scispace - formally typeset
Search or ask a question
Author

Zhixiong Chen

Other affiliations: University of Pittsburgh
Bio: Zhixiong Chen is an academic researcher from Mercy College. The author has contributed to research in topics: Cloud computing & The Internet. The author has an hindex of 9, co-authored 26 publications receiving 257 citations. Previous affiliations of Zhixiong Chen include University of Pittsburgh.

Papers
More filters
Proceedings Article•DOI•
Zhixiong Chen1, John Yoon1•
05 Jul 2010
TL;DR: The approach is to establish a general framework using checklists by following data flow and its lifecycle by making checklists based on the cloud deployment models and cloud services models.
Abstract: In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through IT auditing. Our approach is to establish a general framework using checklists by following data flow and its lifecycle. The checklists are made based on the cloud deployment models and cloud services models. The contribution of the paper is to understand the implication of cloud computing and what is meant secure cloud computing via IT auditing rather than propose a new methodology and new technology to secure cloud computing. Our holistic approach has strategic value to those who are using or consider using cloud computing because it addresses concerns such as security, privacy and regulations and compliance.

51 citations

Journal Article•DOI•
TL;DR: In this paper, the authors analyse the Fisher equation via the expanded Painleve analysis approach and obtain its singular property, auto-Backlund transformation and analytic solutions including some interesting heteroclinic and homocallinic solutions.
Abstract: The authors analyse the Fisher equation via the expanded Painleve analysis approach. They obtain its singular property, auto-Backlund transformation and analytic solutions including some interesting heteroclinic and homoclinic solutions.

41 citations

Journal Article•DOI•
TL;DR: In this paper, a model of chemical reactions that undergo subcritical Hopf bifurcations and have a regime of bistability is shown to exhibit some interesting behavior when diffusively coupled.
Abstract: Models of chemical reactions that undergo subcritical Hopf bifurcations and have a regime of bistability are shown to exhibit some interesting behavior when diffusively coupled. Waves joining a stable steady state to a periodic wavetrain are constructed for low and high thresholds. For intermediate thresholds, localized oscillatory regions are found. These can interact at a distance and behave like weakly coupled oscillators. These patterns are found in both solvable and realistic models for chemical oscillations.

37 citations

Journal Article•
Zhixiong Chen1, Delia I. S. Marx1•
TL;DR: Students who have gone through the introduction of Java concepts and syntax using the JDK directly for several weeks at first and then gradually present IDE features using Eclipse for Java for the rest of the course sequence were able to learn language syntax and problem solving skills in addition to understanding the value of an IDE.
Abstract: This paper reports our experiences using Eclipse for Java in our two-semester Java programming course sequence. Eclipse for Java is a fully featured professional Integrated Development Environment (IDE) with many advanced features. These features may overwhelm some of our students, especially those who have no programming background. In order to balance the use of an IDE that connects potential programmers with a professional community and our students' learning needs, we have conducted various experiments for the last two years. We found that for teaching-oriented colleges like ours, one effective way to reach that balance is to introduce Java concepts and syntax using the JDK directly for several weeks at first and then gradually present IDE features using Eclipse for Java for the rest of the course sequence. Students who have gone through this process were able to learn language syntax and problem solving skills in addition to understanding the value of an IDE, giving them a level of confidence and excitement for using a professional development tool.

34 citations

Proceedings Article•DOI•
15 Apr 2007
TL;DR: This paper uses Fuzzy Logic to achieve adaptive flow clustering, which reacts to the abrupt changes of flow numbers caused by flooding attack or any other attacks, and suggests a best clustering level.
Abstract: Flow level measurements are used to provide insights into the traffic flow crossing a network link. However, existing flow based network detection devices lack adaptive reconfigure functions when facing large number of flow sources such as spoofed attacks. The cache memory for storing flow records and the CPU for processing and/or exporting them could be increasing dramatically beyond what are available. The static sampling technique could not alleviate the issue totally. Instead it missed the ability to log accurately network traffic information. In this paper, we use Fuzzy Logic to achieve adaptive flow clustering. It reacts to the abrupt changes of flow numbers caused by flooding attack or any other attacks, and suggests a best clustering level. Therefore, large amount of flows are aggregated into a few flows in a real time. Our experiments demonstrate that the adaptive flow clustering prevents huge amount of malicious flows from exhausting memories and CPU resources while guarantees the legitimate flows.

11 citations


Cited by
More filters
Journal Article•DOI•
TL;DR: Models of neural networks are developed from a biological point of view and small networks are analysed using techniques from dynamical systems.
Abstract: Models of neural networks are developed from a biological point of view. Small networks are analysed using techniques from dynamical systems. The behaviour of spatially and temporally organized neural fields is then discussed from the point of view of pattern formation. Bifurcation methods, analytic solutions and perturbation methods are applied to these models.

668 citations

Journal Article•DOI•
TL;DR: The paper provides a classification of attacks and defense techniques and shows how flow-based techniques can be used to detect scans, worms, Botnets and (DoS) attacks.
Abstract: Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the contents of every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches, such as flow-based intrusion detection. In that approach the flow of data through the network is analyzed, instead of the contents of each individual packet. The goal of this paper is to provide a survey of current research in the area of flow-based intrusion detection. The survey starts with a motivation why flow-based intrusion detection is needed. The concept of flows is explained, and relevant standards are identified. The paper provides a classification of attacks and defense techniques and shows how flow-based techniques can be used to detect scans, worms, Botnets and (DoS) attacks.

453 citations

Journal Article•DOI•
TL;DR: In this article, a catalogue of symmetry reductions for the nonlinear heat equation is given, including new reductions for linear heat equation and exact solutions of exact solutions for cubic heat equation for cubic f (u) in terms of the roots of f(u) = 0.
Abstract: Classical and nonclassical symmetries of the nonlinear heat equation ut = uxx + f (u) are considered. The method of differential Grobner bases is used both to find the conditions on f (u) under which symmetries other than the trivial spatial and temporal translational symmetries exist, and to solve the determining equations for the infinitesimals. A catalogue of symmetry reductions is given including some new reductions for the linear heat equation and a catalogue of exact solutions of the nonlinear heat equation for cubic f (u) in terms of the roots of f (u) = 0.

296 citations