Ashley Chonka
Ashley Chonka
I.T Security Researcher and Developer
Verified email at - Homepage
Cited by
Cited by
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
A Chonka, Y Xiang, W Zhou, A Bonti
Journal of Network and Computer Applications 34 (4), 1097-1107, 2011
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010
Chaos theory based detection against network mimicking DDoS attacks
A Chonka, J Singh, W Zhou
IEEE Communications Letters 13 (9), 717-719, 2009
Intelligent energy management control of vehicle air conditioning via look-ahead system
H Khayyam, S Nahavandi, E Hu, A Kouzani, A Chonka, J Abawajy, ...
Applied thermal engineering 31 (16), 3147-3160, 2011
Detecting and mitigating HX-DoS attacks against cloud web services
A Chonka, J Abawajy
2012 15th International Conference on Network-Based Information Systems, 429-434, 2012
Defending grid web services from xdos attacks by sota
A Chonka, W Zhou, Y Xiang
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
Detecting and tracing DDoS attacks by intelligent decision prototype
A Chonka, W Zhou, J Singh, Y Xiang
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
Protecting web services with service oriented traceback architecture
A Chonka, W Zhou, Y Xiang
2008 8th IEEE International Conference on Computer and Information …, 2008
Protecting information systems from ddos attack using multicore methodology
A Chonka, W Zhou, K Knapp, Y Xiang
2008 IEEE 8th International Conference on Computer and Information …, 2008
Multi-core defense system (MSDS) for protecting computer infrastructure against DDoS attacks
A Chonka, SK Chong, W Zhou, Y Xiang
2008 Ninth International Conference on Parallel and Distributed Computing …, 2008
Assessing the level of IT security culture improvement: Results from three Australian SMEs
L Ngo, W Zhou, A Chonka, J Singh
2009 35th Annual Conference of IEEE Industrial Electronics, 3189-3195, 2009
Multi-classifier classification of spam email on a ubiquitous multi-core architecture
R Islam, J Singh, A Chonka, W Zhou
2008 IFIP International Conference on Network and Parallel Computing, 210-217, 2008
Ubiquitous multicore (UM) methodology for multimedia
A Chonka, W Zhou, L Ngo, Y Xiang
International Symposium on Computer Science and its Applications, 131-136, 2008
Protecting web services from DDoS attacks by SOTA
A Chonka, W Zhou, Y Xiang
Deakin University, 2008
X. Protecting Cloud Web Services from HX-DoS attacks using Decision Theory
AX Chonka, Y Zhou, W Huang
IEEE conference on communications: advanced internet and cloud, 85-91, 2012
E-Learning Over Mobile Phone Technology: Best Practices and Guidelines.
F Khaddage, A Chonka, W Zhou
Int. J. Interact. Mob. Technol. 3 (3), 55-58, 2009
Anomaly Detection of Distributed Denial of Service Attacks by Non-Liner Dynamics
A Chonka, J Singh, W Zhou
IEEE Communications letters 13 (9), 717-719, 2009
Image indexing for learning content via a mobile phone
F Khaddage, A Chonka, W Zhou
Global Learn, 187-194, 2010
POEM, A 3-dimensional exon taxonomy and patterns in untranslated exons
K Knapp, A Chonka, YPP Chen
BMC genomics 9, 1-11, 2008
Adjacency cache: fast web cache indexing and lookup
J Casey, A Chonka, W Zhou
6th IEEE/ACIS international conference on computer and information science …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20