• Publications
  • Influence
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
TLDR
Two new information metrics such as the generalized entropy metric and the information distance metric are proposed to detect low-rate DDoS attacks by measuring the difference between legitimate traffic and attack traffic. Expand
Robust Network Traffic Classification
TLDR
The proposed RTC scheme has the capability of identifying the traffic of zero-day applications as well as accurately discriminating predefined application classes and is significantly better than four state-of-the-art methods. Expand
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
TLDR
Various types of attacks and countermeasures related to trust schemes in WSNs are categorized, the development of trust mechanisms are provided, a short summarization of classical trust methodologies are given and an open field and future direction with trust mechanisms in W SNs is provided. Expand
Correlated Differential Privacy: Hiding Information in Non-IID Data Set
TLDR
Experimental results show that the proposed solution outperforms traditional differential privacy in terms of mean square error on large group of queries, which suggests the correlated differential privacy can successfully retain the utility while preserving the privacy. Expand
Teaching and learning online with wikis
TLDR
This paper presents wikis as a useful tool for facilitating online education and illustrates how e-learning practitioners can and are moving beyond their comfort zone by using wikis to enhance the process of teaching and learning online. Expand
6 million spam tweets: A large ground truth for timely Twitter spam detection
TLDR
A thorough evaluation of six machine learning algorithms used to detect Twitter spam using a large dataset of over 600 million public tweets and extracted 12 light-weight features, which can be used for online detection. Expand
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
TLDR
This paper recreate some of the current attacks that attackers may initiate as HTTP and XML, and introduces the use of a back propagation neutral network, called Cloud Protector, which was trained to detect and filter such attack traffic. Expand
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks
TLDR
A novel and practical IP traceback system called Flexible Deterministic Packet Marking (FDPM) is presented which provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. Expand
Network Traffic Classification Using Correlation Information
TLDR
A novel nonparametric approach for traffic classification is proposed which can improve the classification performance effectively by incorporating correlated information into the classification process and its performance benefit from both theoretical and empirical perspectives. Expand
...
1
2
3
4
5
...