Skip to main content

Research Repository

Advanced Search

Password Pattern and Vulnerability Analysis for Web and Mobile Applications (2016)
Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006

Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy a... Read More about Password Pattern and Vulnerability Analysis for Web and Mobile Applications.

Constructing more informative plant–pollinator networks: visitation and pollen deposition networks in a heathland plant community (2015)
Journal Article
Ballantyne, G., Baldock, K. C. R., & Willmer, P. G. (2015). Constructing more informative plant–pollinator networks: visitation and pollen deposition networks in a heathland plant community. Proceedings of the Royal Society B: Biological Sciences, 282(1814), Article 20151130. https://doi.org/10.1098/rspb.2015.1130

Interaction networks are widely used as tools to understand plant–pollinator communities, and to examine potential threats to plant diversity and food security if the ecosystem service provided by pollinating animals declines. However, most networks... Read More about Constructing more informative plant–pollinator networks: visitation and pollen deposition networks in a heathland plant community.

Information literacy in Scotland: making it mainstream. (2015)
Journal Article
Crawford, J., Irving, C., & Smith, L. (2015). Information literacy in Scotland: making it mainstream. CILIP Update, 41-43

How the Right Information an online community of practice, is bringing together information professionals and representatives from other professions to promote information literacy as a national policy issue in Scotland.

Improving cloud network security using the Tree-Rule firewall (2013)
Journal Article
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024

This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., Listed-Rule firewalls) have their limita... Read More about Improving cloud network security using the Tree-Rule firewall.

A new analytical model for multi-hop cognitive radio networks (2012)
Journal Article
Wu, Y., Min, G., & Al-Dubai, A. (2012). A new analytical model for multi-hop cognitive radio networks. IEEE Transactions on Wireless Communications, 11, 1643-1648. https://doi.org/10.1109/TWC.2012.030812.111106

The cognitive radio (CR) is an emerging technique for increasing the utilisation of communication resources by allowing the unlicensed users to employ the under-utilised spectrum. In this paper, a new analytical performance model is developed to eval... Read More about A new analytical model for multi-hop cognitive radio networks.

RePIDS: A multi tier Real-time Payload-based Intrusion Detection System (2012)
Journal Article
Jamdagni, A., Tan, Z., He, X., Nanda, P., & Liu, R. P. (2013). RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Computer Networks, 57(3), 811-824. https://doi.org/10.1016/j.comnet.2012.10.002

Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of existing systems lack the ability to process data for real-time anomaly detec... Read More about RePIDS: A multi tier Real-time Payload-based Intrusion Detection System.

A new dynamic counter-based broadcasting scheme for mobile ad hoc networks. (2011)
Journal Article
Yassein, M. B., Nimer, S. F., & Al-Dubai, A. (2011). A new dynamic counter-based broadcasting scheme for mobile ad hoc networks. Simulation Modelling Practice and Theory, 19, 553-563. https://doi.org/10.1016/j.simpat.2010.08.011

Broadcasting is an essential operation in Mobile Ad hoc Networks (MANETs) to transmit a message (data packet) from the sender to the rest of the network nodes. Although flooding is the simplest mechanism for broadcasting, where each node retransmits... Read More about A new dynamic counter-based broadcasting scheme for mobile ad hoc networks..

Deadline-Driven Auctions for NPC Host Allocation on P2P MMOGs. (2010)
Journal Article
Fan, L., Trinder, P., & Taylor, H. (2010). Deadline-Driven Auctions for NPC Host Allocation on P2P MMOGs. International Journal of Advanced Media and Communication, 4, 140-153. https://doi.org/10.1504/IJAMC.2010.032140

We present the design, implementation and evaluation of Deadline-Driven Auctions (DDAs), a novel task-mapping infrastructure for heterogeneous distributed environments. DDA is primarily designed for hosting Non-Player Characters (NPCs) in P2P Massive... Read More about Deadline-Driven Auctions for NPC Host Allocation on P2P MMOGs..

