No photo of Hannan Xiao

Hannan Xiao

Dr

  • Phone83653
  • 847
    Citations
Filter
Conference paper

Search results

  • 2024

    Analysis of Student Preference to Group Work Assessment in Cybersecurity Courses

    Xiao, H., Spring, J. & Kuzminykh, I., Jun 2024, 2nd International Workshop on CyberSecurity Education for Industry and Academia (CSE4IA 2024), Genova, Italy. 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • 2023

    New Algorithms for the Detection of Malicious Traffic in 5G-MEC

    Fernando, O. A., Xiao, H. & Spring, J., Mar 2023, (Accepted/In press) 2023 IEEE Wireless Communications and Networking Conference (WCNC), 26–29 March 2023, Glasgow, Scotland, UK. IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    89 Downloads (Pure)
  • 2022

    Developing a Testbed with P4 to Generate Datasets for the Analysis of 5G-MEC Security

    Fernando, O. A., Xiao, H. & Spring, W. J., Apr 2022, (Accepted/In press) 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, United States. IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
    250 Downloads (Pure)
  • 2021

    Investigating Threshold Concept and Troublesome Knowledge in Cyber Security

    Kuzminykh, I., Ghita, B., Xiao, H., Yevdokymenko, M. & Yeremenko, O., 2021, 2021 1st Conference on Online Teaching for Mobile Education, OT4ME 2021. Institute of Electrical and Electronics Engineers Inc., p. 26-30 5 p. (2021 1st Conference on Online Teaching for Mobile Education, OT4ME 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • SEVA: A Smart Electronic Voting Application Using Blockchain Technology

    Abegunde, J., Spring, J. & Xiao, H., Dec 2021, IEEE Blockchain - 2021 - The 4th IEEE International Conference on Blockchain, 6 Dec 2021 → 8 Dec 2021. IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
    52 Downloads (Pure)
  • The Relationship between Student Engagement and Academic Performance in Online Education

    Kuzminykh, I., Ghita, B. & Xiao, H., 21 Aug 2021, ICSET 2021 - 2021 5th International Conference on E-Society, E-Education and E-Technology. Association for Computing Machinery, p. 97-101 5 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    5 Citations (Scopus)
  • 2019

    Distributed SIP DDoS Defense with P4

    Febro, A., Xiao, H. & Spring, J., Apr 2019, 2019 IEEE Wireless Communications and Networking Conference, WCNC 2019. Institute of Electrical and Electronics Engineers Inc., 8 p. 8885926. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 2019-April).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    24 Citations (Scopus)
    31 Downloads (Pure)
  • Evaluation of Underlying Switching Mechanism for Future Networks with P4 and SDN (Workshop Paper)

    Fernando, O. A., Xiao, H. & Che, X., 1 Aug 2019, Collaborative Computing: Networking, Applications and Worksharing - 15th EAI International Conference, CollaborateCom 2019, Proceedings. Wang, X., Gao, H., Iqbal, M. & Min, G. (eds.). SPRINGER, p. 549-568 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 292).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    4 Citations (Scopus)
    70 Downloads (Pure)
  • Quantum Based Networks: Analysis of Quantum Teleportation Protocol and Entanglement Swapping (Workshop Paper)

    Kandwal, P., Spring, W. J. & Xiao, H., 1 Aug 2019, Collaborative Computing: Networking, Applications and Worksharing - 15th EAI International Conference, CollaborateCom 2019, Proceedings. Wang, X., Gao, H., Iqbal, M. & Min, G. (eds.). SPRINGER, p. 569-582 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 292).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    28 Downloads (Pure)
  • SIPchain: SIP Defense Cluster with Blockchain

    Febro, A., Xiao, H. & Spring, J., Oct 2019, 2019 Principles, Systems and Applications of IP Telecommunications, IPTComm 2019. Institute of Electrical and Electronics Engineers Inc., 8 p. 8920874. (2019 Principles, Systems and Applications of IP Telecommunications, IPTComm 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    4 Citations (Scopus)
    82 Downloads (Pure)
  • 2018

    A Multi-factor Authentication Method for Security of Online Examinations

    Ullah, A., Xiao, H. & Barker, T., 1 Dec 2018, Smart Grid and Internet of Things - 2nd EAI International Conference, SGIoT 2018, Proceedings. Pathan, A-S. K., Fadlullah, Z. M. & Guerroumi, M. (eds.). Springer Verlag, p. 131-138 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 256).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    6 Citations (Scopus)
    38 Downloads (Pure)
  • Telephony Denial of Service Defense at Data Plane (TDoSD@DP)

