Skip to main content

Research Repository

Advanced Search

Outputs (682)

Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust (2020)
Preprint / Working Paper
Buchanan, B., Imran, M., Pagliari, C., Pell, J., & Rimpiläinen, S. (2020). Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust. Glasgow

On December 31st, 2019, the World Health Organisation received a report from the Chinese government detailing a cluster of cases of ‘pneumonia of unknown origin’, later identified as novel coronavirus. The virus, now referred to as COVID-19, quickly... Read More about Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust.

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric (2020)
Journal Article
Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., & Buchanan, W. J. (2020). A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors, 20(22), Article 6587. https://doi.org/10.3390/s20226587

Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record storage solutions to common sec... Read More about A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.

Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms (2020)
Journal Article
Ghanami, A., Li, . J., Hawbani, A., & Al-Dubai, A. (2021). Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms. Expert Systems with Applications, 170, Article 114525. https://doi.org/10.1016/j.eswa.2020.114525

Initialization is the first and a major step in the implementation of evolutionary algorithms (EAs). Although there are many common general methods to initialize EAs such as the pseudo-random number generator (PRNG), there is no single method that ca... Read More about Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms.

Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks (2020)
Journal Article
Zhao, L., Zhao, W., Hawbani, A., Al-Dubai, A. Y., Min, G., Zomaya, A., & Gong, C. (2021). Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks. IEEE Transactions on Wireless Communications, 20(5), 2991-3004. https://doi.org/10.1109/twc.2020.3046275

To provide efficient networking services at the edge of Internet-of-Vehicles (IoV), Software-Defined Vehicular Network (SDVN) has been a promising technology to enable intelligent data exchange without giving additional duties to the resource constra... Read More about Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks.

An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs (2021)
Presentation / Conference Contribution
Wadhaj, I., Thomson, C., & Ghaleb, B. (2021, June). An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs. Presented at International Conference on Emerging Technologies and Intelligent Systems (ICETIS 2021), Online

Compared to an ordinary sensor network, Linear Sensor Networks (LSNs) has many applications in a number of areas such as surveillance and monitoring of international boundaries for illegal crossing, river environment monitoring and roads monitoring e... Read More about An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs.

Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions (2021)
Presentation / Conference Contribution
Wadhaj, I., Ghaleb, B., & Thomson, C. (2021, June). Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions. Presented at International Conference on Emerging Technologies and Intelligent Systems (ICETIS 2021), Online

Effective measurement and monitoring of certain parameters (temperature, pressure, flow etc.) is crucial for the safety and optimization of processes in the Oil and Gas Industry. Wired sensors have been extensively utilized for this purpose but are c... Read More about Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions.

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020, December). PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. Presented at ICVISP 2020: The 2020 4th International Conference on Vision, Image and Signal Processing, Bangkok

The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms o... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.

A novel tensor-information bottleneck method for multi-input single-output applications (2021)
Journal Article
Lu, L., Ren, X., Cui, C., Tan, Z., Wu, Y., & Qin, Z. (2021). A novel tensor-information bottleneck method for multi-input single-output applications. Computer Networks, 193, Article 108088. https://doi.org/10.1016/j.comnet.2021.108088

Ensuring timeliness and mobility for multimedia computing is a crucial task for wireless communication. Previous algorithms that utilize information channels, such as the information bottleneck method, have shown great performance and efficiency, whi... Read More about A novel tensor-information bottleneck method for multi-input single-output applications.

A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions (2021)
Journal Article
Saha, R., Geetha, G., Kumar, G., Buchanan, W. J., & Kim, T. (2021). A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions. Applied Sciences, 11(17), Article 8073. https://doi.org/10.3390/app11178073

Cryptographic algorithms and functions should possess some of the important functional requirements such as: non-linearity, resiliency, propagation and immunity. Several previous studies were executed to analyze these characteristics of the cryptogra... Read More about A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions.

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT (2021)
Journal Article
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021). Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. https://doi.org/10.3390/jcp1020014

As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought. Traditional defe... Read More about Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.

