Skip to main content

Research Repository

Advanced Search

Outputs (682)

Cross-modality interactive attention network for multispectral pedestrian detection (2018)
Journal Article
Zhang, L., Liu, Z., Zhang, S., Yang, X., Qiao, H., Huang, K., & Hussain, A. (2019). Cross-modality interactive attention network for multispectral pedestrian detection. Information Fusion, 50, 20-29. https://doi.org/10.1016/j.inffus.2018.09.015

Multispectral pedestrian detection is an emerging solution with great promise in many around-the-clock applications, such as automotive driving and security surveillance. To exploit the complementary nature and remedy contradictory appearance between... Read More about Cross-modality interactive attention network for multispectral pedestrian detection.

Mitigating Disaster using Secure Threshold-Cloud Architecture (2018)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., & Russell, G. (2018). Mitigating Disaster using Secure Threshold-Cloud Architecture. Current Trends in Computer Sciences & Applications, 1(2),

There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to apply secret sharing methods as used in cryptography to create shares of crypt... Read More about Mitigating Disaster using Secure Threshold-Cloud Architecture.

Cryptography (2017)
Book
Buchanan, B. (2017). Cryptography. River Publishers

Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to d... Read More about Cryptography.

GDPR and Cyber Security for Business Information Systems (2018)
Book
Gobeo, A., Fowler, C., & Buchanan, B. (2018). GDPR and Cyber Security for Business Information Systems. River Publishers

The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals i... Read More about GDPR and Cyber Security for Business Information Systems.

Impact of cyberattacks on stock performance: a comparative study (2018)
Journal Article
Tweneboah-Kodua, S., Atsu, F., & Buchanan, W. (2018). Impact of cyberattacks on stock performance: a comparative study. Information and Computer Security, 26(5), 637-652. https://doi.org/10.1108/ics-05-2018-0060

The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period January 03, 2013 and December 29, 2017. The empirical analysis was performed in two ways: cross-section and industry level. We employ statistical tests... Read More about Impact of cyberattacks on stock performance: a comparative study.

IoT Forensics: Amazon Echo as a Use Case (2019)
Journal Article
Li, S., Li, S., Choo, K. R., Sun, Q., Buchanan, W. J., & Cao, J. (2019). IoT Forensics: Amazon Echo as a Use Case. IEEE Internet of Things Journal, 1-11. https://doi.org/10.1109/jiot.2019.2906946

Internet of Things (IoT) are increasingly common in our society, and can be found in civilian settings as well as sensitive applications such as battlefields and national security. Given the potential of these devices to be targeted by attackers, the... Read More about IoT Forensics: Amazon Echo as a Use Case.

ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System (2019)
Journal Article
Javaid, S., Afzal, H., Babar, M., Arif, F., Tan, Z., & Jan, M. A. (2019). ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System. IEEE Access, 1-1. https://doi.org/10.1109/access.2019.2897095

Putting trust in the world of the Internet of Things, where served and serving entities are often unknown, is very hard especially when personal and business information is often being exchanged for providing and consuming services. Moreover, the iss... Read More about ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System.

A temporal-information-based adaptive routing algorithm for software defined vehicular networks (2019)
Presentation / Conference Contribution
Zhao, L., Li, Z., Li, J., Al-Dubai, A., Min, G., & Zomaya, A. Y. (2019, May). A temporal-information-based adaptive routing algorithm for software defined vehicular networks. Presented at IEEE International Conference on Communications (ICC): Ad Hoc and Sensor Networks Symposium, Shanghai, China

In Software Defined Vehicular Networks (SDVNs), most existing studies of routing consider the vehicular network as a static graph and compute the flow table based on static information. However, a static graph could only contain partial network data.... Read More about A temporal-information-based adaptive routing algorithm for software defined vehicular networks.

A novel adaptive routing and switching scheme for software-defined vehicular Networks (2019)
Presentation / Conference Contribution
Zhoa, L., Zhao, W., Gong, C., Al-Dubai, A., & Min, G. (2019, May). A novel adaptive routing and switching scheme for software-defined vehicular Networks. Presented at IEEE International Conference on Communications, Shanghai, China

Software-Defined Vehicular Networks (SDVNs) technology has been attracting significant attention as it can make Vehicular Ad Hoc Network (VANET) more efficient and intelligent. SDVN provides a flexible architecture which can decouple the network mana... Read More about A novel adaptive routing and switching scheme for software-defined vehicular Networks.

Top 10 Blockchain Predictions for the (Near) Future of Healthcare (2019)
Journal Article
Halamka, J. D., Alterovitz, G., Buchanan, W. J., Cenaj, T., Clauson, K. A., Dhillon, V., Hudson, F. D., Mokhtari, M. (., Porto, D. A., Rutschman, A., & Ngo, A. L. (2019). Top 10 Blockchain Predictions for the (Near) Future of Healthcare. Blockchain in Healthcare Today, 2, https://doi.org/10.30953/bhty.v2.106

To review blockchain lessons learned in 2018 and near-future predictions for blockchain in healthcare, Blockchain in Healthcare Today (BHTY) asked the world's blockchain in healthcare experts to share their insights. Here, our internationally-renowne... Read More about Top 10 Blockchain Predictions for the (Near) Future of Healthcare.

Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop (2019)
Journal Article
Babar, M., Arif, F., Jan, M. A., Tan, Z., & Khan, F. (2019). Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. Future Generation Computer Systems, 96, 398-409. https://doi.org/10.1016/j.future.2019.02.035

The unbroken amplfi cation of a versatile urban setup is challenged by huge Big Data processing. Understanding the voluminous data generated in a smart urban environment for decision making is a challenging task. Big Data analytics is performed to ob... Read More about Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop.

Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications (2019)
Presentation / Conference Contribution
Gunathilake, N. A., Buchanan, W. J., & Asif, R. (2019). Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications. . https://doi.org/10.1109/WF-IoT.2019.8767250

High/ultra-high speed data connections are currently being developed, and by the year 2020, it is expected that the 5th generation networking (5GN) should be much smarter. It would provide great quality of service (QoS) due to low latency, less imple... Read More about Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications.

SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. (2019)
Journal Article
Jan, M. A., Zhang, W., Usman, M., Tan, Z., Khan, F., & Luo, E. (2019). SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. Journal of Network and Computer Applications, 137, 1-10. https://doi.org/10.1016/j.jnca.2019.02.023

The Internet of Things (IoT) has the potential to transform communities around the globe into smart cities. The massive deployment of sensor-embedded devices in the smart cities generates voluminous amounts of data that need to be stored and processe... Read More about SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application..

PLC Memory Attack Detection and Response in a Clean Water Supply System (2019)
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019). PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003

Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens tend to take modern-day conveniences such as trains, planes or tap water fo... Read More about PLC Memory Attack Detection and Response in a Clean Water Supply System.

Decrypting Live SSH Traffic in Virtual Environments (2019)
Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019). Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010

Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts required for decrypting secure communications. This paper develops the MemDe-... Read More about Decrypting Live SSH Traffic in Virtual Environments.

A Multi-UAV Clustering Strategy for Reducing Insecure Communication Range (2019)
Journal Article
Wu, J., Zou, L., Zhao, L., Al-Dubai, A., Mackenzie, L., & Min, G. (2019). A Multi-UAV Clustering Strategy for Reducing Insecure Communication Range. Computer Networks, 158, 132-142. https://doi.org/10.1016/j.comnet.2019.04.028

Multi-unmanned aerial vehicle (UAV) flight formations can be deployed to monitor large areas. Individual UAVs communicate and exchange information while formation flying. but, such communication presents a security risk. The area between the UAV group... Read More about A Multi-UAV Clustering Strategy for Reducing Insecure Communication Range.

Higher-order statistics-based nonlinear speech analysis (2002)
Journal Article
Soraghan, J. J., Hussain, A., Alkulabi, A., & Durrani, T. (2002). Higher-order statistics-based nonlinear speech analysis. Control and Intelligent Systems, 30, 11-18

A fast and robust three-level binary higher order statistics (HOS) based algorithm for simultaneous voiced/unvoiced detection and pitch estimation of speech signals in coloured noise environments with low SNR is presented. The use of the three-level... Read More about Higher-order statistics-based nonlinear speech analysis.

Reviving legacy enterprise systems with microservice-based architecture within cloud environments (2019)
Presentation / Conference Contribution
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019). Reviving legacy enterprise systems with microservice-based architecture within cloud environments. In Computer Science Conference Proceedings. https://doi.org/10.5121/csit.2019.90713

Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most effective means to re-architect legacy enterprise systems and to reengineer th... Read More about Reviving legacy enterprise systems with microservice-based architecture within cloud environments.

A 3D Smooth Random Walk Mobility Model for FANETs (2019)
Presentation / Conference Contribution
Lin, N., Gao, F., Zhao, L., Al-Dubai, A., & Tan, Z. (2019, August). A 3D Smooth Random Walk Mobility Model for FANETs. Presented at The 21 IEEE High Performance Computing and Communications (HPCC), Zhangjiajie, Hunan, China

The number of Unmanned Aerial Vehicles (UAVs) applications has increased over the past few years. Among all scenarios, UAV group consisting multi-UAVs is normally used to provide extensible communications. As a networking solution, Flying Ad Hoc Netw... Read More about A 3D Smooth Random Walk Mobility Model for FANETs.

A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking (2019)
Presentation / Conference Contribution
Zhao, L., Liu, Y., Al-Dubai, A., Tan, Z., Min, G., & Xu, L. (2019). A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking. . https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00082

With the rapid development of mobile applications, networking technologies have been constantly evolved to offer a more convenient way of sharing information and online-communication anytime and anywhere. Vehicular networks have the potential to beco... Read More about A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking.