A Fault-Tolerant Scheme for Detection of DDoS Attack Patterns in Cluster-Based Wireless Sensor Networks

lightweight graph-based pattern recognition scheme in mobile ad hoc networks, in An online scheme for threat detection within mobile ad hoc networks, in Mobile Intelligence, eds Laurence A novel associative model of data: Toward a distributed large-scale data processing scheme for future computer clouds,

[1]  Anang Hudaya Muhamad Amin,et al.  Under the Cloud: A Novel Content Addressable Data Framework for Cloud Parallelization to Create and Virtualize New Breeds of Cloud Applications , 2010, 2010 Ninth IEEE International Symposium on Network Computing and Applications.

[2]  Zubair A. Baig,et al.  A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[3]  Asad I. Khan,et al.  Graph neuron and hierarchical graph neuron, novel approaches toward real time pattern recognition in wireless sensor networks , 2009, IWCMC.

[4]  Deborah Estrin,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Fine-grained Network Time Synchronization Using Reference Broadcasts , 2022 .

[5]  Rasool Jalili,et al.  Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks , 2005, ISPEC.

[6]  A.I. Khan,et al.  CDHT: a clustered DHT communication scheme for serverless (P2P) networks , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.

[7]  Bala Srinivasan,et al.  Abnormal Behaviour Detection within Mobile Networks , 2007, MoMM.

[8]  M. Isreb,et al.  A parallel distributed application of the wireless sensor network , 2004, Proceedings. Seventh International Conference on High Performance Computing and Grid in Asia Pacific Region, 2004..

[9]  Anang Hudaya Muhamad Amin,et al.  Distributed Multi-Feature Recognition Scheme for Greyscale Images , 2010, Neural Processing Letters.

[10]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[11]  Asad I. Khan,et al.  Trusted transaction secure network : agent-based distributed security control system for traffic on the Internet , 2021 .

[12]  Amiza Amir,et al.  A Wheel Graph Structured Associative Memory for Single-Cycle Pattern Recognition within P2P Networks , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[13]  Asad Khan,et al.  System Infrastructure Design for an End-to-end E-Application for Lab Data Acquisition to Repository Deposition , 2007, iiWAS.

[14]  Anang Hudaya Muhamad Amin,et al.  One Shot Associative Memory Method for Distorted Pattern Recognition , 2007, Australian Conference on Artificial Intelligence.

[15]  Anang Hudaya Muhamad Amin,et al.  Collaborative-Comparison Learning for Complex Event Detection Using Distributed Hierarchical Graph Neuron (DHGN) Approach in Wireless Sensor Network , 2009, Australasian Conference on Artificial Intelligence.

[16]  M. Isreb,et al.  Attributes for modelling Internet traffic patterns and analysis , 2000 .

[17]  Asad I. Khan,et al.  A Lightweight, Fast and Efficient Distributed Hierarchical Graph Neuron-based Pattern Classifier , 2009 .

[18]  A.I. Khan,et al.  Dynamic data protocol exchange to handle passive attacks on trusted transient simple network (TTSN) transactions , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.

[19]  Asad I. Khan,et al.  Algorithm Exchange of a Security Control System for Web Services Applications , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[20]  Manish Parashar,et al.  Cooperative Defence Against DDoS Attacks , 2006, J. Res. Pract. Inf. Technol..

[21]  Asad I. Khan,et al.  Building Context Aware Network of Wireless Sensors Using a Novel Pattern Recognition Scheme Called Hierarchical Graph Neuron , 2009, 2009 IEEE International Conference on Semantic Computing.

[22]  Nael B. Abu-Ghazaleh,et al.  A taxonomy of wireless micro-sensor network models , 2002, MOCO.

[23]  Jun Zheng,et al.  An Anomaly Intrusion Detection System Based on Vector Quantization , 2006, IEICE Trans. Inf. Syst..

[24]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[25]  Asad I. Khan,et al.  Towards dynamic data grid framework for eResearch , 2006, ACSW.

[26]  Patrik Mihailescu,et al.  Parallel pattern recognition computations within a wireless sensor network , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[27]  Shawn Ostermann,et al.  Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.

[28]  Asad I. Khan,et al.  An autonomous clustering algorithm for serverless peer-to-peer systems , 2003 .

