Follow
Weizhi Meng
Title
Cited by
Cited by
Year
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
IEEE Access 6, 10179-10188, 2018
4622018
Surveying the Development of Biometric User Authentication on Mobile Phones
W Meng, DS Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials, 2015
2822015
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures
W Li, W Meng, LF Kwok
Journal of Network and Computer Applications 68, 126-139, 2016
1702016
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Y Meng, DS Wong, R Schlegel, LF Kwok
China International Conference on Information Security and Cryptology …, 2012
1632012
Designing collaborative blockchained signature-based intrusion detection in IoT environments
W Li, S Tug, W Meng, Y Wang
Future Generation Computer Systems 96, 481-489, 2019
1252019
SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology
S Singh, IH Ra, W Meng, M Kaur, GH Cho
International Journal of Distributed Sensor Networks 15 (4), 1550147719844159, 2019
1002019
EFM: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism
W Meng, W Li, LF Kwok
Computers & Security 43, 189-204, 2014
932014
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks
W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst
IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018
852018
Enhancing medical smartphone networks via blockchain-based trust management against insider attacks
W Meng, W Li, L Zhu
IEEE Transactions on Engineering Management 67 (4), 1377-1386, 2019
842019
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data
W Meng, W Li, C Su, J Zhou, R Lu
IEEE Access 6, 7234-7243, 2017
822017
Intrusion detection in the era of IoT: Building trust via traffic filtering and sampling
W Meng
Computer 51 (7), 36-43, 2018
792018
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
W Li, W Meng, LF Kwok, HS Horace
Journal of Network and Computer Applications 77, 135-145, 2017
772017
Design of intelligent KNN‐based alarm filter using knowledge‐based alert verification in intrusion detection
W Meng, W Li, LF Kwok
Security and Communication Networks 8 (18), 3883-3895, 2015
742015
The practice on using machine learning for network anomaly intrusion detection
YX Meng
2011 International Conference on Machine Learning and Cybernetics 2, 576-581, 2011
722011
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks
W Meng, W Li, Y Xiang, KKR Choo
Journal of Network and Computer Applications 78, 162-169, 2017
702017
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments
W Li, W Meng, MH Au
Journal of Network and Computer Applications 161, 102631, 2020
662020
The application of Software Defined Networking on securing computer networks: A survey
R Sahay, W Meng, CD Jensen
Journal of Network and Computer Applications 131, 89-108, 2019
632019
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks
W Li, W Meng, LF Kwok
The IFIP WG 11.11 International Conference on Trust Management, 61-76, 2014
572014
A fog-based privacy-preserving approach for distributed signature-based intrusion detection
Y Wang, W Meng, W Li, J Li, WX Liu, Y Xiang
Journal of Parallel and Distributed Computing 122, 26-35, 2018
562018
Detecting insider attacks in medical cyber–physical networks based on behavioral profiling
W Meng, W Li, Y Wang, MH Au
Future Generation Computer Systems 108, 1258-1266, 2020
542020
The system can't perform the operation now. Try again later.
Articles 1–20