Artificial Intelligence and Blockchain for Future Cybersecurity Applications (2021)
Book
Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Cham: Springer. https://doi.org/10.1007/978-3-030-74575-2

Presents the state-of-the-art and the latest discoveries in the field of Artificial Intelligence and Blockchain techniques and methods for future cybersecurity applications Proposes new models, practical solutions and technological advances related... Read More about Artificial Intelligence and Blockchain for Future Cybersecurity Applications.

Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, Article 100436. https://doi.org/10.1016/j.ijcip.2021.100436

Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been introduced, especially against the Routing Protocol for Low-power and Lossy... Read More about Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things.

An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University (2020)
Presentation / Conference Contribution
Ashour, G., Al-Dubai, A., Romdhani, I., & Aljohani, N. (2020, June). An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University. Presented at 2020 International Conference Engineering Technologies and Computer Science (EnT), Moscow, Russia

Educational data is growing continuously. This huge amount of data that is scattered and come from different resources with different formats usually is noisy, duplicated, inconsistent, and unorganized. These data can be more efficient and usable whe... Read More about An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University.

Ontology-based Course Teacher Assignment within Universities (2020)
Journal Article
Ashour, G., Al-Dubai, A., & Romdhani, I. (2020). Ontology-based Course Teacher Assignment within Universities. International Journal of Advanced Computer Science and Applications, 11(7), https://doi.org/10.14569/ijacsa.2020.0110787

Educational institutions suffer from the enormous amount of data that keeps growing continuously. These data are usually scattered and unorganised, and it comes from different resources with different formats. Besides, modernization vision within the... Read More about Ontology-based Course Teacher Assignment within Universities.

PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform (2021)
Journal Article
Abramson, W., Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2021). PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform. Software Impacts, 9, Article 100101. https://doi.org/10.1016/j.simpa.2021.100101

PyDentity lowers the entry barrier for parties interested in experimenting with the Hyperledger’s verifiable information exchange platform. It enables educators, developers and researchers to configure and initialise a set of actors easily as associa... Read More about PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform.

Blockchain for edge-enabled smart cities applications (2021)
Journal Article
Jan, M. A., Yeh, K., Tan, Z., & Wu, Y. (2021). Blockchain for edge-enabled smart cities applications. Journal of Information Security and Applications, 61, 102937. https://doi.org/10.1016/j.jisa.2021.102937

The Internet of Things (IoT)-enabled devices are increasing at an exponential rate and share massive data generated in smart cities around the globe. The time-critical and delay-sensitive nature of this data means that cloud service providers are una... Read More about Blockchain for edge-enabled smart cities applications.

IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities (2020)
Journal Article
Li, S., Choo, K. R., Tan, Z., He, X., Hu, J., & Qin, T. (2020). IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities. IEEE Access, 8, 145033-145036. https://doi.org/10.1109/access.2020.3014416

Industrial IoT (IIoT) interconnects critical devices and sensors in critical infrastructure sectors with existing Internet of Things (IoT) devices and applications. Generally, IIoT deployment allows organizations and users to gain invaluable insights... Read More about IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities.

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT (2021)
Journal Article
Almas Khan, M., Khan, M. A., Ullah Jan, S., Ahmad, J., Jamal, S. S., Shah, A. A., Pitropakis, N., Buchanan, W. J., Alonistioti, N., Panagiotakis, S., & Markakis, E. K. (2021). A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors, 21(21), Article 7016. https://doi.org/10.3390/s21217016

A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely used publish–subscribe-based protocol for the communication of sensor or ev... Read More about A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT.

A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks (2021)
Journal Article
Zhao, L., Li, Z., Al-Dubai, A., Min, G., Li, J., Hawbani, A., & Zomaya, A. (2022). A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems, 23(8), 13275-13290. https://doi.org/10.1109/TITS.2021.3123276

Temporal information is critical for routing computation in the vehicular network. It plays a vital role in the vehicular network. Till now, most existing routing schemes in vehicular networks consider the networks as a sequence of static graphs. We... Read More about A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks.