Skip to main content

Research Repository

Advanced Search

Outputs (61)

Privacy-preserving Surveillance Methods using Homomorphic Encryption (2020)
Presentation / Conference Contribution
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020, February). Privacy-preserving Surveillance Methods using Homomorphic Encryption. Presented at 6th International Conference on Information Security Systems and Privacy (ICISSP), Valletta, Malta

Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encryption to protect all states of the data: in-transit, at-rest, and in-memory.... Read More about Privacy-preserving Surveillance Methods using Homomorphic Encryption.

Understanding Personal Online Risk To Individuals Via Ontology Development (2020)
Presentation / Conference Contribution
Haynes, D. (2020, July). Understanding Personal Online Risk To Individuals Via Ontology Development. Presented at International Societey for Knowledge Organziation (ISKO) 2020, Aalborg, Denmark

The concept of risk is widely misunderstood because of the different contexts in which it is used. This paper describes the development of an ontology of risk as a way of better understanding the nature of the potential harms individuals are exposed... Read More about Understanding Personal Online Risk To Individuals Via Ontology Development.

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach (2020)
Presentation / Conference Contribution
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020, February). Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. Presented at ICISSP 2020, Valletta, Malta

Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high situational awareness, it can still be hard for users to continually be awa... Read More about Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach.

Ontology-based Course Teacher Assignment within Universities (2020)
Journal Article
Ashour, G., Al-Dubai, A., & Romdhani, I. (2020). Ontology-based Course Teacher Assignment within Universities. International Journal of Advanced Computer Science and Applications, 11(7), https://doi.org/10.14569/ijacsa.2020.0110787

Educational institutions suffer from the enormous amount of data that keeps growing continuously. These data are usually scattered and unorganised, and it comes from different resources with different formats. Besides, modernization vision within the... Read More about Ontology-based Course Teacher Assignment within Universities.

Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks (2020)
Journal Article
Zhao, L., Zhao, W., Hawbani, A., Al-Dubai, A. Y., Min, G., Zomaya, A., & Gong, C. (2021). Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks. IEEE Transactions on Wireless Communications, 20(5), 2991-3004. https://doi.org/10.1109/twc.2020.3046275

To provide efficient networking services at the edge of Internet-of-Vehicles (IoV), Software-Defined Vehicular Network (SDVN) has been a promising technology to enable intelligent data exchange without giving additional duties to the resource constra... Read More about Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks.

Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms (2020)
Journal Article
Ghanami, A., Li, . J., Hawbani, A., & Al-Dubai, A. (2021). Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms. Expert Systems with Applications, 170, Article 114525. https://doi.org/10.1016/j.eswa.2020.114525

Initialization is the first and a major step in the implementation of evolutionary algorithms (EAs). Although there are many common general methods to initialize EAs such as the pseudo-random number generator (PRNG), there is no single method that ca... Read More about Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms.

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing (2020)
Journal Article
Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., Haynes, D., Pitropakis, N., & Papadopoulos, P. (2020). Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. Frontiers in Communications and Networks, https://doi.org/10.3389/frcmn.2020.583376

The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking. Many nations of the world have therefore, developed their own ways... Read More about Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020, December). PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. Presented at ICVISP 2020: The 2020 4th International Conference on Vision, Image and Signal Processing, Bangkok

The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms o... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric (2020)
Journal Article
Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., & Buchanan, W. J. (2020). A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors, 20(22), Article 6587. https://doi.org/10.3390/s20226587

Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record storage solutions to common sec... Read More about A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification (2020)
Journal Article
Luo, C., Tan, Z., Min, G., Gan, J., Shi, W., & Tian, Z. (2021). A Novel Web Attack Detection System for Internet of Things via Ensemble Classification. IEEE Transactions on Industrial Informatics, 17(8), 5810-5818. https://doi.org/10.1109/tii.2020.3038761

Internet of things (IoT) has become one of the fastestgrowing technologies and has been broadly applied in various fields. IoT networks contain millions of devices with the capability of interacting with each other and providing functionalities that... Read More about A Novel Web Attack Detection System for Internet of Things via Ensemble Classification.

Fast Probabilistic Consensus with Weighted Votes (2020)
Presentation / Conference Contribution
Müller, S., Penzkofer, A., Ku´smierz, B., Camargo, D., & Buchanan, W. J. (2020, November). Fast Probabilistic Consensus with Weighted Votes. Presented at FTC 2020 - Future Technologies Conference 2020, Vancouver, Canada

The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure. We propose an adaption of the FPC to a setting where the voting power is proportional to the nodes reputations. We model t... Read More about Fast Probabilistic Consensus with Weighted Votes.

