NUK - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 98
1.
  • A survey of network anomaly... A survey of network anomaly detection techniques
    Ahmed, Mohiuddin; Naser Mahmood, Abdun; Hu, Jiankun Journal of network and computer applications, January 2016, 2016-01-00, Volume: 60
    Journal Article
    Peer reviewed

    Information and Communication Technology (ICT) has a great impact on social wellbeing, economic growth and national security in todays world. Generally, ICT includes computers, mobile communication ...
Full text
2.
  • TON_IoT Telemetry Dataset: ... TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems
    Alsaedi, Abdullah; Moustafa, Nour; Tari, Zahir ... IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    Although the Internet of Things (IoT) can increase efficiency and productivity through intelligent and remote management, it also increases the risk of cyber-attacks. The potential threats to IoT ...
Full text

PDF
3.
  • An Architecture and Perform... An Architecture and Performance Evaluation of Blockchain-Based Peer-to-Peer Energy Trading
    Abdella, Juhar; Tari, Zahir; Anwar, Adnan ... IEEE transactions on smart grid, 07/2021, Volume: 12, Issue: 4
    Journal Article
    Peer reviewed

    Several recent studies have suggested Blockchain for Peer-to-Peer energy trading (P2P-ET) to achieve better security, privacy and fast payment settlement. Most of them however rely on either public ...
Full text
4.
  • Two-Tier Cache-Aided Full-D... Two-Tier Cache-Aided Full-Duplex Hybrid Satellite-Terrestrial Communication Networks
    Ngo, Quynh Tu; Phan, Khoa Tran; Xiang, Wei ... IEEE transactions on aerospace and electronic systems, 06/2022, Volume: 58, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Enabling global Internet access is challenging for cellular-based Internet of Things (IoT) due to the limited range of terrestrial network services. One viable solution is to deploy IoT over ...
Full text
5.
  • HiCoOB: Hierarchical Concur... HiCoOB: Hierarchical Concurrent Optimistic Blockchain Consensus Protocol for Peer-to-Peer Energy Trading Systems
    Abdella, Juhar; Tari, Zahir; Mahmud, Redowan ... IEEE transactions on smart grid, 09/2023, Volume: 14, Issue: 5
    Journal Article
    Peer reviewed

    Hierarchical consensus protocols are one of the most promising approaches considered to improve the performance and scalability of blockchain-based peer-to-peer energy trading (P2P ET) systems. They ...
Full text
6.
  • A survey of anomaly detecti... A survey of anomaly detection techniques in financial domain
    Ahmed, Mohiuddin; Mahmood, Abdun Naser; Islam, Md. Rafiqul Future generation computer systems, 02/2016, Volume: 55
    Journal Article
    Peer reviewed

    Anomaly detection is an important data analysis task. It is used to identify interesting and emerging patterns, trends and anomalies from data. Anomaly detection is an important tool to detect ...
Full text
7.
  • USMD: UnSupervised Misbehav... USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data
    Alsaedi, Abdullah; Tari, Zahir; Mahmud, Redowan ... IEEE transactions on dependable and secure computing, 2023-Jan.-Feb.-1, 2023-1-1, 20230101, Volume: 20, Issue: 1
    Journal Article

    Cyber-Physical Systems (CPSs) enable Information Technology to be integrated with Operation Technology to efficiently monitor and manage the physical processes of various critical infrastructures. ...
Full text
8.
  • Multi-State Energy Classifi... Multi-State Energy Classifier to Evaluate the Performance of the NILM Algorithm
    Desai, Sanket; Alhadad, Rabei; Mahmood, Abdun ... Sensors, 11/2019, Volume: 19, Issue: 23
    Journal Article
    Peer reviewed
    Open access

    With the large-scale deployment of smart meters worldwide, research in non-intrusive load monitoring (NILM) has seen a significant rise due to its dual use of real-time monitoring of end-user ...
Full text

PDF
9.
  • Sub-curve HMM: A malware de... Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences
    Suaboot, Jakapan; Tari, Zahir; Mahmood, Abdun ... Computers & security, 20/May , Volume: 92
    Journal Article
    Peer reviewed

    Malicious software (Malware) plays an important role in penetrating and extracting sensitive information. Based on dynamic program’s behavior monitoring, existing solutions have shown that the Hidden ...
Full text
10.
  • Lightweight Authenticated-E... Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication
    Diro, Abebe; Reda, Haftu; Chilamkurti, Naveen ... IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a significant challenge for securing IoT applications. This necessitates a robust and lightweight security ...
Full text

PDF
1 2 3 4 5
hits: 98

Load filters