- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Software System Performance and Reliability
- Information and Cyber Security
- Network Packet Processing and Optimization
- Internet Traffic Analysis and Secure E-voting
- IPv6, Mobility, Handover, Networks, Security
- Advanced Database Systems and Queries
- VLSI and FPGA Design Techniques
- Cloud Computing and Resource Management
- Data Quality and Management
- Traumatic Brain Injury and Neurovascular Disturbances
- Mobile Agent-Based Network Management
- 3D IC and TSV technologies
- S100 Proteins and Annexins
- Fish biology, ecology, and behavior
- Neurosurgical Procedures and Complications
- Parallel Computing and Optimization Techniques
- Spam and Phishing Detection
- Anomaly Detection Techniques and Applications
- Graph Theory and Algorithms
- Data Mining Algorithms and Applications
- Advanced Authentication Protocols Security
- VLSI and Analog Circuit Testing
- Complex Network Analysis Techniques
University of Potsdam
2008-2023
Yancheng Institute of Technology
2023
Hasso Plattner Institute
2010-2022
City University of Hong Kong
2022
National University of Singapore
2022
University of South Florida
2021
State University of New York at Potsdam
2018
Suzhou Kowloon Hospital
2018
Soochow University
2018
Jiangsu University
2014-2018
The use of FPGAs for efficient graph processing has attracted significant interest. Recent memory subsystem upgrades including the introduction HBM in promise to further alleviate bottlenecks. However, modern multi-channel requires much more pipelines fully utilize its bandwidth potential. Due insufficient resource efficiency, existing designs do not scale well, resulting underutilization facilities even when all other resources are consumed. In this paper, we propose ReGraph <sup...
Microservice Architectures (MSA) structure applications as a collection of loosely coupled services that implement business capabilities. The key advantages MSA include inherent support for continuous deployment large complex applications, agility and enhanced productivity. However, studies indicate most are homogeneous, introduce shared vulnerabilites, thus vulnerable to multi-step attacks, which economics-of-scale incentives attackers. In this paper, we address the issue vulnerabilities in...
In this paper, we formulate threat detection in SIEM environments as a large-scale graph inference problem. We introduce SIEM-based knowledge which models global associations among entities observed proxy and DNS logs, enriched with related open source intelligence (OSINT) cyber (CTI). Next, propose MalRank, graph-based algorithm designed to infer node maliciousness score based on its other presented the graph, e.g., shared IP ranges or name servers.
Intrusion Detection Systems (IDS) have been widely deployed in practice for detecting malicious behavior on network communication and hosts. The problem of false-positive alerts is a popular existing most IDS approaches. solution to address this correlation clustering alerts. To meet the practical requirements, process needs be finished as soon possible, which challenging task amount produced large scale deployments distributed significantly high. We identify data storage processing...
FPGA has been an emerging computing infrastructure in datacenters benefiting from fine-grained parallelism, energy efficiency, and reconfigurability. Meanwhile, graph processing attracted tremendous interest data analytics, its performance is increasing demand with the rapid growth of data. Many works have proposed to tackle challenges designing efficient FPGA-based accelerators for processing. However, largely overlooked programmability still requires hardware design expertise sizable...
Teleost fishes comprise more than half of the vertebrate species. Within teleosts, most phylogenies consider split between Osteoglossomorpha and Euteleosteomorpha/Otomorpha as basal, preceded only by derivation primitive group Elopomorpha. While are generally species poor, taxon contains African weakly electric fish (Mormyroidei), which have radiated into numerous mormyrids, genus Campylomormyrus is mostly endemic to Congo Basin. serves a model understand mechanisms adaptive radiation...
Intrusion Detection Systems are widely deployed in computer networks. As modern attacks getting more sophisticated and the number of sensors network nodes grow, problem false positives alert analysis becomes difficult to solve. Alert correlation was proposed analyse alerts decrease positives. Knowledge about target system or environment is usually necessary for efficient correlation. For representing information as well potential exploits, existing vulnerabilities their Attack Graph (AG)...
The current state of affairs regarding the way events are logged by IT systems is source many problems for developers Intrusion Detection Systems (IDS) and Security Information Event Management (SIEM) systems. These stand in development more accurate security solutions that draw their results from data included within logs they process. This mainly caused a lack standards can encapsulate all coherent way. As result, correlating between produced different use log formats has been difficult...
Objective: The impact of hypertonic saline (HTS) on control increased intracranial pressure (ICP) in head-injured patients undergoing decompressive craniectomy (DC) is yet to be established. current retrospective study was carried out compare the effect HTS versus mannitol lowering ICP burdens these patients. Methods: We reviewed data TBI admitted between January 1, 2012, and August 31, 2017. Patients after DC who received only 1 type hyperosmotic agent, 3% or 20% mannitol, were included....
Nowadays, we have a lot of data produced by social media services, but more and often these contain information about location that gives us the wide range possibilities to analyze them. Since can be interested not only in content, also where this content was produced. For good analyzing geo-spatial data, need find best approaches for geo clustering. And approach means real-time clustering massive geodata with high accuracy. In paper, present new online maps, such as Google Maps,...
In recent years, many mobile payment (MP) schemes have been proposed and used in practise. However, a prerequisite for extended acceptance adoption of MP technologies is to deploy an effective system. So far, there no such standardised scalable platform. Most current are circumscribed by its network infrastructures. Fortunately, the fast advancement 3G technology equips next generation phone more benefits. Following this direction, we propose SIMPA - A SIP-based Mobile Payment Architecture...
Intrusion Detection Systems (IDS) have been used widely to detect malicious behavior in network communication and hosts. IDS management is an important capability for distributed solutions, which makes it possible integrate handle different types of sensors or collect synthesize alerts generated from multiple hosts located the environment. Sophisticated attacks are difficult make necessary data sources detection correlation. Attack graph (AG) as effective method model, analyze, evaluate...
Mobile payment has some unique advantages over more traditional methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing solutions rely heavily on underlying communication infrastructures, which are platform-dependent have no unified implementation criteria. This limitation is reducing, however, through the rapid spread of Voice IP (VoIP) telephony service its integration with phones. The Session Initiation Protocol (SIP) currently standard signalling...
Intrusion Detection Systems (IDS) have been widely deployed in practice for detecting malicious behavior on network communication and hosts. False-positive alerts are a popular problem most IDS approaches. The solution to address this is enhance the detection process by correlation clustering of alerts. To meet practical requirements, needs be finished fast, which challenging task as amount large-scale deployments significantly high. We identifytextitdata storage processing algorithms...
An increasing number of attacks use advanced tactics, techniques and methods to compromise target systems environments. Such multi-step are often able bypass existing prevention detection systems, such as Intrusion Detection Systems (IDSs), firewalls anti-virus solutions. These security either an anomaly-based or a signature-based approach. For that utilize approach, it is relevant precise signatures identify attacks. The creation complex time consuming, especially for In this paper, we...
Mitigation techniques employed by attackers has meant that traditional Network Intrusion Detection Systems (NIDS) are no longer able to reliably protect a network in the face of ever more sophisticated attacks. Security Information and Event Management (SIEM) systems monitor analyzing logs they produce. In this paper, we propose method visualizing attacks aggregating, normalizing alerts raised SIEM-based IDS (SIDS) as well NIDS real-time. We present results our proposed visualization...