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network (2020)
Presentation / Conference Contribution
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (2020, April). A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network. Presented at IEEE 6th World Forum on Internet of Things, New Orleans, Louisiana, USA

The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as the sink node shall still pass some nodes more closely and frequently than... Read More about A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network.

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection (2020)
Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (online). Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7

Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component in identifying rare anomalies in context, which is a growing concern for ma... Read More about Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection.

A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading (2020)
Journal Article
Zhao, L., Yang, K., Tan, Z., Li, X., Sharma, S., & Liu, Z. (2021). A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading. IEEE Transactions on Intelligent Transportation Systems, 22(6), 3664-3674. https://doi.org/10.1109/TITS.2020.3024186

Vehicular computation offloading is a well-received strategy to execute delay-sensitive and/or compute-intensive tasks of legacy vehicles. The response time of vehicular computation offloading can be shortened by using mobile edge computing that offe... Read More about A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading.

Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks (2020)
Journal Article
Hawbani, A., Wang, X., Zhao, L., Al-Dubai, A., Min, G., & Busaileh, O. (2020). Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks. IEEE/ACM Transactions on Networking, 28(6), 2809-2822. https://doi.org/10.1109/TNET.2020.3020984

This article extends the promising software-defined networking technology to wireless sensor networks to achieve two goals: 1) reducing the information exchange between the control and data planes, and 2) counterbalancing between the sender's waiting... Read More about Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks.

BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond (2020)
Journal Article
Xu, H., Zhang, L., Onireti, O., Fang, Y., Buchanan, W. J., & Imran, M. A. (2021). BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond. IEEE Internet of Things, 8(5), 3915-3929. https://doi.org/10.1109/jiot.2020.3025953

The outbreak of COVID-19 pandemic has exposed an urgent need for effective contact tracing solutions through mobile phone applications to prevent the infection from spreading further. However, due to the nature of contact tracing, public concern on p... Read More about BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond.

A Distributed Trust Framework for Privacy-Preserving Machine Learning (2020)
Presentation / Conference Contribution
Abramson, W., Hall, A. J., Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2020, September). A Distributed Trust Framework for Privacy-Preserving Machine Learning. Presented at The 17th International Conference on Trust, Privacy and Security in Digital Business - TrustBus2020, Bratislava, Slovakia

When training a machine learning model, it is standard procedure for the researcher to have full knowledge of both the data and model. However, this engenders a lack of trust between data owners and data scientists. Data owners are justifiably reluct... Read More about A Distributed Trust Framework for Privacy-Preserving Machine Learning.

FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures (2020)
Journal Article
Popov, S., & Buchanan, W. J. (2021). FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures. Journal of Parallel and Distributed Computing, 147, 77-86. https://doi.org/10.1016/j.jpdc.2020.09.002

This paper presents a novel leaderless protocol (FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures) with a low communicational complexity and which allows a set of nodes to come to a consensus on a value of a single bit. The paper... Read More about FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures.

Machine Learning-driven Optimization for Intrusion Detection in Smart Vehicular Networks (2020)
Journal Article
Alsarhan, A., Al-Ghuwairi, A.-R., Almalkaw, I., Alauthman, M., & Al-Dubai, A. (2021). Machine Learning-driven Optimization for Intrusion Detection in Smart Vehicular Networks. Wireless Personal Communications, 117, 3129-3152 (2021). https://doi.org/10.1007/s11277-020-07797-y

An essential element in the smart city vision is providing safe and secure journeys via intelligent vehicles and smart roads. Vehicular ad hoc networks (VANETs) have played a significant role in enhancing road safety where vehicles can share road inf... Read More about Machine Learning-driven Optimization for Intrusion Detection in Smart Vehicular Networks.

Tuft: Tree Based Heuristic Data Dissemination for Mobile Sink Wireless Sensor Networks (2020)
Journal Article
Busaileh, O., Hawbani, A., Xingfu, W., Liu, P., Zhao, L., & Al-Dubai, A. (2022). Tuft: Tree Based Heuristic Data Dissemination for Mobile Sink Wireless Sensor Networks. IEEE Transactions on Mobile Computing, 21(4), 1520-1536. https://doi.org/10.1109/TMC.2020.3022403

Wireless sensor networks (WSNs) with a static sink suffer from concentrated data traffic in the vicinity of the sink, which increases the burden on the nodes surrounding the sink, and impels them to deplete their batteries faster than other nodes in... Read More about Tuft: Tree Based Heuristic Data Dissemination for Mobile Sink Wireless Sensor Networks.