Skip to main content

Research Repository

Advanced Search

Outputs (682)

Analysis of the adoption of security headers in HTTP (2017)
Journal Article
Buchanan, W. J., Helme, S., & Woodward, A. (2018). Analysis of the adoption of security headers in HTTP. IET Information Security, 12(2), 118-126. https://doi.org/10.1049/iet-ifs.2016.0621

With the increase in the number of threats within Web-based systems, a more integrated approach is required to ensure the enforcement of security policies from the server to the client. These policies aim to stop man-in-the-middle attacks, code injec... Read More about Analysis of the adoption of security headers in HTTP.

A new Zigbee-based device for measuring visual reaction time in sport activities (2018)
Presentation / Conference Contribution
Ali, B. B., Dugas, É., Naceur, A., & Romdhani, I. (2017, May). A new Zigbee-based device for measuring visual reaction time in sport activities. Presented at 2017 International Conference on Engineering & MIS (ICEMIS)

There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the major problems is the need to maintain an on-time 1 pulse per second (pps) refe... Read More about A new Zigbee-based device for measuring visual reaction time in sport activities.

Simultaneous context inference and mapping using mm-Wave for indoor scenarios (2017)
Presentation / Conference Contribution
Yassin, A., Nasser, Y., Awad, M., & Al-Dubai, A. (2017, May). Simultaneous context inference and mapping using mm-Wave for indoor scenarios. Presented at 2017 IEEE International Conference on Communications (ICC), Paris, France

We introduce in this paper two main approaches, Triangulateration (TL) and Angle-Difference-of-Arrival (ADoA) for indoor localization and mapping using single-anchor and millimeter wave (MMW) propagation characteristics. Then, we perform context infe... Read More about Simultaneous context inference and mapping using mm-Wave for indoor scenarios.

A new enhanced RPL based routing for Internet of Things (2017)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Ekonomou, E., & Wadhaj, I. (2017, June). A new enhanced RPL based routing for Internet of Things. Presented at 2017 IEEE International Conference on Communications Workshops (ICC Workshops)

The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the RPL storing mode has been found restricted by storage limitations in the ro... Read More about A new enhanced RPL based routing for Internet of Things.

New trust metric for the RPL routing protocol (2017)
Presentation / Conference Contribution
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017). New trust metric for the RPL routing protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS),. https://doi.org/10.1109/iacs.2017.7921993

Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new security scheme for the Internet of things... Read More about New trust metric for the RPL routing protocol.

A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks (2017)
Journal Article
Zhao, L., Al-Dubai, A., Li, X., Chen, G., & Min, G. (2017). A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks. Computers and Electrical Engineering, 61, 361-372. https://doi.org/10.1016/j.compeleceng.2016.12.031

Current networking technologies are not perfectly equipped to support Quality of Service (QoS), which is vital for real-time multimedia applications in Wireless Community Mesh Networks (WCNs). Therefore, there is a need to devise innovative routing a... Read More about A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks.

Numerical Encoding to Tame SQL Injection Attacks (2017)
Presentation / Conference Contribution
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (in press). Numerical Encoding to Tame SQL Injection Attacks.

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases. Intruders becoming smarter in obfuscating web requests to evade detection... Read More about Numerical Encoding to Tame SQL Injection Attacks.

10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking (2017)
Journal Article
Asif, R., & Haithem, M. (2017). 10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking. Optics Communications, 391, 106-110. https://doi.org/10.1016/j.optcom.2017.01.022

Generalized few-mode-fiber (FMF) transmission uses N coherent receivers for mode detection, where N scales with the number of fiber modes. Multiple coherent receivers increase the cost of optical network units (ONUs) in access networks, specifically... Read More about 10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking.

Fast Filtering of Known PNG Files Using Early File Features (2017)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2017). Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and Law

A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given media, comparing individual... Read More about Fast Filtering of Known PNG Files Using Early File Features.

How WannaCry caused global panic but failed to turn much of a profit (2017)
Newspaper / Magazine
Buchanan, B. (2017). How WannaCry caused global panic but failed to turn much of a profit. [https://theconversation.com/how-wannacry-caused-global-panic-but-failed-to-turn-much-of-a-profit-77740]. https://theconversation.com/how-wannacry-caused-global-panic-but-failed-to-turn-much-of-a-profit-77740

The WannaCry cyber-attack led to panic across the globe, showing just how important it is for organisations to have secure operating systems. This was not even the most sophisticated malware around. Numerous networks could easily cope with it and it... Read More about How WannaCry caused global panic but failed to turn much of a profit.

Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things (2016)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Paechter, B., & Qasem, M. (2016, April). Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things. Presented at 2016 IEEE Wireless Communications and Networking Conference

Constrained Low-power and Lossy networks (LLNs) represent the building block for the ever-growing Internet of Things (IoT) that deploy the Routing Protocol for Low Power and Lossy networks (RPL) as a key routing standard. RPL, along with other routin... Read More about Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things.

If two countries waged cyber war on each another, here’s what to expect (2016)
Newspaper / Magazine
Buchanan, B. (2016). If two countries waged cyber war on each another, here’s what to expect. [https://theconversation.com/if-two-countries-waged-cyber-war-on-each-another-heres-what-to-expect-63544]. https://theconversation.com/if-two-countries-waged-cyber-war-on-each-another-heres-what-to-expect-63544

Imagine you woke up to discover a massive cyber attack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care records and so much more. The transport system isn’t working, traffic light... Read More about If two countries waged cyber war on each another, here’s what to expect.

The next cyberattack could come from sound waves (2017)
Newspaper / Magazine
Buchanan, B. (2017). The next cyberattack could come from sound waves. [https://theconversation.com/the-next-cyberattack-could-come-from-sound-waves-74716]. https://theconversation.com/the-next-cyberattack-could-come-from-sound-waves-74716

You might think your smartphone or laptop is relatively safe from cyber attacks thanks to anti-virus and encryption software. But your devices are increasingly at risk from “side-channel” attacks, where an intruder can bypass traditional network entr... Read More about The next cyberattack could come from sound waves.

Cryptography across industry sectors (2017)
Journal Article
Buchanan, W. J., Woodward, A., & Helme, S. (2017). Cryptography across industry sectors. Journal of Cyber Security Technology, 1(3-4), 145-162. https://doi.org/10.1080/23742917.2017.1327221

Security adoption varies across industry sectors, where some companies such as Google, Apple and Microsoft are strong advocates of the adoption of HTTPS, while other companies, especially for news sites, have weak adoption. This paper provides a samp... Read More about Cryptography across industry sectors.

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay (2017)
Presentation / Conference Contribution
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2017). An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. In 2016 IEEE Trustcom/BigDataSE/I​SPA (178-184). https://doi.org/10.1109/trustcom.2016.0061

The firewalls were invented since 1990s [1] and have been developed to operate more secure and faster. From the first era of the firewalls until today, they still regulate packet based on a listed rule. The listed rule is the set of rule sequence whi... Read More about An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay.

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis (2017)
Presentation / Conference Contribution
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017, August). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. Presented at 2017 IEEE Trustcom/BigDataSE/ICESS

This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was designed and applied in this work to extract hidden correlations from traffic rel... Read More about An Intrusion Detection System Based on Polynomial Feature Correlation Analysis.

E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks (2015)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., & Ekonomou, E. (2015, October). E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks. Presented at IEEE 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications

Routing Protocol for Low Power and Lossy networks (RPL) is the de-facto standard for routing in resource-constrained low-power and lossy networks (LLNs) which represent the building block for the ever-growing Internet of Things (IoT). RPL along with... Read More about E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks.

Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption (2017)
Presentation / Conference Contribution
Asif, R., & Buchanan, W. J. (2017, June). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. Presented at 10th IEEE International Conference on Internet of Things (iThings‐2017), Exeter, UK

Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the QKD infrastructure is compatible with the already existing telecommunicati... Read More about Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption.

Generation of Network Behaviour Descriptions Using MCA Based on TAM (2013)
Presentation / Conference Contribution
Tan, Z. (2013, March). Generation of Network Behaviour Descriptions Using MCA Based on TAM. Paper presented at Kaspersky Lab's 2013 Annual Student Cyber Security Conference

In this paper, a multivariate correlation analysis technique based on triangle area map is introduced. The technique is applied for network traffic characterization and provides quality network behaviour descriptors for intrusion detectors to use. Th... Read More about Generation of Network Behaviour Descriptions Using MCA Based on TAM.