default search action
Hannan Xiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c44]Vita Santa Barletta, Federica Caruso, Tania Di Mascio, Francesco Greco, Tasmina Islam, Veronica Rossano, Hannan Xiao:
CyberSecurity Education for Industry and Academia (CSE4IA 2024). AVI 2024: 121:1-121:4 - [c43]Hannan Xiao, Joseph Spring, Ievgeniia Kuzminykh:
Analysis of Student Preference to Group Work Assessment in Cybersecurity Courses. CSE4IA@AVI 2024 - [e2]Vita Santa Barletta, Federica Caruso, Tania Di Mascio, Francesco Greco, Tasmina Islam, Veronica Rossano, Hannan Xiao:
Proceedings of the 2nd International Workshop on CyberSecurity Education for Industry and Academia (CSE4IA 2024) co-located with the 17th International Conference on Advanced Visual Interfaces (AVI 2024), Arenzano (Genoa), Italy, June 4, 2024. CEUR Workshop Proceedings 3700, CEUR-WS.org 2024 [contents] - 2023
- [c42]Hannan Xiao, Joseph Spring, Ievgeniia Kuzminykh, Jacopo Cortellazzi:
Inclusive Group Work Assessment for Cybersecurity. ITiCSE (2) 2023: 652 - [c41]Omesh A. Fernando, Hannan Xiao, Joseph Spring:
New Algorithms for the Detection of Malicious Traffic in 5G-MEC. WCNC 2023: 1-6 - 2022
- [j14]Aldo Febro, Hannan Xiao, Joseph Spring, Bruce Christianson:
Edge security for SIP-enabled IoT devices with P4. Comput. Networks 203: 108698 (2022) - [j13]Aldo Febro, Hannan Xiao, Joseph Spring, Bruce Christianson:
Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain. Comput. Networks 216: 109267 (2022) - [j12]Eric Chiejina, Hannan Xiao, Bruce Christianson, Alexios Mylonas, Chidinma Chiejina:
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks. Sensors 22(2): 571 (2022) - [c40]Omesh A. Fernando, Hannan Xiao, Joseph Spring:
Developing a Testbed with P4 to Generate Datasets for the Analysis of 5G-MEC Security. WCNC 2022: 2256-2261 - 2021
- [c39]Jacob Abegunde, Joseph Spring, Hannan Xiao:
SEVA: A Smart Electronic Voting Application Using Blockchain Technology. Blockchain 2021: 353-360 - 2020
- [j11]Jacob Abegunde, Hannan Xiao, Joseph Spring:
A Smart Game for Data Transmission and Energy Consumption in the Internet of Things. IEEE Internet Things J. 7(1): 528-543 (2020)
2010 – 2019
- 2019
- [j10]Abrar Ullah, Hannan Xiao, Trevor Barker:
A study into the usability and security implications of text and image based challenge questions in the context of online examination. Educ. Inf. Technol. 24(1): 13-39 (2019) - [j9]Abrar Ullah, Hannan Xiao, Trevor Barker:
A Dynamic Profile Questions Approach to Mitigate Impersonation in Online Examinations. J. Grid Comput. 17(2): 209-223 (2019) - [c38]Omesh A. Fernando, Hannan Xiao, Xianhui Che:
Evaluation of Underlying Switching Mechanism for Future Networks with P4 and SDN (Workshop Paper). CollaborateCom 2019: 549-568 - [c37]Preeti Kandwal, William Joseph Spring, Hannan Xiao:
Quantum Based Networks: Analysis of Quantum Teleportation Protocol and Entanglement Swapping (Workshop Paper). CollaborateCom 2019: 569-582 - [c36]Aldo Febro, Hannan Xiao, Joseph Spring:
SIPchain: SIP Defense Cluster With Blockchain. IPTComm 2019: 1-8 - [c35]Aldo Febro, Hannan Xiao, Joseph Spring:
Distributed SIP DDoS Defense with P4. WCNC 2019: 1-8 - 2018
- [c34]Tamsanqa Ngalo, Hannan Xiao, Bruce Christianson, Ying Zhang:
Threat Analysis of Software Agents in Online Banking and Payments. DASC/PiCom/DataCom/CyberSciTech 2018: 716-723 - [c33]Aldo Febro, Hannan Xiao, Joseph Spring:
Telephony Denial of Service defense at data plane (TDoSD@DP). NOMS 2018: 1-6 - [c32]Abrar Ullah, Hannan Xiao, Trevor Barker:
