Publications

 

    Information Security

  • Meng Y, Li W and Kwok LF. "Design of Intelligent KNN-based Alarm Filter Using Knowledge-based Alert Verification in Intrusion Detection" in Security and Communication Networks, Vol. 21, No. 4, 209-222, Wiley 2015

  • Meng Y and Kwok LF. "Enhancing Intrusion Detection Systems using Intelligent False Alarm Filter: Selecting the Best Machine Learning Algorithm" in (Eds. A.R. Martinez, R. Marin-Lopez F. Pereniguez-Garcia): Architectures and Protocols for Secure Information Technology Infrastructures, pp.214-236, IGI Global Hershey USA 2014

  • Meng Y, Li W and Kwok LF. "An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments", in Proc 17th International Conference, ISC 2014 LNCS 8783, Hong Kong, China, October 12-14, 2014, pp. 465-476, Springer International Publishing 2014

  • Li W, Meng Y, and Kwok LF. "Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks" in Proc IFIP WG 11.11 International Conference on Trust Management (IFIP TM 2014) IFIP AICT 430, pp. 61-76, Singapore, 7-10 July 2014. Springer Berlin Heidelberg 2014

  • Meng Y, Wong D S and Kwok LF. "Design of Touch Dynamics based User Authentication with an Adaptive Mechanism on Mobile Phones", in Proc. 29th Annual ACM Symposium on Applied Computing: the 13th edition of the Computer Security track (ACM SAC 2014), Gyeongju, Korea, 24-28 March 2014, pp1-8, ACM March 2014

  • Meng Y, Li W and Kwok LF. "Enhancing Email Classification Using Data Reduction and Disagreement-based Semi-Supervised Learning", Proc. of 2014 IEEE International Conference on Communications (ICC 2014), IEEE, pp. 622-627, 10-14 June 2014, Sydney, Australia, pp. 622-627, IEEE 2014

  • Meng Y and Kwok LF. "Enhancing the Performance of ignature-based Network Intrusion Detection Systems: An Engineering Approach" in HKIE Transactions, Vol. 21, No. 4, 209-222, Taylor & Francis 2014

  • Meng Y, Li W and Kwok LF. "EFM: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism", Computers & Security. 43, 189-204, Elsevier Ltd 2014

  • Meng W, Wong D and Kwok LF. "The Effect of Adaptive Mechanism on Behavioral Biometric Based Mobile Phone Authentication", Information Management and Computer Security, 22 (2), 155-166, Emerald 2014

  • Meng Y, Yang X and Kwok LF. "Applications of Machine Learning in Intrusion Detection" in (Eds. Al-Sakib Khan Pathan): The State of the Art in Intrusion Prevention and Detection, CRC Press, Taylor & Francis January 2014

  • Meng Y and Kwok LF. "Enhancing Intrusion Detection Systems using Intelligent False AlarmFilter: Selecting the Best Machine Learning Algorithm" in (Eds. A.R. Martinez, R. Marin-Lopez F. Pereniguez-Garcia): Architectures and Protocols for Secure Information Technology Infrastructures, pp.214-236, IGI Global Hershey USA 2014.

  • Meng Y, Li W and Kwok LF. "A Case Study of Intelligent False Alarm Reduction in Cloud Environments - Challenges and Trends", in (Eds. Biju Issa, Nauman Israr): Case Studies in Secure Computing-Achievements and Trends, CRC Press, Taylor & Francis, 2014.

  • Meng Y and Kwok LF. "Adaptive Blacklist-based Packet Filter with A Statistic-based Approach in Network Intrusion Detection Journal of Network and Computer Applications", Journal of Networking and Computer Applications v39, pp. 83-92, Elsevier March 2014.

  • Meng Y and Kwok LF. "Adaptive Non-Critical Alarm Reduction Using Hash-based Contextual Signatures in Intrusion Detection", Computer Communications, v38, pp. 50-59, Elsevier B.V. February 2014.

  • Meng Y, Xiang Y and Kwok LF. �Applications of Machine Learning in Intrusion Detection� in (Eds. Al-Sakib Khan Pathan): The State of the Art in Intrusion Prevention and Detection, CRC Press, Taylor & Francis, pp311-332, January 2014

  • Meng Y and Kwok LF. "Towards Adaptive Character Frequency-based Exclusive Signature Matching Scheme and its Applications in Distributed Intrusion Detection", Journal of Computer Networks, 57(17) pp.3630-3640 Elsevier December 2013.

