intrusion detection ()

Members

Naghmeh Moradpoor
Lecturer in Cybersecurity and Networks
N.Moradpoor@napier.ac.uk
+44 131 455 2596
Zhiyuan Tan
Lecturer
Z.Tan@napier.ac.uk
+44 131 455 2822

Publications

Ambusaidi, Mohammed A., He, X., Tan, Z., Nanda, P., Lu, L., Nagar, Upasana T. (2014). A Novel Feature Selection Approach for Intrusion Detection Data Classification. In: (Ed.) 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 82 - 89). Beijing, China: . IEEE.

Ambusaidi, Mohammed A., Tan, Z., He, X., Nanda, P., Lu, L., Jamdagni, A. (2014). Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8, (2/3), 77-86.

Jamdagni, A., Tan, Z., Nanda, P., He, X., Liu, R. (2013). RePIDS: A Multi Tier Real-Time Payload-Based Intrusion Detection System. Computer Networks, 57, (3), 811-824.

Jamdagni, A., Tan, Z., Nanda, P., He, X., Liu, R. (2010). Intrusion detection using GSAD model for HTTP traffic on web services. In: (Ed.) Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, , () ( ed.). (pp. 1193-1197). New York, NY, USA: . ACM.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R., Jia, W., Yeh, W. (2010). A two-tier system for web attack detection using linear discriminant method. In: Soriano, M., Qing, S., López, J. (Eds.) Information and Communications Security, 6476, () ( ed.). (pp. 459-471). : . Springer Berlin Heidelberg.

Zheng, L., Peng, T. (2009). The VoIP Intrusion Detection through a LVQ-based Neural Network. In: (Ed.) Proceedings of the 4th International Conference for Internet Technology and Secured Transactions , , () ( ed.). (pp. ). London, UK: . .

Abimbola, A., Munoz, J., Buchanan, W. (2006). Enhancing Intrusion Detection via a Active Target Host. In: (Ed.) IEEE ICTe Africa 2006, , () ( ed.). (pp. ). Kenya: . IEEE Computer Society Press.

Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Tech. Report, 11, (4), 166-175.

Buchanan, W., Llamas, D. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC, , (), .

Pikoulas, J. (2003). An Agent-based Bayesian Method for Network Intrusion Detection (PhD). Edinburgh Napier University (Buchanan, W.).