A Multi-factor Authentication Method for Security of Online Examinations. SGIoT 2018: 131-138 - 2016
- [j8]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks. IEEE J. Biomed. Health Informatics 20(3): 763-774 (2016) - [c31]Hannan Xiao, Awatif Ali Alshehri, Bruce Christianson:
A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels. Trustcom/BigDataSE/ISPA 2016: 332-339 - [c30]Jacob Abegunde, Hannan Xiao, Joseph Spring:
A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT. Trustcom/BigDataSE/ISPA 2016: 473-480 - [c29]Chaminda Alocious, Hannan Xiao, Bruce Christianson:
Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks. WCNC 2016: 1-6 - [i1]Suleiman Mustafa, Hannan Xiao:
Comparison of cinepak, intel, microsoft video and indeo codec for video compression. CoRR abs/1601.01408 (2016) - 2015
- [j7]Eric Chiejina, Hannan Xiao, Bruce Christianson:
A Dynamic Reputation Management System for Mobile Ad Hoc Networks. Comput. 4(2): 87-112 (2015) - [c28]Chaminda Alocious, Hannan Xiao, Bruce Christianson, James A. Malcolm:
Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots. CIT/IUCC/DASC/PICom 2015: 1853-1860 - [c27]Abrar Ullah, Hannan Xiao, Trevor Barker:
Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication. HCI (22) 2015: 131-140 - [c26]Hannan Xiao, Nitin Sidhu, Bruce Christianson:
Guarantor and reputation based trust model for Social Internet of Things. IWCMC 2015: 600-605 - [c25]Chaminda Alocious, Hannan Xiao, Bruce Christianson:
Analysis of DoS attacks at MAC Layer in mobile adhoc networks. IWCMC 2015: 811-816 - [c24]Jacob Abegunde, Hannan Xiao, Joseph Spring:
Resilient Tit-For-Tat (RTFT) A game solution for wireless misbehaviour. IWCMC 2015: 904-909 - [e1]Ajith Abraham, Adel M. Alimi, Abdelkrim Haqiq, Dijiang Huang, Dong Seong Kim, Hannan Xiao, Nizar Rokbani, Mohamed Ben Halima, Azah Kamilah Muda, Kun Ma:
11th International Conference on Information Assurance and Security, IAS 2015, Marrakech, Morocco, December 14-16, 2015. IEEE 2015, ISBN 978-1-4673-8715-6 [contents] - 2014
- [j6]Ki-Il Kim, Hannan Xiao, Sana Ullah, Aneel Rahim:
Three Dimensional Wireless Ad Hoc and Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j5]Abrar Ullah, Hannan Xiao, Trevor Barker, Mariana Lilley:
Evaluating security and usability of profile based challenge questions authentication in online examinations. J. Internet Serv. Appl. 5(1): 2:1-2:16 (2014) - [j4]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
A Survey of Access Control Models in Wireless Sensor Networks. J. Sens. Actuator Networks 3(2): 150-180 (2014) - [c23]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
An evaluation of break-the-glass access control model for medical data in wireless sensor networks. Healthcom 2014: 130-135 - [c22]Abrar Ullah, Hannan Xiao, Mariana Lilley, Trevor Barker:
Privacy and usability of image and text based challenge questions authentication in online examination. ICETC 2014: 24-29 - [c21]Abrar Ullah, Hannan Xiao, Trevor Barker, Mariana Lilley:
Graphical and text based challenge questions for secure and usable authentication in online examinations. ICITST 2014: 302-308 - [c20]Hannan Xiao, Dashti M. Ibrahim, Bruce Christianson:
Energy consumption in Mobile Ad Hoc Networks. WCNC 2014: 2599-2604 - 2013
- [c19]Htoo Aung Maw, Hannan Xiao, Bruce Christianson:
An adaptive access control model for medical data in Wireless Sensor Networks. Healthcom 2013: 303-309 - 2012
