Dr. Miao Xie
Dr. Miao Xie
Geverifieerd e-mailadres voor aarnet.edu.au
Geciteerd door
Geciteerd door
Anomaly detection in wireless sensor networks: A survey
M Xie, S Han, B Tian, S Parvin
Journal of Network and computer Applications 34 (4), 1302-1325, 2011
Intrusion detection in cyber-physical systems: Techniques and challenges
S Han, M Xie, HH Chen, Y Ling
IEEE systems journal 8 (4), 1052-1062, 2014
Scalable hyper-grid k-nn-based online anomaly detection in wireless sensor networks
M Xie, J Hu, S Han, H Chen
Parallel and Distributed Systems, IEEE Transactions on 24 (8), 1661 - 1670, 2013
Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD
M Xie, J Hu, J Slay
2014 11th International Conference on Fuzzy Systems and Knowledge Discovery …, 2014
Evaluating Host-based Anomaly Detection Systems: A Preliminary Analysis of ADFA-LD
M Xie, J Hu
Image and Signal Processing (CISP), 2013 6th International Congress on 3 …, 2013
Evaluating Host-based Anomaly Detection Systems: Application of the Frequency-based Algorithms to ADFA-LD
M Xie, J Hu, X Yu, E Chang
Network and System Security, 542-549, 2014
Distributed segment-based anomaly detection with Kullback–Leibler divergence in wireless sensor networks
M Xie, J Hu, S Guo, AY Zomaya
IEEE Transactions on Information Forensics and Security 12 (1), 101-110, 2016
A short-term forecasting algorithm for network traffic based on chaos theory and SVM
X Liu, X Fang, Z Qin, C Ye, M Xie
Journal of network and systems management 19, 427-447, 2011
Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks
M Xie, J Hu, S Guo
Parallel and Distributed Systems, IEEE Transactions on 26 (2), 574 - 583, 2015
Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks
M Xie, J Hu, B Tian
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012
Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems
W Haider, J Hu, M Xie
2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA …, 2015
Privacy-preserving access to big data in the cloud
P Li, S Guo, T Miyazaki, M Xie, J Hu, W Zhuang
IEEE Cloud Computing 3 (5), 34-42, 2016
Highly efficient distance-based anomaly detection through univariate with PCA in wireless sensor networks
M Xie, S Han, B Tian
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
Secure communication in wireless multimedia sensor networks using watermarking
B Harjito, S Han, V Potdar, E Chang, M Xie
4th IEEE International Conference on Digital Ecosystems and Technologies …, 2010
SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets
AMY Koay, M Xie, RKL Ko, C Sterner, T Choi, N Dong
Inernational Conference on Ubiquitous Security, 102-115, 2021
Authenticated spectrum sharing for secondary users in cognitive radio networks
S Parvin, S Han, B Tian, M Xie
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital …, 2010
A novel IP traffic prediction method of chaos theory with support vector regression
M Xie, X Liu, J Zhang
2008 Second International Symposium on Intelligent Information Technology …, 2008
Anomaly Detection in Wireless Sensor Networks
M Xie
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–18