关注
Weizhi Meng
Weizhi Meng
Department of Applied Mathematics and Computer Science, Technical University of Denmark
在 dtu.dk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
IEEE Access 6, 10179-10188, 2018
4952018
Surveying the Development of Biometric User Authentication on Mobile Phones
W Meng, DS Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials, 2015
2962015
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures
W Li, W Meng, LF Kwok
Journal of Network and Computer Applications 68, 126-139, 2016
1812016
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Y Meng, DS Wong, R Schlegel, LF Kwok
China International Conference on Information Security and Cryptology …, 2012
1692012
Designing collaborative blockchained signature-based intrusion detection in IoT environments
W Li, S Tug, W Meng, Y Wang
Future Generation Computer Systems 96, 481-489, 2019
1432019
SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology
S Singh, IH Ra, W Meng, M Kaur, GH Cho
International Journal of Distributed Sensor Networks 15 (4), 1550147719844159, 2019
1102019
EFM: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism
W Meng, W Li, LF Kwok
Computers & Security 43, 189-204, 2014
1002014
Enhancing medical smartphone networks via blockchain-based trust management against insider attacks
W Meng, W Li, L Zhu
IEEE Transactions on Engineering Management 67 (4), 1377-1386, 2019
992019
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks
W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst
IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018
922018
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data
W Meng, W Li, C Su, J Zhou, R Lu
IEEE Access 6, 7234-7243, 2017
892017
Intrusion detection in the era of IoT: Building trust via traffic filtering and sampling
W Meng
Computer 51 (7), 36-43, 2018
882018
Design of intelligent KNN‐based alarm filter using knowledge‐based alert verification in intrusion detection
W Meng, W Li, LF Kwok
Security and Communication Networks 8 (18), 3883-3895, 2015
822015
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
W Li, W Meng, LF Kwok, HS Horace
Journal of Network and Computer Applications 77, 135-145, 2017
812017
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments
W Li, W Meng, MH Au
Journal of Network and Computer Applications 161, 102631, 2020
792020
The practice on using machine learning for network anomaly intrusion detection
YX Meng
2011 International Conference on Machine Learning and Cybernetics 2, 576-581, 2011
752011
The application of Software Defined Networking on securing computer networks: A survey
R Sahay, W Meng, CD Jensen
Journal of Network and Computer Applications 131, 89-108, 2019
732019
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks
W Meng, W Li, Y Xiang, KKR Choo
Journal of Network and Computer Applications 78, 162-169, 2017
712017
A fog-based privacy-preserving approach for distributed signature-based intrusion detection
Y Wang, W Meng, W Li, J Li, WX Liu, Y Xiang
Journal of Parallel and Distributed Computing 122, 26-35, 2018
632018
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks
L Liu, Z Ma, W Meng
Future generation computer systems 101, 865-879, 2019
612019
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks
W Li, W Meng, LF Kwok
The IFIP WG 11.11 International Conference on Trust Management, 61-76, 2014
582014
系统目前无法执行此操作,请稍后再试。
文章 1–20