UM

Browse/Search Results:  1-10 of 13 Help

Selected(0)Clear Items/Page:    Sort:
A Modular Approach for Implementation of Honeypots in Cyber Security Journal article
International Journal of Applied Engineering Research, 2016,Volume: 11,Issue: 8,Page: 5446-5451
Authors:  Muneeb Mirza;  Muhammad Usman;  Robert P. Biuk-Aghai;  Simon Fong
Favorite  |  View/Download:18/0  |  Submit date:2019/02/13
Antimalware  Antivirus  Cyber Security  Honeypots  Intrusion Detection System  Network Security  Signature  
Ultrasonic detection of reinforced concrete beams on sulfate ions intrusion under stress condition Conference paper
Proceedings of the 11th fib International PhD Symposium in Civil Engineering, FIB 2016
Authors:  Sun M.;  Zhang J.;  Li Z.
Favorite  |  View/Download:1/0  |  Submit date:2019/04/08
Incremental Methods for Detecting Outliers from Multivariate Data Stream Conference paper
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, AIA 2014, Innsbruck, Austria, February 17 – 19, 2014
Authors:  Simon Fong;  Zhicong Luo;  Bee Wah Yap;  Suash Deb
Favorite  |  View/Download:3/0  |  Submit date:2019/02/13
Data Stream Mining  Incremental Processing  Outlier Detection  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:466/44  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid  
Multi-way association clustering analysis on adaptive real-time multicast data Conference paper
Communications in Computer and Information Science, Univ Macau, Macau, PEOPLES R CHINA, JUL 11-13, 2011
Authors:  Sheneela Naz;  Sohail Asghar;  Simon Fong;  Amir Qayyum
Favorite  |  View/Download:3/0  |  Submit date:2019/02/13
Association Rules  Clustering  Network Security  Real-time Multicast  
DFA-based multi-level and multi-layer IDS security evaluation Conference paper
IMCIC 2011 - 2nd International Multi-Conference on Complexity, Informatics and Cybernetics, Proceedings, Orlando, FL, United states, 3 27, 2011 - 3 30, 2011
Authors:  Aili, Geng;  Fong, Simon;  Liu, Liyang;  Miao, Zhong
Favorite  |  View/Download:0/0  |  Submit date:2018/11/06
Experimental research on DFA-Based MLML IDS security evaluation Conference paper
Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, Las Vegas, NV, USA, 11-13 April 2011
Authors:  Hongbin Wang;  Zhiyi Fang;  Simon Fong;  Yain-Whar Si;  Liyang Liu
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Dfa  Ids  Multi-layer Evaluation  Multi-level Evaluation  Security  
A Logical Model for Detecting Irregular Actions in Physical Access Environment Conference paper
Proceedings - International Workshop on Database and Expert Systems Applications, DEXA, Regensburg, Germany, 3-7 Sept. 2007
Authors:  António Leong;  Simon Fong;  Zhuang Yan
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Access Control  Intrusion Detection  Smart-card  
A Security Model for Detecting Suspicious Patterns in Physical Environment Conference paper
Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security, Manchester, UK, 29-31 Aug. 2007
Authors:  Simon Fong;  Zhuang Yan
Favorite  |  View/Download:4/0  |  Submit date:2019/02/13
Mining suspicious patterns in physical environment Conference paper
2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID
Authors:  Fong S.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/13
Data-mining  Intrusion detection  Physical environment security