Site Maintenance will take place from 4:00 PM on 2024-04-29 to 9:00 AM on 2024-05-01.
Please do not make any content change during this time, otherwise all the changes will be lost.

Select Publications

Book Chapters

Yin X; Zhu Y, 2021, '3D Fingerprint', in Encyclopedia of Cryptography, Security and Privacy, Springer, Berlin, Heidelberg, http://dx.doi.org/10.1007/978-3-642-27739-9_1513-1

Moustafa N; Hu J, 2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271, http://dx.doi.org/10.1007/978-3-319-78262-1_119

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1

Wang M; Abbass H; Hu J, 2018, 'EEG-based biometrics for person identification and continuous authentication', in Information Security Foundations Technologies and Applications, IET, http://dx.doi.org/10.1049/PBSE001E_ch13

Tran QN; Wang S; Ou R; Hu J, 2017, 'Double-layer secret-sharing system involving privacy preserving biometric authentication', in User-Centric Privacy and Security in Biometrics, pp. 153 - 170, http://dx.doi.org/10.1049/PBSE004E_ch7

Ahmed M; Mahmood AN, 2014, 'Outlier Detection', in Pathan A-SK (ed.), The State of the Art in Intrusion Prevention and Detection, edn. First, CRC Press, Boca Raton, Fl., USA, pp. 3 - 22, http://dx.doi.org/10.1201/b16390-3

Fei H; Jing Q; Huawei Z; Jiankun H, 2012, 'A General Transformation from KP-ABE to Searchable Encryption', in Cyberspace Safety and Security, Springer Berlin Heidelberg, pp. 165 - 178, http://dx.doi.org/10.1007/978-3-642-35362-8_14

Han F; Hu J; Kotagiri R, 2011, 'Biometric authentication for mobile computing applications', in Advanced Topics in Biometrics, pp. 461 - 481, http://dx.doi.org/10.1142/9789814287852_0019

Xi K; Hu J, 2010, 'Bio-Cryptography', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 129 - 157, http://dx.doi.org/10.1007/978-3-642-04117-4_7

Hu J, 2010, 'Host-Based Anomaly Intrusion Detection', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 235 - 255, http://dx.doi.org/10.1007/978-3-642-04117-4_13

Pabla I; Khalil I; Hu J, 2010, 'Intranet Security via Firewalls', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 207 - 219, http://dx.doi.org/10.1007/978-3-642-04117-4_11

Mahmood AN; Leckie C; Hu J; Tari Z; Atiquzzaman M, 2010, 'Network Traffic Analysis and SCADA Security', in Stavroulakis P; Stamp M (ed.), HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, SPRINGER, pp. 383 - 405, http://dx.doi.org/10.1007/978-3-642-04117-4_20

Sufi F; Khalil I; Hu J, 2010, 'ECG-Based Authentication', in Handbook of Information and Communication Security, Springer Berlin Heidelberg, pp. 309 - 331, http://dx.doi.org/10.1007/978-3-642-04117-4_17

Hu J; Bertok P; Tari Z, 2008, 'CHAPTER 6 Taxonomy and Framework for Integrating Dependability and Security11This work is supported by ARC Linkage Projects LP0455324, LP0455234 and LP0667600. For further information, please email the authors at: jiankun@cs.rmit.edu.au, pbertok@cs.rmit.edu.au, zahirt@cs.rmit.edu.au.', in Information Assurance, Elsevier, pp. 149 - 170, http://dx.doi.org/10.1016/b978-012373566-9.50008-2

Hu J; Bertok P; Hamilton M; White G; Duff A; Cutts Q, 2006, 'Wireless interactive teaching by using keypad-based ARS', in Audience Response Systems in Higher Education: Applications and Cases, pp. 209 - 221, http://dx.doi.org/10.4018/978-1-59140-947-2.ch014


Back to profile page