• Publications
  • Influence
How to detect a compromised SDN switch
tl;dr
In this paper, we define some attack models through compromised switches and design a detection mechanism to find these compromised devices. Expand
  • 43
  • 6
Voting-Based Motion Estimation for Real-Time Video Transmission in Networked Mobile Camera Systems
tl;dr
In a video-based surveillance system, a mobile camera can provide dynamical and wider monitoring range and the video data transmitted from cooperative mobile cameras can be used to actively detect the objects of interest. Expand
  • 29
  • 2
An Analysis of Security Patch Lifecycle Using Google Trend Tool
tl;dr
We proposed a security patch lifecycle to assess the information security risk with the help of vulnerability databases. Expand
  • 5
  • 2
An AMI Threat Detection Mechanism Based on SDN Networks
tl;dr
The security of Advanced Metering Infrastructure (AMI) systems draws more and more attention nowadays. Expand
  • 9
  • 1
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service
tl;dr
We propose a concept of Security Fusion as a Service (SFaaS) for addressing this issue. Expand
  • 19
Rate and Quality Control With Embedded Coding for Mobile Robot With Visual Patrol
tl;dr
In this paper, for transmitting visual objects of interest, an embedded spatial coding approach is proposed to progressively encode the presentation quality of visual objects under receivers' bandwidth limitation. Expand
  • 11
An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks
tl;dr
We propose a Priority Queue-based algorithm that assigns packets from normal users to a high priority queue and packets from suspected attackers to a low priority queue. Expand
  • 10
Keeping an eye on your security through assurance indicators
tl;dr
In this paper we advocate the need for a Security Assurance (SA) system to be embedded within current IT systems. Expand
  • 5
  • Open Access
The VLSI implementation of an artificial neural network scheme embedded in an automated inspection quality management system
This paper describes in detail the VLSI implementation of an innovative artificial neural network scheme embedded in an automated inspection system for the manufacturing industry employing theExpand
  • 7
A Mechanism on Risk Analysis of Information Security with Dynamic Assessment
tl;dr
We propose a dynamic risk assessment mechanism to help the information security manager realizing the human security awareness and vulnerability assessment in end client devices. Expand
  • 5