Skip to main content

Research Repository

Advanced Search

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode (2024)
Conference Proceeding
Buchanan, W., Grierson, S., & Uribe, D. (2024). Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. In Proceedings of the 10th International Conference on Information Systems Security and Privacy (226-233). https://doi.org/10.5220/0012454300003648

Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could... Read More about Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.

A Probability Mapping-Based Privacy Preservation Method for Social Networks (2024)
Conference Proceeding
Li, Q., Wang, Y., Wang, F., Tan, Z., & Wang, C. (2024). A Probability Mapping-Based Privacy Preservation Method for Social Networks. . https://doi.org/10.1007/978-981-97-1274-8_19

The mining and analysis of social networks can bring significant economic and social benefits. However, it also poses a risk of privacy leakages. Differential privacy is a de facto standard to prevent such leaks, but it suffers from the high sensitiv... Read More about A Probability Mapping-Based Privacy Preservation Method for Social Networks.

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT (2024)
Journal Article
Alshehri, M. S., Ahmad, J., Almakdi, S., Qathrady, M. A., Ghadi, Y. Y., & Buchanan, W. J. (in press). SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT. IEEE Access, https://doi.org/10.1109/access.2024.3371992

The rise of Internet of Things (IoT) has led to increased security risks, particularly from botnet attacks that exploit IoT device vulnerabilities. This situation necessitates effective Intrusion Detection Systems (IDS), that are accurate, lightweigh... Read More about SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT.

STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation (2024)
Journal Article
Fang, M., Yu, L., Xie, H., Tan, Q., Tan, Z., Hussain, A., …Tian, Z. (in press). STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation. IEEE Transactions on Computational Social Systems, https://doi.org/10.1109/tcss.2024.3356549

The impressive development of facial manipulation techniques has raised severe public concerns. Identity-aware methods, especially suitable for protecting celebrities, are seen as one of promising face forgery detection approaches with additional ref... Read More about STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation.

An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case (2024)
Conference Proceeding
Onyeashie, B., Leimich, P., McKeown, S., & Russell, G. (2024). An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case. In Big Data Technologies and Applications (156-167). https://doi.org/10.1007/978-3-031-52265-9_11

This paper presents a decentralised framework for sharing and managing evidence that uses smart lockers, blockchain technology, and the InterPlanetary File System (IPFS). The system incorporates Hyperledger Fabric blockchain for immutability and tamp... Read More about An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case.

A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence (2024)
Conference Proceeding
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2024). A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence. In Big Data Technologies and Applications. BDTA 2023. https://doi.org/10.1007/978-3-031-52265-9_8

The effective management of digital evidence is critical to modern forensic investigations. However, traditional evidence management approaches are often prone to security and integrity issues. In recent years, the use of blockchain technology has em... Read More about A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence.

Potential of Satellite-Airborne Sensing Technologies for Agriculture 4.0 and Climate-Resilient: A Review (2023)
Journal Article
Hazmy, A. I., Hawbani, A., Wang, X., Al-Dubai, A., Ghannami, A., Yahya, A. A., …Alsamhi, S. H. (2024). Potential of Satellite-Airborne Sensing Technologies for Agriculture 4.0 and Climate-Resilient: A Review. IEEE Sensors Journal, 24(4), 4161-4180. https://doi.org/10.1109/jsen.2023.3343428

Agriculture 4.0 offers the potential to revolutionize the agriculture sector through improved productivity and efficiency. However, adopting Agriculture 4.0 requires a period of transition and effort. Satellite-Airborne sensing technologies may becom... Read More about Potential of Satellite-Airborne Sensing Technologies for Agriculture 4.0 and Climate-Resilient: A Review.

PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework (2023)
Journal Article
Mckeown, S., Aaby, P., & Steyven, A. (in press). PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework. Forensic Science International: Digital Investigation, 48(Supplement), Article 301680

The automated comparison of visual content is a contemporary solution to scale the detection of illegal media and extremist material, both for detection on individual devices and in the cloud. However, the problem is difficult, and perceptual similar... Read More about PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework.

Minkowski Based Microwave Resonator for Material Detection over Sub-6 GHz 5G Spectrum (2023)
Conference Proceeding
Anwer, A. I., Alibakhshikenari, . M., Elwi, T., Virdee, B., Kouhalvandi, L., Abdul Hassain, Z. A., …Livreri, P. (2023). Minkowski Based Microwave Resonator for Material Detection over Sub-6 GHz 5G Spectrum. . https://doi.org/10.1109/6GNet58894.2023.10317726

This paper describes the performance of a low-cost, high-sensitive microwave resonator for 5G modern wireless communication systems operating through sub-6GHz spectrum. Here, the proposed resonator is constructed from a Minkowski fractal open stub th... Read More about Minkowski Based Microwave Resonator for Material Detection over Sub-6 GHz 5G Spectrum.

Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities (2023)
Journal Article
Tallat,, R., Hawbani, A., Wang, X., Al-Dubai, A., Zhao, L., Liu, Z., …Alsamhi, S. (in press). Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities. Communications Surveys and Tutorials, IEEE Communications Society, https://doi.org/10.1109/comst.2023.3329472

This century has been a major avenue for revolutionary changes in technology and industry. Industries have transitioned towards intelligent automation, relying less on human intervention, resulting in the fourth industrial revolution, Industry 4.0. T... Read More about Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities.

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Conference Proceeding
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (in press). Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices (2023)
Conference Proceeding
Spalding, A., Tan, Z., & Babaagba, K. O. (in press). Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. In Proceedings of the 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023)

Data recovery for forensic analysis of both hard drives and solid state media presents its own unique set of challenges. Hard drives face mechanical failures and data fragmentation , but their sequential storage and higher success rates make recovery... Read More about Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices.

Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant (2023)
Journal Article
Elmiger, M., Lemoudden, M., Pitropakis, N., & Buchanan, W. J. (2024). Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. International Journal of Information Security, 23, 467-485. https://doi.org/10.1007/s10207-023-00751-6

The challenge of securing IT environments has reached a new complexity level as a growing number of organisations adopt cloud solutions. This trend increases the possibility of overseen attack paths in an organisation’s IT infrastructure. This paper... Read More about Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.

Self-attention is What You Need to Fool a Speaker Recognition System (2023)
Conference Proceeding
Wang, F., Song, R., Tan, Z., Li, Q., Wang, C., & Yang, Y. (in press). Self-attention is What You Need to Fool a Speaker Recognition System.

Speaker Recognition Systems (SRSs) are becoming increasingly popular in various aspects of life due to advances in technology. However, these systems are vulnerable to cyber threats, particularly adversarial attacks. Traditional adversarial attack me... Read More about Self-attention is What You Need to Fool a Speaker Recognition System.

Majority Voting Ransomware Detection System (2023)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2023). Majority Voting Ransomware Detection System. Journal of Information Security, 14(4), 264-293. https://doi.org/10.4236/jis.2023.144016

Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic la... Read More about Majority Voting Ransomware Detection System.

Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method (2023)
Journal Article
Li, Z., Zhao, L., Min, G., Al-Dubai, A. Y., Hawbani, A., Zomaya, A. Y., & Luo, C. (2023). Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method. IEEE Transactions on Intelligent Transportation Systems, 24(12), 14022 - 14036. https://doi.org/10.1109/tits.2023.3300082

Greedy routing efficiently achieves routing solutions for vehicular networks due to its simplicity and reliability. However, the existing greedy routing schemes have mainly considered simple routing metrics only, e.g., distance based on the local vie... Read More about Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method.

A Transcriptomic Appreciation of Childhood Meningococcal and Polymicrobial Sepsis from a Pro-Inflammatory and Trajectorial Perspective, a Role for Vascular Endothelial Growth Factor A and B Modulation? (2023)
Journal Article
Rashid, A., Brusletto, B. S., Al-Obeidat, F., Toufiq, M., Benakatti, G., Brierley, J., …Hussain, A. (2023). A Transcriptomic Appreciation of Childhood Meningococcal and Polymicrobial Sepsis from a Pro-Inflammatory and Trajectorial Perspective, a Role for Vascular Endothelial Growth Factor A and B Modulation?. Shock, 60(4), 503-516. https://doi.org/10.1097/shk.0000000000002192

This study investigated the temporal dynamics of childhood sepsis by analyzing gene expression changes associated with proinflammatory processes. Five datasets, including four meningococcal sepsis shock (MSS) datasets (two temporal and two longitudin... Read More about A Transcriptomic Appreciation of Childhood Meningococcal and Polymicrobial Sepsis from a Pro-Inflammatory and Trajectorial Perspective, a Role for Vascular Endothelial Growth Factor A and B Modulation?.

A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models (2023)
Conference Proceeding
Almaini, A., Folz, J., Woelfl, D., Al-Dubai, A., Schramm, M., & Heigl, M. (2023). A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models. In 2023 International Wireless Communications and Mobile Computing (IWCMC) ( 890-897). https://doi.org/10.1109/IWCMC58020.2023.10183131

Due to the increasing privacy demand in data processing, Fully Homomorphic Encryption (FHE) has recently received growing attention for its ability to perform calculations over encrypted data. Since the data can be processed in encrypted form and the... Read More about A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models.

A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes (2023)
Conference Proceeding
Alahamadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2023). A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes. In 2023 International Wireless Communications and Mobile Computing (IWCMC) (917-922). https://doi.org/10.1109/IWCMC58020.2023.10182638

Time-Slotted Medium Access Control protocols bring advantages to the scalability of LoRa networks as an alternative to the ALOHA access method. However, such Time-Slotted protocols require nodes synchronization and schedules dissemination under strin... Read More about A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes.