Skip to main content

Research Repository

Advanced Search

Outputs (682)

Validation of 1-N OT algorithms in privacy-preserving investigations. (2008)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Saliou, L. (2008). Validation of 1-N OT algorithms in privacy-preserving investigations.

Most organisations relay on digital information systems (ISs) in day-to-day operations, and often sensitive data about employees and customers are stored in such systems. This, effectively, makes ISs enhanced surveillance measures, which can reach fu... Read More about Validation of 1-N OT algorithms in privacy-preserving investigations..

A multi-channel hybrid MAC protocol for wireless Mesh networks. (2008)
Presentation / Conference Contribution
Romdhani, I., & Al-Dubai, A. (2008). A multi-channel hybrid MAC protocol for wireless Mesh networks. In Proceedings of the IEEE 8th International Symposium on Computer Networks (ISCN?08), Istanbul, Turkey

A new multicast algorithm for wireless mesh networks. (2008)
Presentation / Conference Contribution
Zhao, L., Al-Dubai, A., & Liu, X. (2008). A new multicast algorithm for wireless mesh networks. In 9th Annual Postgraduate Symposium, The Convergence of Telecommunications, Networking and Broadcasting

Wireless mesh networks, also known as “community wireless networks”, have been attracting much attention due to its promising technology. It is becoming a major avenue for the fourth generation of wireless mobility. This is due to the revaluation of... Read More about A new multicast algorithm for wireless mesh networks..

On The Design of High Throughput Adaptive Multicast Communication (2007)
Presentation / Conference Contribution
Al-Dubai, A. Y., & Romdhani, I. (2007, July). On The Design of High Throughput Adaptive Multicast Communication. Presented at Sixth International Symposium on Parallel and Distributed Computing (ISPDC'07)

The efficient and high throughput multicast communication in interconnection networks is known as a fundamental but hard problem. In the literature, most of the related works handle multicast communication within limited operating conditions and low... Read More about On The Design of High Throughput Adaptive Multicast Communication.

Mobile IP conditional binding update. (2007)
Presentation / Conference Contribution
Romdhani, I., & Al-Dubai, A. (2007). Mobile IP conditional binding update. In 1st IEEE Workshop on Autonomic Communication and Network Management ACNM-2007, 10th IFIP/IEEE Symposium on Integrated Management (64-70)

Mobile IP protocols use a correspondent registration procedure between a Mobile Node (MN) and its Correspondent Nodes (CNs) to maintain a valid and up-to-date binding association between MN’s home address and its current care-ofaddress whenever a han... Read More about Mobile IP conditional binding update..

On High Performance Multicast Algorithms for Interconnection Networks (2006)
Presentation / Conference Contribution
Al-Dubai, A., Ould-Khaoua, M., & Romdhani, I. (2006, September). On High Performance Multicast Algorithms for Interconnection Networks. Presented at HPCC 2006: High Performance Computing and Communications

Although multicast communication, in interconnection networks has been a major avenue for a lot of research works found in literature, there are several key issues that should still be improved in order to meet the increasing demand for service quali... Read More about On High Performance Multicast Algorithms for Interconnection Networks.

Investigating false positive reduction in HTTP via procedure analysis. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). Investigating false positive reduction in HTTP via procedure analysis. . https://doi.org/10.1109/ICNS.2006.65

This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection systems (IDSs) are discussed. Then we present our research efforts in the form... Read More about Investigating false positive reduction in HTTP via procedure analysis..

Hierarchical Home Agent Architecture for Mobile IP Communications (2006)
Presentation / Conference Contribution
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006, June). Hierarchical Home Agent Architecture for Mobile IP Communications. Presented at 11th IEEE Symposium on Computers and Communications (ISCC'06)

While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile node uses multiple HAs located in different physical links in his home network... Read More about Hierarchical Home Agent Architecture for Mobile IP Communications.

Mobile Multicast Route Optimisation (2006)
Presentation / Conference Contribution
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006). Mobile Multicast Route Optimisation. In IEEE International Conference on Communications, 2006. ICC '06 (1977-1983). https://doi.org/10.1109/icc.2006.255060

The multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional delay in receiving multicast packets due to handover delay, join latency, a... Read More about Mobile Multicast Route Optimisation.

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. (2006)
Presentation / Conference Contribution
Graves, J., Buchanan, W. J., Saliou, L., & Old, L. J. (2006). Performance analysis of network based forensic systems for in-line and out-of-line detection and logging.

Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers and Intrusion Detection Systems (IDSs) can yield important information, whi... Read More about Performance analysis of network based forensic systems for in-line and out-of-line detection and logging..

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. (2006)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2006). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In W. Hutchinson (Ed.),

Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, they are normally done manually. Ultimately, the social and hierarchical stru... Read More about Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations..

Transparent Handover for Mobile Multicast Sources (2006)
Presentation / Conference Contribution
Romdhani, I., Bettahar, H., & Bouabdallah, A. (2006, April). Transparent Handover for Mobile Multicast Sources. Presented at International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06)

The Internet research community has proposed many routing protocols to support efficient multicast application. However, these protocols were developed for multicast parties whose members are topologically stationary, and they thus do not support bot... Read More about Transparent Handover for Mobile Multicast Sources.

Enhancing intrusion detection via an active target host. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). Enhancing intrusion detection via an active target host. In IEEE ICTe Africa 2006

Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of networked resources. In other to reduce these attacks, Intrusion Detection Syste... Read More about Enhancing intrusion detection via an active target host..

A framework to detect novel computer viruses via system calls. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006, December). A framework to detect novel computer viruses via system calls. Presented at 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting

This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries (DLLs). Our research approach is based on the principle that a key objecti... Read More about A framework to detect novel computer viruses via system calls..

A Performance Study of Path Based Multicast Communication Algorithms (2006)
Presentation / Conference Contribution
Al-Dubai, A., & Romdhani, I. (2006). A Performance Study of Path Based Multicast Communication Algorithms. In International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2006) (245-250). https://doi.org/10.1109/parelec.2006.7

Multicast communication?s history has been driven by many schemes; however, a few have shown their efficiency on interconnection networks. Among these schemes, path based multicast has been proven to be more efficient in handling multicast, than thos... Read More about A Performance Study of Path Based Multicast Communication Algorithms.

Agent-based systems for Ad-hoc routing. (2006)
Presentation / Conference Contribution
Buchanan, W. J., Migas, N., & McArtney, K. (2006). Agent-based systems for Ad-hoc routing.

Provides a foundation in agent-based systems for Ad-hoc routing.

An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing (2006)
Presentation / Conference Contribution
Migas, N., & Buchanan, W. (2006, March). An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing. Presented at 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)

Multi-hop ad-hoc routing is a challenging issue, because of the dynamic network topology, and limited capabilities of resource-constrained mobile devices. This paper proposes a metric-driven clustering organisation of participating nodes which provid... Read More about An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing.

Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification (2005)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. In W. Hutchinson (Ed.),

This paper presents a novel framework for network security, and provides a complete solution to integrated security policies, which meets the objectives of an organisation, and also an automated verification process. The framework uses a security com... Read More about Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification.

On the performance of broadcast algorithms in interconnection networks. (2005)
Presentation / Conference Contribution
Al-Dubai, A., & Ould-Khaoua, M. (2005). On the performance of broadcast algorithms in interconnection networks. . https://doi.org/10.1109/ICPPW.2005.63

Broadcast Communication is among the most primitive collective capabilities of any message passing network. Broadcast algorithms for the mesh have been widely reported in the literature. However, most existing algorithms have been studied within limi... Read More about On the performance of broadcast algorithms in interconnection networks..

Agent-based forensic investigations with an integrated framework. (2005)
Presentation / Conference Contribution
Buchanan, W. J., Graves, J., Saliou, L., Sebea, A. L., & Migas, N. (2005). Agent-based forensic investigations with an integrated framework.

Forensics investigations can be flawed for many reasons, such as that they can lack any real evidence of an incident. Also, it can be the case that the legal rights of an individual has been breached, or that the steps taken in the investigation cann... Read More about Agent-based forensic investigations with an integrated framework..