Hannan Xiao

Orcid: 0000-0003-2273-6679

According to our database1, Hannan Xiao authored at least 60 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Personalised Feedback Framework for Online Education Programmes Using Generative AI.
CoRR, 2024

Analysis of Student Preference to Group Work Assessment in Cybersecurity Courses.
Proceedings of the 2nd International Workshop on CyberSecurity Education for Industry and Academia (CSE4IA 2024) co-located with the 17th International Conference on Advanced Visual Interfaces (AVI 2024), 2024

CyberSecurity Education for Industry and Academia (CSE4IA 2024).
Proceedings of the 2024 International Conference on Advanced Visual Interfaces, 2024

2023
New Algorithms for the Detection of Malicious Traffic in 5G-MEC.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Inclusive Group Work Assessment for Cybersecurity.
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 2, 2023

2022
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks.
Sensors, 2022

Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain.
Comput. Networks, 2022

Edge security for SIP-enabled IoT devices with P4.
Comput. Networks, 2022

Developing a Testbed with P4 to Generate Datasets for the Analysis of 5G-MEC Security.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

2021
SEVA: A Smart Electronic Voting Application Using Blockchain Technology.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
A Smart Game for Data Transmission and Energy Consumption in the Internet of Things.
IEEE Internet Things J., 2020

2019
A Dynamic Profile Questions Approach to Mitigate Impersonation in Online Examinations.
J. Grid Comput., 2019

A study into the usability and security implications of text and image based challenge questions in the context of online examination.
Educ. Inf. Technol., 2019

Distributed SIP DDoS Defense with P4.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

SIPchain: SIP Defense Cluster With Blockchain.
Proceedings of the 2019 Principles, Systems and Applications of IP Telecommunications, 2019

Quantum Based Networks: Analysis of Quantum Teleportation Protocol and Entanglement Swapping (Workshop Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

Evaluation of Underlying Switching Mechanism for Future Networks with P4 and SDN (Workshop Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
A Multi-factor Authentication Method for Security of Online Examinations.
Proceedings of the Smart Grid and Internet of Things - Second EAI International Conference, 2018

Telephony Denial of Service defense at data plane (TDoSD@DP).
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Threat Analysis of Software Agents in Online Banking and Payments.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2016
BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks.
IEEE J. Biomed. Health Informatics, 2016

Comparison of cinepak, intel, microsoft video and indeo codec for video compression.
CoRR, 2016

Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
A Dynamic Reputation Management System for Mobile Ad Hoc Networks.
Comput., 2015

Guarantor and reputation based trust model for Social Internet of Things.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Analysis of DoS attacks at MAC Layer in mobile adhoc networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Resilient Tit-For-Tat (RTFT) A game solution for wireless misbehaviour.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A Survey of Access Control Models in Wireless Sensor Networks.
J. Sens. Actuator Networks, 2014

Evaluating security and usability of profile based challenge questions authentication in online examinations.
J. Internet Serv. Appl., 2014

Three Dimensional Wireless Ad Hoc and Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Energy consumption in Mobile Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Graphical and text based challenge questions for secure and usable authentication in online examinations.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Privacy and usability of image and text based challenge questions authentication in online examination.
Proceedings of the 2014 International Conference on Education Technologies and Computers, 2014

An evaluation of break-the-glass access control model for medical data in wireless sensor networks.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

2013
An adaptive access control model for medical data in Wireless Sensor Networks.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

2012
An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks.
Proceedings of the Q2SWinet'12, 2012

Trustworthiness and authentication in ubiquitous computing.
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012

Usability of profile based student authentication and traffic light system in online examinations.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2010
Modelling and Analysis of TCP Performance in Wireless Multihop Networks.
Wirel. Sens. Netw., 2010

Snoop behaviour in multihop wireless networks.
Proceedings of the 5th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, 2010

2009
Bluetooth-Based Sensor Networks for Remotely Monitoring the Physiological Signals of a Patient.
IEEE Trans. Inf. Technol. Biomed., 2009

Trust*: Using Local Guarantees to Extend the Reach of Trust.
Proceedings of the Security Protocols XVII, 2009

Multimodal security enforcement framework for wireless ad hoc networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Extending Trust in Peer-to-Peer Networks.
Proceedings of the Advances in Databases and Information Systems, 2009

2008
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Hierarchical Trustworthy Authentication for Pervasive Computing.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Evaluation of Auditory and Visual Feedback on Task Performance in a Virtual Assembly Environment.
Presence Teleoperators Virtual Environ., 2006

Can Multi-sensory Feedback Improve the Usability of the Virtual Assembly Environment?
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

Improving the Usability of a Virtual Assembly Environment with the Integration of Multi-sensory Feedback.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006

2005
The Use of Visual and Auditory Feedback for Assembly Task Performance in a Virtual Environment.
Proceedings of the 9th International Conference on Information Visualisation, 2005

Theoretical analysis of TCP throughput in adhoc wireless networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2003
Relative service differentiation for mobile ad hoc networks.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Adaptive ingress admission control for differentiated services.
Proceedings of the 11th IEEE International Conference on Networks, 2003

2001
A quantitative analysis of TCP performance over wireless multihop networks.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

On service prioritization in mobile ad-hoc networks.
Proceedings of the IEEE International Conference on Communications, 2001


  Loading...