- Network Security and Intrusion Detection
- Higher Education and Teaching Methods
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Advanced Malware Detection Techniques
- Software-Defined Networks and 5G
- Security and Verification in Computing
- Distributed and Parallel Computing Systems
- Smart Materials for Construction
- Ultrasonics and Acoustic Wave Propagation
- Software System Performance and Reliability
- Internet Traffic Analysis and Secure E-voting
- Advanced Decision-Making Techniques
- Scientific Computing and Data Management
- Nanocluster Synthesis and Applications
- Cloud Data Security Solutions
- Rock Mechanics and Modeling
- Access Control and Trust
- Language, Communication, and Linguistic Studies
- Software Reliability and Analysis Research
- Information and Cyber Security
- Big Data and Business Intelligence
- Big Data Technologies and Applications
- Network Packet Processing and Optimization
Hebei University of Technology
2024
University of Tennessee at Chattanooga
2019-2022
Hohai University
2022
Wuhan University
2021
Shenzhen University
2010-2020
Suzhou Research Institute
2018
Peking University
2017
University of Wyoming
2017
Beijing University of Technology
2015
George Mason University
2013
Many threats that plague today's networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem attack programs commonly called malware. To combat these threats, defenders have turned to the collection, analysis, and reverse engineering malware as mechanisms understand programs, generate signatures, facilitate cleanup infected hosts. Recently however, new instances emerged with capability check often thwart defensive activities — essentially leaving blind...
Abstract In this prospective work, a machine learning (ML) model based on multiple independent random forest models to predict the configuration of binary composite bars is developed. The input variables ML are elastic wave signals collected at one end bar, while targets vectors representing bars. This study results indicate: First, short period propagated through bar can collect and carry detailed information entire bar; second, patterns hidden in be detected, extracted, used by model;...
Network intrusion detection system (NIDS) is indispensable for cloud computing providers to detect ongoing cyber attacks and deter future ones in the era. To help users secure their tenant networks inside a cloud, tenant-based NIDS service model has been proposed where services are deployed as virtual instances tenants. However, this approach imposes significant virtualization overhead at cost of tenants, provision process can be time-consuming. In work, we present an innovative OpenStack...
Although many studies have been devoted to integrating blockchain into IoT device management, access control, data integrity, security, and privacy, blockchain-facilitated communication is still much less studied. Blockchain has great potential in decentralizing securing communications. In this paper, we propose an innovative service platform powered by the consortium technology. The proposed abstracts machine-to-machine (M2M) human-to-machine (H2M) communications services provided devices....
Cybersecurity education and training have gained increasing attention in all sectors due to the prevalence quick evolution of cyberattacks. A variety platforms systems been proposed developed accommodate growing needs hands-on cybersecurity practice. However, those are either lacking sufficient flexibility (e.g., tied a specific virtual computing service provider, little customization support) or difficult scale. In this work, we present cloud-based platform named EZSetup for practice at...
Representational state transfer (REST), which is a style of software architecture with simplicity and flexity, has been widely adopted in web services. To solve challenges like multidimensional API validation requirements, call sequencing organization test cases, data dependency between this thesis proposes REST testing model an expressive description language based on JSON.
Cloud computing has become a major paradigm and data processing approach in almost all sectors. To ensure normal business operation security, performing traffic monitoring detecting suspicious network packets possible intrusions have daily job for tenant administrators. Using existing tools, administrator can set up Network Intrusion Detection System (NIDS) on virtual machine (VM) instance the mirror from other instances to NIDS via Tap as Service (TaaS) or Switched Port Analyzer (SPAN)...
Exception handling is an effective mechanism to guarantee software reliability in modern programming languages. An exception interrupts the program execution and propagates backwards along call chain until caught by handler. In development practices, developers may be confused determining where place handler chain. The reason that requires a developer take comprehensive consideration from global perspective of project. this paper, we propose automatic approach EHAdvisor, which recommends...
With the growth of Internet, network security has received significant attention over pass ten years due to increasing threat hacker attacks. To achieve goals, most corporate environments have deployed firewalls block intrusion. However, traditional only provided static filleting analysis so that they can not analyze content data packet for providing dynamic requirement. In order address this issue, in paper, we integrate with intrusion detection technologies. The proposed provides defense...
In implementing the PMC model, trusting relationships between owners and contractors is key to resolving dilemmas caused by institutional constraints conventional thinking, such as frequent organizational conflicts, low management efficiency, higher transaction costs. This study utilized projects in Guangxi, Jiangsu, Zhejiang, Tibet, Guizhou analysis samples employed semi-structured field interviews investigate antecedents of trust contractors. addition, questionnaires were used quantify...
The use of security certificates under the Cloud environment is foundation to establish mutual trust between and user.In this paper, we propose an authentication method based on zero-knowledge proof mind key escrow.With method, will not only satisfy requirement anonymity but also can recover real identity information in special circumstances with cooperation multiple parties.We show that proposed more suitable for promotion through analysis comparison existing scheme.
This paper propose a digital campus model based on "SOA+cloud" grounded deep researching into developing courses and thorough analysis the principle characteristics of SOA (service-oriented architecture)technology description cloud computing. will achieve optimization management service process, thereby creating new educational model.