Research Services Division

Deakin Research

Research Output for Yang Xiang

Note: The 2012, 2013, 2014 publications have not been audited.

Jump to: Publications | Grants and Consultancies | HDR completions

Publications

2014 School of Information Technology

Cao, Zhenfu*, Li, Keqiu*, Li, Xu*, McDaniel, Patrick*, Poovendran, Radha*, Wang, Guojun* and Xiang, Yang (2014) Guest editors' introduction : Special issue on trust, security, and privacy in parallel and distributed systems, IEEE transactions on parallel and distributed systems, vol. 25, no. 2, pp. 279-282, IEEE, Piscataway, N.J. [C4]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-84891789371
DRO entry for this publication

Deng, Robert H.*, Xiang, Yang and Au, Man Ho* (2014) Cryptography in cloud computing, Future generation computer systems, vol. 30, p. 90, Elsevier, Amsterdam, The Netherlands [C4]
ERA journal ID: 17858 – Scopus EID: 2-s2.0-84888367266
DRO entry for this publication

Khan, Wazir Zada*, Aalsalem, Mohammed Yehyah*, Saad, Mohamad Naufal Mohamad*, Xiang, Yang and Luan, Tom H. (2014) Detecting replicated nodes in wireless sensor networks using random walks and network division, in Ciliv, Sureyya (eds), IEEE WCNC 2014 : Proceedings of the IEEE Wireless Communications and Networking 2014 Conference, p. 1, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

2013 School of Information Technology

Cesare, Silvio, Xiang, Yang and Zhang, Jun (2013) Clonewise - detecting package-level clones using machine learning, in Zia, Tanveer; Zomaya, Albert; Varadharajan, Vijay and Mao, Morley (eds), Security and privacy in communication networks, pp. 197-215, Springer International Publishing, Berlin, Germany [B1]
DRO entry for this publication

Chen, Jing*, Du, Ruiying*, Zhao, Li*, Wang, Chiheng*, Zheng, Minghui* and Xiang, Yang (2013) Fault-tolerant topology control based on artificial immune theory in WMNs, in Lopez, Javier; Huang, Xinyi and Sandhu, Ravi (eds), Network and system security: 7th international conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings, pp. 590-598, Springer, Berlin, Germany [B1]
DRO entry for this publication

Wen, Sheng, Li, Ping, Wu, Di, Xiang, Yang and Zhou, Wanlei (2013) Detecting stepping stones by abnormal causality probability, in Wang, Guojun; Ray, Indrakshi; Feng, Dengguo and Rajarajan, Muttukrishnan (eds), Cyberspace safety and security, pp. 308-322, Springer International Publishing, Cham, Switzerland [B1]
DRO entry for this publication

Zhang, Jun, Chen, Xiao, Xiang, Yang and Zhou, Wanlei (2013) Zero-day traffic identification, in Wang, Guojun; Ray, Indrakshi; Feng, Dengguo and Rajarajan, Muttukrishnan (eds), Cyberspace safety and security, pp. 213-227, Springer International Publishing, Cham, Switzerland [B1]
DRO entry for this publication

Cesare, Silvio, Xiang, Yang and Zhou, Wanlei (2013) Malwise-an effective and efficient classification system for packed and polymorphic malware, IEEE transactions on computers, vol. 62, no. 6, pp. 1193-1206, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 4447 – Scopus EID: 2-s2.0-84877264918
Citation counts: Scopus - 7
DRO entry for this publication

Deng, Kefeng*, Ren, Kaijun*, Song, Junqiang*, Yuan, Dong*, Xiang, Yang and Chen, Jinjun* (2013) A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing, Concurrency computation practice and experience, vol. 25, no. 18, pp. 2523-2539, John Wiley & Sons, London, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-84879718426
Citation counts: Thomson - 1
DRO entry for this publication

Khan, Wazir Zada*, Aalsalem, Mohammed Y.*, Saad, Mohammed Naufal Bin Mohammed* and Xiang, Yang (2013) Detection and mitigation of node replication attacks in wireless sensor networks : a survey, International journal of distributed sensor networks, vol. 2013, no. 149023, pp. 1-22, Hindawi Publishing Corporation, Philadelphia, Pa. [C1]
ERA journal ID: 3489 – Scopus EID: 2-s2.0-84878653218
Citation counts: Scopus - 3
DRO entry for this publication

Khan, Wazir Zada*, Xiang, Yang, Aalsalem, Mohammed Y.* and Arshad, Quratulain* (2013) Mobile phone sensing systems : a survey, IEEE communications surveys and tutorials, vol. 15, no. 1, pp. 402-427, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 123593 – Scopus EID: 2-s2.0-84873708582
Citation counts: Scopus - 20, Thomson - 9
DRO entry for this publication

Ren, Yizhi*, Li, Mingchu*, Xiang, Yang, Cui, Yongrui* and Sakurai, Kouichi* (2013) Evolution of cooperation in reputation system by group-based scheme, Journal of supercomputing, vol. 63, no. 1, pp. 171-190, Springer, New York, N.Y. [C1]
ERA journal ID: 18042 – Scopus EID: Not tagged
Citation counts: Thomson - 1
DRO entry for this publication

Wen, Sheng*, Zhou, Wei*, Zhang, Jun, Xiang, Yang, Zhou, Wanlei and Jia, Weijia* (2013) Modeling propagation dynamics of social network worms, IEEE transactions on parallel and distributed systems, vol. 24, no. 8, pp. 1633-1643, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-84880054920
Citation counts: Scopus - 2
DRO entry for this publication

Wu, Wei*, Zhou, Jianying*, Xiang, Yang and Xu, Li* (2013) How to achieve non-repudiation of origin with privacy protection in cloud computing, Journal of computer and system sciences, vol. 79, no. 8, pp. 1200-1213, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 17982 – Scopus EID: 2-s2.0-84880571602
Citation counts: Scopus - 2, Thomson - 1
DRO entry for this publication

