Skip to main content

Research Repository

Advanced Search

All Outputs (71)

FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment (2020)
Journal Article
Zhang, S., Liu, Y., Li, S., Tan, Z., Zhao, X., & Zhou, J. (2020). FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment. IEEE Access, 8, 17356-17365. https://doi.org/10.1109/access.2020.2966399

Edge computing is a research hotspot that extends cloud computing to the edge of the network. Due to the recent developments in computation, storage and network technology for end devices, edge networks have become more powerful, making it possible t... Read More about FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment.

FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks (2020)
Journal Article
Lai, S., Fan, X., Ye, Q., Tan, Z., Zhang, Y., He, X., & Nanda, P. (2020). FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks. IEEE Access, 8, 13516-13526. https://doi.org/10.1109/access.2020.2965562

Mobile cloud computing has emerged as a promising paradigm to facilitate computation-intensive and delay-sensitive mobile applications. Computation offloading services at the edge mobile cloud environment are provided by small-scale cloud infrastruct... Read More about FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks.

Double-Arc Parallel Coordinates and its Axes re-Ordering Methods (2020)
Journal Article
Lu, L., Wang, W., & Tan, Z. (2020). Double-Arc Parallel Coordinates and its Axes re-Ordering Methods. Mobile Networks and Applications, 25(4), 1376-1391. https://doi.org/10.1007/s11036-019-01455-9

The Parallel Coordinates Plot (PCP) is a popular technique for the exploration of high-dimensional data. In many cases, researchers apply it as an effective method to analyze and mine data. However, when today's data volume is getting larger, visual... Read More about Double-Arc Parallel Coordinates and its Axes re-Ordering Methods.

PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing (2019)
Journal Article
Zhu, R., Yu, T., Tan, Z., Du, W., Zhao, L., Li, J., & Xia, X. (2020). PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing. IEEE Access, 8, 1475-1485. https://doi.org/10.1109/ACCESS.2019.2962066

Outlier detection over sliding window is a fundamental problem in the domain of streaming data management, which has been studied over 10 years. The key of supporting outlier detection is to construct a neighbour-list for each object. It is used for... Read More about PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing.

O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification (2019)
Journal Article
Kakavand, M., Mustapha, A., Tan, Z., Foroozana, S., & Arulsamy, L. (2019). O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification. IEEE Access, 7, 167141-167156. https://doi.org/10.1109/access.2

Most active research in Host and Network Intrusion Detection Systems are only able to detect attacks of the computer systems and attacks at the network layer, which are not sufficient to counteract SOAP/REST or XML/JSON-related attacks. In dealing wi... Read More about O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification.

Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network (2019)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2019). Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network. Sensors, 19(22), Article 4930. https://doi.org/10.3390/s19224930

The hotspot issue in wireless sensor networks, with nodes nearest the sink node losing energy fastest and degrading network lifetime, is a well referenced problem. Mobile sink nodes have been proposed as a solution to this. This does not completely r... Read More about Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network.

PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme (2019)
Journal Article
Khan, R., Zakarya, M., Tan, Z., Usman, M., Jan, M. A., & Khan, M. (2019). PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme. International Journal of Communication Systems, 32(18), Ar

Heterogeneous wireless sensor networks (WSNs) consist of resource-starving nodes that face a challenging task of handling various issues such as data redundancy, data fusion, congestion control, and energy efficiency. In these networks, data fusion a... Read More about PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme.

A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks (2019)
Journal Article
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019). A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, Article 4321. https://doi.org/10.3390/s19194321

The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks play an important role in the designing of IoT-enabled platforms due to thei... Read More about A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks.

A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles (2019)
Journal Article
Yao, W., Yahya, A., Khan, F., Tan, Z., Rehman, A. U., Chuma, J. M., Jan, M. A., & Babar, M. (2019). A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles. IEEE Access, 7, 160889-160900. https://doi.org/1

The advancements in hardware technologies have driven the evolution of vehicular ad hoc networks into the Internet of Vehicles (IoV). The IoV is a decentralized network of IoT-enabled vehicles capable of smooth traffic flow to perform fleet managemen... Read More about A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles.

