Skip to main content

Research Repository

Advanced Search

Leaf-based Routing Mechanism for Low-Power and Lossy Networks (2018)
Patent
Ghaleb, B., & Al-Dubai, A. (2018). Leaf-based Routing Mechanism for Low-Power and Lossy Networks. 1800668.4. Intellectual Property Office, UK

Unlike existing solutions, our invention provides a “Leaf-Based” mechanism for establishing the Downward routes in Low-Power and Lossy Networks (LLNs) that seeks to provide a novel, scalable and efficient routing solution for LLNs, which are the back... Read More about Leaf-based Routing Mechanism for Low-Power and Lossy Networks.

Mining malware command and control traces (2018)
Presentation / Conference Contribution
McLaren, P., Russell, G., & Buchanan, B. (2017, July). Mining malware command and control traces. Presented at 2017 Computing Conference

Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, which enables the malware to respond to controller commands. The detection o... Read More about Mining malware command and control traces.

Employing machine learning techniques for detection and classification of phishing emails (2018)
Presentation / Conference Contribution
Moradpoor, N., Clavie, B., & Buchanan, B. (2017, July). Employing machine learning techniques for detection and classification of phishing emails. Presented at 2017 Computing Conference, London, UK

A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or downloads malicious software through clicking on malicious links contained i... Read More about Employing machine learning techniques for detection and classification of phishing emails.

Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture (2018)
Journal Article
Chrysoulas, C., & Pitropakis, N. (2018). Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 4(12), 153551. https://doi.org/10.4108/eai.10-1-2018.153551

QoS and Security features are playing an important role in modern network architecures. Dynamic selection of services and by extension of service providers are vital in today’s liberalized market of energy. On the other hand it is equally important f... Read More about Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture.

Resilience of Video Streaming Services to Network Impairments (2018)
Journal Article
Torres Vega, M., Perra, C., & Liotta, A. (2018). Resilience of Video Streaming Services to Network Impairments. IEEE Transactions on Broadcasting, 64(2), 220-234. https://doi.org/10.1109/tbc.2017.2781125

When dealing with networks, performance management through conventional quality of service (QoS)-based methods becomes difficult and is often ineffective. In fact, quality emerges as an end-to-end factor, for it is particularly sensitive to the end-u... Read More about Resilience of Video Streaming Services to Network Impairments.

An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres (2018)
Journal Article
Panneerselvam, J., Liu, L., Lu, Y., & Antonopoulos, N. (2018). An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres. Future Generation Computer Systems, 83, 239-249. https://doi.org/10.1016/j.future.2017.12.064

Cloud datacentre resources and the arriving jobs are addressed to be exhibiting increased level of heterogeneity. A single Cloud job may encompass one to several number of tasks, such tasks usually exhibit increased level of behavioural heterogeneity... Read More about An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres.

CACA-UAN: a context-aware communication approach to efficient and reliable underwater acoustic sensor networks (2018)
Journal Article
Liu, Q., Chen, X., Liu, X., & Linge, N. (2018). CACA-UAN: a context-aware communication approach to efficient and reliable underwater acoustic sensor networks. International Journal of Sensor Networks, 26(1), 1. https://doi.org/10.1504/ijsnet.2018.088364

Underwater Acoustic Sensor Networks (UANs) have emerged as a promising technology recently which can be applied in many areas such as military and civil, where the communication between devices is crucial and challenging due to the unique characteris... Read More about CACA-UAN: a context-aware communication approach to efficient and reliable underwater acoustic sensor networks.

A Cognitive-IoE Approach to Ambient-intelligent Smart Home (2017)
Presentation / Conference Contribution
Jamnal, G., & Liu, X. (2017, April). A Cognitive-IoE Approach to Ambient-intelligent Smart Home. Presented at 2nd International Conference on Internet of Things, Big Data and Security, Porto, Portugal

In today’s world, we are living in busy metropolitan cities and want our homes to be ambient intelligent enough towards our cognitive requirements for assisted living in smart space environment and an excellent smart home control system should not re... Read More about A Cognitive-IoE Approach to Ambient-intelligent Smart Home.

Visualization of Online Datasets (2017)
Journal Article
Peng, T., & Downie, C. (2017). Visualization of Online Datasets. International Journal of Networked and Distributed Computing, 6(1), 11-23. https://doi.org/10.2991/ijndc.2018.6.1.2

As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, information visualization becomes even more significant as we immerse ourselves into the era of big data, leading to... Read More about Visualization of Online Datasets.