Xiang, Yong, Peng, Dezhong*, Xiang, Yang and Guo, Song* (2013) Novel Z-Domain precoding method for blind separation of spatially correlated signals, IEEE transactions on neural networks and learning systems, vol. 24, no. 1, pp. 94-105, IEEE, Piscataway, N.J. [C1]
ERA journal ID: Not matching ERA journal list
Citation counts: Thomson - 1
DRO entry for this publication

Xie, Yi*, Hu, Jiankun*, Xiang, Yang, Yu, Shui, Tang, Shensheng* and Wang, Yu (2013) Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration, IEEE transactions on parallel and distributed systems, vol. 24, no. 9, pp. 1807-1817, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-84881076393
Citation counts: Scopus - 1
DRO entry for this publication

Xie, Yi*, Tang, S.*, Xiang, Y. and Hu, J.* (2013) Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior, IEEE transactions on parallel and distributed systems, vol. 24, no. 7, pp. 1401-1410, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-84878500827
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Zhang, Jun, Chen, Chao, Xiang, Yang, Zhou, Wanlei and Vasilakos, Athanasios V.* (2013) An effective network traffic classification method with unknown flow detection, IEEE transactions on network and service management, vol. 10, no. 2, pp. 133-147, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 5073 – Scopus EID: 2-s2.0-84879105959
Citation counts: Scopus - 4
DRO entry for this publication

Zhang, Jun, Ye, Lei*, Xiang, Yang and Zhou, Wanlei (2013) Robust image retrieval with hidden classes, Computer vision and image understanding, vol. 117, no. 6, pp. 670-679, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 4402 – Scopus EID: 2-s2.0-84875458479
DRO entry for this publication

Zhang, Jun, Xiang, Yang, Wang, Yu, Zhou, Wanlei, Xiang, Yong and Guan, Yong* (2013) Network traffic classification using correlation information, IEEE transactions on parallel and distributed systems, vol. 24, no. 1, pp. 104-117, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-84870950267
Citation counts: Scopus - 16, Thomson - 5
DRO entry for this publication

Zhang, Jun, Chen, Chao, Xiang, Yang, Zhou, Wanlei and Xiang, Yong (2013) Internet traffic classification by aggregating correlated naive bayes predictions, IEEE transactions on information forensics and security, vol. 8, no. 1, pp. 5-15, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 32044 – Scopus EID: 2-s2.0-84872025715
Citation counts: Scopus - 6, Thomson - 4
DRO entry for this publication

Zhang, Jun, Xiang, Yang, Zhou, Wanlei and Wang, Yu (2013) Unsupervised traffic classification using flow statistical properties and IP packet payload, Journal of computer and system sciences, vol. 79, no. 5, pp. 573-585, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 17982 – Scopus EID: Not tagged
DRO entry for this publication

Ren, Yizhi*, Xiang, Yang, Xu, Ming* and Hua, Jingyu* (2013) Google hacking defence based on honey pages, International journal of applied mathematics and statistics, vol. 51, no. 22, pp. 284-292, Centre for Environment, Social and Economic Research Publications, Uttarakhand, India [C2]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Khan, Muhammad Khurram*, Xiang, Yang, Horng, Shi-Jinn* and Chen, Hsiao-Hwa* (2013) Editorial : Trust, security, and privacy in next-generation wireless sensor networks, International journal of distributed sensor networks, vol. 2013, pp. 1-2, Hindawi Publishing Corporation, Philadelphia, Pa. [C4]
ERA journal ID: 3489 – Scopus EID: 2-s2.0-84887458287
Citation counts: Scopus - 2
DRO entry for this publication

Xiang, Yang, Cuzzocrea, Alfredo*, Hobbs, Michael and Yang, Laurence T.* (2013) EDITORIAL : Advances in parallel, distributed, embedded, and ubiquitous systems, Concurrency computation practice and experience, vol. 25, no. 14, pp. 1985-1986, John Wiley & Sons, London, England [C4]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-84874702565
DRO entry for this publication

Chen, Xiao, Zhang, Jun, Xiang, Yang and Zhou, Wanlei (2013) Traffic identification in semi-known network environment, in Chen, Jinjun; Cuzzocrea, Alfredo and Yang, Laurence T. (eds), CSE 2013 : Proceedings of the IEEE Computational Science and Engineering 2013 international conference, pp. 572-579, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Meng, Yuxin*, Li, Wenjuan*, Kwok, Lam-For* and Xiang, Yang (2013) Towards designing privacy-preserving signature-based IDS as a service : a study and practice, in Xhafa, Fatos; Barolli, Leonard and Chen, Xiaofeng (eds), Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems; INCOS 2013, pp. 181-188, IEEE Computer Society, Piscataway, N.J. [E1]
DRO entry for this publication

Natgunanathan, Iynkaran, Xiang, Yong, Elbadry, Suzan S.M., Zhou, Wanlei and Xiang, Yang (2013) Analysis of a patchwork-based audio watermarking scheme, in Unknown (ed.), ICIEA 2013 : Proceedings of the 8th IEEE Conference on Industrial Electronics and Applications, pp. 900-905, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Olabelurin, Abimbola*, Kallos, Georgios*, Xiang, Yang, Bloomfield, Robin*, Veluru, Suresh* and Rajarajan, Muttukrishnan* (2013) Time correlated anomaly detection based on inferences, in Kuusisto, Rauno and Kurkinen, Erkki (eds), ECIWS 2013 : Proceedings of the European Conference on Information Warfare and Security, pp. 351-360, Academic Conference and Publishing International Limited, Jyvaskyla, Finland [E1]
DRO entry for this publication