    Febro, A., Xiao, H. & Spring, J., 6 Jul 2018, IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    8 Citations (Scopus)
    42 Downloads (Pure)
  • Threat Analysis of Software Agents in Online Banking and Payments

    Ngalo, T., Xiao, H., Christianson, B. & Zhang, Y., 26 Oct 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 1116p 8 p. 8511968. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    2 Citations (Scopus)
    37 Downloads (Pure)
  • 2017

    A Focus Group Study: Usability and Security of Challenge Question Authentication in Online Examinations

    Ullah, A., Barker, T. & Xiao, H., 1 Jul 2017, The International Conference on Information Technology and Applications. IEEE, 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    46 Downloads (Pure)
  • 2016

    A Classification of Threats to Remote Online Examinations

    Ullah, A., Xiao, H. & Barker, T., 16 Nov 2016, 7th IEEE Annual Information Technology, Electronics and Mobile Communication Conference, IEEE IEMCON 2016. Saha, H. N. & Chakrabarti, S. (eds.). Institute of Electrical and Electronics Engineers Inc., 7746085. (7th IEEE Annual Information Technology, Electronics and Mobile Communication Conference, IEEE IEMCON 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    14 Citations (Scopus)
  • A Cloud-based RFID Authentication Protocol with Insecure Communication Channels

    Xiao, H., Alshehri, A. A. & Christianson, B., 1 Jan 2016, Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. Institute of Electrical and Electronics Engineers Inc., p. 332-339 8 p. 7846964. (Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    19 Citations (Scopus)
    20 Downloads (Pure)
  • A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT

    Abegunde, J., Xiao, H. & Spring, J., 1 Jan 2016, Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. Institute of Electrical and Electronics Engineers Inc., p. 473-480 8 p. 7846982. (Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    8 Citations (Scopus)
    25 Downloads (Pure)
  • Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks

    Alocious, C., Xiao, H. & Christianson, B., 12 Sept 2016, 2016 IEEE Wireless Communications and Networking Conference, WCNC 2016. Institute of Electrical and Electronics Engineers Inc., 8 p. 7564841. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 2016-September).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    2 Citations (Scopus)
    13 Downloads (Pure)
  • 2015

    Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks

    Alocious, C., Xiao, H. & Christianson, B., 2 Oct 2015, IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference. Institute of Electrical and Electronics Engineers Inc., p. 811-816 6 p. 7289187. (IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    9 Citations (Scopus)
    28 Downloads (Pure)
  • Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots

    Alocious, C., Xiao, H., Christianson, B. & Malcolm, J., 22 Dec 2015, Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015. Atzori, L., Jin, X., Jarvis, S., Liu, L., Calvo, R. A., Hu, J., Min, G., Georgalas, N. & Wu, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1853-1860 8 p. 7363322. (Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    3 Citations (Scopus)
    11 Downloads (Pure)
  • Guarantor and Reputation Based Trust Model for Social Internet of Things

    Xiao, H., Sidhu, N. & Christianson, B., 2 Oct 2015, IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference. Institute of Electrical and Electronics Engineers Inc., p. 600-605 6 p. 7289151. (IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    68 Citations (Scopus)
    53 Downloads (Pure)
  • Resilient Tit-For-Tat (RTFT) A Game Solution for Wireless Misbehaviour

    Abegunde, J., Xiao, H. & Spring, J., 2 Oct 2015, IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference. Institute of Electrical and Electronics Engineers Inc., p. 904-909 6 p. 7289203. (IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    3 Citations (Scopus)
    39 Downloads (Pure)
  • Usability of Activity-based and Image-based Challenge Questions in Online Student Authentication

    Ullah, A., Xiao, H. & Barker, T., 1 Jan 2015, Human Aspects of Information Security, Privacy and Trust - 3rd International Conference, HAS 2015 Held as Part of HCI International 2015, Proceedings. Tryfonas, T. & Askoxylakis, I. (eds.). Springer Verlag, p. 131-140 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9190).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    2 Citations (Scopus)
    12 Downloads (Pure)
  • 2014

