City Research Online

Items where City Author is "Chen, Tom"

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Type | No Grouping
Number of items: 25.

Article

Ghanem, M. & Chen, T. ORCID: 0000-0001-8037-1685 (2020). Reinforcement learning for efficient network penetration testing. Information, 11(1), 6.. doi: 10.3390/info11010006

Fernando, D. W., Komninos, N. ORCID: 0000-0003-2776-1283 & Chen, T. ORCID: 0000-0001-8037-1685 (2020). A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep Learning Techniques. IoT, 1(2), pp. 551-604. doi: 10.3390/iot1020030

Sandoval, R. M., Garcia-Sanchez, A-J., Garcia-Haro, J. & Chen, T. ORCID: 0000-0001-8037-1685 (2018). Optimal Policy Derivation for Transmission Duty-Cycle Constrained LPWAN. IEEE Internet of Things Journal, 5(4), pp. 3114-3125. doi: 10.1109/JIOT.2018.2833289

Blasco, J. & Chen, T. ORCID: 0000-0001-8037-1685 (2018). Automated generation of colluding apps for experimental research. Journal of Computer Virology and Hacking Techniques, pp. 127-138. doi: 10.1007/s11416-017-0296-4

Blasco, J., Chen, T. ORCID: 0000-0001-8037-1685, Muttik, I. & Roggenbach, M. (2018). Detection of app collusion potential using logic programming. Journal of Network and Computer Applications, 105, pp. 88-104. doi: 10.1016/j.jnca.2017.12.008

Al Azwani, N. & Chen, T. ORCID: 0000-0001-8037-1685 (2018). Cyber Deterrence by Punishment: Role of Different Perceptions. Cyberpolitik Journal, 3(5), pp. 62-75.

Abro, F. I., Rajarajan, M., Chen, T. & Rahulamathavan, Y. (2017). Android application collusion demystified. Communications in Computer and Information Science, 759, pp. 176-187. doi: 10.1007/978-3-319-65548-2_14

Idrees, F., Rajarajan, M., Conti, M. , Chen, T. & Rahulamathavan, Y. (2017). PIndroid: A novel Android malware detection system using ensemble learning methods. Computers and Security, 68, pp. 36-46. doi: 10.1016/j.cose.2017.03.011

Blasco, J., Chen, T. ORCID: 0000-0001-8037-1685, Tapiador, J. & Peris-Lopez, P. (2016). A Survey of Wearable Biometric Recognition Systems. ACM Computing Surveys, 49(3), 43.. doi: 10.1145/2968215

Xu, Q., Gong, P., Chen, T. , Michael, J. & Li, S. (2015). Modelling and characterization of NAND flash memory channels. Measurement, 70, pp. 225-231. doi: 10.1016/j.measurement.2015.04.003

Gong, P., Chen, T. & Xu, Q. (2015). ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks. Journal of Sensors, 2015, p. 469793. doi: 10.1155/2015/469793

Xu, Q., Chen, T., Hu, Y. & Gong, P. (2014). Write Pattern Format Algorithm for Reliable NAND-Based SSDs. IEEE Transactions on Circuits and Systems II: Express Briefs, 61(7), pp. 516-520. doi: 10.1109/TCSII.2014.2327332

Li, S., Oikonomou, G., Tryfonas, T. , Chen, T. & Xu, L. D. (2014). A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things. IEEE Transactions on Industrial Informatics, 10(2), pp. 1461-1468. doi: 10.1109/TII.2014.2306331

Xu, Q., Gong, P. & Chen, T. (2014). Concatenated LDPC-TCM coding for reliable storage in multi-level flash memories. 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 166-170. doi: 10.1109/CSNDSP.2014.6923818

Gong, P., Xu, Q. & Chen, T. (2014). Energy Harvesting Aware routing protocol for wireless sensor networks. 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 171-176. doi: 10.1109/CSNDSP.2014.6923819

Guan, W., He, J., Tang, Z. & Chen, T. (2013). Design and Evaluation of a Framework for Cooperative and Adaptive QoS Control of DSRC Network for Road Safety Applications. International Journal of Distributed Sensor Networks, 2013(946931), pp. 1-10. doi: 10.1155/2013/946931

Olteanu Raimond, A. M., Xiao, Y., Liu, J. , Chen, T. & Chen, C. L. P. (2013). Nonintrusive tracing in the Internet. Security and Communication Networks, 6(7), pp. 833-843. doi: 10.1002/sec.616

Abu-Nimeh, S., Chen, T. & Alzubi, O. (2011). Malicious and spam posts in online social networks. Computer, 44(9), pp. 23-28. doi: 10.1109/MC.2011.222

Chen, T. & Abu-Nimeh, S. (2011). Lessons from Stuxnet. Computer, 44(4), pp. 91-93. doi: 10.1109/MC.2011.115

He, J., Tang, Z., O'Farrell, T. & Chen, T. (2011). Performance analysis of DSRC priority mechanism for road safety applications in vehicular networks. Wireless Communications and Mobile Computing, 11(7), pp. 980-990. doi: 10.1002/wcm.821

Chen, T., Sanchez-Aarnoutse, J. C. & Buford, J. (2011). Petri net modeling of cyber-physical attacks on smart grid. IEEE Transactions on Smart Grid, 2(4), pp. 741-749. doi: 10.1109/TSG.2011.2160000

Chen, T. (2010). Web filtering and censoring. IEEE Computer, 43(3), pp. 94-97. doi: 10.1109/MC.2010.84

Chen, T. & Zeng, Y. (2009). Classification of traffic flows into QoS classes by unsupervised learning and KNN clustering. KSII Trans. on Internet and Information Systems, 3(2), pp. 134-146. doi: 10.3837/tiis.2009.02.001

Conference or Workshop Item

Li, W., Mitchell, C. J. & Chen, T. ORCID: 0000-0001-8037-1685 (2018). Mitigating CSRF attacks on OAuth 2.0 Systems. 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 280-284. ISSN 1712-364X doi: 10.1109/PST.2018.8514180

Li, W., Mitchell, C. J. & Chen, T. ORCID: 0000-0001-8037-1685 (2018). Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations. In: Security Protocols XXVI. Security Protocols 2018. (pp. 24-41). Cham, Switzerland: Springer. ISBN 9783030032500 doi: 10.1007/978-3-030-03251-7_3

This list was generated on Tue May 24 04:48:21 2022 UTC.