Skip to main content

Research Repository

Advanced Search

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse (2017)
Presentation / Conference Contribution
Kintis, P., Miramirkhani, N., Lever, C., Chen, Y., Romero-GĂłmez, R., Pitropakis, N., Nikiforakis, N., & Antonakakis, M. (2017, October). Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. Presented at 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA

Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific type of domain squatting called "combosquatting," in which attackers register... Read More about Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse.

Load Balancing Objective Function in RPL (Draft 2) (2017)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., Hou, J., & Jadhav, R. A. (2017). Load Balancing Objective Function in RPL (Draft 2). USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of child nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Ne... Read More about Load Balancing Objective Function in RPL (Draft 2).

WaveTrace Demo at the Dutch Design Week (2017)
Exhibition / Performance
Verweij, D., Abreu Esteves, A., Khan, V., & Bakker, S. WaveTrace Demo at the Dutch Design Week. Exhibited at Eindhoven, The Netherlands. 21 October 2017 - 29 October 2017

Every design has its own story, a story about ideas, exploring, decisions and adaptations. During Mind the Story, the lecture program that accompanies Mind the Step, the focus is on people involved in the design process. As user, client, organization... Read More about WaveTrace Demo at the Dutch Design Week.

SmoothMoves: smooth pursuits head movements for augmented reality. (2017)
Presentation / Conference Contribution
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y., & Oakley, I. (2017, October). SmoothMoves: smooth pursuits head movements for augmented reality. Presented at 30th Annual ACM Symposium on User Interface Software & Technology

SmoothMoves is an interaction technique for augmented reality (AR) based on smooth pursuits head movements. It works by computing correlations between the movements of on-screen targets and the user’s head while tracking those targets. The paper pres... Read More about SmoothMoves: smooth pursuits head movements for augmented reality..

CymaSense: a novel audio-visual therapeutic tool for people on the autism spectrum. (2017)
Presentation / Conference Contribution
McGowan, J., Leplâtre, G., & McGregor, I. (2017, October). CymaSense: a novel audio-visual therapeutic tool for people on the autism spectrum. Presented at Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility - ASSETS '17

Music Therapy has been shown to be an effective intervention for clients with Autism Spectrum Condition (ASC), a lifelong neurodevelopmental condition that can affect people in a number of ways. This paper presents a study evaluating the use of a mul... Read More about CymaSense: a novel audio-visual therapeutic tool for people on the autism spectrum..

Performance Evaluation of a Fragmented Secret Share System (2017)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017, June). Performance Evaluation of a Fragmented Secret Share System. Presented at 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)

There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed as a keyless and resilient mechanism to mitigate this, but scaling through... Read More about Performance Evaluation of a Fragmented Secret Share System.

A methodology for the security evaluation within third-party Android Marketplaces (2017)
Journal Article
Buchanan, W. J., Chiale, S., & Macfarlane, R. (2017). A methodology for the security evaluation within third-party Android Marketplaces. Digital Investigation, 23, 88-98. https://doi.org/10.1016/j.diin.2017.10.002

This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia. It provides a comprehensive review of existing academic literature about... Read More about A methodology for the security evaluation within third-party Android Marketplaces.

A framework for data security in cloud using collaborative intrusion detection scheme (2017)
Presentation / Conference Contribution
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017, October). A framework for data security in cloud using collaborative intrusion detection scheme. Presented at Proceedings of the 10th International Conference on Security of Information and Networks - SIN '17, Jaipur, India

Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go feature which is based on measured usage and can be compared to other utility se... Read More about A framework for data security in cloud using collaborative intrusion detection scheme.

For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems (2017)
Presentation / Conference Contribution
Pitt, J., & Hart, E. (2017, September). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. Presented at 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W)

This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional rules. The core of the problem is that there are multiple, inter-dependent... Read More about For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems.

