![]() | Up a level |
Ghanem, M. and Chen, T. ORCID: 0000-0001-8037-1685 (2020).
Reinforcement learning for efficient network penetration testing.
Information, 11(1),
6..
doi: 10.3390/info11010006
Fernando, D. W., Komninos, N. ORCID: 0000-0003-2776-1283 and Chen, T.
ORCID: 0000-0001-8037-1685 (2020).
A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep Learning Techniques.
IoT, 1(2),
pp. 551-604.
doi: 10.3390/iot1020030
Sandoval, R. M., Garcia-Sanchez, A-J., Garcia-Haro, J. and Chen, T. ORCID: 0000-0001-8037-1685 (2018).
Optimal Policy Derivation for Transmission Duty-Cycle Constrained LPWAN.
IEEE Internet of Things Journal, 5(4),
pp. 3114-3125.
doi: 10.1109/JIOT.2018.2833289
Blasco, J. and Chen, T. ORCID: 0000-0001-8037-1685 (2018).
Automated generation of colluding apps for experimental research.
Journal of Computer Virology and Hacking Techniques,
pp. 127-138.
doi: 10.1007/s11416-017-0296-4
Blasco, J., Chen, T. ORCID: 0000-0001-8037-1685, Muttik, I. and Roggenbach, M. (2018).
Detection of app collusion potential using logic programming.
Journal of Network and Computer Applications, 105,
doi: 10.1016/j.jnca.2017.12.008
Al Azwani, N. and Chen, T. ORCID: 0000-0001-8037-1685 (2018).
Cyber Deterrence by Punishment: Role of Different Perceptions.
Cyberpolitik Journal, 3(5),
pp. 62-75.
Abro, F. I., Rajarajan, M., Chen, T. and Rahulamathavan, Y. (2017). Android application collusion demystified. Communications in Computer and Information Science, 759, pp. 176-187. doi: 10.1007/978-3-319-65548-2_14
Idrees, F., Rajarajan, M., Conti, M., Chen, T. and Rahulamathavan, Y. (2017). PIndroid: A novel Android malware detection system using ensemble learning methods. Computers and Security, 68, pp. 36-46. doi: 10.1016/j.cose.2017.03.011
Blasco, J., Chen, T. ORCID: 0000-0001-8037-1685, Tapiador, J. and Peris-Lopez, P. (2016).
A Survey of Wearable Biometric Recognition Systems.
ACM Computing Surveys, 49(3),
43..
doi: 10.1145/2968215
Xu, Q., Gong, P., Chen, T., Michael, J. and Li, S. (2015). Modelling and characterization of NAND flash memory channels. Measurement, 70, pp. 225-231. doi: 10.1016/j.measurement.2015.04.003
Gong, P., Chen, T. and Xu, Q. (2015). ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks. Journal of Sensors, 2015, p. 469793. doi: 10.1155/2015/469793
Xu, Q., Chen, T., Hu, Y. and Gong, P. (2014). Write Pattern Format Algorithm for Reliable NAND-Based SSDs. IEEE Transactions on Circuits and Systems II: Express Briefs, 61(7), pp. 516-520. doi: 10.1109/TCSII.2014.2327332
Li, S., Oikonomou, G., Tryfonas, T., Chen, T. and Xu, L. D. (2014). A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things. IEEE Transactions on Industrial Informatics, 10(2), pp. 1461-1468. doi: 10.1109/TII.2014.2306331
Xu, Q., Gong, P. and Chen, T. (2014). Concatenated LDPC-TCM coding for reliable storage in multi-level flash memories. 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 166-170. doi: 10.1109/CSNDSP.2014.6923818
Gong, P., Xu, Q. and Chen, T. (2014). Energy Harvesting Aware routing protocol for wireless sensor networks. 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 171-176. doi: 10.1109/CSNDSP.2014.6923819
Guan, W., He, J., Tang, Z. and Chen, T. (2013). Design and Evaluation of a Framework for Cooperative and Adaptive QoS Control of DSRC Network for Road Safety Applications. International Journal of Distributed Sensor Networks, 2013(946931), pp. 1-10. doi: 10.1155/2013/946931
Olteanu Raimond, A. M., Xiao, Y., Liu, J., Chen, T. and Chen, C. L. P. (2013). Nonintrusive tracing in the Internet. Security and Communication Networks, 6(7), pp. 833-843. doi: 10.1002/sec.616
Abu-Nimeh, S., Chen, T. and Alzubi, O. (2011). Malicious and spam posts in online social networks. Computer, 44(9), pp. 23-28. doi: 10.1109/MC.2011.222
Chen, T. and Abu-Nimeh, S. (2011). Lessons from Stuxnet. Computer, 44(4), pp. 91-93. doi: 10.1109/MC.2011.115
He, J., Tang, Z., O'Farrell, T. and Chen, T. (2011). Performance analysis of DSRC priority mechanism for road safety applications in vehicular networks. Wireless Communications and Mobile Computing, 11(7), pp. 980-990. doi: 10.1002/wcm.821
Chen, T., Sanchez-Aarnoutse, J. C. and Buford, J. (2011). Petri net modeling of cyber-physical attacks on smart grid. IEEE Transactions on Smart Grid, 2(4), pp. 741-749. doi: 10.1109/TSG.2011.2160000
Chen, T. (2010). Web filtering and censoring. IEEE Computer, 43(3), pp. 94-97. doi: 10.1109/MC.2010.84
Chen, T. and Zeng, Y. (2009). Classification of traffic flows into QoS classes by unsupervised learning and KNN clustering. KSII Trans. on Internet and Information Systems, 3(2), pp. 134-146. doi: 10.3837/tiis.2009.02.001
Li, W., Mitchell, C. J. and Chen, T. ORCID: 0000-0001-8037-1685 (2018).
Mitigating CSRF attacks on OAuth 2.0 Systems.
2018 16th Annual Conference on Privacy, Security and Trust (PST),
pp. 280-284.
doi: 10.1109/PST.2018.8514180
ISSN 1712-364X
Li, W., Mitchell, C. J. and Chen, T. ORCID: 0000-0001-8037-1685 (2018).
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations.
In:
Security Protocols XXVI. Security Protocols 2018.
(pp. 24-41). Cham, Switzerland: Springer.
ISBN 9783030032500