X; Ni, W |
2017-10-13 | A Framework for Data Security in Cloud using Collaborative Intrusion Detection Scheme | Nagar, U; He, X; Nanda, P; Tan, Z |
2017-09-07 | An intrusion detection system based on polynomial feature correlation analysis | Li, Q; Tan, Z; Jamdagni, A; Nanda, P; He, X; Han, W |
2016-10-01 | Building an intrusion detection system using a filter-based feature selection algorithm | Ambusaidi, MA; He, X; Nanda, P; Tan, Z |
2016-01-01 | An improvement of tree-rule firewall for a large network: Supporting large rule size and low delay | Chomsiri, T; He, X; Nanda, P; Tan, Z |
2015-09-01 | Detection of Denial-of-Service Attacks Based on Computer Vision Techniques | Tan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP; Hu, J |
2015-01-15 | A stateful mechanism for the tree-rule firewall | Chomsiri, T; He, X; Nanda, P; Tan, Z |
2015-01-15 | A novel feature selection approach for intrusion detection data classification | Ambusaidi, MA; He, X; Tan, Z; Nanda, P; Lu, LF; Nagar, UT |
2015-01-15 | A robust authentication scheme for observing resources in the internet of things environment | Jan, MA; Nanda, P; He, X; Tan, Z; Liu, RP |
2014-09-01 | Enhancing Big Data Security with Collaborative Intrusion Detection | Tan, Z; Nagar, U; He, X; Nanda, P; Liu, R |
2014-02-01 | A system for denial-of-service attack detection based on multivariate correlation analysis | Tan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP |
2014-01-01 | Enhancing big data security with collaborative intrusion detection | Tan, Z; Nagar, UT; He, X; Nanda, P; Liu, RP; Wang, S; Hu, J |
2014-01-01 | Improving cloud network security using the Tree-Rule firewall | He, X; Chomsiri, T; Nanda, P; Tan, Z |