Skip to main content

Research Repository

Advanced Search

Outputs (682)

Fingerprinting JPEGs With Optimised Huffman Tables (2018)
Journal Article
McKeown, S., Russell, G., & Leimich, P. (2018). Fingerprinting JPEGs With Optimised Huffman Tables. Journal of Digital Forensics, Security and Law, 13(2), Article 7. https://doi.org/10.15394/jdfsl.2018.1451

A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given medium, and comparing indiv... Read More about Fingerprinting JPEGs With Optimised Huffman Tables.

A methodology for the security evaluation within third-party Android Marketplaces (2017)
Journal Article
Buchanan, W. J., Chiale, S., & Macfarlane, R. (2017). A methodology for the security evaluation within third-party Android Marketplaces. Digital Investigation, 23, 88-98. https://doi.org/10.1016/j.diin.2017.10.002

This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia. It provides a comprehensive review of existing academic literature about... Read More about A methodology for the security evaluation within third-party Android Marketplaces.

What role will wearables play in future healthcare? (2017)
Presentation / Conference Contribution
Thuemmler, C. (2017, November). What role will wearables play in future healthcare?. Presented at Seminar on the future of Health care, Big Data and Wearables

A better and more efficient health sector through digitalization and the use of Big Data – personalized treatment, prevention and diagnostics based on a more encompassing understanding of the patient; continuous surveillance and home based treatment. Read More about What role will wearables play in future healthcare?.

A framework for data security in cloud using collaborative intrusion detection scheme (2017)
Presentation / Conference Contribution
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017, October). A framework for data security in cloud using collaborative intrusion detection scheme. Presented at Proceedings of the 10th International Conference on Security of Information and Networks - SIN '17, Jaipur, India

Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go feature which is based on measured usage and can be compared to other utility se... Read More about A framework for data security in cloud using collaborative intrusion detection scheme.

A New Spectrum Management Scheme for Road Safety in Smart Cities (2018)
Journal Article
Alsarhan, A., Al-Dubai, A. Y., Min, G., Zomaya, A. Y., & Bsoul, M. (2018). A New Spectrum Management Scheme for Road Safety in Smart Cities. IEEE Transactions on Intelligent Transportation Systems, 19(11), 3496-3506. https://doi.org/10.1109/TITS.2017.2784548

Traffic management in roads is one of the major challenges faced in developing efficient intelligent transportation systems. Recently, wireless networks have received significant attention for tackling this challenge. However, wireless technologies f... Read More about A New Spectrum Management Scheme for Road Safety in Smart Cities.

Distance Measurement Methods for Improved Insider Threat Detection (2018)
Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018). Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368

Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account change... Read More about Distance Measurement Methods for Improved Insider Threat Detection.

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study (2018)
Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018). Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002

Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods of assessing critical systems security risk exposure. The question is; do ex... Read More about Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study.

Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs) (2018)
Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2018). Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs). IEEE Transactions on Green Communications and Networking, 2(3), 804-816. https://doi.org/10.1109/tgcn.2018.2813060

Medium Access Control (MAC) protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, traditional static TDMA techniques adopted by IEEE 802.15.4 and IEEE 802.15.6 do not sufficiently conside... Read More about Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs).

Drizzle Algorithm (2018)
Report
Ghaleb, B., Al-Dubai, A., Romdhani, I., & Qasem, M. (2018). Drizzle Algorithm. USA: IETF

Trickle algorithm used in RPL routing protocol suffers from some issues related to power, network convergence time and overhead and load-distribution. To optimize this algorithm for Low-power and Lossy Networks (LLNs), a new algorithm called Dr... Read More about Drizzle Algorithm.

Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01 (2018)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., & Ghaleb, B. (2018). Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01. USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of children nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Net... Read More about Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01.

Load Balancing Objective Function in RPL (Draft 2) (2017)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., Hou, J., & Jadhav, R. A. (2017). Load Balancing Objective Function in RPL (Draft 2). USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of child nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Ne... Read More about Load Balancing Objective Function in RPL (Draft 2).

Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases (2018)
Presentation / Conference Contribution
Clavie, B., & Moradpoor, N. (2018, May). Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. Poster presented at 10th ACM Conference on Web Science, Amsterdam

This article explores a perceived bias between two British reddit communities dedicated to discussing British politics.We analyse the popular sources favoured by each community and study semantic indicators that would be indicative of a bias. Althoug... Read More about Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases.

Forensics study of IMO call and chat app. (2018)
Journal Article
Sudozai, M., Saleem, S., Buchanan, W. J., Habib, N., & Zia, H. (2018). Forensics study of IMO call and chat app. Digital Investigation, https://doi.org/10.1016/j.diin.2018.04.006

Smart phones often leave behind a wealth of information that can be used as an evidence during an investigation. There are thus many smart phone applications that employ encryption to store and/or transmit data, and this can add a layer of complexity... Read More about Forensics study of IMO call and chat app..

Cross-Layer Multipath Multichannel MAC protocol for MANETs (2018)
Presentation / Conference Contribution
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018, June). Cross-Layer Multipath Multichannel MAC protocol for MANETs. Presented at The International Symposium on Networks, Computers and Communications (ISNCC), Rome, Italy

Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale route to recover from a broken li... Read More about Cross-Layer Multipath Multichannel MAC protocol for MANETs.

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018, June). A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. Presented at Cyber Security 2018: 2018 International Conference on Cyber Security and Protection of Digital Services, Glasgow, United Kingdom

Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development over time have improved their components including operating system platforms... Read More about A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.

Sub-file Hashing Strategies for Fast Contraband Detection (2018)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2018, June). Sub-file Hashing Strategies for Fast Contraband Detection. Presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018), Glasgow, Scotland

Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for many law enforcement agencies. Data reduction techniques are required for fast... Read More about Sub-file Hashing Strategies for Fast Contraband Detection.

Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks (2018)
Presentation / Conference Contribution
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June). Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Paper presented at The 16th IEEE International Conference on Smart City (IEEE SmartCity-2018)

In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional unequal clustering approaches where small clusters located close to the base st... Read More about Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks.

Reducing the Impact of Network Bottlenecks on Remote Contraband Detection (2018)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2018, June). Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. Presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018), Glasgow, UK

Cloud based storage is increasing in popularity, with large volumes of data being stored remotely. Digital forensics investigators examining such systems remotely are limited by bandwidth constraints when accessing this kind of data using traditi... Read More about Reducing the Impact of Network Bottlenecks on Remote Contraband Detection.

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors (2018)
Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., Prasad, M., Raja, R., & Tripathi, S. S. (2018). Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760

Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to form a network (well known as wireless sensor networks) to complete IoT Inf... Read More about Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.