Skip to main content

Research Repository

Advanced Search

Outputs (682)

Ensemble learning-based IDS for sensors telemetry data in IoT networks (2022)
Journal Article
Naz, N., Khan, M. A., Alsuhibany, S. A., Diyan, M., Tan, Z., Khan, M. A., & Ahmad, J. (2022). Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 19(10), 10550-10580. https://doi.org/10.3934/mbe.2022493

The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT devices collect data from the surrounding environment and communicate with ot... Read More about Ensemble learning-based IDS for sensors telemetry data in IoT networks.

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform (2022)
Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., Abramson, W., & Buchanan, W. J. (2022). Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379

Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and impro... Read More about Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification (2022)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022). Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), Article 1503. https://doi.org/10.3390/e24101503

Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by the attacker until a ransom demand is met. A common approach used by many c... Read More about Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.

PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN (2021)
Presentation / Conference Contribution
Romanini, D., Hall, A. J., Papadopoulos, P., Titcombe, T., Ismail, A., Cebere, T., Sandmann, R., Roehm, R., & Hoeh, M. A. (2021, May). PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN. Poster presented at ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021), Online

We introduce PyVertical, a framework supporting vertical federated learning using split neural networks. The proposed framework allows a data scientist to train neural networks on data features vertically partitioned across multiple owners while keep... Read More about PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN.

Practical defences against model inversion attacks for split neural networks (2021)
Presentation / Conference Contribution
Titcombe, T., Hall, A. J., Papadopoulos, P., & Romanini, D. (2021, May). Practical defences against model inversion attacks for split neural networks. Paper presented at ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021), Online

We describe a threat model under which a split network-based federated learning system is susceptible to a model inversion attack by a malicious computational server. We demonstrate that the attack can be successfully performed with limited knowledge... Read More about Practical defences against model inversion attacks for split neural networks.

A forensic analysis of streaming platforms on Android OS (2022)
Journal Article
Murias, J. G., Levick, D., & McKeown, S. (2023). A forensic analysis of streaming platforms on Android OS. Forensic Science International: Digital Investigation, 44, Article 301485. https://doi.org/10.1016/j.fsidi.2022.301485

This work builds on existing research in streamed video reconstruction on the Android OS, which previously demonstrated that caching occurs in most cases for the Chrome and Firefox Web browsers. Prior work also outlined that streaming application cac... Read More about A forensic analysis of streaming platforms on Android OS.

A framework for live host-based Bitcoin wallet forensics and triage (2022)
Journal Article
Holmes, A., & Buchanan, W. J. (2023). A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486

Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislation to recover the proceeds of crime from criminals. Recent UK case law has r... Read More about A framework for live host-based Bitcoin wallet forensics and triage.

Blockchain for Cybersecurity in Cyber-Physical Systems (2023)
Book
Maleh, Y., Alazab, M., & Romdhani, I. (Eds.). (2023). Blockchain for Cybersecurity in Cyber-Physical Systems. Cham: Springer. https://doi.org/10.1007/978-3-031-25506-9

This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems. It presents crucial issues in this field and provides a sample of recent advances and insights into the research pr... Read More about Blockchain for Cybersecurity in Cyber-Physical Systems.

Using Social Media & Sentiment Analysis to Make Investment Decisions (2022)
Journal Article
Hasselgren, B., Chrysoulas, C., Pitropakis, N., & Buchanan, W. J. (2023). Using Social Media & Sentiment Analysis to Make Investment Decisions. Future Internet, 15(1), Article 5. https://doi.org/10.3390/fi15010005

Making investment decisions by utilizing sentiment data from social media (SM) is starting to become a more tangible concept. There has been a broad investigation into this field of study over the last decade, and many of the findings have promising... Read More about Using Social Media & Sentiment Analysis to Make Investment Decisions.

Towards The Creation Of The Future Fish Farm (2023)
Journal Article
Papadopoulos, P., Buchanan, W. J., Sayeed, S., & Pitropakis, N. (2023). Towards The Creation Of The Future Fish Farm. Journal of Surveillance, Security and Safety, 4, 1-3. https://doi.org/10.20517/jsss.2022.16

Aim: A fish farm is an area where fish raise and bred for food. Fish farm environments support the care and management of seafood within a controlled environment. Over the past few decades, there has been a remarkable increase in the calorie intake o... Read More about Towards The Creation Of The Future Fish Farm.

An omnidirectional approach to touch-based continuous authentication (2023)
Journal Article
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2023). An omnidirectional approach to touch-based continuous authentication. Computers and Security, 128, Article 103146. https://doi.org/10.1016/j.cose.2023.103146

This paper focuses on how touch interactions on smartphones can provide a continuous user authentication service through behaviour captured by a touchscreen. While efforts are made to advance touch-based behavioural authentication, researchers often... Read More about An omnidirectional approach to touch-based continuous authentication.

MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing (2023)
Journal Article
Zhao, L., Zhang, E., Wan, S., Hawbani, A., Al-Dubai, A. Y., Min, G., & Zomaya, A. Y. (2024). MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing. IEEE Transactions on Mobile Computing, 23(5), 4259 - 4272. https://doi.org/10.1109/tmc.2023.3289611

Vehicular Edge Computing (VEC) is the transportation version of Mobile Edge Computing (MEC) in road scenarios. One key technology of VEC is task offloading, which allows vehicles to send their computation tasks to the surrounding Roadside Units (RSUs... Read More about MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing.

ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology (2023)
Journal Article
Naji, A., Hawbani, A., Wang, X., Al-Gunid, H. M., Al-Dhabi, Y., Al-Dubai, A., Hussain, A., Zhao, L., & Alsamhi, S. H. (2024). ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology. IEEE Transactions on Sustainable Computing, 9(1), 31 - 45. https://doi.org/10.1109/tsusc.2023.3296607

Wireless Power Transfer (WPT) is a promising technology that can potentially mitigate the energy provisioning problem for sensor networks. In order to efficiently replenish energy for these battery-powered devices, designing appropriate scheduling an... Read More about ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology.

Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method (2023)
Journal Article
Li, Z., Zhao, L., Min, G., Al-Dubai, A. Y., Hawbani, A., Zomaya, A. Y., & Luo, C. (2023). Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method. IEEE Transactions on Intelligent Transportation Systems, 24(12), 14022 - 14036. https://doi.org/10.1109/tits.2023.3300082

Greedy routing efficiently achieves routing solutions for vehicular networks due to its simplicity and reliability. However, the existing greedy routing schemes have mainly considered simple routing metrics only, e.g., distance based on the local vie... Read More about Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method.

A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing (2023)
Journal Article
Zhao, L., Zhao, Z., Zhang, E., Hawbani, A., Al-Dubai, A., Tan, Z., & Hussain, A. (2023). A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing. IEEE Journal on Selected Areas in Communications, 41(11), 3386-3400. https://doi.org/10.1109/jsac.2023.3310062

Vehicle Edge Computing (VEC) is a promising paradigm that exposes Mobile Edge Computing (MEC) to road scenarios. In VEC, task offloading can enable vehicles to offload the computing tasks to nearby Roadside Units (RSUs) that deploy computing capabili... Read More about A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing.

Rapidrift: Elementary Techniques to Improve Machine Learning-Based Malware Detection (2023)
Journal Article
Manikandaraja, A., Aaby, P., & Pitropakis, N. (2023). Rapidrift: Elementary Techniques to Improve Machine Learning-Based Malware Detection. Computers, 12(10), Article 195. https://doi.org/10.3390/computers12100195

Artificial intelligence and machine learning have become a necessary part of modern living along with the increased adoption of new computational devices. Because machine learning and artificial intelligence can detect malware better than traditional... Read More about Rapidrift: Elementary Techniques to Improve Machine Learning-Based Malware Detection.

Machine Un-learning: An Overview of Techniques, Applications, and Future Directions (2023)
Journal Article
Sai, S., Mittal, U., Chamola, V., Huang, K., Spinelli, I., Scardapane, S., Tan, Z., & Hussain, A. (2024). Machine Un-learning: An Overview of Techniques, Applications, and Future Directions. Cognitive Computation, 16, 482-506. https://doi.org/10.1007/s12559-023-10219-3

ML applications proliferate across various sectors. Large internet firms employ ML to train intelligent models using vast datasets, including sensitive user information. However, new regulations like GDPR require data removal by businesses. Deleting... Read More about Machine Un-learning: An Overview of Techniques, Applications, and Future Directions.

Adaptive Mobile Chargers Scheduling Scheme based on AHP-MCDM for WRSN (2024)
Journal Article
Makanda, K., Hawbani, A., Wang, . X., Naji, A., Al-Dubai, A., Zhao, L., & Alsamhi, S. H. (online). Adaptive Mobile Chargers Scheduling Scheme based on AHP-MCDM for WRSN. IEEE Transactions on Sustainable Computing, https://doi.org/10.1109/TSUSC.2024.3391316

Wireless Sensor Networks (WSNs) are used to sense and monitor physical conditions in various services and applications. However, there are a number of challenges in deploying WSNs, especially those pertaining to energy replenishment. Using the curre... Read More about Adaptive Mobile Chargers Scheduling Scheme based on AHP-MCDM for WRSN.

A Transcriptomic Appreciation of Childhood Meningococcal and Polymicrobial Sepsis from a Pro-Inflammatory and Trajectorial Perspective, a Role for Vascular Endothelial Growth Factor A and B Modulation? (2023)
Journal Article
Rashid, A., Brusletto, B. S., Al-Obeidat, F., Toufiq, M., Benakatti, G., Brierley, J., Malik, Z. A., Hussain, Z., Alkhazaimi, H., Sharief, J., Kadwa, R., Sarpal, A., Chaussabel, D., Malik, R. A., Quraishi, N., Khilnani, P., Zaki, S. A., Nadeem, R., Shaikh, G., Al-Dubai, A., …Hussain, A. (2023). A Transcriptomic Appreciation of Childhood Meningococcal and Polymicrobial Sepsis from a Pro-Inflammatory and Trajectorial Perspective, a Role for Vascular Endothelial Growth Factor A and B Modulation?. Shock, 60(4), 503-516. https://doi.org/10.1097/shk.0000000000002192

This study investigated the temporal dynamics of childhood sepsis by analyzing gene expression changes associated with proinflammatory processes. Five datasets, including four meningococcal sepsis shock (MSS) datasets (two temporal and two longitudin... Read More about A Transcriptomic Appreciation of Childhood Meningococcal and Polymicrobial Sepsis from a Pro-Inflammatory and Trajectorial Perspective, a Role for Vascular Endothelial Growth Factor A and B Modulation?.

Wireless Power Transfer Technologies, Applications, and Future Trends: A Review (2024)
Journal Article
Alabsi, A., Hawbani, A., Wang, X., Dubai, A. A., Hu, J., Aziz, S. A., Kumar, S., Zhao, L., Shvetsov, A. V., & Alsamhi, S. H. (online). Wireless Power Transfer Technologies, Applications, and Future Trends: A Review. IEEE Transactions on Sustainable Computing, https://doi.org/10.1109/TSUSC.2024.3380607

Wireless Power Transfer (WPT) is a disruptive technology that allows wireless energy provisioning for energy- limited IoT devices, thus decreasing the over-reliance on batteries and wires. WPT could replace conventional energy provisioning (e.g., ene... Read More about Wireless Power Transfer Technologies, Applications, and Future Trends: A Review.