Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks

W Meng, KKR Choo, S Furnell… - … on Network and …, 2018 - ieeexplore.ieee.org
The medical industry is increasingly digitalized and Internet-connected (eg, Internet of
Medical Things), and when deployed in an Internet of Medical Things environment, software …

A fog-based privacy-preserving approach for distributed signature-based intrusion detection

Y Wang, W Meng, W Li, J Li, WX Liu, Y Xiang - Journal of Parallel and …, 2018 - Elsevier
Intrusion detection systems (IDSs) are the frontier of defense against transmissible cyber
threats that spread across distributed systems. Modern IDSs overcome the limitation of …

CBSigIDS: towards collaborative blockchained signature-based intrusion detection

S Tug, W Meng, Y Wang - … on Internet of Things (iThings) and …, 2018 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) are one of the most important security mechanisms that
help identify various attacks. To enhance the detection performance of a single IDS …

Investigating the influence of special on–off attacks on challenge-based collaborative intrusion detection networks

W Li, W Meng, LF Kwok - Future Internet, 2018 - mdpi.com
Intrusions are becoming more complicated with the recent development of adversarial
techniques. To boost the detection accuracy of a separate intrusion detector, the …

Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

W Li, W Meng, LF Kwok, HHS Ip - Cluster Computing, 2018 - Springer
Traditionally, an isolated intrusion detection system (IDS) is vulnerable to various types of
attacks. In order to enhance IDS performance, collaborative intrusion detection networks …

Towards securing challenge-based collaborative intrusion detection networks via message verification

W Li, W Meng, Y Wang, J Han, J Li - Information Security Practice and …, 2018 - Springer
With the increasing number of Internet-of-Things (IoT) devices, intrusion detection systems
(IDSs) have been widely deployed in a distributed or collaborative setting, in which a …

Identifying passive message fingerprint attacks via honey challenge in collaborative intrusion detection networks

W Li, W Meng, Y Wang, LF Kwok… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
To enhance the detection capability of a single intrusion detection system (IDS),
collaborative intrusion detection networks (CIDNs) have been exploited and developed via …

Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA

D Madsen, W Li, W Meng, Y Wang - … 15-17, 2018, Proceedings, Part IV 18, 2018 - Springer
Cyber attacks are greatly expanding in both size and complexity. To handle this issue,
research has been focused on collaborative intrusion detection networks (CIDNs), which …

[PDF][PDF] Institutional Knowledge at Singapore Management Universit y

QF ZHANG, J LI, D ZHENG, P LI, Y TIAN - Journal of Network and …, 2018 - core.ac.uk
This paper develops and tests a new theoretical explanation for stock repurchases. Investors
may disagree with the manager about the firm's investment projects. A repurchase causes a …