Skip to main content

Research Repository

Advanced Search

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection (2020)
Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press). Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7

Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component in identifying rare anomalies in context, which is a growing concern for ma... Read More about Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection.

Trust-aware and Cooperative Routing Protocol for IoT Security (2020)
Journal Article
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020). Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, Article 102467. https://doi.org/10.1016/j.jisa.2020.102467

The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to... Read More about Trust-aware and Cooperative Routing Protocol for IoT Security.

Double-Arc Parallel Coordinates and its Axes re-Ordering Methods (2020)
Journal Article
Lu, L., Wang, W., & Tan, Z. (2020). Double-Arc Parallel Coordinates and its Axes re-Ordering Methods. Mobile Networks and Applications, 25(4), 1376-1391. https://doi.org/10.1007/s11036-019-01455-9

The Parallel Coordinates Plot (PCP) is a popular technique for the exploration of high-dimensional data. In many cases, researchers apply it as an effective method to analyze and mine data. However, when today's data volume is getting larger, visual... Read More about Double-Arc Parallel Coordinates and its Axes re-Ordering Methods.

Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs (2019)
Journal Article
Alsarhan, A., Kilani, Y., Al-Dubai, A., Zomaya, A. Y., & Hussain, A. (2020). Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs. IEEE Transactions on Vehicular Technology, 69(2), 1568-1581. https://doi.org/10.1109/TVT.2019.2956228

Different studies have recently emphasized the importance of deploying clustering schemes in Vehicular ad hoc Network (VANET) to overcome challenging problems related to scalability, frequent topology changes, scarcity of spectrum resources, maintain... Read More about Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs.

Machine Learning for Health and Social Care Demographics in Scotland (2019)
Presentation / Conference Contribution
Buchanan, W. J., Smales, A., Lawson, A., & Chute, C. (2019, November). Machine Learning for Health and Social Care Demographics in Scotland. Paper presented at HEALTHINFO 2019, Valencia, Spain

This paper outlines an extensive study of applying machine learning to the analysis of publicly available health and social care data within Scotland, with a focus on learning the most significant variables involved in key health care outcome factors... Read More about Machine Learning for Health and Social Care Demographics in Scotland.

PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme (2019)
Journal Article
Khan, R., Zakarya, M., Tan, Z., Usman, M., Jan, M. A., & Khan, M. (2019). PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme. International Journal of Communication Systems, 32(18), Article e4144. https://doi.org/10.1002/dac.4144

Heterogeneous wireless sensor networks (WSNs) consist of resource-starving nodes that face a challenging task of handling various issues such as data redundancy, data fusion, congestion control, and energy efficiency. In these networks, data fusion a... Read More about PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme.

A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications (2019)
Journal Article
Almalkawi, I. T., Halloush, R., Alsarhan, A., Al-Dubai, A., & Al-karaki, J. N. (2019). A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications. Journal of Information Security and Applications, 49, https://doi.org/10.1016/j.jisa.2019.102384

Due to limited processing capabilities and other constraints of most wireless networks, many existing security algorithms do not consider the network efficiency. This is because most of these security solutions exhibit intolerable overhead and consid... Read More about A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications.

Outlier Detection of Time Series with A Novel Hybrid Method in Cloud Computing (2019)
Journal Article
Liu, Q., Wang, Z., Liu, X., & Linge, N. (2019). Outlier Detection of Time Series with A Novel Hybrid Method in Cloud Computing. International Journal of High Performance Computing and Networking, 14(4), 435-443. https://doi.org/10.1504/IJHPCN.2019.102350

In the wake of the development in science and technology, Cloud Computing has obtained more attention in different field. Meanwhile, outlier detection for data mining in Cloud Computing is playing more and more significant role in different research... Read More about Outlier Detection of Time Series with A Novel Hybrid Method in Cloud Computing.

FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks (2019)
Journal Article
Liu, P., Wang, X., Hawbani, A., Busaileh, O., Zhao, L., & Al-Dubai, A. (2020). FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks. IEEE Transactions on Mobile Computing, 19(11), 2623-2639. https://doi.org/10.1109/tmc.2019.2928805

In wireless sensor networks, routing protocols with immutable network policies lacking the flexibility are generally incapable of maintaining desired performance due to the complicated and changeable environment situations and application requirement... Read More about FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks.

PLC Memory Attack Detection and Response in a Clean Water Supply System (2019)
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019). PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003

Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens tend to take modern-day conveniences such as trains, planes or tap water fo... Read More about PLC Memory Attack Detection and Response in a Clean Water Supply System.

Non-intrusive load monitoring and its challenges in a NILM system framework (2019)
Journal Article
Liu, Q., Lu, M., Liu, X., & Linge, N. (2019). Non-intrusive load monitoring and its challenges in a NILM system framework. International Journal of High Performance Computing and Networking, 14(1), 102-111. https://doi.org/10.1504/IJHPCN.2019.099748

With the increasing of energy demand and electricity price, researchers gain more and more interest among the residential load monitoring. In order to feed back the individual appliance’s energy consumption instead of the whole-house energy consumpti... Read More about Non-intrusive load monitoring and its challenges in a NILM system framework.