Toorchi, Niloofar*, Attari, Mahmoud Ahmadian*, Haghighi, Mohammad Sayad and Xiang, Yang (2013) A Markov model of safety message broadcasting for vehicular networks, in Unknown (ed.), WCNC 2013 : IEEE Wireless Communications and Networking Conference, pp. 1657-1662, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Wang, Yu, Xiang, Yang and Zhang, Jun (2013) Network traffic clustering using random forest proximities, in Kim, Dong-In and Mueller, Peter (eds), ICC 2013 : IEEE International Conference on Communications, pp. 2058-2062, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Wen, Sheng, Xiang, Yang and Zhou, Wanlei (2013) Modeling and analysis for thwarting worm propagation in email networks, in Lopez, Javier; Huang, Xinyi and Sandhu, Ravi (eds), Network and system security : 7th international conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings, pp. 763-769, Springer, Berlin, Germany [E1]
DRO entry for this publication

Zhang, Jun, Chen, Chao, Xiang, Yang and Zhou, Wanlei (2013) Robust network traffic identification with unknown applications, in Unknown (ed.), Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security; ASIA CCS 2013, pp. 405-414, ACM - The Association for Computing Machinery, New York, N.Y. [E1]
DRO entry for this publication

Zhang, Yuexin*, Xu, Li*, Xiang, Yang and Huang, Xinyi* (2013) Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge, in Kim, Dong-In and Mueller, Peter (eds), ICC 2013 : IEEE International Conference on Communications, pp. 1604-1608, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Zhu, Tianqing, Xiong, Ping*, Xiang, Yang and Zhou, Wanlei (2013) An effective deferentially private data releasing algorithm for decision tree, in Unknown (ed.), TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 388-395, IEEE Computer Society, Piscataway, N.J. [E1]
DRO entry for this publication

Xiang, Yang (2013) Classifying network traffic in the big data era, in Xhafa, Fatos; Barolli, Leonard and Chen, Xiaofeng (eds), INCOS 2013 : Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems, p. xxxi, IEEE Computer Society, Piscataway, N.J. [E3]
DRO entry for this publication

2012 School of Information Technology

Cesare, Silvio and Xiang, Yang (2012) Software similarity and classification, in Cesare, Silvio and Xiang, Yang (eds), Springer, Berlin, Germany [A1]
DRO entry for this publication

Xiang, Yang, Stojmenovic, Ivan*, Apduhan, Bernady O.*, Wang, Guojun*, Nakano, Koji* and Zomaya, Albert* (2012) Algorithms and architectures for parallel processing, in Xiang, Yang; Stojmenovic, Ivan; Apduhan, Bernady O.; Wang, Guojun; Nakano, Koji and Zomaya, Albert (eds), Springer Verlag, Berlin, Germany [A1.1]
DRO entry for this publication

Xiang, Yang, Stojmenovic, Ivan*, Apduhan, Bernady O.*, Wang, Guojun*, Nakano, Koji* and Zomaya, Albert* (2012) Algorithms and architectures for parallel processing, in Xiang, Yang; Stojmenovic, Ivan; Apduhan, Bernady O.; Wang, Guojun; Nakano, Koji and Zomaya, Albert (eds), Springer Verlag, Berlin, Germany [A1.1]
DRO entry for this publication

Xiang, Yang, Lopez, Javier*, Kuo, C.C. Jay* and Zhou, Wanlei (2012) Cyberspace safety and security : 4th International Symposium, CSS 2012 Melbourne, Australia, December 12-13, 2012 Proceedings, in Xiang, Yang; Lopez, Javier; Kuo, C.C. Jay and Zhou, Wanlei (eds), Springer-Verlag, Berlin, Germany [A7]
DRO entry for this publication

Nakano, Koji*, Zomaya, Albert* and Xiang, Yang (2012) Message from the ICA3PP 2012 general chairs, in Xiang, Yang; Stojmenovic, Ivan; Apduhan, Bernady O.; Wang, Guojun; Nakano, Koji and Zomaya, Albert (eds), Algorithms and architectures for parallel processing, Springer-Verlag, Berlin, Germany [BN]
DRO entry for this publication

Cui, Yongrui, Li, Mingchu*, Xiang, Yang, Ren, Yizhi* and Cesare, Silvio (2012) A QoS-based fine-grained reputation system in the grid environment, Concurrency computation : practice and experience, vol. 24, no. 17, pp. 1990-2006, John Wiley & Sons, Chichester, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-84867337310
Citation counts: Scopus - 3, Thomson - 3
DRO entry for this publication

Wang, Yu, Xiang, Yang, Zhou, Wanlei and Yu, Shunzheng* (2012) Generating regular expression signatures for network traffic classification in trusted network management, Journal of network and computer applications, vol. 35, no. 3, pp. 992-1000, Academic Press, London, U. K. [C1]
ERA journal ID: 18032 – Scopus EID: Not tagged
Citation counts: Thomson - 5
DRO entry for this publication

Wen, Sheng, Zhou, Wei, Xiang, Yang and Zhou, Wanlei (2012) CAFS : a novel lightweight cache-based scheme for large-scale intrusion alert fusion, Concurrency computation : practice and experience, vol. 24, no. 10, pp. 1137-1153, John Wiley & Sons, West Sussex, U. K. [C1]
ERA journal ID: 17819 – Scopus EID: Not tagged
Citation counts: Thomson - 1
DRO entry for this publication

Wen, Sheng*, Zhou, Wei*, Wang, Yini, Zhou, Wanlei and Xiang, Yang (2012) Locating defense positions for thwarting the propagation of topological worms, IEEE Communications Letters, vol. 16, no. 4, pp. 560-563, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 5068 – Scopus EID: 2-s2.0-84859962242
Citation counts: Thomson - 3
DRO entry for this publication

