Lecturer of Cybersecurity, Encryption and Networks
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X. & Han, W. (in press). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference ProceedingsISBN NA
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Bach, B., Kerracher, N., Hall, K. W., Carpendale, S., Kennedy, J. & Riche, N. H. (2016). Telling stories about dynamic networks with graph comics. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI'16), 1-13. doi:10.1145/2858036.2858387. ISBN 978-1-4503-3362-7
In this paper, we explore graph comics as a medium to communicate
changes in dynamic networks. While previous research
has focused on visualizing dynamic networks for data
Abdmeziem, M. R., Tandjaoui, D. & Romdhani, I. (2016). A new distributed MIKEY mode to secure e-health applications. In Chang, V., Méndez Muñoz, V., Walters, R., Wills, G. & Ramachandran, M. (Eds.). Proceedings of the International Conference on Internet of Things and Big Data, 88-95. doi:10.5220/0005945300880095. ISBN 978-989-758-183-0
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...
Bhardwaj, J. (2017). Review of 'Towards a framework for inclusive STEM Education' Workshop. International Journal of Gender, Science and Technology. 9(1), 73-75. ISSN 2040-0748
No abstract available.
Li, S., Tryfonas, T. & Li, H. (2015). The Internet of Things: a security point of view. Internet Research. 26(2), 337-359. doi:10.1108/IntR-07-2014-0173. ISSN 1066-2243
-- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technol...
Li, L., Peng, T. & Kennedy, J. (2010). A rule based taxonomy of dirty data. GSTF journal on computing. 1(2), 140-148. ISSN 2010-2283
There is a growing awareness that high quality of data is a key to today’s business success and that dirty data existing within data sources is one of the causes of poor data ...