Publications (Zhiyuan Tan)

2017

Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., Han, W. (2017). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In: (Ed.) 2017 IEEE Trustcom/BigDataSE/ICESS, , () ( ed.). (pp. ). Sydney, Australia: . IEEE Computer Society.

Saleem, K., Tan, Z., Buchanan, W. (2017). Security for Cyber-Physical Systems in Healthcare. Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare, 12, (), 233-251.

2016

Ambusaidi, M., He, X., Nanda, P., Tan, Z. (2016). Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Transactions on Computers, 65, (10), 2986-2998.

Chomsiri, T., He, X., Nanda, P., Tan, Z. (2016). An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. In: (Ed.) The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. ). Tianjian, China: . IEEE.

Chomsiri, T., He, X., Nanda, P., Tan, Z. (2016). Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE Transactions on Cloud Computing, (PrePrints), (), .

Tan, Z., Saleem, K., Buchanan, W. (2016). Security for Cyber-Physical Systems in Healthcare. In: (Ed.) Health 4.0: How Industry 4.0 and Virtualization are Revolutionizing Healthcare (In-print), , () ( ed.). (pp. ). : . .

2015

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R., Hu, J. (2015). Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64, (9), 2519 - 2533.

2014

Ambusaidi, Mohammed A., He, X., Tan, Z., Nanda, P., Lu, L., Nagar, Upasana T. (2014). A Novel Feature Selection Approach for Intrusion Detection Data Classification. In: (Ed.) 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 82 - 89). Beijing, China: . IEEE.

Ambusaidi, Mohammed A., Tan, Z., He, X., Nanda, P., Lu, L., Jamdagni, A. (2014). Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8, (2/3), 77-86.

Chomsiri, T., He, X., Nanda, P., Tan, Z. (2014). A Stateful Mechanism for the Tree-Rule Firewall. In: (Ed.) 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 122 - 129). Beijing, China: . IEEE.

He, X., Chomsiri, T., Nanda, P., Tan, Z. (2014). Improving Cloud Network Security Using Tree-Rule Firewall. Future Generation Computer Systems, 30, (), 116-126.

Jan, M., Nanda, P., He, X., Tan, Z., Liu, R. (2014). A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In: (Ed.) 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 205 - 211). Beijing, China: . IEEE.

Li, W., Meng, W., Tan, Z., Xiang, Y. (2014). Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In: (Ed.) Proceedings of 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 174-181). Beijing: . IEEE.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. (2014). A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. IEEE Transactions on Parallel and Distributed Systems, 25, (2), 447-456.

Tan, Z., Nagar, Upasana T., He, X., Nanda, P., Liu, R., Wang, S., Hu, J. (2014, September). Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE Cloud Computing, 27 - 33.

2013

Jamdagni, A., Tan, Z., Nanda, P., He, X., Liu, R. (2013). RePIDS: A Multi Tier Real-Time Payload-Based Intrusion Detection System. Computer Networks, 57, (3), 811-824.

Tan, Z. (2013). Detection of Denial-of-Service Attacks Based on Computer Vision Techniques (PhD). University of Technology, Sydney, Australia (He, X., Nanda, P., Liu, R.).

Tan, Z. (2013, March). Generation of Network Behaviour Descriptions Using MCA Based on TAM. Paper presented at Kaspersky Lab's 2013 Annual Student Cyber Security Conference, Singapore.

2012

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. (2012). Evaluation on Multivariate Correlation Analysis Based Denial-of-Service Attack Detection System. In: (Ed.) Proceedings of the First International Conference on Security of Internet of Things, , () ( ed.). (pp. 160-164). New York, NY, USA: . ACM.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. (2012). Triangle-area-based multivariate correlation analysis for effective denial-of-service attack detection. In: (Ed.) Proceeding of 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 33-40). : . IEEE.

2011

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. (2011). Denial-of-service attack detection based on multivariate correlation analysis. In: Lu, B., Zhang, L., Kwok, J. (Eds.) Neural Information Processing, 7064, () ( ed.). (pp. 756-765). : . Springer Berlin Heidelberg.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. (2011). Multivariate correlation analysis technique based on Euclidean distance map for network traffic characterization. In: Qing, S., Susilo, W., Wang, G., Liu, D. (Eds.) Information and Communications Security, 7043, () ( ed.). (pp. 388-398). : . Springer Berlin Heidelberg.

2010

Jamdagni, A., Tan, Z., Nanda, P., He, X., Liu, R. (2010). Intrusion detection using GSAD model for HTTP traffic on web services. In: (Ed.) Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, , () ( ed.). (pp. 1193-1197). New York, NY, USA: . ACM.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R., Jia, W., Yeh, W. (2010). A two-tier system for web attack detection using linear discriminant method. In: Soriano, M., Qing, S., López, J. (Eds.) Information and Communications Security, 6476, () ( ed.). (pp. 459-471). : . Springer Berlin Heidelberg.

Tan, Z., Jamdagni, A., He, X., Nanda, P. (2010). Network Intrusion Detection based on LDA for payload feature selection. In: (Ed.) Proceedings of 2010 IEEE GLOBECOM Workshops, , () ( ed.). (pp. 1545-1549). : . IEEE.