Skip to main content

Research Repository

Advanced Search

Outputs (53)

Fast Filtering of Known PNG Files Using Early File Features (2017)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2017, May). Fast Filtering of Known PNG Files Using Early File Features. Presented at Annual Conference on Digital Forensics, Security and Law, Daytona Beach, Florida

A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given media, comparing individual... Read More about Fast Filtering of Known PNG Files Using Early File Features.

Case for Health 4.0 (2017)
Book Chapter
Thuemmler, C. (2017). Case for Health 4.0. In C. Thuemmler, & C. Bai (Eds.), Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (1-22). (1). BMC

No abstract available.

A Health 4.0 Based Approach Towards the Management of Multiple Sclerosis (2017)
Book Chapter
Grigoriadis, N., Bakirtzis, C., Politis, C., Danas, K., Thuemmler, C., & Keow Lim, A. (2017). A Health 4.0 Based Approach Towards the Management of Multiple Sclerosis. In C. Thuemmler, & C. Bai (Eds.), Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (205-218). (1). Springer

No abstract available.

A new dynamic weight clustering algorithm for wireless sensor networks (2017)
Presentation / Conference Contribution
Essa, A., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2016, May). A new dynamic weight clustering algorithm for wireless sensor networks. Presented at 1st EAI International Conference on Smart Grid Inspired Future Technologies (SmartGift 2016)

Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WSNs). Most existing approaches consider the residual energy of a single node... Read More about A new dynamic weight clustering algorithm for wireless sensor networks.

Blockchain and Git repositories for sticky policies protected OOXML. (2017)
Presentation / Conference Contribution
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017

The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This work compliments research on secure data sharing
with Office Open XML (OOX... Read More about Blockchain and Git repositories for sticky policies protected OOXML..

Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies (2017)
Presentation / Conference Contribution
Asif, R. (2017, November). Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. Presented at IEEE Network of the Future (NoF) conference, London, UK

Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home (FTTH)' networks and data centers. It is important that the newly designed... Read More about Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies.

Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks (2017)
Presentation / Conference Contribution
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017, October). Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. Presented at 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)

The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing pr... Read More about Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks.

Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks (2017)
Journal Article
Torres Vega, M., Koonen, A. M. J., Liotta, A., & Famaey, J. (2018). Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks. IEEE Wireless Communications Letters, 7(2), 278-281. https://doi.org/10.1109/lwc.2017.2771771

In light of the extreme radio congestion, the time has come to consider the upper parts of the electromagnetic spectrum. Optical beam-steered wireless communications offer great potential for future indoor short-range connectivity, due to virtually u... Read More about Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks.

What role will wearables play in future healthcare? (2017)
Presentation / Conference Contribution
Thuemmler, C. (2017, November). What role will wearables play in future healthcare?. Presented at Seminar on the future of Health care, Big Data and Wearables

A better and more efficient health sector through digitalization and the use of Big Data – personalized treatment, prevention and diagnostics based on a more encompassing understanding of the patient; continuous surveillance and home based treatment. Read More about What role will wearables play in future healthcare?.

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack (2017)
Presentation / Conference Contribution
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017, September). An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. Presented at 2017 Seventh International Conference on Emerging Security Technologies (EST)

Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted web applications. Structured Query Language (SQL) Injection Attack (SQLIA) r... Read More about An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack.

Load Balancing Objective Function in RPL (Draft 2) (2017)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., Hou, J., & Jadhav, R. A. (2017). Load Balancing Objective Function in RPL (Draft 2). USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of child nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Ne... Read More about Load Balancing Objective Function in RPL (Draft 2).

Performance Evaluation of a Fragmented Secret Share System (2017)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017, June). Performance Evaluation of a Fragmented Secret Share System. Presented at 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)

There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed as a keyless and resilient mechanism to mitigate this, but scaling through... Read More about Performance Evaluation of a Fragmented Secret Share System.

A New Weight based Rotating Clustering Scheme for WSNs (2017)
Presentation / Conference Contribution
Essa, A., Al-Dubai, A. Y., Romdhani, I., & Esriaftri, M. A. (2017, May). A New Weight based Rotating Clustering Scheme for WSNs. Presented at 2017 International Symposium on Networks, Computers and Communications (ISNCC)

Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely recommended approaches to sustaining a network throughout its lifetime. Des... Read More about A New Weight based Rotating Clustering Scheme for WSNs.

A framework for data security in cloud using collaborative intrusion detection scheme (2017)
Presentation / Conference Contribution
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017, October). A framework for data security in cloud using collaborative intrusion detection scheme. Presented at Proceedings of the 10th International Conference on Security of Information and Networks - SIN '17, Jaipur, India

Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go feature which is based on measured usage and can be compared to other utility se... Read More about A framework for data security in cloud using collaborative intrusion detection scheme.

A methodology for the security evaluation within third-party Android Marketplaces (2017)
Journal Article
Buchanan, W. J., Chiale, S., & Macfarlane, R. (2017). A methodology for the security evaluation within third-party Android Marketplaces. Digital Investigation, 23, 88-98. https://doi.org/10.1016/j.diin.2017.10.002

This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia. It provides a comprehensive review of existing academic literature about... Read More about A methodology for the security evaluation within third-party Android Marketplaces.

Insider threat detection using principal component analysis and self-organising map (2017)
Presentation / Conference Contribution
Moradpoor, N., Brown, M., & Russell, G. (2017, October). Insider threat detection using principal component analysis and self-organising map. Presented at Proceedings of the 10th International Conference on Security of Information and Networks - SIN '17, India

An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data which can damage the employer's marketing position and reputation. In additio... Read More about Insider threat detection using principal component analysis and self-organising map.

Analysis of the adoption of security headers in HTTP (2017)
Journal Article
Buchanan, W. J., Helme, S., & Woodward, A. (2018). Analysis of the adoption of security headers in HTTP. IET Information Security, 12(2), 118-126. https://doi.org/10.1049/iet-ifs.2016.0621

With the increase in the number of threats within Web-based systems, a more integrated approach is required to ensure the enforcement of security policies from the server to the client. These policies aim to stop man-in-the-middle attacks, code injec... Read More about Analysis of the adoption of security headers in HTTP.

Relevant 5G Application Scenarios in the Health Domain (2017)
Presentation / Conference Contribution
Thuemmler, C. (2017, September). Relevant 5G Application Scenarios in the Health Domain. Paper presented at IEEE 5G and Beyond Testbed Workshop, Toronto, Canada

No abstract available.