Network anomaly detection: methods, systems and tools
MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …
Cyber security and privacy issues in smart grids
Smart grid is a promising power delivery infrastructure integrated with communication and
information technologies. Its bi-directional communication and electricity flow enable both …
information technologies. Its bi-directional communication and electricity flow enable both …
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …
cyber‐attacks are created every day as means for achieving financial gain, imposing …
Accountable MapReduce in cloud computing
Z Xiao, Y Xiao - 2011 IEEE Conference on Computer …, 2011 - ieeexplore.ieee.org
Accountable MapReduce in cloud computing Page 1 Accountable MapReduce in Cloud
Computing Zhifeng Xiao and Yang Xiao The University of Alabama Tuscaloosa, AL 35487-0290 …
Computing Zhifeng Xiao and Yang Xiao The University of Alabama Tuscaloosa, AL 35487-0290 …
A survey of security visualization for computer network logs
Network security is an important area in computer science. Although great efforts have
already been made regarding security problems, networks are still threatened by all kinds of …
already been made regarding security problems, networks are still threatened by all kinds of …
Wireless telemedicine and m-health: technologies, applications and research issues
Telemedicine is not medicine, but it is used to compute, to communicate and to deliver high-
quality medical care regardless of location. It reduces cost, time and resources. Furthermore …
quality medical care regardless of location. It reduces cost, time and resources. Furthermore …
Network traffic anomaly detection techniques and systems
To develop a network traffic anomaly detection technique and system, it is indeed necessary
to know the basic properties of network-wide traffic. This chapter starts with a discussion of …
to know the basic properties of network-wide traffic. This chapter starts with a discussion of …
Accountability using flow‐net: design, implementation, and performance evaluation
Y Xiao, K Meng, D Takahashi - Security and Communication …, 2012 - Wiley Online Library
Accountability is a very important topic for computer and networking systems. It helps to
answer questions such as,“What happened?” and,“Who did it?” These two questions are …
answer questions such as,“What happened?” and,“Who did it?” These two questions are …
Accountability and Q-Accountable logging in wireless networks
B Fu, Y Xiao - Wireless personal communications, 2014 - Springer
In this paper, we first present a scheme called flow-net, which is designed to record events
and their relations through the collaboration of the nodes in a network. Flow-net can be used …
and their relations through the collaboration of the nodes in a network. Flow-net can be used …