Analysis of the adoption of security headers in HTTP (2017)
Journal Article
Buchanan, W. J., Helme, S., & Woodward, A. (2018). Analysis of the adoption of security headers in HTTP. IET Information Security, 12(2), 118-126. https://doi.org/10.1049/iet-ifs.2016.0621

With the increase in the number of threats within Web-based systems, a more integrated approach is required to ensure the enforcement of security policies from the server to the client. These policies aim to stop man-in-the-middle attacks, code injec... Read More about Analysis of the adoption of security headers in HTTP.

Dual-band planar inverted F-L antenna structure for bluetooth and ZigBee applications (2017)
Book Chapter
See, C. H., Oguntala, G. A., Shuaieb, W., Noras, J. M., & Excell, P. S. (2018). Dual-band planar inverted F-L antenna structure for bluetooth and ZigBee applications. In I. Elfergani, A. Hussaini, J. Rodriguez, & R. Abd-Alhameed (Eds.), Antenna Fundamentals for Legacy Mobile Applications and Beyond (39-52). Springer. https://doi.org/10.1007/978-3-319-63967-3_2

This chapter will present and analyse a compact and dual frequency inverted L-F antennas for the operating frequency bands to meet the requirement for IEEE 802.11a/b/g, Bluetooth and ZigBee standards; the optimal design providing a compromise between... Read More about Dual-band planar inverted F-L antenna structure for bluetooth and ZigBee applications.

A new technique for designing 8 Ă— 8 substitution box for image encryption applications (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017, September). A new technique for designing 8 Ă— 8 substitution box for image encryption applications. Presented at 2017 9th Computer Science and Electronic Engineering (CEEC), Colchester

To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secure encryption algorithm, substitution plays a key role during confusion stag... Read More about A new technique for designing 8 Ă— 8 substitution box for image encryption applications.

Relevant 5G Application Scenarios in the Health Domain (2017)
Presentation / Conference Contribution
Thuemmler, C. (2017, September). Relevant 5G Application Scenarios in the Health Domain. Paper presented at IEEE 5G and Beyond Testbed Workshop, Toronto, Canada

No abstract available.

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis (2017)
Presentation / Conference Contribution
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017, August). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. Presented at 2017 IEEE Trustcom/BigDataSE/ICESS

This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was designed and applied in this work to extract hidden correlations from traffic rel... Read More about An Intrusion Detection System Based on Polynomial Feature Correlation Analysis.

Remote control by body movement in synchrony with orbiting widgets: an evaluation of TraceMatch (2017)
Journal Article
Clarke, C., Bellino, A., Esteves, A., & Gellersen, H. (2017). Remote control by body movement in synchrony with orbiting widgets: an evaluation of TraceMatch. PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1(3), Article 45. https://doi.org/10.1145/3130910

In this work we consider how users can use body movement for remote control with minimal effort and maximum flexibility. TraceMatch is a novel technique where the interface displays available controls as circular widgets with orbiting targets, and wh... Read More about Remote control by body movement in synchrony with orbiting widgets: an evaluation of TraceMatch.

Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments (2017)
Journal Article
Alsarhan, A., Itradat, A., Al-Dubai, A. Y., Zomaya, A. Y., & Min, G. (2018). Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments. IEEE Transactions on Parallel and Distributed Systems, 29(1), 31-42. https://doi.org/10.1109/tpds.2017.2748578

In the current cloud business environment, the cloud provider (CP) can provide a means for offering the required quality of service (QoS) for multiple classes of clients. We consider the cloud market where various resources such as CPUs, memory, and... Read More about Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments.

Impact of selection methods on the diversity of many-objective Pareto set approximations (2017)
Presentation / Conference Contribution
Martí, L., Segredo, E., Sánchez-Pi, N., & Hart, E. (2017, September). Impact of selection methods on the diversity of many-objective Pareto set approximations. Presented at 21st International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, Marseille, France

Selection methods are a key component of all multi-objective and, consequently, many-objective optimisation evolutionary algorithms. They must perform two main tasks simultaneously. First of all, they must select individuals that are as close as poss... Read More about Impact of selection methods on the diversity of many-objective Pareto set approximations.