Hu, Jinakun*, Xiang, Yang and Zhou, Wanlei (2012) Advances in network and system security : editorial statement, Computer journal, vol. 55, no. 4, pp. 382-383, Oxford University Press, Oxford, England [C4]
ERA journal ID: 17794 – Scopus EID: 2-s2.0-84859322508
DRO entry for this publication

Qu, Wenyu*, Xiang, Yang and Zhang, Yong* (2012) Editorial in the Special issue on security in ubiquitous computing, Security and communication networks, vol. 5, no. 11, pp. 1221-1222, Wiley, London, England [C4]
ERA journal ID: 39741 – Scopus EID: Not tagged
DRO entry for this publication

Xiang, Yang, Hu, Jiankun* and Zhou, Wanlei (2012) Advances in network and system security, Concurrency computation : practice and experience, vol. 24, no. 10, pp. 1035-1036, John Wiley & Sons, London, England [C4]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-84862812406
DRO entry for this publication

Cesare, Silvio and Xiang, Yang (2012) Wire - a formal intermediate language for binary analysis, in Min, Geyong; Wu, Yulei; Lei, Liu (Chris); Jin, Xiaolong; Jarvis, Stephen and Al-Dubai, Ahmed Y. (eds), TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 515-524, IEEE, Piscataway, N. J. [E1]
Citation counts: Scopus - 1
DRO entry for this publication

Wang, Yu, Xiang, Yang, Zhang, Jun and Yu, Shunzheng* (2012) Internet traffic clustering with constraints, in Unknown (ed.), IWCMC 2012 : Proceedings of the IEEE 8th Wireless Communications and Mobile Computing Conference, pp. 619-624, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Zhang, Jun, Chen, Chao, Xiang, Yang and Zhou, Wanlei (2012) Classification of correlated internet traffic flows, in Min, Geyong; Wu, Yulei; Lei, Liu (Chris); Jin, Xiaolong; Jarvis, Stephen and Al-Dubai, Ahmed Y. (eds), TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 490-496, IEEE, Piscataway, N. J. [E1]
Citation counts: Scopus - 1
DRO entry for this publication

Zhang, Jun, Chen, Chao, Xiang, Yang and Zhou, Wanlei (2012) Semi-supervised and compound classification of network traffic, in Unknown (ed.), ICDCSW 2012 : Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems Workshops, pp. 617-621, IEEE Computer Society, Piscataway, N. J. [E1]
Citation counts: Scopus - 1
DRO entry for this publication

Zhou, Wei, Wen, Sheng, Wang, Yini, Xiang, Yang and Zhou, Wanlei (2012) An analytical model on the propagation of modern email worms, in Min, Geyong; Wu, Yulei; Lei, Liu (Chris); Jin, Xiaolong; Jarvis, Stephen and Al-Dubai, Ahmed Y. (eds), TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 533-540, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

2011 School of Information Technology

Khan, Wazir Zada*, Xiang, Yang, Aalsalem, Mohammed Y.* and Arshad, Quratulain* (2011) A hybrid graphical password based system, in Xiang, Yang; Cuzzocrea, Alfredo; Hobbs, Michael and Zhou, Wanlei (eds), Algorithms and architectures for parallel processing : 11th International Conference, ICA3PP 2011, Melbourne, Australia, October 24-26, 2011 : proceedings, part II, pp. 153-164, Springer-Verlag, Berlin, Germany [B1]
Citation counts: Scopus - 1
DRO entry for this publication

Wang, Yini, Wen, Sheng, Zhou, Wei, Zhou, Wanlei and Xiang, Yang (2011) The probability model of peer-to-peer botnet propagation, in Xiang, Yang; Cuzzocrea, Alfredo; Hobbs, Michael and Zhou, Wanlei (eds), Algorithms and architectures for parallel processing : 11th International Conference, ICA3PP 2011, Melbourne, Australia, October 24-26, 2011 : proceedings, part I, pp. 470-480, Springer-Verlag, Berlin, Germany [B1]
Citation counts: Scopus - 1
DRO entry for this publication

Xiang, Yang, Cuzzocrea, Alfredo* and Hobbs, Michael (2011) Message from the ICA3PP 2011 program chairs, in Xiang, Yang; Cuzzocrea, Alfredo; Hobbs, Michael and Zhou, Wanlei (eds), Algorithms and architectures for parallel processing : 11th International Conference, ICA3PP 2011, Melbourne, Australia, October 24-26, 2011 : proceedings, part I, p. vii, Springer-Verlag, Berlin, Germany [BN]
DRO entry for this publication

Chonka, Ashley, Xiang, Yang, Zhou, Wanlei and Bonti, Alessio (2011) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks, Journal of network and computer applications, vol. 34, no. 4, pp. 1097-1107, Academic Press, London, U. K. [C1]
ERA journal ID: 18032 – Scopus EID: Not tagged
Citation counts: Thomson - 12
DRO entry for this publication

Huang, Xinyi*, Mu, Yi*, Susilo, Willy*, Wu, Wei* and Xiang, Yang (2011) Optimistic fair exchange with strong resolution-ambiguity, IEEE journal on selected areas in communications, vol. 29, no. 7, pp. 1491-1502, IEEE, Piscataway, N. J. [C1]
ERA journal ID: 4430 – Scopus EID: 2-s2.0-80051536616
Citation counts: Scopus - 3, Thomson - 2
DRO entry for this publication

Huang, Xinyi*, Xiang, Yang, Chonka, Ashley, Zhou, Jianying* and Deng, Robert H.* (2011) A generic framework for three-factor authentication : preserving security and privacy in distributed systems, IEEE transactions on parallel and distributed systems, vol. 22, no. 8, pp. 1390-1397, IEEE, Piscataway, N. J. [C1]
ERA journal ID: 20981 – Scopus EID: Not tagged
Citation counts: Thomson - 9
DRO entry for this publication

