When intrusion detection meets blockchain technology: a review W Meng, EW Tischhauser, Q Wang, Y Wang, J Han IEEE Access 6, 10179-10188, 2018 | 573 | 2018 |
Surveying the Development of Biometric User Authentication on Mobile Phones W Meng, DS Wong, S Furnell, J Zhou IEEE Communications Surveys & Tutorials, 2015 | 324 | 2015 |
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures W Li, W Meng, LF Kwok Journal of Network and Computer Applications 68, 126-139, 2016 | 219 | 2016 |
Designing collaborative blockchained signature-based intrusion detection in IoT environments W Li, S Tug, W Meng, Y Wang Future Generation Computer Systems 96, 481-489, 2019 | 189 | 2019 |
Touch gestures based biometric authentication scheme for touchscreen mobile phones Y Meng, DS Wong, R Schlegel, LF Kwok China International Conference on Information Security and Cryptology …, 2012 | 179 | 2012 |
SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology S Singh, IH Ra, W Meng, M Kaur, GH Cho International Journal of Distributed Sensor Networks 15 (4), 1550147719844159, 2019 | 145 | 2019 |
Enhancing medical smartphone networks via blockchain-based trust management against insider attacks W Meng, W Li, L Zhu IEEE Transactions on Engineering Management 67 (4), 1377-1386, 2019 | 125 | 2019 |
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments W Li, W Meng, MH Au Journal of Network and Computer Applications 161, 102631, 2020 | 120 | 2020 |
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018 | 113 | 2018 |
EFM: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism W Meng, W Li, LF Kwok Computers & Security 43, 189-204, 2014 | 110 | 2014 |
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data W Meng, W Li, C Su, J Zhou, R Lu IEEE Access 6, 7234-7243, 2017 | 102 | 2017 |
Intrusion detection in the era of IoT: Building trust via traffic filtering and sampling W Meng Computer 51 (7), 36-43, 2018 | 96 | 2018 |
The application of software defined networking on securing computer networks: A survey R Sahay, W Meng, CD Jensen Journal of Network and Computer Applications 131, 89-108, 2019 | 95 | 2019 |
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model W Li, W Meng, LF Kwok, HS Horace Journal of Network and Computer Applications 77, 135-145, 2017 | 90 | 2017 |
Design of intelligent KNN‐based alarm filter using knowledge‐based alert verification in intrusion detection W Meng, W Li, LF Kwok Security and Communication Networks 8 (18), 3883-3895, 2015 | 87 | 2015 |
The practice on using machine learning for network anomaly intrusion detection YX Meng 2011 International Conference on Machine Learning and Cybernetics 2, 576-581, 2011 | 87 | 2011 |
Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems Y Wang, W Meng, W Li, Z Liu, Y Liu, H Xue Concurrency and Computation: Practice and Experience 31 (19), e5101, 2019 | 84 | 2019 |
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks L Liu, Z Ma, W Meng Future generation computer systems 101, 865-879, 2019 | 79 | 2019 |
A fog-based privacy-preserving approach for distributed signature-based intrusion detection Y Wang, W Meng, W Li, J Li, WX Liu, Y Xiang Journal of Parallel and Distributed Computing 122, 26-35, 2018 | 77 | 2018 |
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks W Meng, W Li, Y Xiang, KKR Choo Journal of Network and Computer Applications 78, 162-169, 2017 | 77 | 2017 |