    A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Chiejina, E., Xiao, H. & Christianson, B., 14 Nov 2014, 2014 6th Computer Science and Electronic Engineering Conference, CEEC 2014 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 133-138 6 p. 6958568. (2014 6th Computer Science and Electronic Engineering Conference, CEEC 2014 - Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    1 Citation (Scopus)
  • An Evaluation of Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks

    Maw, H. A., Xiao, H., Christianson, B. & Malcolm, J. A., 1 Oct 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services, Healthcom 2014. Institute of Electrical and Electronics Engineers Inc., p. 130-135 6 p. 7001829. (2014 IEEE 16th International Conference on e-Health Networking, Applications and Services, Healthcom 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    12 Citations (Scopus)
    7 Downloads (Pure)
  • A Resilient MAC Protocol for Wireless Networks

    Abegunde, J., Xiao, H. & Spring, W., 1 Dec 2014, IMA.

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    20 Downloads (Pure)
  • Energy Consumption in Mobile Ad Hoc Networks

    Xiao, H., Ibrahim, D. M. & Christianson, B., 10 Nov 2014, IEEE Wireless Communications and Networking Conference, WCNC. Institute of Electrical and Electronics Engineers Inc., p. 2599-2604 6 p. 6952818. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    12 Citations (Scopus)
    31 Downloads (Pure)
  • Graphical and Text based Challenge Questions for Secure and Usable Authentication in Online Examinations

    Ullah, A., Xiao, H., Barker, T. & Lilley, M., 1 Jan 2014, 2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014. Institute of Electrical and Electronics Engineers Inc., p. 302-308 7 p. 7038825. (2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
    6 Citations (Scopus)
    12 Downloads (Pure)
  • Intrusion Detection System Using Bayesian Network Modeling

    Alocious, C., Abouzakhar, N., Xiao, H. & Christianson, B., 1 Jan 2014, Proceedings of the 13th European Conference on Cyber Warfare and Security, ECCWS 2014. Tsihrintzis, G. A. & Liaropoulos, A. N. (eds.). Curran Associates Inc., p. 223-232 10 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2014-January).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    3 Citations (Scopus)
  • Privacy and usability of image and text based challenge questions authentication in online examination

    Ullah, A., Xiao, H., Lilley, M. & Barker, T., 25 Dec 2014, 2014 International Conference on Education Technologies and Computers, ICETC 2014. Institute of Electrical and Electronics Engineers Inc., p. 24-29 6 p. 6998897. (2014 International Conference on Education Technologies and Computers, ICETC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    5 Citations (Scopus)
  • 2013

    A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks

    Chiejina, E., Xiao, H. & Christianson, B., 2013, Procs of the 6th York Doctoral Symposium on Computer Science & Electronics. Simpson, S. (ed.). University of York, p. 17-26 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance

    Alocious, C., Xiao, H. & Christianson, B., 2013, Procs 6th York Doctoral Symposium on Computer Science & Electronics. Simpson, S. (ed.). University of York, p. 57-62 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • An adaptive access control model for medical data in Wireless Sensor Networks

    Maw, H. A., Xiao, H. & Christianson, B., 1 Dec 2013, 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services, Healthcom 2013. p. 303-309 7 p. 6720690. (2013 IEEE 15th International Conference on e-Health Networking, Applications and Services, Healthcom 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    14 Citations (Scopus)
  • Design, privacy and authentication of challenge questions in online examinations

    Ullah, A., Xiao, H., Lilley, M. & Barker, T., 1 Jan 2013, 2013 IEEE Conference on e-Learning, e-Management and e-Services, IC3e 2013. IEEE Computer Society, p. 46-50 5 p. 6735964. (2013 IEEE Conference on e-Learning, e-Management and e-Services, IC3e 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    4 Citations (Scopus)
  • Trust*: Using local guarantees to extend the reach of trust

    Clarke, S., Christianson, B. & Xiao, H., 23 Jan 2013, Security Protocols XVII - 17th International Workshop, Revised Selected Papers. p. 171-178 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7028 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    9 Citations (Scopus)
  • 2012

    An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks

    Maw, H. A., Xiao, H. & Christianson, B., 5 Dec 2012, Q2SWinet'12 - Proceedings of the 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks. p. 81-83 3 p. (Q2SWinet'12 - Proceedings of the 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    8 Citations (Scopus)
  • Profile based student authentication in online examination

