Skip to main content

Research Repository

Advanced Search

Outputs (682)

A Trust-based Intrusion Detection System for Mobile RPL Based Networks (2018)
Presentation / Conference Contribution
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (2017, June). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. Presented at 10th IEEE International Conference on Internet of Things (iThings-2017)

Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be exploited to perform security attacks against the Routing Protocol for Low-... Read More about A Trust-based Intrusion Detection System for Mobile RPL Based Networks.

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures (2018)
Journal Article
Barrowclough, J. P., & Asif, R. (2018). Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908

The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In... Read More about Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures.

An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0 (2018)
Journal Article
Pace, P., Aloi, G., Gravina, R., Caliciuri, G., Fortino, G., & Liotta, A. (2019). An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0. IEEE Transactions on Industrial Informatics, 15(1), 481-489. https://doi.org/10.1109/tii.2018.2843169

Edge computing paradigm has attracted many interests in the last few years as a valid alternative to the standard cloud-based approaches to reduce the interaction timing and the huge amount of data coming from Internet of Things (IoT) devices toward... Read More about An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0.

Detection of Algorithmically Generated Malicious Domain (2018)
Presentation / Conference Contribution
Agyepong, E., Buchanan, W., & Jones, K. (2018, May). Detection of Algorithmically Generated Malicious Domain. Presented at Computer Science & Information Technology

In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, D... Read More about Detection of Algorithmically Generated Malicious Domain.

On-Line Building Energy Optimization Using Deep Reinforcement Learning (2018)
Journal Article
Mocanu, E., Mocanu, D. C., Nguyen, P. H., Liotta, A., Webber, M. E., Gibescu, M., & Slootweg, J. G. (2019). On-Line Building Energy Optimization Using Deep Reinforcement Learning. IEEE Transactions on Smart Grid, 10(4), 3698-3708. https://doi.org/10.1109/tsg.2018.2834219

Unprecedented high volumes of data are becoming available with the growth of the advanced metering infrastructure. These are expected to benefit planning and operation of the future power systems and to help customers transition from a passive to an... Read More about On-Line Building Energy Optimization Using Deep Reinforcement Learning.

A Review of Predictive Quality of Experience Management in Video Streaming Services (2018)
Journal Article
Torres Vega, M., Perra, C., De Turck, F., & Liotta, A. (2018). A Review of Predictive Quality of Experience Management in Video Streaming Services. IEEE Transactions on Broadcasting, 64(2), 432-445. https://doi.org/10.1109/tbc.2018.2822869

Satisfying the requirements of devices and users of online video streaming services is a challenging task. It requires not only managing the network quality of service but also to exert real-time control, addressing the user's quality of experience (... Read More about A Review of Predictive Quality of Experience Management in Video Streaming Services.

Performance Evaluation of a Fragmented Secret Share System (2017)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017, June). Performance Evaluation of a Fragmented Secret Share System. Presented at 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)

There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed as a keyless and resilient mechanism to mitigate this, but scaling through... Read More about Performance Evaluation of a Fragmented Secret Share System.

Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet (2016)
Presentation / Conference Contribution
Paulin, A., & Thuemmler, C. (2016, September). Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet. Presented at 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)

This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in two heterogeneous use-cases of a European project, namely: to govern drugs al... Read More about Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet.

Machine learning and semantic analysis of in-game chat for cyber bullying (2018)
Journal Article
Murnion, S., Buchanan, W. J., Smales, A., & Russell, G. (2018). Machine learning and semantic analysis of in-game chat for cyber bullying. Computers and Security, 76, 197-213. https://doi.org/10.1016/j.cose.2018.02.016

One major problem with cyberbullying research is the lack of data, since researchers are traditionally forced to rely on survey data where victims and perpetrators self-report their impressions. In this paper, an automatic data collection system is p... Read More about Machine learning and semantic analysis of in-game chat for cyber bullying.

Determinants of Next Generation e-Health Network and Architecture Specifications (2016)
Presentation / Conference Contribution
Thuemmler, C., Paulin, A., & Lim, A. K. (2016, September). Determinants of Next Generation e-Health Network and Architecture Specifications. Presented at 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)

This paper summarizes the determinants for future e-Health network and IT infrastructures in the health care environment. The paper bases on observations conducted as part of a larger study at a university hospital in Munich, and summarizes ongoing d... Read More about Determinants of Next Generation e-Health Network and Architecture Specifications.

Lightweight cryptography methods (2018)
Journal Article
Buchanan, W. J., Li, S., & Asif, R. (2018). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917

While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processing power and memory capabilities, these do not scale well into a world with... Read More about Lightweight cryptography methods.

5G as an enabler for Medical IOT - 5GMIOT (2016)
Presentation / Conference Contribution
Thuemmler, C., & Jefefries, N. (2016, December). 5G as an enabler for Medical IOT - 5GMIOT. Presented at IEEE Globecom 2016

Short Power Point presentation on 5G as enabler for Medical IoT – 5GMIOT Standards, policies and strategies for social technological alignment of 5G technology

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait (2018)
Journal Article
Khan, F., ur Rehman, A., Usman, M., Tan, Z., & Puthal, D. (2018). Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait. Mobile Networks and Applications, https://doi.org/10.1007/s11036-018-1020-4

The enormous developments in the field of wireless communication technologies have made the unlicensed spectrum bands crowded, resulting uncontrolled interference to the traditional wireless network applications. On the other hand, licensed spectrum... Read More about Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait.

5G - What architecture to serve vertical industry (2017)
Presentation / Conference Contribution
Thuemmler, C. (2017, May). 5G - What architecture to serve vertical industry. Presented at IEEE ICC 2017

5G offers the promise to dynamically satisfy a multiplicity of concurrent requirements originating from various business models of vertical industries. The 5G PPP has published a White Paper on 5G empowering vertical industries and has further worked... Read More about 5G - What architecture to serve vertical industry.

Resilience of Video Streaming Services to Network Impairments (2018)
Journal Article
Torres Vega, M., Perra, C., & Liotta, A. (2018). Resilience of Video Streaming Services to Network Impairments. IEEE Transactions on Broadcasting, 64(2), 220-234. https://doi.org/10.1109/tbc.2017.2781125

When dealing with networks, performance management through conventional quality of service (QoS)-based methods becomes difficult and is often ineffective. In fact, quality emerges as an end-to-end factor, for it is particularly sensitive to the end-u... Read More about Resilience of Video Streaming Services to Network Impairments.

U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks (2016)
Presentation / Conference Contribution
Zeb, K., Saleem, K., Al Muhtadi, J., & Thuemmler, C. (2016, September). U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. Presented at 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)

Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records are worth 10 times more than credit card details [1]. Datasets experience... Read More about U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks.

Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies (2017)
Presentation / Conference Contribution
Asif, R. (2017, November). Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. Presented at IEEE Network of the Future (NoF) conference, London, UK

Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home (FTTH)' networks and data centers. It is important that the newly designed... Read More about Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies.

A New Weight based Rotating Clustering Scheme for WSNs (2017)
Presentation / Conference Contribution
Essa, A., Al-Dubai, A. Y., Romdhani, I., & Esriaftri, M. A. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC). https://doi.org/10.1109/ISNCC.2017.8072000

Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely recommended approaches to sustaining a network throughout its lifetime. Des... Read More about A New Weight based Rotating Clustering Scheme for WSNs.