Skip to main content

Research Repository

Advanced Search

E-Health: chances and challenges of distributed, service oriented architectures (2012)
Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012). E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,

Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remain affordable for governments and individuals. Mobile technology and cloud c... Read More about E-Health: chances and challenges of distributed, service oriented architectures.

Novel tracking of rogue network packets using danger theory approach (2012)
Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012). Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286

Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disrupt computer networks and gain access to private confidential data. A typica... Read More about Novel tracking of rogue network packets using danger theory approach.