Research explorer tool

16 results

A Practical Steganographic Approach for Matroska Based High Quality Video Files

Conference Proceeding
Pitropakis, N., Lambrinoudakis, C., Geneiatakis, D., & Gritzalis, D. (2013)
A Practical Steganographic Approach for Matroska Based High Quality Video Files. In 2013 27th International Conference on Advanced Information Networking and Applications Workshopsdoi:10.1109/waina.2013.39
Several steganographic algorithms have been proposed for protecting message secrecy against unauthorized "reads". The most used method for hiding a message relies on embedding...

Towards OWL 2 Natively Supported Fuzzy Cloud Ontology

Conference Proceeding
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012)
Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. In 6th IEEE International Workshop Quality-Oriented Reuse of Software (IEEE QUORS’12), (328-333). https://doi.org/10.1109/compsacw.2012.66
Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applicati...

Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection

Conference Proceeding
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2012)
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. https://doi.org/10.1109/trustcom.2012.284
Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. Ho...

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...

A multi-channel hybrid MAC protocol for wireless Mesh networks.

Conference Proceeding
Romdhani, I., & Al-Dubai, A. (2007)
A multi-channel hybrid MAC protocol for wireless Mesh networks. In Proceedings of the IEEE 8th International Symposium on Computer Networks (ISCN?08), Istanbul, Turkey

An agent based Bayesian forecasting model for enhanced network security.

Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...