Date


School

Download Available

33 results

Cooja Simulator Manual

Report
Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., & Wadhaj, I. (2016)
Cooja Simulator Manual. Edinburgh: Edinburgh Napier University
While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation....

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm

Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification bu...

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things

Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015)
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1118-1122). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.167
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)

Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015)
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), (1109-1117). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.166
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and...

An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework

Journal Article
Fang, D., Liu, X., Romdhani, I., & Pahl, C. (2015)
An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework. Journal of cloud computing advances, systems and applications, 4(1), https://doi.org/10.1186/s13677-015-0039-3
Cloud computing offers various computational resources via convenient on-demand service provision. Currently, heterogeneous services and cloud resources are usually utilized a...

Cloud-based identity and identity meta-data: secure and control own data in globalization era.

Journal Article
Spyra, G., Buchanan, W. J., Cruickshank, P., & Ekonomou, E. (2014)
Cloud-based identity and identity meta-data: secure and control own data in globalization era. International Journal of Reliable and Quality E-Healthcare, 3, https://doi.org/10.4018/ijrqeh.2014010105
This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care,...

Who would you trust to identify you in accessing your health record?

Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture.

Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013)
Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy, (91-101). https://doi.org/10.1007/978-3-642-41205-9_8
We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, org...

A scaleable and trusted e-Health eco-system: safi.re

Presentation / Conference
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April)
A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels
At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main component...

Conducting Performance Evaluation of an e-Health Platform

Book
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012)
Conducting Performance Evaluation of an e-Health Platform. In T. Issa, P. Isaías, & P. Kommers (Eds.), Advances in Business Information Systems and Analytics; Information Systems and Technology for Organizations in a Networked Society, 295-315. IGI Global Publishing. doi:10.4018/978-1-4666-4062-7.ch016
For increased awareness and adoption of e-Health implementations, results from evaluation must be catered towards three primary perspectives: organizational, end-user and tech...