Skip to main content

Research Repository

Advanced Search

Outputs (253)

An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation (2015)
Journal Article
Fang, D., Liu, X., Romdhani, I., Jamshidi, P., & Pahl, C. (2016). An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation. Future Generation Computer Systems, 56, 11-26. https://doi.org/10.1016/j.future.2015.09.025

Cloud computing enables a revolutionary paradigm of consuming ICT services. However, due to the inadequately described service information, users often feel confused while trying to find the optimal services. Although some approaches are proposed to... Read More about An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation.

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach (2015)
Presentation / Conference Contribution
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015, September). Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. Presented at Proceedings of the 2015 Federated Conference on Computer Science and Information Systems

In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the design of WSN energy efficient algorithms and standards. The standard IEEE 80... Read More about Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach.

5G-PPP White Paper on eHealth Vertical Sector (2015)
Report
Thuemmler, C., Jumelle, A. K. L., Paulin, A., Sadique, A., Schneider, A., Fedell, C., Abraham, D., Trossen, D., Strinati, E. C., Cavallo, F., Feussner, H., Hay, I., Bedo, J., Micocci, S., Nunziata, S., Gallelli, T., & Covaci, S. (2015). 5G-PPP White Paper on eHealth Vertical Sector. Brussels: EU Commission

Gaston Crommenlaan 1 PO box: 101 9050 Gent Belgium www.5g-ppp.eu 5G and e-Health 1 Socioeconomic drivers of e-Health in Horizon 2020 Although socioeconomically the sector addressed by this white paper is the health sector, the detailed analysis will... Read More about 5G-PPP White Paper on eHealth Vertical Sector.

ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Imed, R., & Yassien, M. B. (2015, September). ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things. Presented at Proceedings of the The International Conference on Engineering & MIS 2015 - ICEMIS '15

Energy is a precious resource in Internet of Things (IoT) especially with battery operated nodes, the overhead that consumes the battery power of the sensor nodes is a fundamental problem. This overhead is mainly caused by the frequent update message... Read More about ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things.

A decentralized group key management protocol for mobile Internet of things (DBGK) (2015)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, August). A decentralized group key management protocol for mobile Internet of things (DBGK). Paper presented at The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)

Architecting the Internet of Things: State of the Art (2015)
Book Chapter
Abdmeziem, M. R., Romdhani, I., & Tandjaoui, D. (2016). Architecting the Internet of Things: State of the Art. In A. Koubaa, & E. Shakshuki (Eds.), Robots and Sensor Clouds; Studies in Systems, Decision and Control (55-75). Springer. https://doi.org/10.1007/978-3-319-22168-7_3

Internet of things (IoT) constitutes one of the most important technological development in the last decade. It has the potential to deeply affect our life style. However, its success relies greatly on a well-defined architecture that will provide sc... Read More about Architecting the Internet of Things: State of the Art.

A new adaptive probabilistic broadcast protocol for vehicular networks (2015)
Presentation / Conference Contribution
Al-Dubai, A. Y., Khalaf, M. B., Gharibi, W., & Ouenniche, J. (2015, May). A new adaptive probabilistic broadcast protocol for vehicular networks. Presented at 2015 IEEE 81st Vehicular Technology Conference: VTC Spring 2015

In VANETs, there are many applications that use broadcast communication as a fundamental operational tool, in disseminating information of interest to other road users under the umbrella of both safety and entertainment applications. Recently, the pr... Read More about A new adaptive probabilistic broadcast protocol for vehicular networks.

Stable Infrastructure-based routing for Intelligent transportation systems (2015)
Presentation / Conference Contribution
Al-Kubati, G., Al-Dubai, A., Mackenzie, L., & Pezaros, D. P. (2015, June). Stable Infrastructure-based routing for Intelligent transportation systems. Presented at 2015 IEEE International Conference on Communications (ICC), London, UK

Intelligent Transportation Systems (ITSs) have been instrumental in reshaping transportation towards safer roads, seamless logistics, and digital business-oriented services under the umbrella of smart city platforms. Undoubtedly, ITS applications wil... Read More about Stable Infrastructure-based routing for Intelligent transportation systems.

How do International New Ventures Create Social Capital? A Local and Global Networking Activities Perspective. (2015)
Presentation / Conference Contribution
Warner, K. S. R., & Jones, M. V. (2015, June). How do International New Ventures Create Social Capital? A Local and Global Networking Activities Perspective. Presented at The Academy of International Business (AIB) Worldwide Annual Meeting

It is widely acknowledged in the international entrepreneurship (IE) literature that social capital is a vital asset for new venture internationalization. Despite a well published body of literature on network based research, it is still unclear as t... Read More about How do International New Ventures Create Social Capital? A Local and Global Networking Activities Perspective..

An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework (2015)
Journal Article
Fang, D., Liu, X., Romdhani, I., & Pahl, C. (2015). An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework. Journal of cloud computing: advances, systems and applications, 4(1), https://doi.org/10.1186/s13677-015-0039-3

Cloud computing offers various computational resources via convenient on-demand service provision. Currently, heterogeneous services and cloud resources are usually utilized and managed through diverse service portals. This significantly limits the e... Read More about An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework.

A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. (2015)
Presentation / Conference Contribution
Fang, D., Liu, X., & Romdhani, I. (2015, May). A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. Presented at Fifth International Conference on Cloud Computing, GRIDs, and Virtualization

As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While many approaches are proposed on the specification and discovery of cloud s... Read More about A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval..

New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks (2015)
Journal Article
Bani Khalaf, M., Al-Dubai, A. Y., & Min, G. (2015). New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks. Journal of Computer and System Sciences, 81(1), 97-109. https://doi.org/10.1016/j.jcss.2014.06.014

Most existing route discovery schemes in MANETs are based on probabilistic models by which MANETs usually deploy broadcast mechanisms to discover routes between nodes. This is implemented by flooding the network with routing requests (RREQ) packets w... Read More about New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks.

Process discovery in highly parallel distributed systems. (2014)
Presentation / Conference Contribution
Kerridge, J. (2014). Process discovery in highly parallel distributed systems.

In distributed data processing systems it may happen that data arrives for
processing for which the appropriate algorithm is not available on the specific node
of the distributed system. It is however known that the required algorithm is
available... Read More about Process discovery in highly parallel distributed systems..

Intrusion detection method based on nonlinear correlation measure (2014)
Journal Article
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2014). Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. https://doi.org/10.1504/ijipt.2014.066377

Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services, are more widespread and closely related to our daily life. Thus, it has ra... Read More about Intrusion detection method based on nonlinear correlation measure.

If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments (2014)
Journal Article
Pitropakis, N., Anastasopoulou, D., Pikrakis, A., & Lambrinoudakis, C. (2014). If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments. Journal of cloud computing: advances, systems and applications, 3(1), https://doi.org/10.1186/s13677-014-0020-6

Computational systems are gradually moving towards Cloud Computing Infrastructures, using the several advantages they have to offer and especially the economic advantages in the era of an economic crisis. In addition to this revolution, several secur... Read More about If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments.

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques (2014)
Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015). Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218

Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing approaches based on machine learning and statistical analysis, the proposed... Read More about Detection of Denial-of-Service Attacks Based on Computer Vision Techniques.

QoS-aware Inter-domain multicast for scalable wireless community networks (2014)
Journal Article
Al-Dubai, A. Y., Zhao, L., Zomaya, A. Y., & Min, G. (2014). QoS-aware Inter-domain multicast for scalable wireless community networks. IEEE Transactions on Parallel and Distributed Systems, 26(11), 3136-3148. https://doi.org/10.1109/TPDS.2014.2365190

Wireless Community Networks (WCNs) have emerged as a cost-effective ubiquitous broadband connectivity solution, offering a wide range of services in a given geographical area. QoS-aware multicast over WCNs is among the most challenging issues and has... Read More about QoS-aware Inter-domain multicast for scalable wireless community networks.

A Novel Feature Selection Approach for Intrusion Detection Data Classification (2014)
Presentation / Conference Contribution
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F., & Nagar, U. T. (2014). A Novel Feature Selection Approach for Intrusion Detection Data Classification. . https://doi.org/10.1109/trustcom.2014.15

Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats. However, the routinely produced analytical data from computer networks ar... Read More about A Novel Feature Selection Approach for Intrusion Detection Data Classification.

Enhancing Big Data Security with Collaborative Intrusion Detection (2014)
Journal Article
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014). Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. https://doi.org/10.1109/mcc.2014.53

Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a data-driven process. The security and privacy of this data, however, have al... Read More about Enhancing Big Data Security with Collaborative Intrusion Detection.