  • Li W, Meng Y, and Kwok LF. "Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges", In Proc. 9th International Conference on Computational Intelligence and Security (CIS 2013), Leshan, Sichuan PRC, 14-15 December 2013, pp. 518-522, IEEE 2013

  • Meng Y, Li W and Kwok LF. "Design of Cloud-based Parallel Exclusive Signature Matching Model in Intrusion Detection", Proc. of the 15th IEEE International Conference on High Performance Computing and Communications (HPCC 2013), 13-15 Nov 2013, Zhangjiajie, China, pp. 175-182, IEEE 2013

  • Meng Y, Li W, Kwok LF and Xiang Y. "Towards Designing Privacy Preserving Signature-based IDS As a Service: A Study and Practice". In Proc. 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS 2013), Xi'an PRC, 9-11 September 2013, pp.181-188, IEEE 2013

  • Meng Y, Li W and Kwok LF. "Towards Adaptive False Alarm Reduction Using Cloud as a Service", In Proc. The 8th International Conference on Communications and Networking in China (ChinaCom 2013), Network and Information Security Track, Guilin, China 14-16 August 2013, pp.420-425, IEEE 2013

  • Meng Y and Kwok LF. "Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection" in Proc. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), Melbourne, Australia, 16-18 July 2013, pp. 241-248, IEEE 2013

  • Meng Y and Kwok LF. "Enhancing False Alarm Reduction using Voted Ensemble Selection in Intrusion Detection", The International Journal of Computational Intelligence Systems 6(4), p626-638, July 2013, Atlantis Press and Taylor & Francis 2013

  • Meng Y, Li W and Kwok LF. "Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones", in (Ed.: L.J. Janczewski, H. Wolf, and S. Shenoi): Proceedings of 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference (IFIP SEC 2013), IFIP AICT 405, 8-10 July 2013, Auckland, New Zealand, pp. 55-68, Springer-Verlag Berlin Heidelberg 2013

  • Meng Y, Kwok LF and Li W. "Towards Designing Packet Filter with A Trust-based Approach using Bayesian Inference in Network Intrusion Detection", in (Ed.: A.D. Keromytis and R. Di Pietro): Proceedings of 8th International Conference on Security and Privacy in Communication Networks (SecureComm 2012), LNICST 106, 3-5 September 2012, Padua, Italy, pp203-221., Springer-Verlag Berlin Heidelberg 2013

  • Meng Y and Kwok LF. "Enhancing List-based Packet Filter using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection", in (Eds. L. Xu, E. Bertino, and Y. Mu) Proc. 6th International Conference on Network and System Security (NSS 2012), LNCS 7645, Wu Yi Shan, Fujian, China, 21-23 November 2012, pp. 1-14, Springer-Verlag Berlin Heidelberg 2012

  • Meng Y and Kwok LF. "Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction", in (Eds. Y. Xiang et al.) Proc. 4th International Symposium on Cyberspace Safety and Security (CSS 2012), LNCS 7672, Melbourne, Australia, 12-13 December, 2012, pp. 483�497, Springer-Verlag Berlin Heidelberg 2012

  • Meng Y, Li W and Kwok LF. "Intelligent Alarm Filter using Knowledge-based Alert Verification in Network Intrusion Detection", in (Ed.: Chen et al): Proceedings of 20th International Symposium on Methodologies for Intelligent Systems (ISMIS 12), LNAI 7661, Macau, China, 4-7 December 2012, pp.115-124, Springer-Verlag Berlin Heidelberg 2012

  • Meng Y, Wong D, Schlegel R and Kwok LF. "Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones", in (Eds. M. Kutyowski and M. Yung): Proceedings of 8th China International Conference on Information Security and Cryptology (Inscrypt 2012) LNCS 7763, Beijing, PRC. 28-30 November 2012, pp. 331-350, Springer-Verlag Berlin Heidelberg 2013

  • Meng Y and Kwok LF. "Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection" in (Eds. R.H. Deng and T. Feng): Proceedings of 9th International Conference on Information Security Practice and Experience (ISPEC 2013) LNCS 7863, 12-14 May 2013, Lanzhou, PRC, pp. 1-15, Springer-Verlag Berlin Heidelberg 2013

  • Meng Y, Li W and Kwok LF. "Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection" in (Eds. J Lopez, X Huang and R Sandhu): Proc. 7th International Conference on Network and System Security (NSS 2013), LNCS 7873, Madrid, Spain, 3-4 June 2013, pp. 40-53, Springer-Verlag Berlin Heidelberg 2013

  • Meng Y, Li W and Kwok LF. "Single Character Frequency-Based Exclusive Signature Matching Scheme", in (Ed.: R. Lee): Computer and Information Science 2012, SCI 429, pp. 67-80, Springer-Verlag Berlin Heidelberg 2012

  • Meng Y and Kwok LF. A Case Study: Intelligent False Alarm Reduction using Fuzzy If-Then Rules in Network Intrusion Detection. The 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012), Chongqing, PRC, 29-31 May 2012, pp.505-509, IEEE 2012

  • Caelli WJ, Kwok LF and Longley D. "A Model and a Simulator for Disaster Recovery" International Journal of Business Continuity and Risk Management (IJBCRM) 2011 - 2(4), p351-371.

