Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

Cyber security and privacy issues in smart grids

J Liu, Y Xiao, S Li, W Liang… - … surveys & tutorials, 2012 - ieeexplore.ieee.org
Smart grid is a promising power delivery infrastructure integrated with communication and
information technologies. Its bi-directional communication and electricity flow enable both …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …

A survey of cyber crimes

Y Zhang, Y Xiao, K Ghaboosi, J Zhang… - Security and …, 2012 - Wiley Online Library
With the advancement of computer and information technology, cyber crime is now
becoming one of the most significant challenges facing law enforcement organizations …

Accountable MapReduce in cloud computing

Z Xiao, Y Xiao - 2011 IEEE Conference on Computer …, 2011 - ieeexplore.ieee.org
Accountable MapReduce in cloud computing Page 1 Accountable MapReduce in Cloud
Computing Zhifeng Xiao and Yang Xiao The University of Alabama Tuscaloosa, AL 35487-0290 …

A survey of security visualization for computer network logs

Y Zhang, Y Xiao, M Chen, J Zhang… - Security and …, 2012 - Wiley Online Library
Network security is an important area in computer science. Although great efforts have
already been made regarding security problems, networks are still threatened by all kinds of …

Wireless telemedicine and m-health: technologies, applications and research issues

Y Xiao, D Takahashi, J Liu, H Deng… - … Journal of Sensor …, 2011 - inderscienceonline.com
Telemedicine is not medicine, but it is used to compute, to communicate and to deliver high-
quality medical care regardless of location. It reduces cost, time and resources. Furthermore …

Network traffic anomaly detection techniques and systems

MH Bhuyan, DK Bhattacharyya, JK Kalita… - Network Traffic Anomaly …, 2017 - Springer
To develop a network traffic anomaly detection technique and system, it is indeed necessary
to know the basic properties of network-wide traffic. This chapter starts with a discussion of …

Accountability using flow‐net: design, implementation, and performance evaluation

Y Xiao, K Meng, D Takahashi - Security and Communication …, 2012 - Wiley Online Library
Accountability is a very important topic for computer and networking systems. It helps to
answer questions such as,“What happened?” and,“Who did it?” These two questions are …

Accountability and Q-Accountable logging in wireless networks

B Fu, Y Xiao - Wireless personal communications, 2014 - Springer
In this paper, we first present a scheme called flow-net, which is designed to record events
and their relations through the collaboration of the nodes in a network. Flow-net can be used …