- [c18]Abrar Ullah, Hannan Xiao, Mariana Lilley, Trevor Barker:
Usability of profile based student authentication and traffic light system in online examinations. ICITST 2012: 220-225 - [c17]Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang:
Trustworthiness and authentication in ubiquitous computing. MOBIWAC 2012: 135-138 - [c16]Htoo Aung Maw, Hannan Xiao, Bruce Christianson:
An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks. Q2SWinet 2012: 81-84 - 2010
- [j3]Hannan Xiao, Ying Zhang, James A. Malcolm, Bruce Christianson, Kee Chaing Chua:
Modelling and Analysis of TCP Performance in Wireless Multihop Networks. Wirel. Sens. Netw. 2(7): 493-503 (2010) - [c15]Prasad Nambiar, Hannan Xiao, James A. Malcolm:
Snoop behaviour in multihop wireless networks. PM2HW2N@MSWiM 2010: 55-62
2000 – 2009
- 2009
- [j2]Ying Zhang, Hannan Xiao:
Bluetooth-Based Sensor Networks for Remotely Monitoring the Physiological Signals of a Patient. IEEE Trans. Inf. Technol. Biomed. 13(6): 1040-1048 (2009) - [c14]Stephen William Clarke, Bruce Christianson, Hannan Xiao:
Extending Trust in Peer-to-Peer Networks. ADBIS (Workshops) 2009: 145-152 - [c13]Lu Yan, Nasser Abouzakhar, Hannan Xiao:
Multimodal security enforcement framework for wireless ad hoc networks. IWCMC 2009: 921-925 - [c12]Stephen William Clarke, Bruce Christianson, Hannan Xiao:
Trust*: Using Local Guarantees to Extend the Reach of Trust. Security Protocols Workshop 2009: 171-178 - 2008
- [c11]Hannan Xiao, Bruce Christianson, Ying Zhang:
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. IAS 2008: 15-20 - 2007
- [c10]Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson:
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. IAS 2007: 50-55 - [c9]Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang:
Hierarchical Trustworthy Authentication for Pervasive Computing. MobiQuitous 2007: 1-3 - 2006
- [j1]Ying Zhang, Terrence Fernando, Hannan Xiao, Adrian R. L. Travis:
Evaluation of Auditory and Visual Feedback on Task Performance in a Virtual Assembly Environment. Presence Teleoperators Virtual Environ. 15(6): 613-626 (2006) - [c8]Ying Zhang, Adrian R. L. Travis, Terrence Fernando, Hannan Xiao:
Improving the Usability of a Virtual Assembly Environment with the Integration of Multi-sensory Feedback. ACIS-ICIS 2006: 444-451 - [c7]Ying Zhang, Adrian R. L. Travis, Hannan Xiao:
Can Multi-sensory Feedback Improve the Usability of the Virtual Assembly Environment? CIT 2006: 132 - 2005
- [c6]Hannan Xiao, Kee Chaing Chua, James A. Malcolm, Ying Zhang:
Theoretical analysis of TCP throughput in adhoc wireless networks. GLOBECOM 2005: 6 - [c5]Ying Zhang, Terrence Fernando, Reza Sotudeh, Hannan Xiao:
The Use of Visual and Auditory Feedback for Assembly Task Performance in a Virtual Environment. IV 2005: 779-784 - 2003
- [c4]Hannan Xiao, Kee Chaing Chua:
Adaptive ingress admission control for differentiated services. ICON 2003: 513-518 - [c3]Kee Chaing Chua, Hannan Xiao, Winston Khoon Guan Seah:
Relative service differentiation for mobile ad hoc networks. WCNC 2003: 1379-1384 - 2001
- [c2]Hannan Xiao, Kee Chaing Chua, Winston Seah, Anthony C. C. Lo:
On service prioritization in mobile ad-hoc networks. ICC 2001: 1900-1904 - [c1]Hannan Xiao, Kee Chaing Chua, Winston Seah, Anthony C. C. Lo:
A quantitative analysis of TCP performance over wireless multihop networks. VTC Fall 2001: 610-614
Coauthor Index
aka: William Joseph Spring
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint