Skip to main content

Research Repository

Advanced Search

Outputs (7)

A Multi-attributes-based Trust Model of Internet of Vehicle (2019)
Presentation / Conference Contribution
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019). A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security (706-713). https://doi.org/10.1007/978-3-030-36938-5_45

Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establish a trustworthy mechanism. Through transmission and dissemination of trust,... Read More about A Multi-attributes-based Trust Model of Internet of Vehicle.

Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node (2019)
Presentation / Conference Contribution
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2019, August). Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node. Presented at 2019 IEEE International Conference on Smart Internet of Things, Tianjin, China

In Wireless Sensor Networks (WSNs) the use of Mobile Sink Nodes (MSNs) has been proposed in order to negate the ”hotspot” issue. This where nodes closest to the sink node shall run out of energy fastest, affecting network lifetime. However, in using... Read More about Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node.

Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme (2019)
Presentation / Conference Contribution
Babaagba, K. O., Tan, Z., & Hart, E. (2019, November). Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme. Presented at The 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2019), Guangzhou, China

The ability to detect metamorphic malware has generated significant research interest over recent years, particularly given its proliferation on mobile devices. Such malware is particularly hard to detect via signature-based intrusion detection syste... Read More about Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme.

Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method (2019)
Presentation / Conference Contribution
Ou, W., Deng, M., Luo, E., Shi, W., Tan, Z., & Bhuiyan, M. (2019, July). Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method. Presented at The 2019 IEEE International Conference on Cyber Physical and Social Computing (CPSCom-2019), Atlanta, USA

Proof of Work (PoW) is used to provide a consensus mechanism for Bitcoin. In this mechanism, the process of generating a new block in the blockchain is referred to as mining. Such process is intentionally designed to be resource-intensive and time co... Read More about Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method.

A 3D Smooth Random Walk Mobility Model for FANETs (2019)
Presentation / Conference Contribution
Lin, N., Gao, F., Zhao, L., Al-Dubai, A., & Tan, Z. (2019, August). A 3D Smooth Random Walk Mobility Model for FANETs. Presented at The 21 IEEE High Performance Computing and Communications (HPCC), Zhangjiajie, Hunan, China

The number of Unmanned Aerial Vehicles (UAVs) applications has increased over the past few years. Among all scenarios, UAV group consisting multi-UAVs is normally used to provide extensible communications. As a networking solution, Flying Ad Hoc Netw... Read More about A 3D Smooth Random Walk Mobility Model for FANETs.

A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking (2019)
Presentation / Conference Contribution
Zhao, L., Liu, Y., Al-Dubai, A., Tan, Z., Min, G., & Xu, L. (2019). A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking. . https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00082

With the rapid development of mobile applications, networking technologies have been constantly evolved to offer a more convenient way of sharing information and online-communication anytime and anywhere. Vehicular networks have the potential to beco... Read More about A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking.

Reviving legacy enterprise systems with microservice-based architecture within cloud environments (2019)
Presentation / Conference Contribution
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019). Reviving legacy enterprise systems with microservice-based architecture within cloud environments. In Computer Science Conference Proceedings. https://doi.org/10.5121/csit.2019.90713

Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most effective means to re-architect legacy enterprise systems and to reengineer th... Read More about Reviving legacy enterprise systems with microservice-based architecture within cloud environments.