Joseph Spring
YOU?
Author Swipe
View article: Bijective Network-to-Image Encoding for Interpretable CNN-Based Intrusion Detection System
Bijective Network-to-Image Encoding for Interpretable CNN-Based Intrusion Detection System Open
As 5G and beyond networks grow in heterogeneity, complexity, and scale, traditional Intrusion Detection Systems (IDS) struggle to maintain accurate and precise detection mechanisms. A promising alternative approach to this problem has invo…
View article: CiNeT: A Comparative Study of a CNN-Based Intrusion Detection System with TensorFlow and PyTorch for 5G and Beyond
CiNeT: A Comparative Study of a CNN-Based Intrusion Detection System with TensorFlow and PyTorch for 5G and Beyond Open
As 5G and beyond networks grow in heterogeneity, complexity, and scale, traditional Intrusion Detection Systems (IDS) struggle to maintain accurate and precise detection. Deep Learning (DL) provides a promising alternative detection method…
View article: CiNeT: A Comparative Study of a CNN-Based Intrusion Detection System with TensorFlow and PyTorch for 5G and Beyond
CiNeT: A Comparative Study of a CNN-Based Intrusion Detection System with TensorFlow and PyTorch for 5G and Beyond Open
As 5G and beyond networks grow in heterogeneity, complexity, and scale, traditional Intrusion Detection Systems (IDS) struggle to maintain accurate and precise detection. Deep Learning (DL) provides a promising alternative detection method…
View article: A Performance Evaluation for Software Defined Networks with P4
A Performance Evaluation for Software Defined Networks with P4 Open
The exponential growth in the number of devices connected via the internet has led to the need to achieve granular programmability for increased performance, resilience, reduced latency, and jitter. Software Defined Networking (SDN) and Pr…
View article: THE CONTINUING IMPACT OF A PANDEMIC ON LEARNING AND TEACHING IN HIGHER EDUCATION: THE ACADEMICS' PERSPECTIVE
THE CONTINUING IMPACT OF A PANDEMIC ON LEARNING AND TEACHING IN HIGHER EDUCATION: THE ACADEMICS' PERSPECTIVE Open
The Covid-19 pandemic in 2020 led to an unprecedented shift in higher education (HE), forcing institutions to rapidly transition to online delivery due to lockdowns. Since 2022, universities worldwide have largely returned to on-campus tea…
View article: A Performance Evaluation for Software Defined Networks with P4
A Performance Evaluation for Software Defined Networks with P4 Open
Software Defined Networking (SDN) and Programming Protocol-independent Packet Processors (P4) have been attracting attention from both industry and academia as a means of achieving programmability in the network at different layers. The tw…
View article: Embedding Trust in the Media Access Control Protocol for Wireless Networks
Embedding Trust in the Media Access Control Protocol for Wireless Networks Open
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that a…
View article: Inclusive Group Work Assessment for Cybersecurity
Inclusive Group Work Assessment for Cybersecurity Open
This poster presents an ongoing study that takes a diverse and inclusive approach to designing a practical group work assessment for an undergraduate cybersecurity course delivered to third year university cohorts. Students were given the …
View article: Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain
Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain Open
© 2022 Elsevier B.V. All rights reserved. This is the accepted manuscript version of an article which has been published in final form at https://doi.org/10.1016/j.comnet.2022.109267
View article: A Smart Game for Data Transmission and Energy Consumption in the Internet of Things
A Smart Game for Data Transmission and Energy Consumption in the Internet of Things Open
The current trend in developing smart technology for the Internet of Things (IoT) has motivated a lot of research interest in optimizing data transmission or minimizing energy consumption, but with little evidence of proposals for achievin…
View article: Distributed SIP DDoS Defense with P4
Distributed SIP DDoS Defense with P4 Open
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, cre…
View article: A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT
A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT Open
© 2016 IEEE. This is the accepted manuscript version of a conference paper which has been published in final form at https://doi.org/10.1109/TrustCom.2016.0099