Wang, Yini, Wen, Sheng, Cesare, Silvio, Zhou, Wanlei and Xiang, Yang (2011) The microcosmic model of worm propagation, The Computer Journal, vol. 54, no. 10, pp. 1700-1720, Oxford University Press, Oxford, England [C1]
ERA journal ID: 17794 – Scopus EID: Not tagged
Citation counts: Thomson - 1
DRO entry for this publication

Wang, Yini, Wen, Sheng, Cesare, Silvio, Zhou, Wanlei and Xiang, Yang (2011) Eliminating errors in worm propagation models, IEEE Communications Letters, vol. 15, no. 9, pp. 1022-1024, IEEE, United States [C1]
ERA journal ID: 5068 – Scopus EID: 2-s2.0-80052853005
Citation counts: Scopus - 5, Thomson - 2
DRO entry for this publication

Xiang, Yang, Li, Ke and Zhou, Wanlei (2011) Low-rate DDoS attacks detection and traceback by using new information metrics, IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 426-437, IEEE, Piscataway, NJ [C1]
ERA journal ID: 32044 – Scopus EID: Not tagged
Citation counts: Thomson - 20
DRO entry for this publication

Zhang, Jun, Xiang, Yang, Zhou, Wanlei, Ye, Lei* and Mu, Yi* (2011) Secure image retrieval based on visual content and watermarking protocol, Computer journal, vol. 54, no. 10, pp. 1661-1674, Oxford University Press, Oxford, U. K. [C1]
ERA journal ID: 17794 – Scopus EID: 2-s2.0-80053559396
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Zhu, Wen Tao*, Xiang, Yang, Zhou, Jianying*, Deng, Robert H.* and Bao, Feng* (2011) Secure localization with attack detection in wireless sensor networks, International journal of information security, vol. 10, no. 3, pp. 155-171, Springer, Heidelberg, Germany [C1]
ERA journal ID: 17948 – Scopus EID: 2-s2.0-79957842998
Citation counts: Scopus - 3, Thomson - 5
DRO entry for this publication

Zhu, Wen Tao*, Gao, Fei* and Xiang, Yang (2011) A secure and efficient data aggregation scheme for wireless sensor networks, Concurrency Computation Practice and Experience, vol. 23, no. 12, pp. 1414-1430, John Wiley & Sons, United Kingdom [C1]
ERA journal ID: 17819 – Scopus EID: Not tagged
Citation counts: Thomson - 2
DRO entry for this publication

Xiang, Yang and Zhou, Wanlei (2011) Special section : trusted computing, Future generation computer systems, vol. 27, no. 5, pp. 527-528, Elsevier BV, Amsterdam, Netherlands [C4]
ERA journal ID: 17858 – Scopus EID: Not tagged
DRO entry for this publication

Xiang, Yang and Zhou, Wanlei (2011) Special issue: Building secure parallel and distributed networks and systems, Computer Communications, vol. 34, no. 4, p. 525, Elsevier BV, Netherlands [C4]
ERA journal ID: 5063 – Scopus EID: Not tagged
DRO entry for this publication

Xiang, Yang, Hu, Jiankun* and Zhou, Wanlei (2011) Editorial : advances in network and system security, Computers and security, vol. 30, no. 5, pp. 295-296, Elsevier Advanced Technology, Oxon, U. K. [C4]
ERA journal ID: 17813 – Scopus EID: Not tagged
DRO entry for this publication

Xiang, Yang, Lopez, Javier*, Wang, Haining* and Zhou, Wanlei (2011) Special issue : securing distributed networks and systems, Concurrency computation : practice and experience, vol. 23, no. 12, pp. 1311-1312, John Wiley & Sons, West Sussex, U. K. [C4.1]
ERA journal ID: 17819 – Scopus EID: Not tagged
DRO entry for this publication

Ahmed, Mahbub and Xiang, Yang (2011) Trust ticket deployment : a notion of a data owner's trust in cloud computing, in Unknown (ed.), TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, pp. 111-117, IEEE, Changsha, China [E1]
DRO entry for this publication

Cesare, Silvio and Xiang, Yang (2011) Malware variant detection using similarity search over sets of control flow graphs, in Unknown (ed.), TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, pp. 181-189, IEEE, Changsha, China [E1]
Citation counts: Scopus - 4
DRO entry for this publication

Muhaya, Fahad Bin*, Khan, Muhammad Khurram* and Xiang, Yang (2011) Polymorphic malware detection using Hierarchical Hidden Markov Model, in Unknown (ed.), DASC 2011 : Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp. 151-155, IEEE Computer Society Conference Publishing Services (CPS), Piscataway, N.J. [E1]
DRO entry for this publication

Wang, Yini, Wen, Sheng and Xiang, Yang (2011) Modeling worms propagation on probability, in Unknown (ed.), NSS 2011 : Proceedings of the 5th International Conference on Network and System Security, pp. 49-56, IEEE, Milan, Italy [E1]
Citation counts: Scopus - 1
DRO entry for this publication

Wang, Yu, Xiang, Yang, Zhang, Jun and Yu, Shunzheng* (2011) A novel semi-supervised approach for network traffic clustering, in Unknown (ed.), NSS 2011 : Proceedings of the 5th International Conference on Network and System Security, pp. 169-175, IEEE, Milan, Italy [E1]
Citation counts: Scopus - 3
DRO entry for this publication

Wang, Yu, Xiang, Yang and Yu, Shunzheng* (2011) Internet traffic classification using machine learning : a token-based approach, in Unknown (ed.), CSE 2011 : Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, pp. 285-289, IEEE, Dalian, China [E1]
DRO entry for this publication

Xiang, Yang (2011) Defending against large-scale and coordinated attacks in the ubiquitous environments, in Unknown (ed.), TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, pp. 7-8, IEEE, Changsha, China [E1]
DRO entry for this publication

