Skip to main content

Research Repository

Advanced Search

Outputs (39)

Practical Intrusion Detection of Emerging Threats (2021)
Journal Article
Mills, R., Marnerides, A. K., Broadbent, M., & Race, N. (2022). Practical Intrusion Detection of Emerging Threats. IEEE Transactions on Network and Service Management, 19(1), 582-600. https://doi.org/10.1109/TNSM.2021.3091517

The Internet of Things (IoT), in combination with advancements in Big Data, communications and networked systems, offers a positive impact across a range of sectors including health, energy, manufacturing and transport. By virtue of current business... Read More about Practical Intrusion Detection of Emerging Threats.

Effectiveness of Vicinity-based Content Finding in Mobile NDN Environments (2021)
Conference Proceeding
Suwannasa, A., Broadbent, M., & Mauthe, A. (2021). Effectiveness of Vicinity-based Content Finding in Mobile NDN Environments. In 2021 International Conference on Information Networking (ICOIN) (343-348). https://doi.org/10.1109/ICOIN50884.2021.9333948

In Named Data Networking (NDN), consumer mobility is supported by letting a consumer re-transmit an Interest packet to re-request a lost content object through a new NDN Access Router (NAR). The object is often replicated at a previous NAR, located c... Read More about Effectiveness of Vicinity-based Content Finding in Mobile NDN Environments.

Llama-Low Latency Adaptive Media Algorithm (2021)
Conference Proceeding
Lyko, T., Broadbent, M., Race, N., Nilsson, M., Farrow, P., & Appleby, S. (2021). Llama-Low Latency Adaptive Media Algorithm. In 2020 IEEE International Symposium on Multimedia (ISM) (113-121). https://doi.org/10.1109/ISM.2020.00027

In the recent years, HTTP Adaptive Bit Rate (ABR) streaming including Dynamic Adaptive Streaming over HTTP (DASH) has become the most popular technology for video streaming over the Internet. The client device requests segments of content using HTTP,... Read More about Llama-Low Latency Adaptive Media Algorithm.

Sdn heading north: Towards a declarative intent-based northbound interface (2020)
Conference Proceeding
Alalmaei, S., Elkhatib, Y., Bezahaf, M., Broadbent, M., & Race, N. (2020). Sdn heading north: Towards a declarative intent-based northbound interface. In 2020 16th International Conference on Network and Service Management (CNSM). https://doi.org/10.23919/CNSM50824.2020.9269118

The Intent-Based Northbound Interface (NBI) offers users the ability to express what they want to achieve instead of how to achieve it, enabling improvements to network management and reducing operational costs. However, development of an Intent-Base... Read More about Sdn heading north: Towards a declarative intent-based northbound interface.

Impact of Content Popularity on Content Finding in NDN: Default NDN vs. Vicinity-based Enhanced NDN (2020)
Conference Proceeding
Suwannasa, A., Broadbent, M., & Mauthe, A. (2020). Impact of Content Popularity on Content Finding in NDN: Default NDN vs. Vicinity-based Enhanced NDN. In 2020 10th International Conference on Information Science and Technology (ICIST) (163-168). https://doi.org/10.1109/ICIST49303.2020.9202215

Named Data Networking allows a consumer to locate a desired content object by its name prefix. By using the best route strategy of the default NDN architecture, an Interest packet is forwarded along a default path indicated by the packet's name to fi... Read More about Impact of Content Popularity on Content Finding in NDN: Default NDN vs. Vicinity-based Enhanced NDN.

From One Edge to the Other: Exploring Gaming's Rising Presence on the Network (2020)
Conference Proceeding
Marsden, M., Hazas, M., & Broadbent, M. (2020). From One Edge to the Other: Exploring Gaming's Rising Presence on the Network. In ICT4S2020: Proceedings of the 7th International Conference on ICT for Sustainability (247-254). https://doi.org/10.1145/3401335.3401366

Audio and video streaming and on-demand services have dramatically changed how, and how much, media is consumed. Streaming generally allows a much larger selection of content, and arguably greater convenience. Gaming is the latest medium to place del... Read More about From One Edge to the Other: Exploring Gaming's Rising Presence on the Network.

Citrus: Orchestrating Security Mechanisms via Adversarial Deception (2020)
Conference Proceeding
Mills, R., Race, N., & Broadbent, M. (2020). Citrus: Orchestrating Security Mechanisms via Adversarial Deception. In NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium. https://doi.org/10.1109/NOMS47738.2020.9110443

Despite the Internet being an apex of human achievement for many years, malicious activity and cyber attacks are becoming more prevalent than ever before. Large scale data collection using threat sources such as honeypots have recently been employed... Read More about Citrus: Orchestrating Security Mechanisms via Adversarial Deception.

Evaluation of cmaf in live streaming scenarios (2020)
Conference Proceeding
Lyko, T., Broadbent, M., Race, N., Nilsson, M., Farrow, P., & Appleby, S. (2020). Evaluation of cmaf in live streaming scenarios. In Proceedings of the 30th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video (21-26). https://doi.org/10.1145/3386290.3396932

HTTP Adaptive Streaming (HAS) technologies such as MPEG DASH are now used extensively to deliver television services to large numbers of viewers. In HAS, the client requests segments of content using HTTP, with an ABR algorithm selecting the quality... Read More about Evaluation of cmaf in live streaming scenarios.

P4ID: P4 enhanced intrusion detection (2020)
Conference Proceeding
Lewis, B., Broadbent, M., & Race, N. (2020). P4ID: P4 enhanced intrusion detection. In 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) (1-4). https://doi.org/10.1109/NFV-SDN47374.2019.9040044

The growth in scale and capacity of networks in recent years leads to challenges of positioning and scalability of Intrusion Detection Systems (IDS). With the flexibility afforded by programmable dataplanes, it is now possible to perform a new level... Read More about P4ID: P4 enhanced intrusion detection.

Safe and Secure Software-Defined Networks for Smart Electricity Substations (2020)
Conference Proceeding
Holik, F., Broadbent, M., Findrik, M., Smith, P., & Race, N. (2020). Safe and Secure Software-Defined Networks for Smart Electricity Substations. In Intelligent Information and Database Systems: 12th Asian Conference, ACIIDS 2020, Phuket, Thailand, March 23–26, 2020, Proceedings (179-191). https://doi.org/10.1007/978-981-15-3380-8_16

The next generation of smart electricity substations and grids are on the horizon. Part of the drive behind this movement is a need to improve safety and security. In parallel, software-defined networking has been proposed as a disruptive approach wh... Read More about Safe and Secure Software-Defined Networks for Smart Electricity Substations.