Enhancing medical smartphone networks via blockchain-based trust management against insider attacks

W Meng, W Li, L Zhu - IEEE Transactions on Engineering …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has gradually become one of the most important platforms across
different disciplines, by enabling dedicated physical objects to communicate with other …

Designing collaborative blockchained signature-based intrusion detection in IoT environments

W Li, S Tug, W Meng, Y Wang - Future Generation Computer Systems, 2019 - Elsevier
With the rapid development of Internet-of-Things (IoT), there is an increasing demand for
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …

Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems

Y Wang, W Meng, W Li, Z Liu, Y Liu… - … Practice and Experience, 2019 - Wiley Online Library
To protect assets and resources from being hacked, intrusion detection systems are widely
implemented in organizations around the world. However, false alarms are one challenging …

Towards blockchained challenge-based collaborative intrusion detection

W Li, Y Wang, J Li, MH Au - … and Network Security Workshops: ACNS 2019 …, 2019 - Springer
To protect distributed network resources and assets, collaborative intrusion detection
systems/networks (CIDSs/CIDNs) have been widely deployed in various organizations with …

Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: a further analysis

W Li, LF Kwok - Journal of Information Security and Applications, 2019 - Elsevier
Collaborative intrusion detection systems/networks (CIDSs/CIDNs) have been widely used,
aiming to enhance the performance of a single intrusion detection system (IDS), by allowing …

Practical Bayesian poisoning attacks on challenge-based collaborative intrusion detection networks

W Meng, W Li, L Jiang, KKR Choo, C Su - … 27, 2019, Proceedings, Part I 24, 2019 - Springer
As adversarial techniques constantly evolve to circumvent existing security measures, an
isolated, stand-alone intrusion detection system (IDS) is unlikely to be efficient or effective …