[29]  Zubair A. Baig,et al.  SGSIA-in-Network Data Preprocessing for Secure Grid-Sensor Integration , 2006, 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06).

[30]  Asad I. Khan,et al.  A Hierarchical Graph Neuron Scheme for Real-Time Pattern Recognition , 2008, IEEE Transactions on Neural Networks.

[31]  Asad I. Khan,et al.  Computational Structures Technology Internet Based Engineering Education , 1998 .

[32]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[33]  Anantha Chandrakasan,et al.  Dynamic Power Management in Wireless Sensor Networks , 2001, IEEE Des. Test Comput..

[34]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[35]  J. Elliott,et al.  Distributed denial of service attacks and the zombie ant effect , 2000 .

[36]  Anang Hudaya Muhamad Amin,et al.  A distributed event detection scheme for wireless sensor networks , 2009, MoMM.

[37]  Kuei-Ping Shih,et al.  Distributed direction-based localization in wireless sensor networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[38]  Anang Hudaya Muhamad Amin,et al.  Single-Cycle Image Recognition Using an Adaptive Granularity Associative Memory Network , 2008, Australasian Conference on Artificial Intelligence.

[39]  Asad I. Khan,et al.  A peer-to-peer associative memory network for intelligent information systems , 2002 .

[40]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[41]  Anang Hudaya Muhamad Amin,et al.  Parallel Pattern Recognition Using a Single-Cycle Learning Approach within Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[42]  Virgil D. Gligor,et al.  Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion) , 2003, Security Protocols Workshop.

[43]  Peng Ning,et al.  A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks , 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks.

[44]  Anang Hudaya Muhamad Amin,et al.  A divide-and-distribute approach to single-cycle learning HGN network for pattern recognition , 2010, 2010 11th International Conference on Control Automation Robotics & Vision.

[45]  A.I. Khan,et al.  Analysis of Pattern Recognition Algorithms Using Associative Memory Approach: A Comparative Study between the Hopfield Network and Distributed Hierarchical Graph Neuron (DHGN) , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[46]  Asad I. Khan,et al.  Evolution of Information Retrieval in Cloud Computing by Redesigning Data Management Architecture from a Scalable Associative Computing Perspective , 2010, ICONIP.

[47]  Wei Ye,et al.  CDHT: the design of a clustered DHT routing scheme for serverless (P2P) networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[48]  Mustafa Isreb,et al.  Synthesis Based Software Engineering Design for Automotive Industry , 1998 .

[49]  Sergio D. Servetto,et al.  Asymptotically optimal time synchronization in dense sensor networks , 2003, WSNA '03.

[50]  Rocky K. C. Chang,et al.  Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..

[51]  A.I. Khan,et al.  Energy-Efficient Pattern Recognition Approach for Wireless Sensor Networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[52]  M. Isreb,et al.  An internet-4MAT-CAL system for adaptive finite element mesh refinement , 2000 .

[53]  A.I. Khan,et al.  An agent based approach to discovery and formation of the serverless core network , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.

[54]  Asad I. Khan,et al.  A performance comparison using automatic, semi-automatic, and manual parallelisation tools , 2001 .

[55]  Mustafa Isreb,et al.  Parrallelising Finite Elements Equation Solver for Power Indu7stry Infrastructures , 1999 .

[56]  Ali A. Ghorbani,et al.  Network intrusion detection using an improved competitive learning neural network , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..

[57]  Hyunsoo Kim,et al.  Estimation of the Optimal Number of Cluster-Heads in Sensor Network , 2005, KES.

[58]  Anang Hudaya Muhamad Amin,et al.  Lightweight and distributed attack detection scheme in mobile ad hoc networks , 2009, MoMM.

[59]  M. Isreb,et al.  Internet Traffic Congestion Modelling and Parallel Distributed Analysis , 2003, ISPA.

[60]  Zubair A. Baig,et al.  Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks , 2005, EUC Workshops.

[61]  Anang Hudaya Muhamad Amin,et al.  Commodity-Grid Based Distributed Pattern Recognition Framework , 2008, AusGrid.

[62]  Wei Ye,et al.  Distributed network file storage for a serverless (P2P) network , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..