Enhanced Shadow Retargeting with Light-Source Estimation Using Flat Fresnel Lenses (2019)
Journal Article
Casas, L., Fauconneau, M., Kosek, M., Mclister, K., & Mitchell, K. (2019). Enhanced Shadow Retargeting with Light-Source Estimation Using Flat Fresnel Lenses. Computers, 8(2), Article 29. https://doi.org/10.3390/computers8020029

Shadow-retargeting maps depict the appearance of real shadows to virtual shadows given corresponding deformation of scene geometry, such that appearance is seamlessly maintained. By performing virtual shadow reconstruction from unoccluded real-shadow... Read More about Enhanced Shadow Retargeting with Light-Source Estimation Using Flat Fresnel Lenses.

Decrypting Live SSH Traffic in Virtual Environments (2019)
Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019). Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010

Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts required for decrypting secure communications. This paper develops the MemDe-... Read More about Decrypting Live SSH Traffic in Virtual Environments.

The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers (2019)
Journal Article
Stapleton, G., Chapman, P., Rodgers, P., Touloumis, A., Blake, A., & Delaney, A. (2019). The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers. PLOS ONE, 14(3), https://doi.org/10.1371/journal.pone.0211234

This paper presents the first empirical investigation that compares Euler and linear diagrams when they are used to represent set cardinality. A common approach is to use area-proportional Euler diagrams but linear diagrams can exploit length-proport... Read More about The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers.

IoT Forensics: Amazon Echo as a Use Case (2019)
Journal Article
Li, S., Li, S., Choo, K. R., Sun, Q., Buchanan, W. J., & Cao, J. (2019). IoT Forensics: Amazon Echo as a Use Case. IEEE Internet of Things Journal, 1-11. https://doi.org/10.1109/jiot.2019.2906946

Internet of Things (IoT) are increasingly common in our society, and can be found in civilian settings as well as sensitive applications such as battlefields and national security. Given the potential of these devices to be targeted by attackers, the... Read More about IoT Forensics: Amazon Echo as a Use Case.

SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. (2019)
Journal Article
Jan, M. A., Zhang, W., Usman, M., Tan, Z., Khan, F., & Luo, E. (2019). SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. Journal of Network and Computer Applications, 137, 1-10. https://doi.org/10.1016/j.jnca.2019.02.023

The Internet of Things (IoT) has the potential to transform communities around the globe into smart cities. The massive deployment of sensor-embedded devices in the smart cities generates voluminous amounts of data that need to be stored and processe... Read More about SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application..

Lightweight Reinforcement Learning for Energy Efficient Communications in Wireless Sensor Networks (2019)
Journal Article
Savaglio, C., Pace, P., Aloi, G., Liotta, A., & Fortino, G. (2019). Lightweight Reinforcement Learning for Energy Efficient Communications in Wireless Sensor Networks. IEEE Access, 7, 29355-29364. https://doi.org/10.1109/access.2019.2902371

High-density communications in wireless sensor networks (WSNs) demand for new approaches to meet stringent energy and spectrum requirements. We turn to reinforcement learning, a prominent method in artificial intelligence, to design an energy-preserv... Read More about Lightweight Reinforcement Learning for Energy Efficient Communications in Wireless Sensor Networks.

Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop (2019)
Journal Article
Babar, M., Arif, F., Jan, M. A., Tan, Z., & Khan, F. (2019). Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. Future Generation Computer Systems, 96, 398-409. https://doi.org/10.1016/j.future.2019.02.035

The unbroken amplfi cation of a versatile urban setup is challenged by huge Big Data processing. Understanding the voluminous data generated in a smart urban environment for decision making is a challenging task. Big Data analytics is performed to ob... Read More about Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop.

Top 10 Blockchain Predictions for the (Near) Future of Healthcare (2019)
Journal Article
Halamka, J. D., Alterovitz, G., Buchanan, W. J., Cenaj, T., Clauson, K. A., Dhillon, V., Hudson, F. D., Mokhtari, M. (., Porto, D. A., Rutschman, A., & Ngo, A. L. (2019). Top 10 Blockchain Predictions for the (Near) Future of Healthcare. Blockchain in Healthcare Today, 2, https://doi.org/10.30953/bhty.v2.106

To review blockchain lessons learned in 2018 and near-future predictions for blockchain in healthcare, Blockchain in Healthcare Today (BHTY) asked the world's blockchain in healthcare experts to share their insights. Here, our internationally-renowne... Read More about Top 10 Blockchain Predictions for the (Near) Future of Healthcare.

ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System (2019)
Journal Article
Javaid, S., Afzal, H., Babar, M., Arif, F., Tan, Z., & Jan, M. A. (2019). ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System. IEEE Access, 1-1. https://doi.org/10.1109/access.2019.2897095

Putting trust in the world of the Internet of Things, where served and serving entities are often unknown, is very hard especially when personal and business information is often being exchanged for providing and consuming services. Moreover, the iss... Read More about ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System.