Eidolon360 – A VR Experience (2017)
Presentation / Conference Contribution
Hood, B., & Flint, T. (2017, July). Eidolon360 – A VR Experience. Presented at HCI 2017 - Digital make-believe, University of Sunderland

Eidolon360 is a virtual reality artwork and experience that is interacted with through VR headsets. The viewer, reclining on a bed within the exhibition space, experiences a 360 film, shot within a medical simulation centre, that mimics clinical hosp... Read More about Eidolon360 – A VR Experience.

Cognitive Internet of Everything (CIoE): State of the Art and Approaches (2017)
Book Chapter
Jamnal, G. S., Liu, X., Fan, L., & Ramachandran, M. (2017). Cognitive Internet of Everything (CIoE): State of the Art and Approaches. In R. Mihajlovic, M. Ramachandran, R. Behringer, & P. Kocovic (Eds.), Emerging Trends and Applications of the Internet of Things; Advances in Wireless Technologies and Telecommunication (277-309). IGI Global. https://doi.org/10.4018/978-1-5225-2437-3.ch010

In today's world, we are living in busy metropolitan cities and want our homes to be ambient intelligent enough towards our cognitive requirements for assisted living in smart space environment and an excellent smart home control system should not re... Read More about Cognitive Internet of Everything (CIoE): State of the Art and Approaches.

Fast Filtering of Known PNG Files Using Early File Features (2017)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2017, May). Fast Filtering of Known PNG Files Using Early File Features. Presented at Annual Conference on Digital Forensics, Security and Law, Daytona Beach, Florida

A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given media, comparing individual... Read More about Fast Filtering of Known PNG Files Using Early File Features.

Aide Memoire (2017)
Presentation / Conference Contribution
Flint, T., & Dylan, T. H. (2017, July). Aide Memoire. Presented at HCI 2017 - Digital make-believe, University of Sunderland

The Aide Memoire is a fully realised product constructed from discarded testing equipment. Born out of a series of creative sessions exploring the broad theme of interactivity the product was developed in partnership between Tom Flint and Tommy Dylan... Read More about Aide Memoire.

A new dynamic weight clustering algorithm for wireless sensor networks (2017)
Presentation / Conference Contribution
Essa, A., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2016, May). A new dynamic weight clustering algorithm for wireless sensor networks. Presented at 1st EAI International Conference on Smart Grid Inspired Future Technologies (SmartGift 2016)

Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WSNs). Most existing approaches consider the residual energy of a single node... Read More about A new dynamic weight clustering algorithm for wireless sensor networks.

Modeling and analysis of a deep learning pipeline for cloud based video analytics (2017)
Presentation / Conference Contribution
Yaseen, M. U., Anjum, A., & Antonopoulos, N. (2017, December). Modeling and analysis of a deep learning pipeline for cloud based video analytics. Presented at BDCAT '17: Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, Austin, Texas, USA

Video analytics systems based on deep learning approaches are becoming the basis of many widespread applications including smart cities to aid people and traffic monitoring. These systems necessitate massive amounts of labeled data and training time... Read More about Modeling and analysis of a deep learning pipeline for cloud based video analytics.

Blockchain and Git repositories for sticky policies protected OOXML. (2017)
Presentation / Conference Contribution
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017

The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This work compliments research on secure data sharing
with Office Open XML (OOX... Read More about Blockchain and Git repositories for sticky policies protected OOXML..

Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies (2017)
Presentation / Conference Contribution
Asif, R. (2017, November). Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. Presented at IEEE Network of the Future (NoF) conference, London, UK

Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home (FTTH)' networks and data centers. It is important that the newly designed... Read More about Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies.

Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks (2017)
Presentation / Conference Contribution
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017, October). Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. Presented at 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)

The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing pr... Read More about Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks.

What can we learn from simulating commuters? (2017)
Presentation / Conference Contribution
Urquhart, N. (2017, November). What can we learn from simulating commuters?. Presented at U!REKA

Commuting affects just about every member of the workforce in the UK, those who do not commute are affected by the congestion and pollution generated by such activities. There is increasing pressure on organisations to adopt practices and measures th... Read More about What can we learn from simulating commuters?.