Yu, Shui, Zhao, Guofeng*, Guo, Song*, Xiang, Yang and Vasilakos, Athanasios V.* (2011) Browsing behavior mimicking attacks on popular web sites for large botnets, in Unknown (ed.), INFOCOM WKSHPS 2011 : IEEE Conference on Computer Communications Workshops, pp. 947-951, IEEE, Shanghai, China [E1]
Citation counts: Scopus - 1
DRO entry for this publication

2010 School of Information Technology

Huang, Xinyi*, Mu, Yi*, Susilo, Willy*, Wu, Wei* and Xiang, Yang (2010) Further observations on optimistic fair exchange protocols in the multi-user setting, in Nguyen, Phong Q. and Pointcheval, David (eds), Public key cryptography - PKC 2010 : 13th International Conference on Practice and Theory of Public-Key Cryptography, Paris, France, May 26-28, 2010 : proceedings, pp. 124-141, Springer, New York, N. Y. [B1]
DRO entry for this publication

Fan, Xiang* and Xiang, Yang (2010) Modeling the propagation of peer-to-peer worms, Future generation computer systems, vol. 26, no. 8, pp. 1433-1443, Elsevier BV, Amsterdam, The Netherlands [C1]
ERA journal ID: 17858 – Scopus EID: 2-s2.0-77955517954
Citation counts: Scopus - 15, Thomson - 10
DRO entry for this publication

Wang, Yu, Xiang, Yang and Yu, Shun-Zheng* (2010) An automatic application signature construction system for unknown traffic, Concurrency computation practice and experience, vol. 22, no. 13, pp. 1927-1944, John Wiley & Sons, West Sussex, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-77956489422
Citation counts: Scopus - 15, Thomson - 10
DRO entry for this publication

Ahmed, Mahbub and Xiang, Yang (2010) Above the trust and security in cloud computing : a notion towards innovation, in Unknown (ed.), IEEE/IFIP 2010 : Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010, pp. 723-730, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Islam, Rafiqul and Xiang, Yang (2010) Email classification using data reduction method, in Unknown (ed.), CHINACOM 2010 : Proceedings of the 5th International ICST Conference on Communications and Networking in China, pp. 1-5, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Wen, Sheng*, Xiang, Yang and Zhou, Wanlei (2010) A lightweight intrusion alert fusion system, in Unknown (ed.), HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, pp. 695-700, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Zhao, Laiping*, Ren, Yizhi*, Xiang, Yang and Sakurai, Kouichi* (2010) Fault-tolerant scheduling with dynamic number of replicas in heterogeneous systems, in Unknown (ed.), HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, pp. 434-441, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

2010 External

Xiang, Yang*, Tian, Daxin* and Zhou, Wanlei (2010) A microscopic competition model and its dynamics analysis on network attacks, Concurrency computation practice and experience, vol. 22, no. 4, pp. 503-517, John Wiley & Sons, West Sussex, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-77449150932
Citation counts: Scopus - 2, Thomson - 2
DRO entry for this publication

2009 External

Islam, Rafiqul, Zhou, Wanlei, Xiang, Yang* and Mahmood, Abdun Naser* (2009) Spam filtering for network traffic security on a multi-core environment, Concurrency and computation : practice & experience, vol. 21, no. 10, pp. 1307-1320, John Wiley & Sons, Bognor Regis, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-67650462895
Citation counts: Scopus - 11, Thomson - 7
DRO entry for this publication

Islam, Md Rafiqul, Zhou, Wanlei, Guo, Minyi* and Xiang, Yang* (2009) An innovative analyser for multi-classifier e-mail classification based on grey list analysis, Journal of network and computer applications, vol. 32, no. 2, pp. 357-366, Academic Press, London, England [C1]
ERA journal ID: 18032 – Scopus EID: 2-s2.0-59249098667
Citation counts: Scopus - 6, Thomson - 1
DRO entry for this publication

Xiang, Yang*, Zhou, Wanlei and Guo, Minyi* (2009) Flexible deterministic packet marking: an IP traceback system to find the real source of attacks, IEEE transactions on parallel and distributed systems, vol. 20, no. 4, pp. 567-580, IEEE, Piscataway, NJ [C1]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-67649889403
Citation counts: Scopus - 48, Thomson - 15
DRO entry for this publication

Xiang, Yang* and Zhou, Wanlei (2009) Special issue : multi-core supported network and system security, Concurrency and computation : practice and experience, vol. 21, no. 10, pp. 1251-1253, John Wiley & Sons, West Sussex, England [C4]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-67650481174
Citation counts: Scopus - 1
DRO entry for this publication

Zhou, Wanlei and Xiang, Yang* (2009) Editorial: network and system security, Journal of network and computer applications, vol. 32, no. 2, pp. 345-346, Academic Press, London, England [C4]
ERA journal ID: 18032 – Scopus EID: 2-s2.0-59249097172
DRO entry for this publication

2008 School of Engineering and Information Technology

Zhou, W. and Xiang, Y. (2008) Using Multi-core to Support Security-related Applications, ICA3PP 2008 : Algorithms and architectures for parallel processing : Proceedings of the 8th International Conference on Algorithms and Architectures for Parallel Processing 2008, pp. 316-317, Springer Berlin, Heidelberg, Germany [E3.1]
Citation counts: Scopus - 1
DRO entry for this publication

2008 External

Xiang, Y.* and Zhou, Wanlei (2008) Defending against distributed denial of service, in Quigley, Marian (eds), Encyclopedia of information ethics and security, pp. 121-129, Information Science Reference IGI Global, Hershey, PA [B1]
DRO entry for this publication

Zhou, Wanlei, Xiang, Yang* and Guo, Minyi* (2008) Editorial : Network attacks and defense systems, International journal of computer systems science and engineering, vol. 23, no. 3, pp. 137-138, CRL Publishing, London, England [C4.1]
ERA journal ID: 17806 – Scopus EID: 2-s2.0-49549111386
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Chonka, Ashley, Zhou, Wanlei, Knapp, Keith and Xiang, Yang* (2008) Protecting information systems from DDoS attack using multicore methodology, in He, Xiangjian; Wu, Qiang; Nguyen, Quang Vinh and Jia, Wenjing (eds), CIT 2008 : Proceedings of IEEE 8th International Conference on Computer and Information Technology, pp. 270-275, IEEE, Piscataway, N.J. [E1]
Citation counts: Scopus - 7
DRO entry for this publication

Chonka, Ashley, Zhou, Wanlei and Xiang, Yang* (2008) Protecting web services with service oriented traceback architecture, in Wu, Qiang; He, Xiangjian; Nguyen, Quang Vinh; Jia, Wenjing and Huang, Maolin (eds), CIT 2008 : Proceedings of IEEE 8th International Conference on Computer and Information Technology, pp. 706-711, IEEE, Piscataway, N.J. [E1]
Citation counts: Scopus - 2, Thomson - 1
DRO entry for this publication

Chonka, Ashley, Zhou, Wanlei, Singh, Jaipal and Xiang, Yang* (2008) Detecting and tracing DDoS attacks by intelligent decision prototype, in Unknown (ed.), Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, pp. 578-583, IEEE, Piscataway, N.J. [E1]
Citation counts: Scopus - 2, Thomson - 1
DRO entry for this publication

Chonka, Ashley, Zhou, Wanlei and Xiang, Yang* (2008) Multi-core security defense system (MSDS), in Unknown (ed.), ATNAC 2008 : Proceedings of the 2008 Australasian Telecommunication Networks and Applications Conference, pp. 85-90, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Chonka, A., Zhou, Wanlei and Xiang, Y.* (2008) Protecting web services from DDoS attacks by SOTA, in Tien, David and Kavakli, Manolya (eds), ICITA 2008 : Proceedings of the 5th International Conference on Information Technology and Applications, pp. 379-384, Macquarie Scientific Publishing, Bathurst, N.S.W. [E1]
DRO entry for this publication

Chonka, Ashley, Chong, Soon-Keow, Zhou, Wanlei and Xiang, Yang* (2008) Multi-core Defense System (MSDS) for protecting computer infrastructure against DDoS attacks, in Huang, Zhiyi; Xu, Zhiwei; Rountree, Nathan; Lefevre, Laurent; Shen, Hong; Hine, John and Pan, Yi (eds), PDCAT 2008 : Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 503-508, IEEE, Piscataway, N.J. [E1]
Citation counts: Scopus - 4, Thomson - 4
DRO entry for this publication

Chonka, A., Zhou, W., Ngo, L. and Xiang, Y.* (2008) Ubiquitous multicore (UM) methodology for multimedia, Proceedings : International Symposium on Computer Science and its Applications : CSA 2008, pp. 131-136, IEEE Computer Society Press, Los Alamitos, Calif. [E2]
DRO entry for this publication

2007 External

Xiang, Yang* and Zhou, Wanlei (2007) Pervasive computing at tableside : a wireless web-based ordering system, International journal of pervasive computing and communications, vol. 3, no. 1, pp. 82-101, Emerald Group Publishing, Bingley, England [C1]
ERA journal ID: 32100 – Scopus EID: Not tagged
DRO entry for this publication

Xiang, Yang*, Zhou, Wanlei and Chen, Jinjun* (2007) Managing email overload with an automatic nonparametric clustering approach, Lecture notes in computer science, vol. 4672, pp. 81-90, Springer Berlin; IFIP International Federation for Information Processing, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-38149108325
DRO entry for this publication

Xiang, Y.*, Zhou, Wanlei, Li, Z.* and Zeng, Q.* (2007) On the effectiveness of flexible deterministic packet marking for DDos defence, in Li, Keqiu; Xiang, Yang; Jin, Hai; Qu, Wenyu and Cao, Zhiying (eds), 2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China, pp. 183-190, IEEE Computer Society, Los Alimitos, Calif. [E1]
DRO entry for this publication

2006 School of Engineering and Information Technology

Xiang, Yang and Zhou, Wanlei (2006) Protecting web applications from DDoS attacks by an active distributed defense system, International journal of web information systems, vol. 2, no. 1, pp. 37-44, Troubador Publishing Limited, Leicester, England [C1]
ERA journal ID: 32107 – Scopus EID: Not tagged
DRO entry for this publication

Xiang, Yang and Zhou, Wanlei (2006) Classifying DDoS packets in high-speed networks, International journal of computer science and network security, vol. 6, no. 2B, pp. 107-115, International Journal of Computer Science and Network Security, Republic of Korea [C1]
ERA journal ID: 39771 – Scopus EID: Not tagged
DRO entry for this publication

2005 School of Information Technology

Shi, Wei, Xiang, Yang and Zhou, Wanlei (2005) Distributed defense against distributed denial-of-service attacks, Lecture notes in computer science, vol. 3719, pp. 357-362, Springer-Verlag, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-33646432220
DRO entry for this publication

Xiang, Yang and Zhou, Wanlei (2005) Intelligent DDoS packet filtering in high-speed networks, Lecture notes in computer science, vol. 3758, pp. 395-406, Springer-Verlag, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-33646673553
Citation counts: Scopus - 1
DRO entry for this publication

Xiang, Yang and Zhou, Wanlei (2005) Safeguard information infrastructure against DDoS attacks: experiments and modeling, Lecture notes in computer science, vol. 3810, pp. 320-333, Springer-Verlag, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-33744818463
DRO entry for this publication

Xiang, Yang and Zhou, Wanlei (2005) Mark-aided distributed filtering by using neural network for DDoS defense, in Miller, A. (eds), GLOBECOM '05 : IEEE Global Telecommunications Conference, 28 November-2 December 2005 St. Louis, Missouri, USA, discovery past and future, pp. 1701-1705, IEEE Globecom, Piscataway, N.J. [E1]
DRO entry for this publication

