Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks A Chonka, Y Xiang, W Zhou, A Bonti Journal of Network and Computer Applications 34 (4), 1097-1107, 2011 | 339 | 2011 |
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems X Huang, Y Xiang, A Chonka, J Zhou, RH Deng IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010 | 306 | 2010 |
Chaos theory based detection against network mimicking DDoS attacks A Chonka, J Singh, W Zhou IEEE Communications Letters 13 (9), 717-719, 2009 | 147 | 2009 |
Intelligent energy management control of vehicle air conditioning via look-ahead system H Khayyam, S Nahavandi, E Hu, A Kouzani, A Chonka, J Abawajy, ... Applied thermal engineering 31 (16), 3147-3160, 2011 | 95 | 2011 |
Detecting and mitigating HX-DoS attacks against cloud web services A Chonka, J Abawajy 2012 15th International Conference on Network-Based Information Systems, 429-434, 2012 | 81 | 2012 |
Defending grid web services from xdos attacks by sota A Chonka, W Zhou, Y Xiang 2009 IEEE International Conference on Pervasive Computing and Communications …, 2009 | 30 | 2009 |
Detecting and tracing DDoS attacks by intelligent decision prototype A Chonka, W Zhou, J Singh, Y Xiang 2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008 | 30 | 2008 |
Protecting web services with service oriented traceback architecture A Chonka, W Zhou, Y Xiang 2008 8th IEEE International Conference on Computer and Information …, 2008 | 26 | 2008 |
Protecting information systems from ddos attack using multicore methodology A Chonka, W Zhou, K Knapp, Y Xiang 2008 IEEE 8th International Conference on Computer and Information …, 2008 | 22 | 2008 |
Multi-core defense system (MSDS) for protecting computer infrastructure against DDoS attacks A Chonka, SK Chong, W Zhou, Y Xiang 2008 Ninth International Conference on Parallel and Distributed Computing …, 2008 | 21* | 2008 |
Assessing the level of IT security culture improvement: Results from three Australian SMEs L Ngo, W Zhou, A Chonka, J Singh 2009 35th Annual Conference of IEEE Industrial Electronics, 3189-3195, 2009 | 18 | 2009 |
Multi-classifier classification of spam email on a ubiquitous multi-core architecture R Islam, J Singh, A Chonka, W Zhou 2008 IFIP International Conference on Network and Parallel Computing, 210-217, 2008 | 17 | 2008 |
Ubiquitous multicore (UM) methodology for multimedia A Chonka, W Zhou, L Ngo, Y Xiang International Symposium on Computer Science and its Applications, 131-136, 2008 | 11 | 2008 |
Protecting web services from DDoS attacks by SOTA A Chonka, W Zhou, Y Xiang Deakin University, 2008 | 7 | 2008 |
X. Protecting Cloud Web Services from HX-DoS attacks using Decision Theory AX Chonka, Y Zhou, W Huang IEEE conference on communications: advanced internet and cloud, 85-91, 2012 | 4 | 2012 |
E-Learning Over Mobile Phone Technology: Best Practices and Guidelines. F Khaddage, A Chonka, W Zhou Int. J. Interact. Mob. Technol. 3 (3), 55-58, 2009 | 3 | 2009 |
Anomaly Detection of Distributed Denial of Service Attacks by Non-Liner Dynamics A Chonka, J Singh, W Zhou IEEE Communications letters 13 (9), 717-719, 2009 | 2 | 2009 |
Image indexing for learning content via a mobile phone F Khaddage, A Chonka, W Zhou Global Learn, 187-194, 2010 | 1 | 2010 |
POEM, A 3-dimensional exon taxonomy and patterns in untranslated exons K Knapp, A Chonka, YPP Chen BMC genomics 9, 1-11, 2008 | 1 | 2008 |
Adjacency cache: fast web cache indexing and lookup J Casey, A Chonka, W Zhou 6th IEEE/ACIS international conference on computer and information science …, 2007 | 1 | 2007 |