    Ullah, A., Xiao, H. & Lilley, M., 17 Oct 2012, International Conference on Information Society, i-Society 2012. p. 109-113 5 p. 6285058. (International Conference on Information Society, i-Society 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    28 Citations (Scopus)
  • Trustworthiness and authentication in ubiquitous computing

    Xiao, H., Malcolm, J., Christianson, B. & Zhang, Y., 5 Dec 2012, MobiWac'12 - Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access. p. 135-138 4 p. (MobiWac'12 - Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Usability of profile based student authentication and traffic light system in online examinations

    Ullah, A., Xiao, H., Lilley, M. & Barker, T., 1 Dec 2012, 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012. p. 220-225 6 p. 6470947. (2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    8 Citations (Scopus)
  • 2010

    Extending trust in peer-to-peer networks

    Clarke, S., Christianson, B. & Xiao, H., 3 May 2010, Advances in Databases and Information Systems - Associated Workshops and Doctoral Consortium of the 13th East European Conference, ADBIS 2009, Revised Selected Papers. p. 145-152 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5968 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Snoop behaviour in multihop wireless networks

    Nambiar, P., Xiao, H. & Malcolm, J. A., 20 Oct 2010, PM2HW2N 2010 - Proceedings of the 5th ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, co-located with MSWiM 2010. Association for Computing Machinery, Inc, p. 55-62 8 p. (PM2HW2N 2010 - Proceedings of the 5th ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, co-located with MSWiM 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • 2009

    Multimodal security enforcement framework for wireless ad hoc networks

    Yan, L., Abouzakhar, N. & Xiao, H., 30 Nov 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 921-925 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    1 Citation (Scopus)
  • 2008

    A purchase protocol with live cardholder authentication for online credit card payment

    Xiao, H., Christianson, B. & Zhang, Y., 10 Nov 2008, Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008. p. 15-20 6 p. 4627054. (Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    7 Citations (Scopus)
  • 2007

    A performance comparison of wireless ad hoc network routing protocols under security attack

    Bo, S. M., Xiao, H., Adereti, A., Malcolm, J. A. & Christianson, B., 1 Dec 2007, Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security. p. 50-55 6 p. 4299750. (Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    14 Citations (Scopus)
  • Hierarchical trustworthy authentication for pervasive computing

    Xiao, H., Malcolm, J. A., Christianson, B. & Zhang, Y., 1 Dec 2007, Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2007. 4450993. (Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    3 Citations (Scopus)
  • 2006

    Improving the usability of a virtual assembly environment with the integration of multi-sensory feedback

    Zhang, Y., Travis, A., Fernando, T. & Xiao, H., 1 Dec 2006, Proceedings - 5th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2006. In conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, S. p. 444-450 7 p. 1652031. (Proceedings - 5th IEEE/ACIS Int. Conf. on Comput. and Info. Sci., ICIS 2006. In conjunction with 1st IEEE/ACIS, Int. Workshop Component-Based Software Eng., Softw. Archi. and Reuse, COMSAR 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    1 Citation (Scopus)
  • 2005

    Theoretical analysis of TCP throughput in adhoc wireless networks

    Xiao, H., Chua, K. C., Malcolm, J. A. & Zhang, Y., 1 Dec 2005, GLOBECOM'05: IEEE Global Telecommunications Conference, 2005. p. 2714-2719 6 p. 1578253. (GLOBECOM - IEEE Global Telecommunications Conference; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    11 Citations (Scopus)
  • The use of visual and auditory feedback for assembly task performance in a virtual environment

    Zhang, Y., Fernando, T., Sotudeh, R. & Xiao, H., 1 Dec 2005, Proceedings - Ninth International Conference on Information Visualisation, iV05. p. 779-784 6 p. 1509161. (Proceedings of the International Conference on Information Visualisation; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    7 Citations (Scopus)
  • 2003

    Adaptive ingress admission control for differentiated services

    Xiao, H. & Chua, K. C., 1 Jan 2003, ICON 2003 - 11th IEEE International Conference on Networks. IEEE Computer Society, p. 513-518 6 p. (IEEE International Conference on Networks, ICON).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Relative service differentiation for mobile ad hoc networks

    Chua, K. C., Xiao, H. & Seah, K. G., 1 Jan 2003, 2003 IEEE Wireless Communications and Networking Conference, WCNC 2003. Institute of Electrical and Electronics Engineers Inc., p. 1379-1384 6 p. 1200575. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    3 Citations (Scopus)
Your message has successfully been sent.
Your message was not sent due to an error.