Xiang, Yang and Zhou, Wanlei (2005) A defense system against DDoS attacks by large-scale IP traceback, in He, X.; Hintz, T.; Piccardi, M.; Wu, Q.; Huang, M. and Tien, D. (eds), Third International Conference on Information Technology and Applications : 4-7 July 2005, Sydney, Australia : proceedings, pp. 431-436, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

2004 School of Information Technology

Nasierding, Gulisong, Xiang, Yang and Dai, Honghua (2004) Towards extended machine translation model for next generation world wide web, Lecture notes in computer science, vol. LNCS 3251, pp. 1017-1020, Springer-Verlag, Berlin , Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-35048890729
DRO entry for this publication

Xiang, Yang and Zhou, Wanlei (2004) Protect grids from DDoS attacks, Lecture notes in computer science, vol. 3251, pp. 309-316, Springer-Verlag, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-33646855207
Citation counts: Scopus - 3
DRO entry for this publication

Xiang, Yang, Zhou, Wanlei and Chowdhury, Morshed (2004) GHIRS: integration of hotel management systems by web services, Lecture notes in computer science, vol. 3033, pp. 1002-1009, Springer-Verlag, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-35048846498
DRO entry for this publication

Xiang, Yang and Zhou, Wanlei (2004) IP spoofing attack and its countermeasures, in William, Hutchinson (eds), From information warfare to information operations: proceedings of the 5th Australian Information Warfare and Security Conference, pp. 52-60, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E1]
DRO entry for this publication

Xiang, Yang, Chowdhury, Morshed and Ali, Shawkat* (2004) Filtering mobile spam by support vector machine, in Debnath, Narayan (eds), CSITeA'04 : Third International Conference on Computer Sciences, Software Engineering, Information Technology, E-Business and Applications, pp. 1-4, International Society for Computers and Their Applications (ISCA), Cairo, Egypt [E1]
DRO entry for this publication

Xiang, Yang and Zhou, Wanlei (2004) An active distributed defense system to protect web applications from DDoS attacks, in Kotsis, G.; Bressan, S.; Taniar, D. and Ibrahim, I. K. (eds), Sixth International Conference on Information Integration and Web-based Applications Services, 27-29 September 2004, Jakarta, Indonesia, pp. 559-568, iiWAS, Jakarta, Indonesia [E1]
DRO entry for this publication

Xiang, Y., Zhou, W. and Chowdhury, M. (2004) Toward pervasive computing in restaurant, ICETE 2004 : Proceedings of the First International Conference on E-Business and Telecommunication Networks, pp. 312-317, Institute for Systems and Technologies of Information, Control and Communication, Setúbal, Portugal [E2]
DRO entry for this publication

Xiang, Yang, Lan, Mingjun and Zhou, WanLei (2004) Web services in hotel industry, ICETE 2004 : Proceedings of the First International Conference on E-Business and Telecommunication Networks, pp. 231-237, Institute for Systems and Technologies of Information, Control and Communication, Setúbal, Portugal [E2]
DRO entry for this publication

2002 School of Information Technology

Xiang, Yang and Zhou, Wanlei (2002) The design and development of an integrated system for object-oriented finite element computing, in Zhou, Wanlei; Chi, X.; Goscinski, A. and Li, G. (eds), 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, pp. 201-204, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Xiang, Yang, Ping, Yang* and Zhou, Wanlei (2002) Object oriented finite element analysis: a distributed approach to mesh generation, in Zhou, Wanlei; Chi, X.; Goscinski, A. and Li, G. (eds), 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, pp. 92-99, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Yu, Shui, Zhou, Wanlei, Zhao, Ying*, Lan, Mingjun and Xiang, Yang (2002) A web-DB model on multicast and anycast, in Zhou, Wanlei; Chi, X.; Goscinski, A. and Li, G. (eds), Proceedings of the 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, pp. 412-415, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Grants and Consultancies

All years

Research Income - National Competitive Grants

Xiang, Y, Zhou, W, Varadharajan, V* and Oliver, J*. Developing an active defence system to identify malicious domains and websites, ARC Collaborative - Linkage - Projects (Round 2) [T]

  • 2012: $41,539

Xiang, Y, Zhou, W and Xiang, Y. Tracing real internet attackers through information correlation, ARC Grant - Discovery Projects [T]

  • 2012: $75,370
  • 2011: $72,578
  • 2010: $81,660

Zhou, W and Xiang, Y*. An active approach to detect and defend against peer-to-peer botnets, ARC Collaborative - Linkage - Projects (Round 1) [T]

  • 2012: $60,312
  • 2011: $54,402
  • 2010: $51,671

Research Income - Industry and Other Funding

Xiang, Y, Zhou, W, Varadharajan, V* and Oliver, J*. Developing an active defence system to identify malicious domains and websites [V]

  • 2012: $15,000

Xiang, Y and Xiang, Y. Development of a smart data management and optimisation system [V]

  • 2012: $25,000

Zhou, W and Xiang, Y*. An active approach to detect and defend against peer-to-peer botnets [V]

  • 2012: $11,000
  • 2011: $11,000
  • 2010: $11,000

Higher Degree by Research Completions supervised by Yang Xiang

2013

Mahbub Ahmed
Doctor of Philosophy, Thesis entitled: Security in cloud computing. School of Information Technology

Silvio Cesare
Doctor of Philosophy, Thesis entitled: Software Similarity and Classification. School of Information Technology

Yu Wang
Doctor of Philosophy, Thesis entitled: Automatic network traffic classification. School of Information Technology

Legend:
* Not a member of Deakin University at time of output.

DRO to publications collection last synchronised: Thursday 2nd October 2014 11:34am

Deakin University acknowledges the traditional land owners of present campus sites.

23rd July 2011