Machine learning based trust computational model for IoT services

U Jayasinghe, GM Lee, TW Um… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The Internet of Things has facilitated access to a large volume of sensitive information on
each participating object in an ecosystem. This imposes many threats ranging from the risks …

Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks

W Meng, KKR Choo, S Furnell… - … on Network and …, 2018 - ieeexplore.ieee.org
The medical industry is increasingly digitalized and Internet-connected (eg, Internet of
Medical Things), and when deployed in an Internet of Medical Things environment, software …

A fog-based privacy-preserving approach for distributed signature-based intrusion detection

Y Wang, W Meng, W Li, J Li, WX Liu, Y Xiang - Journal of Parallel and …, 2018 - Elsevier
Intrusion detection systems (IDSs) are the frontier of defense against transmissible cyber
threats that spread across distributed systems. Modern IDSs overcome the limitation of …

Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing

W Meng, Y Wang, W Li, Z Liu, J Li… - Information Security and …, 2018 - Springer
To construct an intelligent alarm filter is a promising solution to help reduce false alarms for
an intrusion detection system (IDS), in which an appropriate algorithm can be selected in an …

Investigating the influence of special on–off attacks on challenge-based collaborative intrusion detection networks

W Li, W Meng, LF Kwok - Future Internet, 2018 - mdpi.com
Intrusions are becoming more complicated with the recent development of adversarial
techniques. To boost the detection accuracy of a separate intrusion detector, the …

Stealthy attack detection in multi-channel multi-radio wireless networks

R Varatharajan, AP Preethi, G Manogaran… - Multimedia tools and …, 2018 - Springer
In recent years, the lack of network traffic analysis and flexible network topologies reduce the
performance of the multi-channel multi-radio wireless networks. As high scalability of its …

Towards securing challenge-based collaborative intrusion detection networks via message verification

W Li, W Meng, Y Wang, J Han, J Li - Information Security Practice and …, 2018 - Springer
With the increasing number of Internet-of-Things (IoT) devices, intrusion detection systems
(IDSs) have been widely deployed in a distributed or collaborative setting, in which a …

Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA

D Madsen, W Li, W Meng, Y Wang - … 15-17, 2018, Proceedings, Part IV 18, 2018 - Springer
Cyber attacks are greatly expanding in both size and complexity. To handle this issue,
research has been focused on collaborative intrusion detection networks (CIDNs), which …

[图书][B] Trust evaluation in the IoT environment

U Jayasinghe - 2018 - search.proquest.com
Along with the many benefits of IoT, its heterogeneity brings a new challenge to establish a
trustworthy environment among the objects due to the absence of proper enforcement …

A robust intrusion detection network using thresholdless trust management system with incentive design

A Rezapour, WG Tzeng - … and Privacy in Communication Networks: 14th …, 2018 - Springer
Intrusion detection networks (IDNs) have been developed to improve the detection accuracy
of a single IDS, by collecting intrusion intelligence knowledge and learning experience from …