J Liu, Y Xiao, J Gao - IEEE Systems Journal, 2013 - ieeexplore.ieee.org
Smart grid is a promising power infrastructure that is integrated with communication and information technologies. Nevertheless, privacy and security concerns arise simultaneously …
B Fu, Y Xiao - Wireless personal communications, 2014 - Springer
In this paper, we first present a scheme called flow-net, which is designed to record events and their relations through the collaboration of the nodes in a network. Flow-net can be used …
M Ghorbani, MR Hashemi - 2015 23rd Iranian Conference on …, 2015 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) are an essential component of any network security architecture. Their importance is emphasized in today's heterogeneous and complex …
X Liang, Y Xiao, S Ozdemir… - Security and …, 2013 - Wiley Online Library
To produce ciphertexts, two modes of encryption are applied—block ciphers, which encrypt a fixed size block of plaintext at a time, and stream ciphers, which encrypt stream data, one …
Intruders that log in through a series of machines when conducting an attack are hard to trace because of the complex architecture of the Internet. The thumbprinting method …
This study developed an improved multi-level access control system for internet financial transactions. It formulated, simulated and evaluated the performance of the model. This was …
E Kamalanaban, R Seshadri - … of the International Conference on Soft …, 2016 - Springer
In this paper, an architecture of an intrusion detection system (IDS) based on a two-server queueing model is considered and studied. By using an integral equation approach, an …