Browsing byAuthorTan, Z

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 31  next >
Issue DateTitleAuthor(s)
2016-10-01Building an intrusion detection system using a filter-based feature selection algorithmAmbusaidi, MA; He, X; Nanda, P; Tan, Z
2018-05-31Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power SensorsLenka, RK; Rath, AK; Tan, Z; Sharma, S; Puthal, D; Simha, NVR; Prasad, M; Raja, R; Tripathi, SS
2011-11-28Denial-of-service attack detection based on multivariate correlation analysisTan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP
2015-09-01Detection of Denial-of-Service Attacks Based on Computer Vision TechniquesTan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP; Hu, J
2013Detection of denial-of-service attacks based on computer vision techniquesTan, Z
2014-01-01Enhancing big data security with collaborative intrusion detectionTan, Z; Nagar, UT; He, X; Nanda, P; Liu, RP; Wang, S; Hu, J
2014-09-01Enhancing Big Data Security with Collaborative Intrusion DetectionTan, Z; Nagar, U; He, X; Nanda, P; Liu, R
2012-12-01Evaluation on multivariate correlation analysis based denial-of-service attack detection systemTan, Z; Jamdagni, A; Nanda, P; He, X; Liu, RP
2020-01-01FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet NetworksLai, S; Fan, X; Ye, Q; Tan, Z; Zhang, Y; He, X; Nanda, P
2017-10-13A Framework for Data Security in Cloud using Collaborative Intrusion Detection SchemeNagar, U; He, X; Nanda, P; Tan, Z
2020Hybrid Tree-rule Firewall for High Speed Data TransmissionChomsiri, T; He, XS; Nanda, P; Tan, Z
2016-01-01An improvement of tree-rule firewall for a large network: Supporting large rule size and low delayChomsiri, T; He, X; Nanda, P; Tan, Z
2014-01-01Improving cloud network security using the Tree-Rule firewallHe, X; Chomsiri, T; Nanda, P; Tan, Z
2014-01-01Intrusion detection method based on nonlinear correlation measureAmbusaidi, MA; Tan, Z; He, X; Nanda, P; Lu, LF; Jamdagni, A
2017-09-07An intrusion detection system based on polynomial feature correlation analysisLi, Q; Tan, Z; Jamdagni, A; Nanda, P; He, X; Han, W
2009-12-01Intrusion detection using geometrical structureJamdagni, A; Tan, Z; Nanda, P; He, X; Liu, R
2010-08-06Intrusion detection using GSAD model for HTTP traffic on web servicesJamdagni, A; Tan, Z; Nanda, P; He, X; Liu, RP
2010-12-01Mahalanobis Distance Map approach for Anomaly Detection of web-based attacksJamdagni, A; Tan, Z; Nanda, P; He, X; Liu, RP
2018-01-01Moving towards highly reliable and effective sensor networksJan, MA; Tan, Z; He, X; Ni, W
2011-11-17Multivariate correlation analysis technique based on Euclidean distance map for network traffic characterizationTan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP