Skip to main content

Research Repository

Advanced Search

Outputs (682)

Machine Learning-driven Optimization for SVM-based Intrusion Detection System in Vehicular Ad Hoc Networks (2021)
Journal Article
Alsarhan, A., Alauthman, M., Alshdaifat, E., Al-Ghuwairi, A., & Al-Dubai, A. (2023). Machine Learning-driven Optimization for SVM-based Intrusion Detection System in Vehicular Ad Hoc Networks. Journal of Ambient Intelligence and Humanized Computing, 14(5), 6113-6122. https://doi.org/10.1007/s12652-021-02963-x

Machine Learning (ML) driven solutions have been widely used to secure wireless communications Vehicular ad hoc networks (VANETs) in recent studies. Unlike existing works, this paper applies support vector machine (SVM) for intrusion detection in VAN... Read More about Machine Learning-driven Optimization for SVM-based Intrusion Detection System in Vehicular Ad Hoc Networks.

Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. (1996)
Thesis
Buchanan, W. J. Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4022

The 3D Finite-Difference Time-Domain (FDTD) method simulates structures in the time-domain using a direct form of Maxwell’s curl equations. This method has the advantage over other simulation methods in that it does not use empirical approximations.... Read More about Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing..

Vehicular Computation Offloading for Industrial Mobile Edge Computing (2021)
Journal Article
Zhao, L., Yang, K., Tan, Z., Song, H., Al-Dubai, A., & Zomaya, A. (2021). Vehicular Computation Offloading for Industrial Mobile Edge Computing. IEEE Transactions on Industrial Informatics, 17(11), 7871-7881. https://doi.org/10.1109/TII.2021.3059640

Due to the limited local computation resource, industrial vehicular computation requires offloading the computation tasks with time-delay sensitive and complex demands to other intelligent devices (IDs) once the data is sensed and collected collabora... Read More about Vehicular Computation Offloading for Industrial Mobile Edge Computing.

Applied PC interfacing, graphics and interrupts. (1996)
Book
Buchanan, W. J. (1996). Applied PC interfacing, graphics and interrupts. Addison Wesley

Using good practical examples, this new book introduces the reader to the component parts of a PC, showing how high and low level languages communicate with them, and how computers communicate with peripherals.

C for Electronic Engineering with Applied Software Engineering. (1995)
Book
Buchanan, W. J. (1995). C for Electronic Engineering with Applied Software Engineering. Prentice Hall

The objective of this text is to provide a practical introduction to the C programming language through the usage of electrical/electronic examples. All the examples in the text are related to the specific discipline of electronics, and this approach... Read More about C for Electronic Engineering with Applied Software Engineering..

A Novel Heuristic Data Routing for Urban Vehicular Ad-hoc Networks (2021)
Journal Article
Hawbani, A., Wang, X., Al-Dubai, A., Zhao, L., Busaileh, . O., Liu, P., & Al-qaness, M. (2021). A Novel Heuristic Data Routing for Urban Vehicular Ad-hoc Networks. IEEE Internet of Things Journal, 8(11), 8976-8989. https://doi.org/10.1109/JIOT.2021.3055504

This work is devoted to solving the problem of multi-criteria multi-hop routing in vehicular ad-hoc networks (VANETs), aiming at three goals, increasing the end-to-end delivery ratio, reducing the end-to-end latency, and minimizing the network overhe... Read More about A Novel Heuristic Data Routing for Urban Vehicular Ad-hoc Networks.

Secure Lightweight Stream Data Outsourcing for Internet of Things (2021)
Journal Article
Peng, S., Zhao, L., Al-Dubai, A., Zomaya, A., Hu, J., Min, G., & Wang, Q. (2021). Secure Lightweight Stream Data Outsourcing for Internet of Things. IEEE Internet of Things Journal, 8(13), 10815-10829. https://doi.org/10.1109/JIOT.2021.3050732

The epoch of the Internet of Things (IoT) has come by enabling almost everything to gather and share electronic information. Considering the unreliable factors of public IoT, how to outsource huge amounts of indispensable stream data generated by the... Read More about Secure Lightweight Stream Data Outsourcing for Internet of Things.

An experimental analysis of attack classification using machine learning in IoT networks (2021)
Journal Article
Churcher, A., Ullah, R., Ahmad, J., Ur Rehman, S., Masood, F., Gogate, M., Alqahtani, F., Nour, B., & Buchanan, W. J. (2021). An experimental analysis of attack classification using machine learning in IoT networks. Sensors, 21(2), Article 446. https://doi.org/10.3390/s21020446

In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature,... Read More about An experimental analysis of attack classification using machine learning in IoT networks.

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach (2020)
Presentation / Conference Contribution
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020, February). Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. Presented at ICISSP 2020, Valletta, Malta

Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high situational awareness, it can still be hard for users to continually be awa... Read More about Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach.

Privacy-preserving Surveillance Methods using Homomorphic Encryption (2020)
Presentation / Conference Contribution
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020, February). Privacy-preserving Surveillance Methods using Homomorphic Encryption. Presented at 6th International Conference on Information Security Systems and Privacy (ICISSP), Valletta, Malta

Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encryption to protect all states of the data: in-transit, at-rest, and in-memory.... Read More about Privacy-preserving Surveillance Methods using Homomorphic Encryption.

Understanding Personal Online Risk To Individuals Via Ontology Development (2020)
Presentation / Conference Contribution
Haynes, D. (2020, July). Understanding Personal Online Risk To Individuals Via Ontology Development. Presented at International Societey for Knowledge Organziation (ISKO) 2020, Aalborg, Denmark

The concept of risk is widely misunderstood because of the different contexts in which it is used. This paper describes the development of an ontology of risk as a way of better understanding the nature of the potential harms individuals are exposed... Read More about Understanding Personal Online Risk To Individuals Via Ontology Development.

Cooja Simulator Manual (2016)
Report
Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., & Wadhaj, I. (2016). Cooja Simulator Manual. Edinburgh: Edinburgh Napier University

While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation. The Contiki website provides an image of Instant Contiki which can then be... Read More about Cooja Simulator Manual.

Mobility And Energy Extensions For The IEEE 802.15.4 Standard (2015)
Presentation / Conference Contribution
Romdhani, I., Al-Dubai, A. Y., & Guibene, W. (2015, December). Mobility And Energy Extensions For The IEEE 802.15.4 Standard. Presented at Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia - MoMM 2015

The IEEE 802.15.4 standard is designed for low-power and low-rate wireless Personal Area Networks. Although energy is a key parameter in shaping the communication and interaction methods of wireless sensor nodes, the specification of the MAC layer do... Read More about Mobility And Energy Extensions For The IEEE 802.15.4 Standard.

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing (2020)
Journal Article
Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., Haynes, D., Pitropakis, N., & Papadopoulos, P. (2020). Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. Frontiers in Communications and Networks, https://doi.org/10.3389/frcmn.2020.583376

The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking. Many nations of the world have therefore, developed their own ways... Read More about Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification (2020)
Journal Article
Luo, C., Tan, Z., Min, G., Gan, J., Shi, W., & Tian, Z. (2021). A Novel Web Attack Detection System for Internet of Things via Ensemble Classification. IEEE Transactions on Industrial Informatics, 17(8), 5810-5818. https://doi.org/10.1109/tii.2020.3038761

Internet of things (IoT) has become one of the fastestgrowing technologies and has been broadly applied in various fields. IoT networks contain millions of devices with the capability of interacting with each other and providing functionalities that... Read More about A Novel Web Attack Detection System for Internet of Things via Ensemble Classification.

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network (2020)
Presentation / Conference Contribution
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (2020, April). A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network. Presented at IEEE 6th World Forum on Internet of Things, New Orleans, Louisiana, USA

The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as the sink node shall still pass some nodes more closely and frequently than... Read More about A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network.

A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading (2020)
Journal Article
Zhao, L., Yang, K., Tan, Z., Li, X., Sharma, S., & Liu, Z. (2021). A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading. IEEE Transactions on Intelligent Transportation Systems, 22(6), 3664-3674. https://doi.org/10.1109/TITS.2020.3024186

Vehicular computation offloading is a well-received strategy to execute delay-sensitive and/or compute-intensive tasks of legacy vehicles. The response time of vehicular computation offloading can be shortened by using mobile edge computing that offe... Read More about A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading.

Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks (2020)
Journal Article
Hawbani, A., Wang, X., Zhao, L., Al-Dubai, A., Min, G., & Busaileh, O. (2020). Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks. IEEE/ACM Transactions on Networking, 28(6), 2809-2822. https://doi.org/10.1109/TNET.2020.3020984

This article extends the promising software-defined networking technology to wireless sensor networks to achieve two goals: 1) reducing the information exchange between the control and data planes, and 2) counterbalancing between the sender's waiting... Read More about Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks.

A Distributed Trust Framework for Privacy-Preserving Machine Learning (2020)
Presentation / Conference Contribution
Abramson, W., Hall, A. J., Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2020, September). A Distributed Trust Framework for Privacy-Preserving Machine Learning. Presented at The 17th International Conference on Trust, Privacy and Security in Digital Business - TrustBus2020, Bratislava, Slovakia

When training a machine learning model, it is standard procedure for the researcher to have full knowledge of both the data and model. However, this engenders a lack of trust between data owners and data scientists. Data owners are justifiably reluct... Read More about A Distributed Trust Framework for Privacy-Preserving Machine Learning.