Skip to main content

Research Repository

Advanced Search

Outputs (32)

5G as an enabler for Medical IOT - 5GMIOT (2016)
Presentation / Conference Contribution
Thuemmler, C., & Jefefries, N. (2016, December). 5G as an enabler for Medical IOT - 5GMIOT. Presented at IEEE Globecom 2016

Short Power Point presentation on 5G as enabler for Medical IoT – 5GMIOT Standards, policies and strategies for social technological alignment of 5G technology

Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications (2016)
Journal Article
Yassin, A., Nasser, Y., Awad, M., Al-Dubai, A., Liu, R., Yuen, C., Raulefs, R., & Aboutanios, E. (2017). Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications. Communications Surveys and Tutorials, IEEE Communications Society, 19(2), 1327-1346. https://doi.org/10.1109/comst.2016.2632427

Nowadays, the availability of the location information becomes a key factor in today’s communications systems for allowing location based services. In outdoor scenarios, the Mobile Terminal (MT) position is obtained with high accuracy thanks to the G... Read More about Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications.

3LS-authenticate: an e-commerce challenge-response mobile application. (2016)
Presentation / Conference Contribution
Molla, R., Romdhani, I., & Buchanan, B. (2016, November). 3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016

The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determining the most secure and convenient solution to protect online clients has be... Read More about 3LS-authenticate: an e-commerce challenge-response mobile application..

Weight Driven Cluster Head Rotation for Wireless Sensor Networks (2016)
Presentation / Conference Contribution
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Essa, A. (2016, November). Weight Driven Cluster Head Rotation for Wireless Sensor Networks. Presented at Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media - MoMM '16, Singapore

Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering techniques proved to be the effective solution to improve the energy effic... Read More about Weight Driven Cluster Head Rotation for Wireless Sensor Networks.

U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks (2016)
Presentation / Conference Contribution
Zeb, K., Saleem, K., Al Muhtadi, J., & Thuemmler, C. (2016, September). U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. Presented at 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)

Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records are worth 10 times more than credit card details [1]. Datasets experience... Read More about U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks.

Determinants of Next Generation e-Health Network and Architecture Specifications (2016)
Presentation / Conference Contribution
Thuemmler, C., Paulin, A., & Lim, A. K. (2016, September). Determinants of Next Generation e-Health Network and Architecture Specifications. Presented at 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)

This paper summarizes the determinants for future e-Health network and IT infrastructures in the health care environment. The paper bases on observations conducted as part of a larger study at a university hospital in Munich, and summarizes ongoing d... Read More about Determinants of Next Generation e-Health Network and Architecture Specifications.

Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet (2016)
Presentation / Conference Contribution
Paulin, A., & Thuemmler, C. (2016, September). Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet. Presented at 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)

This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in two heterogeneous use-cases of a European project, namely: to govern drugs al... Read More about Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet.

Health 4.0: The Case of Multiple Sclerosis (2016)
Presentation / Conference Contribution
Grigoriadis, N., Bakirtzis, C., Politis, C., Danas, K., & Thuemmler, C. (2016, September). Health 4.0: The Case of Multiple Sclerosis. Presented at 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), Munch, Germany

Multiple sclerosis is a chronic and variable disease in matters of symptoms, clinical course and outcome. The ultimate goal of currently used drugs and therapeutic strategies is the control of disease activity and the delay of the ongoing disability.... Read More about Health 4.0: The Case of Multiple Sclerosis.

HI-risk: A method to analyse health information risk intelligence (2016)
Presentation / Conference Contribution
Buchanan, W. J., & van Deursen, N. (2016, September). HI-risk: A method to analyse health information risk intelligence. Presented at 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)

Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to security threat and vulnerability scanning offer a significant development in the... Read More about HI-risk: A method to analyse health information risk intelligence.

Will quantum computers be the end of public key encryption? (2016)
Journal Article
Buchanan, W., & Woodward, A. (2016). Will quantum computers be the end of public key encryption?. Journal of Cyber Security Technology, 1(1), 1-22. https://doi.org/10.1080/23742917.2016.1226650

The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete log... Read More about Will quantum computers be the end of public key encryption?.

Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things (2016)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Paechter, B., & Qasem, M. (2016, April). Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things. Presented at 2016 IEEE Wireless Communications and Networking Conference

Constrained Low-power and Lossy networks (LLNs) represent the building block for the ever-growing Internet of Things (IoT) that deploy the Routing Protocol for Low Power and Lossy networks (RPL) as a key routing standard. RPL, along with other routin... Read More about Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things.

Sticky policy enabled authenticated OOXML (2016)
Presentation / Conference Contribution
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2016, July). Sticky policy enabled authenticated OOXML. Presented at IEEE Technically Sponsored SAI Computing Conference 2016, London, UK

This paper proposes a secure document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data sharing. The goal of this research is to find an efficient way to share data in the cloud across various... Read More about Sticky policy enabled authenticated OOXML.

If two countries waged cyber war on each another, here’s what to expect (2016)
Newspaper / Magazine
Buchanan, B. (2016). If two countries waged cyber war on each another, here’s what to expect. https://theconversation.com/if-two-countries-waged-cyber-war-on-each-another-heres-what-to-expect-63544

Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care records and so much more. The transport system isn’t working, traffic light... Read More about If two countries waged cyber war on each another, here’s what to expect.

Resilient secret sharing cloud based architecture for data vault (2016)
Patent
Lanc, D., Fan, L., MacKinnon, L., & Buchanan, B. (2016). Resilient secret sharing cloud based architecture for data vault

A method of securely storing data including: providing, within a secure data storage system, a plurality of secret sharing methods for selection and identifying a striping policy for storage of the data, in accordance with input preferences. The data... Read More about Resilient secret sharing cloud based architecture for data vault.

A RAM triage methodology for Hadoop HDFS forensics (2016)
Journal Article
Leimich, P., Harrison, J., & Buchanan, W. J. (2016). A RAM triage methodology for Hadoop HDFS forensics. Digital Investigation, 18, 96-109. https://doi.org/10.1016/j.diin.2016.07.003

This paper discusses the challenges of performing a forensic investigation against a multi-node Hadoop cluster and proposes a methodology for examiners to use in such situations. The procedure's aim of minimising disruption to the data centre during... Read More about A RAM triage methodology for Hadoop HDFS forensics.

A topological insight into restricted Boltzmann machines (2016)
Journal Article
Mocanu, D. C., Mocanu, E., Nguyen, P. H., Gibescu, M., & Liotta, A. (2016). A topological insight into restricted Boltzmann machines. Machine Learning, 104(2-3), 243-270. https://doi.org/10.1007/s10994-016-5570-z

Restricted Boltzmann Machines (RBMs) and models derived from them have been successfully used as basic building blocks in deep artificial neural networks for automatic features extraction, unsupervised weights initialization, but also as density esti... Read More about A topological insight into restricted Boltzmann machines.

Applied web traffic analysis for numerical encoding of SQL Injection attack features (2016)
Presentation / Conference Contribution
Uwagbole, S., Buchanan, W., & Fan, L. (2016, July). Applied web traffic analysis for numerical encoding of SQL Injection attack features. Presented at 15th European Conference on Cyber Warfare and Security ECCWS-2016

SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent... Read More about Applied web traffic analysis for numerical encoding of SQL Injection attack features.