Deriving ChaCha20 Key Streams From Targeted Memory Analysis (2019)
Journal Article
McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019). Deriving ChaCha20 Key Streams From Targeted Memory Analysis. Journal of Information Security and Applications, 48, Article 102372. https://doi.org/10.1016/j.jisa.2019.102372

There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly resistant to side-channel attacks, cryptographic artefacts may exist in memo... Read More about Deriving ChaCha20 Key Streams From Targeted Memory Analysis.

A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers (2019)
Journal Article
Han, T., Jan, S., Tan, T., Usman, M., Jan, M., Khan, R., & Xu, Y. (2020). A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers. Concurrency and Computation: Practice and Experience, 32(16), Article

Software De ned Network (SDN) and Network Virtualization (NV) are emerged paradigms that simpli ed the control and management of the next generation networks, most importantly, Internet of Things (IoT), Cloud Computing, and Cyber-Physical Systems. Th... Read More about A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers.

Decrypting Live SSH Traffic in Virtual Environments (2019)
Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019). Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010

Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts required for decrypting secure communications. This paper develops the MemDe-... Read More about Decrypting Live SSH Traffic in Virtual Environments.

SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. (2019)
Journal Article
Jan, M. A., Zhang, W., Usman, M., Tan, Z., Khan, F., & Luo, E. (2019). SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. Journal of Network and Computer Applications, 137, 1-10. https://doi.org/10.1016/j.jnca.2019.0

The Internet of Things (IoT) has the potential to transform communities around the globe into smart cities. The massive deployment of sensor-embedded devices in the smart cities generates voluminous amounts of data that need to be stored and processe... Read More about SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application..

Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop (2019)
Journal Article
Babar, M., Arif, F., Jan, M. A., Tan, Z., & Khan, F. (2019). Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. Future Generation Computer Systems, 96, 398-409. https://do

The unbroken amplfi cation of a versatile urban setup is challenged by huge Big Data processing. Understanding the voluminous data generated in a smart urban environment for decision making is a challenging task. Big Data analytics is performed to ob... Read More about Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop.

ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System (2019)
Journal Article
Javaid, S., Afzal, H., Babar, M., Arif, F., Tan, Z., & Jan, M. A. (2019). ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System. IEEE Access, 1-1. https://doi.org/10.1109/access.2019.2897095

Putting trust in the world of the Internet of Things, where served and serving entities are often unknown, is very hard especially when personal and business information is often being exchanged for providing and consuming services. Moreover, the iss... Read More about ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System.

Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning (2018)
Journal Article
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2019). Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, 128, 56-63. https://doi.org/10.1016/j.jnca.2018.12.002

Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce users to click and then redirect them to a phishing webpage. To protect IoT systems, email classification is an essential mechanism to classify spam and l... Read More about Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning.

Copy-move forgery detection using combined features and transitive matching (2018)
Journal Article
Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H., & Tan, Z. (2019). Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications, 78(21), 30081-30096. https://doi.org/10.1007/s11042-018-6922-4

Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be tampered easily. Therefore, the research of multimedia forensics is necessary... Read More about Copy-move forgery detection using combined features and transitive matching.

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services (2018)
Journal Article
Zhang, S., Li, X., Tan, Z., Peng, T., & Wang, G. (2019). A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Generation Computer Systems, 94, 40-50. https://doi.org/10.1016/j.future.2018.10.053

With the rapid pervasion of location-based services (LBSs), protection of location privacy has become a significant concern. In most continuous LBSs' privacy-preserving solutions, users need to transmit the location query data to an untrusted locatio... Read More about A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.

An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules (2018)
Journal Article
Habibullah, S., Liu, X., & Tan, Z. (2018). An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules. International Journal of Computer Theory and Engineering, 10(5), 164-169. https://doi.or

Evolving legacy enterprise systems into a lean system architecture has been on the agendas of many enterprises. Recent advance in legacy system evaluation is in favour of microservice technologies, which not only significantly reduce the complexity i... Read More about An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules.

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment (2018)
Journal Article
Babar, M., Khan, F., Iqbal, W., Yahya, A., Arif, F., Tan, Z., & Chuma, J. (2018). A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access, 6, 43088-43099

Smart societies have an increasing demand for quality-oriented services and infrastructure in an Industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numerous challenges. Among them, secured energy Demand Side Management (DSM) is o... Read More about A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment.