Skip to main content

Research Repository

Advanced Search

Outputs (682)

Mining malware command and control traces (2018)
Presentation / Conference Contribution
McLaren, P., Russell, G., & Buchanan, B. (2018). Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017. https://doi.org/10.1109/SAI.2017.8252185

Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, which enables the malware to respond to controller commands. The detection o... Read More about Mining malware command and control traces.

A nonlinear correlation measure for Intrusion Detection (2012)
Presentation / Conference Contribution
Ambusaidi, M., Lu, L. F., He, X., Tan, Z., Jamdagni, A., & Nanda, P. (2012, November). A nonlinear correlation measure for Intrusion Detection. Paper presented at The 7th International Conference on Frontier of Computer Science and Technology (FCST-12)

The popularity of using internet contains some risks of network attacks. It has attracted the attention of many researchers to overcome this problem. One of the effective ways that plays an important role to achieve higher security and protect networ... Read More about A nonlinear correlation measure for Intrusion Detection.

Securing the Internet of Things (2017)
Book
Romdhani, I. (2017). S. Li, & L. Da Xu (Eds.), Securing the Internet of Things. Elsevier

Key Features Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures Explores how the threats in IoT are different from traditional ad hoc or infrastructural network... Read More about Securing the Internet of Things.

A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers (2019)
Journal Article
Han, T., Jan, S., Tan, T., Usman, M., Jan, M., Khan, R., & Xu, Y. (2020). A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers. Concurrency and Computation: Practice and Experience, 32(16), Article e5300. https://doi.org/10.1002/cpe.5300

Software De ned Network (SDN) and Network Virtualization (NV) are emerged paradigms that simpli ed the control and management of the next generation networks, most importantly, Internet of Things (IoT), Cloud Computing, and Cyber-Physical Systems. Th... Read More about A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers.

Future Quantum-to-the-Home (QTTH) All-Optical Networks (Invited Talk) (2019)
Presentation / Conference Contribution
Asif, R. (2018, August). Future Quantum-to-the-Home (QTTH) All-Optical Networks (Invited Talk). Presented at 10th International Conference on Advanced Infocomm Technology, Stockholm, Sweden

For imparting data security to the end-users in a archetypal fiber-to-the-home (FTTH) network, quantum cryptography (QC) is getting much attention now-a-days. QC or more specifically quantum key distribution (QKD) promises unconditionally secure prot... Read More about Future Quantum-to-the-Home (QTTH) All-Optical Networks (Invited Talk).

A Forensic Audit of the Tor Browser Bundle (2019)
Journal Article
Muir, M., Leimich, P., & Buchanan, W. J. (2019). A Forensic Audit of the Tor Browser Bundle. Digital Investigation, 29, 118-128. https://doi.org/10.1016/j.diin.2019.03.009

The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its lo... Read More about A Forensic Audit of the Tor Browser Bundle.

Analyzing Objective and Subjective Data in Social Sciences: Implications for Smart Cities (2019)
Journal Article
Erhan, L., Ndubuaku, M., Ferrara, E., Richardson, M., Sheffield, D., Ferguson, F. J., Brindley, P., & Liotta, A. (2019). Analyzing Objective and Subjective Data in Social Sciences: Implications for Smart Cities. IEEE Access, 7, 19890-19906. https://doi.org/10.1109/access.2019.2897217

The ease of deployment of digital technologies and the Internet of Things gives us the opportunity to carry out large-scale social studies and to collect vast amounts of data from our cities. In this paper, we investigate a novel way of analyzing dat... Read More about Analyzing Objective and Subjective Data in Social Sciences: Implications for Smart Cities.

Security for Cyber-Physical Systems in Healthcare (2017)
Book Chapter
Saleem, K., Tan, Z., & Buchanan, W. (2017). Security for Cyber-Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (233-251). Springer. https://doi.org/10.1007/978-3-319-47617-9_12

The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients with secure and reliable healthcare experience, the security issues of cyber-... Read More about Security for Cyber-Physical Systems in Healthcare.

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks (2017)
Presentation / Conference Contribution
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESS. https://doi.org/10.1109/trustcom/bigdatase/icess.2017.351

In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the... Read More about Performance Evaluation of RPL Protocol under Mobile Sybil Attacks.

A Health 4.0 Based Approach Towards the Management of Multiple Sclerosis (2017)
Book Chapter
Grigoriadis, N., Bakirtzis, C., Politis, C., Danas, K., Thuemmler, C., & Keow Lim, A. (2017). A Health 4.0 Based Approach Towards the Management of Multiple Sclerosis. In C. Thuemmler, & C. Bai (Eds.), Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (205-218). (1). Springer

No abstract available.

Case for Health 4.0 (2017)
Book Chapter
Thuemmler, C. (2017). Case for Health 4.0. In C. Thuemmler, & C. Bai (Eds.), Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (1-22). (1). BMC

No abstract available.

Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services (2017)
Presentation / Conference Contribution
Lim, A. K., Thuemmler, C., Paulin, A., Jell, T., & Keow Lim, A. K. (2017, April). Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services. Presented at Information Technology – Next Generation 14th International Conference on Information Technology

As more and more details of 5G technology specifications unveil and standards emerge it becomes clear that 5G will have an enabling effect on many different verticals including automotive, mobility and health. This paper gives an overview about techn... Read More about Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services.

Interference graphs to monitor and control schedules in low-power WPAN (2018)
Journal Article
van der Lee, T., Liotta, A., & Exarchakos, G. (2019). Interference graphs to monitor and control schedules in low-power WPAN. Future Generation Computer Systems, 93, 111-120. https://doi.org/10.1016/j.future.2018.10.014

Highlights • This study presents the complete and slotted interference graph model. • The service uses the complete interference graph to evaluate the network. • Slotted interference graphs are used to reschedule problematic connections. • Rea... Read More about Interference graphs to monitor and control schedules in low-power WPAN.

Requirements for 5G based telemetric cardiac monitoring (2018)
Presentation / Conference Contribution
Thuemmler, C., Hindricks, G., Rolffs, C., Buchanan, W., & Bollmann, A. (2018, October). Requirements for 5G based telemetric cardiac monitoring. Presented at 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol, Cyprus

Several white papers have been published on general requirements for 5G in the health vertical. As 5G research and implementation continue more detailed real world information for application research are needed. This paper is focusing on the require... Read More about Requirements for 5G based telemetric cardiac monitoring.

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings (2018)
Presentation / Conference Contribution
(2017, December). Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. Presented at CollaborateCom 2017, Edinburgh, UK

This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2017, held in Edinburgh, UK, in December 2017. The 65 papers presente... Read More about Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings.

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things (2018)
Presentation / Conference Contribution
Semedo, F., Moradpoor, N., & Rafiq, M. (2018, September). Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. Presented at 11th International Conference On Security Of Information and Networks, Cardiff, United Kingdom

The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Positioning devices (GPS) and Local Area Network (LAN) interfaces. Security is by f... Read More about Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things.

Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network (2018)
Presentation / Conference Contribution
Asif, R., Haithem, M., & Buchanan, W. J. (2018, July). Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network. Presented at Advanced Photonics 2018 (BGPP, IPR, NP, NOMA, Sensors, Networks, SPPCom, SOF)

We report a high capacity Quantum-to-the-Home (QTTH) network in a spatialdivision-multiplexing (SDM) network utilizing 7-core multicore fiber (MCF). Aggregate secure key rates of 33.6 Mbit/s over 9.8 km of fiber are the actual state-of-the-art.

Performance Investigation of RPL Routing in Pipeline Monitoring WSNs (2018)
Presentation / Conference Contribution
Wadhaj, I., Gharebi, W., Al-Dubai, A., & Thomson, C. (2018, June). Performance Investigation of RPL Routing in Pipeline Monitoring WSNs. Presented at 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Exeter, United Kingdom

The adoption of WSN and IEEE 802.15.4 standard for the linear WSN networks were assumed. The interconnection of WSNs with the Internet is possible by assigning IPv6 addresses to low- power devices. The 6LoWPAN adaption layer enables the IPv6 addresse... Read More about Performance Investigation of RPL Routing in Pipeline Monitoring WSNs.