Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 39.

Add to Quick Collection   All 39 Results

Sort:
 Add All Items to Quick Collection
Date: 2017
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1248960
Description: In a cognitive radio network (CRN), energy detection is one of the most efficient spectrum sensing techniques for the protection of legacy spectrum users, with which the presence of primary users (PUs ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1250669
Description: Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have provided a survey on several intrusion detection techniques for detecting intrusions in the cloud com ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1235507
Description: Intrusion Detection System is one of the challenging research areas in Cloud Security. Security incidents such as Denial of service, scanning, malware code injection, virus, worm and password cracking ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1222199
Description: Today we are living in the era of Cloud Computing where services are provisioned to users on demand and on a pay-per-use basis. On oneside, Cloud Computing has made things easier but it has also opene ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1248822
Description: In this paper, we propose a policy driven security architecture for securing end to end services across multiple autonomous domain based SDN environment. We develop a language based approach to design ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1161130
Description: Software Defined Network(SDN) is a promising technological advancement in the networking world. It is still evolving and security is a major concern for SDN. In this paper we proposed policy based sec ... More
Reviewed: Reviewed
Date: 2016
Subject Keyword: Big Data Security | Security Attacks
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1145431
Description: In this paper we propose techniques for securing big data environments such as public cloud with tenants using their virtual machines for different services such as utility and healthcare. Our model m ... More
Reviewed: Reviewed
Date: 2015
Subject Keyword: botnet | network security | IPFIX | NetFlow
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1048987
Description: The botnet is a group of hijacked computers, which are employed under command and control mechanism administered by a botmaster. Botnet evolved from IRC based centralized botnet to employing common pr ... More
Reviewed: Reviewed
Date: 2015
Subject Keyword: SDN | Botnet | IPFIX
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/359674
Description: Software Defined Networking (SDN) is considered as a new approach promising simplified network management by providing a programmable interface. The idea of SDN is based on the separation of control p ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1029885
Description: Web based applications are very common nowadays where almost every software can be accessible through a web browser in one form or the other. This paper proposes techniques to detect diffierent threat ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1062421
Description: Modern society heavily depends on wireless spectrum for communication purposes. With the rapid increase in mobile devices and Internet of Things (IoT), the need for wireless spectrum has grown dramati ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1043972
Description: The current mobile devices have become smart and are increasingly being used for conducting business and personal activities. Also, there is increasing number of attacks targeting such mobile devices. ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1043943
Description: Cloud computing technologies are receiving a great deal of attention. Although there are several benefits with the cloud, attackers can also make use of the cloud infrastructure for hosting malicious ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/327587
Description: The security of modern computer systems heavily depends on security tools, especially on antivirus software solutions. In the anti-malware research community, development of techniques for evading det ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/284590
Description: Cloud computing technologies are receiving a great deal of attention. Furthermore most of the hardware devices such as the PCs and mobile phones are increasingly having a trusted component called Trus ... More
Reviewed: Reviewed