Skip to main content

Research Repository

Advanced Search

Outputs (257)

Security for Cyber-Physical Systems in Healthcare (2017)
Book Chapter
Saleem, K., Tan, Z., & Buchanan, W. (2017). Security for Cyber-Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (233-251). Springer. https://doi.org/10.1007/978-3-319-47617-9_12

The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients with secure and reliable healthcare experience, the security issues of cyber-... Read More about Security for Cyber-Physical Systems in Healthcare.

5G as an enabler for Medical IOT - 5GMIOT (2016)
Presentation / Conference Contribution
Thuemmler, C., & Jefefries, N. (2016, December). 5G as an enabler for Medical IOT - 5GMIOT. Presented at IEEE Globecom 2016

Short Power Point presentation on 5G as enabler for Medical IoT – 5GMIOT Standards, policies and strategies for social technological alignment of 5G technology

3LS-authenticate: an e-commerce challenge-response mobile application. (2016)
Presentation / Conference Contribution
Molla, R., Romdhani, I., & Buchanan, B. (2016, November). 3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016

The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determining the most secure and convenient solution to protect online clients has be... Read More about 3LS-authenticate: an e-commerce challenge-response mobile application..

Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications (2016)
Journal Article
Yassin, A., Nasser, Y., Awad, M., Al-Dubai, A., Liu, R., Yuen, C., Raulefs, R., & Aboutanios, E. (2017). Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications. Communications Surveys and Tutorials, IEEE Communications Society, 19(2), 1327-1346. https://doi.org/10.1109/comst.2016.2632427

Nowadays, the availability of the location information becomes a key factor in today’s communications systems for allowing location based services. In outdoor scenarios, the Mobile Terminal (MT) position is obtained with high accuracy thanks to the G... Read More about Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications.

Weight Driven Cluster Head Rotation for Wireless Sensor Networks (2016)
Presentation / Conference Contribution
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Essa, A. (2016, November). Weight Driven Cluster Head Rotation for Wireless Sensor Networks. Presented at Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media - MoMM '16, Singapore

Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering techniques proved to be the effective solution to improve the energy effic... Read More about Weight Driven Cluster Head Rotation for Wireless Sensor Networks.

U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks (2016)
Presentation / Conference Contribution
Zeb, K., Saleem, K., Al Muhtadi, J., & Thuemmler, C. (2016, September). U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. Presented at 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)

Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records are worth 10 times more than credit card details [1]. Datasets experience... Read More about U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks.

Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things (2016)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Paechter, B., & Qasem, M. (2016, April). Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things. Presented at 2016 IEEE Wireless Communications and Networking Conference

Constrained Low-power and Lossy networks (LLNs) represent the building block for the ever-growing Internet of Things (IoT) that deploy the Routing Protocol for Low Power and Lossy networks (RPL) as a key routing standard. RPL, along with other routin... Read More about Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things.

Cloud Security, Privacy, and Trust Baselines (2016)
Book Chapter
Pitropakis, N., Katsikas, S., & Lambrinoudakis, C. (2016). Cloud Security, Privacy, and Trust Baselines. In Cloud Computing Security Foundations and Challenges. CRC Press

According to ISO 27001, a threat is a potential event. When a threat turns into an actual event, it may cause an undesirable incident. It is undesirable because the incident may harm an organization or a system, causing a security incident and/or t... Read More about Cloud Security, Privacy, and Trust Baselines.

The Far Side of Mobile Application Integrated Development Environments (2016)
Presentation / Conference Contribution
Lyvas, C., Pitropakis, N., & Lambrinoudakis, C. (2016, September). The Far Side of Mobile Application Integrated Development Environments. Presented at International Conference on Trust and Privacy in Digital Business TrustBus 2016: Trust, Privacy and Security in Digital Business, Porto, Portugal

Smart phones are, nowadays, a necessity for the vast majority of individuals around the globe. In addition to the ubiquitous computing paradigm supported by such devices, there are numerous software applications that utilize the high computational ca... Read More about The Far Side of Mobile Application Integrated Development Environments.

A topological insight into restricted Boltzmann machines (2016)
Journal Article
Mocanu, D. C., Mocanu, E., Nguyen, P. H., Gibescu, M., & Liotta, A. (2016). A topological insight into restricted Boltzmann machines. Machine Learning, 104(2-3), 243-270. https://doi.org/10.1007/s10994-016-5570-z

Restricted Boltzmann Machines (RBMs) and models derived from them have been successfully used as basic building blocks in deep artificial neural networks for automatic features extraction, unsupervised weights initialization, but also as density esti... Read More about A topological insight into restricted Boltzmann machines.

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things (2016)
Presentation / Conference Contribution
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016, June). Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things. Presented at 5th IEEE International Conference on Mobile Services, San Francisco, USA

Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirements of low-power and low-processing devices. To address this issue, we com... Read More about Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

A new distributed MIKEY mode to secure e-health applications. (2016)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016, April). A new distributed MIKEY mode to secure e-health applications. Presented at International Conference on Internet of Things and Big Data (IoTBD 2016)

Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing standard based protocols. Among these protocols, MIKEY (Multimedia Interne... Read More about A new distributed MIKEY mode to secure e-health applications..

Hybrid Tree-rule Firewall for High Speed Data Transmission (2016)
Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016). Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE Transactions on Cloud Computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548

Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create rule conflicts, and slows down the firewall. To overcome this problem, we hav... Read More about Hybrid Tree-rule Firewall for High Speed Data Transmission.

The Internet of Things: a security point of view. (2016)
Journal Article
Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: a security point of view. Internet Research, 26(2), 337-359. https://doi.org/10.1108/IntR-07-2014-0173

Purpose
-- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.
Design/methodology/approa... Read More about The Internet of Things: a security point of view..

Sir James Macmillan/Hebrides Ensemble LoLa Research between UK and Italy (2015)
Digital Artefact
Ferguson, P. (2015). Sir James Macmillan/Hebrides Ensemble LoLa Research between UK and Italy. [Video]

This video documents the use of Edinburgh Napier University's low-latency research by Sir James Macmillan and the Hebrides Ensemble. The resulting Macmillan Horn Quintet masterclass took place between three sites: Edinburgh, London and Trieste (Ital... Read More about Sir James Macmillan/Hebrides Ensemble LoLa Research between UK and Italy.

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, October). A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However, a regular update process causes extra signaling overhead and drains the n... Read More about A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things.

Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks (2015)
Presentation / Conference Contribution
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015, October). Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how a routing protocol for low-power and lossy-networks such as (RPL) would per... Read More about Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks.

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable (2015)
Presentation / Conference Contribution
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015, October). Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random variables and Nakagami-m random variable can be applied in performance analysis... Read More about Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable.

E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks (2015)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., & Ekonomou, E. (2015, October). E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks. Presented at IEEE 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications

Routing Protocol for Low Power and Lossy networks (RPL) is the de-facto standard for routing in resource-constrained low-power and lossy networks (LLNs) which represent the building block for the ever-growing Internet of Things (IoT). RPL along with... Read More about E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks.