Skip to main content

Research Repository

Advanced Search

Outputs (239)

A reliable route repairing scheme for internet of vehicles (2019)
Journal Article
Banikhalaf, M., Manasrah, A. M., AlEroud, A. F., Hamadneh, N., Qawasmeh, A., & Al-Dubai, A. Y. (2019). A reliable route repairing scheme for internet of vehicles. International Journal of Computer Applications in Technology, 61(3), https://doi.org/10.1504/IJCAT.2019.102847

Recently, Internet of Vehicles (IoVs) has been recognised as a key solution for vehicular communications. Connected vehicles and infrastructure' roadside units have been shaping the underlying architecture of IoVs technology, where the conventional r... Read More about A reliable route repairing scheme for internet of vehicles.

A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications (2019)
Journal Article
Almalkawi, I. T., Halloush, R., Alsarhan, A., Al-Dubai, A., & Al-karaki, J. N. (2019). A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications. Journal of Information Security and Applications, 49, https://doi.org/10.1016/j.jisa.2019.102384

Due to limited processing capabilities and other constraints of most wireless networks, many existing security algorithms do not consider the network efficiency. This is because most of these security solutions exhibit intolerable overhead and consid... Read More about A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications.

An AI approach to Collecting and Analyzing Human Interactions with Urban Environments (2019)
Journal Article
Ferrara, E., Fragale, L., Fortino, G., Song, W., Perra, C., di Mauro, M., & Liotta, A. (2019). An AI approach to Collecting and Analyzing Human Interactions with Urban Environments. IEEE Access, 7, 141476-141486. https://doi.org/10.1109/access.2019.2943845

Thanks to advances in Internet of Things and crowd-sensing, it is possible to collect vast amounts of urban data, to better understand how citizens interact with cities and, in turn, improve human well-being in urban environments. This is a scientifi... Read More about An AI approach to Collecting and Analyzing Human Interactions with Urban Environments.

Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach (2019)
Journal Article
Di Mauro, M., & Liotta, A. (2019). Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach. IEEE Transactions on Network and Service Management, 16(4), 1493-1506. https://doi.org/10.1109/tnsm.2019.2943776

The Next Generation 5G Networks can greatly benefit from the synergy between virtualization paradigms, such as the Network Function Virtualization (NFV), and service provisioning platforms such as the IP Multimedia Subsystem (IMS). The NFV concept is... Read More about Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach.

Outlier Detection of Time Series with A Novel Hybrid Method in Cloud Computing (2019)
Journal Article
Liu, Q., Wang, Z., Liu, X., & Linge, N. (2019). Outlier Detection of Time Series with A Novel Hybrid Method in Cloud Computing. International Journal of High Performance Computing and Networking, 14(4), 435-443. https://doi.org/10.1504/IJHPCN.2019.102350

In the wake of the development in science and technology, Cloud Computing has obtained more attention in different field. Meanwhile, outlier detection for data mining in Cloud Computing is playing more and more significant role in different research... Read More about Outlier Detection of Time Series with A Novel Hybrid Method in Cloud Computing.

DNA key based visual chaotic image encryption (2019)
Journal Article
Khan, J. S., Ahmad, J., Ahmed, S. S., Siddiqa, H. A., Abbasi, S. F., & Kayhan, S. K. (2019). DNA key based visual chaotic image encryption. Journal of Intelligent and Fuzzy Systems, 37(2), 2549-2561. https://doi.org/10.3233/jifs-182778

With the exponential growth of Internet technologies, digital information exchanged over the Internet is also significantly increased. In order to ensure the security of multimedia contents over the open natured Internet, data should be encrypted. In... Read More about DNA key based visual chaotic image encryption.

Style-Neutralized Pattern Classification Based on Adversarially Trained Upgraded U-Net (2019)
Journal Article
Jiang, H., Huang, K., Zhang, R., & Hussain, A. (2021). Style-Neutralized Pattern Classification Based on Adversarially Trained Upgraded U-Net. Cognitive Computation, 13(4), 845-858. https://doi.org/10.1007/s12559-019-09660-0

Traditional machine learning approaches usually hold the assumption that data for model training and in real applications are created following the identical and independent distribution (i.i.d.). However, several relevant research topics have demons... Read More about Style-Neutralized Pattern Classification Based on Adversarially Trained Upgraded U-Net.

Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems (2019)
Book Chapter
Maglaras, L., Janicke, H., Jiang, J., & Crampton, A. (2019). Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems. In Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications (299-318). IGI Global. https://doi.org/10.4018/978-1-5225-9866-4.ch017

SCADA (Supervisory Control and Data Acquisition) systems are a critical part of modern national critical infrastructure (CI) systems. Due to the rapid increase of sophisticated cyber threats with exponentially destructive effects, intrusion detection... Read More about Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems.