1. 2018
  2. Published

    Cyber-physical architecture assisted by programmable networking. / Rubio-Hernan, Jose; Sahay, Rishikesh; De Cicco, Luca; Garcia-Alfaro, Joaquin.

    In: Internet Technology Letters, 2018.

    Publication: Research - peer-reviewJournal article – Annual report year: 2018

  3. Published

    Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. / Meng, Weizhi; Lee, Wang; Liu, Zhe; Su, Chunhua; Li, Yan.

    Information Security and Cryptology. Vol. 10779 Springer, 2018. p. 327-338.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2018

  4. Published

    Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs. / Li, Wei; Rijmen, Vincent; Tao, Zhi; Wang, Qingju; Chen, Hua; Liu, Yunwen; Li, Chaoyun; Liu, Ya.

    In: Science China Information Sciences, Vol. 61, No. 3, 032110, 2018.

    Publication: Research - peer-reviewJournal article – Annual report year: 2018

  5. Published

    Improved meet-in-the-middle attacks on reduced-round Piccolo. / Liu, Ya; Cheng, Liang; Liu, Zhiqiang; Li, Wei; Wang, Qingju; Gu, Dawu.

    In: Science China Information Sciences, Vol. 61, No. 3, 032108, 2018.

    Publication: Research - peer-reviewJournal article – Annual report year: 2018

  6. Published

    Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks. / Li, Wenjuan; Meng, Weizhi; Kwok, Lam For.

    In: Future Internet, Vol. 10, No. 1, 2018.

    Publication: Research - peer-reviewJournal article – Annual report year: 2018

  7. Published

    Putting Wings on SPHINCS. / Kölbl, Stefan.

    Post-quantum Cryptography. Vol. 10786 Springer, 2018. p. 205-226 (Lecture Notes in Computer Science, Vol. 10786).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2018

  8. Accepted/In press

    TouchWB : Touch behavioral user authentication based on web browsing on smartphones. / Meng, Weizhi; Wang, Yu; Wong, Duncan S.; Wen, Sheng; Xiang, Yang.

    In: Journal of Network and Computer Applications, Vol. 117, 2018, p. 1-9.

    Publication: Research - peer-reviewJournal article – Annual report year: 2018

  9. Accepted/In press

    Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. / Meng, Weizhi; Choo, Kim-Kwang Raymond; Furnell, Steven; Vasilakos, Athanasios V.; Probst, Christian W.

    In: IEEE Transactions on Network and Service Management, Vol. PP, No. 99, 2018.

    Publication: Research - peer-reviewJournal article – Annual report year: 2018

  10. Published

    Towards False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems. / Li, Wenjuan; Meng, Weizhi; Su, Chunhua; Kwok, Lam For.

    In: IEEE Access, Vol. 6, 2018, p. 6530-6539.

    Publication: Research - peer-reviewJournal article – Annual report year: 2018

  11. Published

    When Intrusion Detection Meets Blockchain Technology: A Review. / Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang.

    In: IEEE Access, Vol. 6, 2018, p. 10179 - 10188.

    Publication: Research - peer-reviewJournal article – Annual report year: 2018

Previous 1 2 3 4 5 6 7 8 ...11 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word