Design Issues for Peer-to-Peer Massively Multiplayer Online Games. (2010)
Journal Article
Fan, L., Trinder, P., & Taylor, H. (2010). Design Issues for Peer-to-Peer Massively Multiplayer Online Games. International Journal of Advanced Media and Communication, 4, 108-125. https://doi.org/10.1504/IJAMC.2010.032138

Massively Multiplayer Online Games (MMOGs) are increasing in both popularity and scale, and while classical Client/Server (C/S) architectures convey some benefits, they suffer from significant technical and commercial drawbacks. This realisation has... Read More about Design Issues for Peer-to-Peer Massively Multiplayer Online Games..

Modelling infection spread using location tracking. (2010)
Journal Article
Mason, A. M., Dingle, N. J., Knottenbelt, W. J., Bell, D., Buchanan, W. J., & Thuemmler, C. (2010). Modelling infection spread using location tracking. International Journal of Healthcare Technology and Management, 11, 442-461. https://doi.org/10.1504/IJHTM.2010.036925

The precision of location tracking technology has improved greatly over the last few decades. We aim to show that by tracking the locations of individuals in a closed environment, it is now possible to record the nature and frequency of interactions... Read More about Modelling infection spread using location tracking..

An efficient neighbourhood load routing metric for wireless mesh networks (2010)
Journal Article
Zhao, L., Al-Dubai, A., & Min, G. (2011). An efficient neighbourhood load routing metric for wireless mesh networks. Simulation Modelling Practice and Theory, 19, 1415-1426. https://doi.org/10.1016/j.simpat.2010.10.009

The Wireless Mesh Network (WMN) is a highly capable technology that can offer low-cost and easy-deployable network connectivity to both small-size community networks and large-scale metropolitan networks. As a key emerging technology to provide the n... Read More about An efficient neighbourhood load routing metric for wireless mesh networks.

GLBM: A new QoS aware multicast scheme for wireless Mesh network (2010)
Journal Article
Zhao, L., Al-Dubai, A., & Min, G. (2010). GLBM: A new QoS aware multicast scheme for wireless Mesh network. Journal of Systems and Software, 83, 1318-1326. https://doi.org/10.1016/j.jss.2010.01.044

Wireless mesh networks (WMNs) have been attracting significant attention due to their promising technology. The WMN technology is becoming a major avenue for the fourth generation of wireless mobility. Communication in large-scale wireless networks c... Read More about GLBM: A new QoS aware multicast scheme for wireless Mesh network.

Tradeoffs between latency, complexity and load balancing with multicast algorithms (2010)
Journal Article
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2010). Tradeoffs between latency, complexity and load balancing with multicast algorithms. IEEE Transactions on Computers, 59, 159-173. https://doi.org/10.1109/TC.2009.104

The increasing number of collective communication-based services with a mass interest and the parallel increasing demand for service quality are paving the way toward end-to-end QoS guarantees. Although many multicast algorithms in interconnection ne... Read More about Tradeoffs between latency, complexity and load balancing with multicast algorithms.

Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks (2009)
Journal Article
Min, G., Wu, Y., Li, K., & Al-Dubai, A. (2009). Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks. International Journal of Communication Systems, 23, 1111-1126. https://doi.org/10.1002/dac.1074

The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points (APs). Wireless mesh networks (WMNs) have emerged as a promising technology in the next gene... Read More about Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks.

Critical analysis and error determination of locating-finding techniques in GSM. (2005)
Journal Article
Buchanan, W. J., Raja, A., & Munoz, J. (2005). Critical analysis and error determination of locating-finding techniques in GSM. International Journal of Mobile Communications, 3, 165-182. https://doi.org/10.1504/IJMC.2005.005905

GPS is a well-established technique for location-finding, but mobile phone-based methods are generally less expensive to implement, and can give reasonable accuracies. These techniques can thus be useful to network operators in providing services bas... Read More about Critical analysis and error determination of locating-finding techniques in GSM..

Excluding inclusions [PCB inspection] (1999)
Journal Article
Scott, A. V., & Buchanan, W. J. (1999). Excluding inclusions [PCB inspection]. Manufacturing Engineer, 78(4), 154-156. https://doi.org/10.1049/me%3A19990403

The authors look at the causes of a persistent annoyance for manufacturers of printed circuit boards, and suggest some steps that would help to speed inspection and reduce both genuine faults and false rejects from the visual inspection system. This... Read More about Excluding inclusions [PCB inspection].