15 results

Cryptocurrency and Uncertainty

Other
Minhat, M., Abdullah, M., Dzolkarnaini, N., & Sapiei, N. (2022)
Cryptocurrency and Uncertainty. [https://www.at-mia.my/2022/01/26/cryptocurrency-and-uncertainty/]

GCHQ Cyber Zone at Cheltenham Science Festival (Curator)

Exhibition / Performance
Kerr, G. GCHQ Cyber Zone at Cheltenham Science Festival (Curator)
[https://issuu.com/cheltenhamfestivals/docs/science_festival_2019_brochure]. 4 June 2019 - 9 June 2019. (Unpublished
Step into a fascinating digital world…come into the GCHQ Cyber Zone and see what it’s like to be a code cracker, ethical hacker and cyber security expert. Escape to cyber spac...

Decrypting Live SSH Traffic in Virtual Environments

Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...

From work-integrated learning to learning-integrated work: motivations and apprehensions of Graduate Apprentices

Conference Proceeding
Smith, S., Taylor-Smith, E., Smith, C., & Varey, A. (2018)
From work-integrated learning to learning-integrated work: motivations and apprehensions of Graduate Apprentices. In Proceedings of the 3rdInternational Research Symposium on Cooperative and Work-Integrated Education, Stuttgart, Germany (199-207
Graduate Apprenticeship (GA) degrees bring new collaborations between universities and employers and new opportunities for apprentices—to gain a university degree, while also ...

Security for Cyber-Physical Systems in Healthcare

Book Chapter
Saleem, K., Tan, Z., & Buchanan, W. (2017)
Security for Cyber-Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (233-251). Springer. https://doi.org/10.1007/978-3-319-47617-9_12
The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients wi...

Hybrid Tree-rule Firewall for High Speed Data Transmission

Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...

Intrusion detection method based on nonlinear correlation measure

Journal Article
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2014)
Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. https://doi.org/10.1504/ijipt.2014.066377
Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services,...

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques

Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment

Conference Proceeding
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014)
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (205-211). https://doi.org/10.1109/trustcom.2014.31
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovat...

A Novel Feature Selection Approach for Intrusion Detection Data Classification

Conference Proceeding
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F., & Nagar, U. T. (2014)
A Novel Feature Selection Approach for Intrusion Detection Data Classification. https://doi.org/10.1109/trustcom.2014.15
Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats...