A knowledge graph empowered online learning framework for access control decision-making

M You, J Yin, H Wang, J Cao, K Wang, Y Miao… - World Wide Web, 2023 - Springer
Abstract Knowledge graph, as an extension of graph data structure, is being used in a wide
range of areas as it can store interrelated data and reveal interlinked relationships between …

A survey of link flooding attacks in software defined network ecosystems

R ur Rasool, H Wang, U Ashraf, K Ahmed… - Journal of Network and …, 2020 - Elsevier
Abstract Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service
attack that congests critical network links and can completely isolate the victim's network. In …

A novel statistical technique for intrusion detection systems

E Kabir, J Hu, H Wang, G Zhuo - Future Generation Computer Systems, 2018 - Elsevier
This paper proposes a novel approach for intrusion detection system based on sampling
with Least Square Support Vector Machine (LS-SVM). Decision making is performed in two …

Graph intelligence enhanced bi-channel insider threat detection

W Hong, J Yin, M You, H Wang, J Cao, J Li… - … Conference on Network …, 2022 - Springer
For an organization, insider intrusion generally poses far more detrimental threats than
outsider intrusion. Traditionally, insider threat is detected by analyzing logged user …

Secure -NN Query on Encrypted Cloud Data with Multiple Keys

K Cheng, L Wang, Y Shen, H Wang… - … Transactions on Big …, 2017 - ieeexplore.ieee.org
The k-nearest neighbors (k-NN) query is a fundamental primitive in spatial and multimedia
databases. It has extensive applications in location-based services, classification & …

A minority class boosted framework for adaptive access control decision-making

M You, J Yin, H Wang, J Cao, Y Miao - International conference on web …, 2021 - Springer
Access control is an effective way to prevent data exfiltration from insiders. Recently,
machine learning algorithms have been widely used in access control decision-making …

Insider Threat Detection: A Review

P Manoharan, J Yin, H Wang… - … on Networking and …, 2024 - ieeexplore.ieee.org
In the cyber world, insider threats significantly challenge organizational security. These
threats originate from malicious or negligent employees with authorized access, making …

Building access control policy model for privacy preserving and testing policy conflicting problems

H Wang, J Cao, Y Zhang, H Wang, J Cao… - … Control Management in …, 2020 - Springer
This chapter proposes a purpose-based access control model in distributed computing
environment for privacy preserving policies and mechanisms, and describes algorithms for …

HpGraphNEI: A network entity identification model based on heterophilous graph learning

N Li, T Li, Z Ma, X Hu, S Zhang, F Liu, X Quan… - Information Processing …, 2024 - Elsevier
Network entities have important asset mapping, vulnerability, and service delivery
applications. In cyberspace, where the network structure is complex and the number of …

Effect of packet loss and reorder on quality of audio streaming

A Laghari, R Laghari, A Wagan, A Umrani - EAI Endorsed Transactions on …, 2019 - eudl.eu
Abstract In this paper, Audio QoE assessment experiments were conducted by using
network parameters such as packet loss and reorder. The network model was created by …