  • Meng Y and Kwok LF. "A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection", Proc. Seventh International Conference on Computational Intelligence and Security (CIS 2011), Sanya, Hainan, China, 3-4 December 2011, pp978-982.

  • Meng Y and Kwok LF. "Adaptive Context-aware Packet Filter Scheme using Statistic-based Blacklist Generation in Network Intrusion Detection", Proc. 7th International Conference on Information Assurance and Security-"Innovative Cyber Security : Protecting Nations Beyond Borders" (IAS 2011), Malacca, Malaysia, 5-8 December 2011, pp. 74-79, IEEE 2011.

  • Meng Y and Kwok LF. "Adaptive False Alarm Filter Using Machine Learning in Intrusion Detection", in (Eds.: Y. Wang and T. Li): Practical Applications of Intelligent Systems, AISC 124, pp. 573-584, Springer-Verlag Berlin Heidelberg 2011.

  • Meng Y and Kwok LF. "A Framework for Protocol Vulnerability Condition Detection", Proc. The Fifth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2011), Nice/Saint Laurent du Var, France, 21-27 August, 2011, pp.91-96, IARIA, 2011. (ISBN:978-1-61208-010-9).

  • Meng Y, Li W and Kwok LF. "Single Character Frequency-Based Exclusive Signature Matching Scheme", in (Ed.: R. Lee): Computer and Information Science 2012, SCI 429, pp. 67-80, Springer-Verlag Berlin Heidelberg 2012.

  • Meng Y, and Kwok LF. A Case Study: Intelligent False Alarm Reduction using Fuzzy If-Then Rules in Network Intrusion Detection. The 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012), Chongqing, PRC, 29-31 May 2012, pp.505-509, IEEE 2012.

  • Caelli WJ, Kwok LF and Longley D. "A Business Continuity Management Simulator" in (Eds: K. Rannenberg, V. Varadharajan, and C. Weber) SEC 2010, IFIP AICT 330, pp. 9-18, IFIP International Federation for Information Processing 2010.

  • Longley D, Branagan M, Caelli WJ and Kwok LF, "Feasibility of Automated Information Security Compliance Auditing", in IFIP International Federation for Information Processing, Volume 278; Proceedings of the IFIP TC 11 23rd International Information Security Conference (Editors: Sushil Jajodia, Pierangela Samarati, Stelvio Cimato); 8-10 September 2008, Milan, Italy, pp. 493-507

  • Caelli WJ, Gaskell G, Kwok LF and Longley D. "A model to support information security governance" Journal of Information Risk Management and Audit, 16 (1), Spring 2006, pp7-24, British Computer Society (ISSN: 1741-4229).

  • Law KH and Kwok LF. "An Architecture for IDS False Alarm Reduction", Proc. Joint Int. Computer Conf. (JICC 2004), 4-6 Nov 2004, Kunming, Yunan, PRC, pp347-351 (Best Paper Award).

  • Kwok LF and Longley D. "Security Modelling for Risk Analysis" Proc. 18th IFIP World Computer Congress, IFIP 2004, 22-27 August 2004, Toulouse, France, pp29-45.

  • Law KH and Kwok LF. "IDS False Alarm Filtering Using KNN Classifier" in (Eds: Lim CH and Yung M) Lecture Notes of Computer Science 3325, (WISA 2004) pp114-121, Springer-Verlag 2004.

  • Yu Z, Ip H H S and Kwok L F, "A robust watermarking scheme for 3D triangular mesh model", Pattern Recognition, Vol. 36 (11), November 2003, pp2603-2614.

  • Chan M T and Kwok L F, "Integrating Security Design into the Software Development Process for E-Commerce Systems", Information Management and Computer Security, Vol. 9, No. 3, 2001, pp112-122.

  • Anderson A, Kwok L F and Longley D, "Workbench for Security Officers", Encyclopaedia of Telecommunications (Ed:Froehlich), Vol. 18, 1999, pp.211-221.

  • Kwok L F and Longley D, "Information Security Management and Modelling", Information Management and Computer Security, Vol. 7, No. 1, 1999, pp.30-39

  • Kwok L F, "A Hypertext Information Security Model for Organisations", Information Management and Computer Security, Vol. 5, No. 4, 1997, pp.138-148.
  • Kwok L F and Longley D, "A Security Officers;Workbench", Computers and Security, Vol.15, No. 8, 1996, pp. 695-705.