Date


Download Available

107 results

A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks

Journal Article
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019)
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, https://doi.org/10.3390/s19194321
The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks p...

A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles

Journal Article
Yao, W., Yahya, A., Khan, F., Tan, Z., Rehman, A. U., Chuma, J. M., …Babar, M. (2019)
A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles. IEEE Access, 7, 160889-160900. https://doi.org/10.1109/ACCESS.2019.2945610
The advancements in hardware technologies have driven the evolution of vehicular ad hoc networks into the Internet of Vehicles (IoV). The IoV is a decentralized network of IoT...

A 3D Smooth Random Walk Mobility Model for FANETs

Conference Proceeding
Lin, N., Gao, F., Zhao, L., Al-Dubai, A., & Tan, Z. (2019)
A 3D Smooth Random Walk Mobility Model for FANETs. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00075
The number of Unmanned Aerial Vehicles (UAVs) applications has increased over the past few years. Among all scenarios, UAV group consisting multi-UAVs is normally used to prov...

A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking

Conference Proceeding
Zhao, L., Liu, Y., Al-Dubai, A., Tan, Z., Min, G., & Xu, L. (2019)
A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking. https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00082
With the rapid development of mobile applications, networking technologies have been constantly evolved to offer a more convenient way of sharing information and online-commun...

Deriving ChaCha20 Key Streams From Targeted Memory Analysis

Journal Article
McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019)
Deriving ChaCha20 Key Streams From Targeted Memory Analysis. Journal of Information Security and Applications, 48, https://doi.org/10.1016/j.jisa.2019.102372
There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly r...

Reviving legacy enterprise systems with microservice-based architecture within cloud environments

Conference Proceeding
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019)
Reviving legacy enterprise systems with microservice-based architecture within cloud environments. In Computer Science Conference Proceedingshttps://doi.org/10.5121/csit.2019.90713
Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most eff...

A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers

Journal Article
Han, T., Jan, S., Tan, T., Usman, M., Jan, M., Khan, R., & Xu, Y. (2020)
A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers. Concurrency and Computation: Practice and Experience, 32(16), https://doi.org/10.1002/cpe.5300
Software De ned Network (SDN) and Network Virtualization (NV) are emerged paradigms that simpli ed the control and management of the next generation networks, most importantly...

Decrypting Live SSH Traffic in Virtual Environments

Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...

SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application.

Journal Article
Jan, M. A., Zhang, W., Usman, M., Tan, Z., Khan, F., & Luo, E. (2019)
SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. Journal of Network and Computer Applications, 137, 1-10. https://doi.org/10.1016/j.jnca.2019.02.023
The Internet of Things (IoT) has the potential to transform communities around the globe into smart cities. The massive deployment of sensor-embedded devices in the smart citi...

Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop

Journal Article
Babar, M., Arif, F., Jan, M. A., Tan, Z., & Khan, F. (2019)
Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. Future Generation Computer Systems, 96, 398-409. https://doi.org/10.1016/j.future.2019.02.035
The unbroken amplfi cation of a versatile urban setup is challenged by huge Big Data processing. Understanding the voluminous data generated in a smart urban environment for d...
6 results

Evaluation of Federated Machine Unlearning using Membership Inference Attacks

2023 - 2026
Federated Learning (FL) is a type of distributed Machine Learning (ML) training technique that allows for accurate predictions without sharing sensitive data. This is possible, as FL allows everyone t...
Funder: Carnegie Trust for the Universities of Scotland | Value: £73,564

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2022 - 2022
Authenticating smartphone users from distinct behavioural biometric patterns provided through human interactions on touch screens would allow users to be continuously authenticated on their devices wh...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £923

Divulging the Secrets of Artificial Intelligence

2022 - 2022
Digital Infrastructures are complex systems that are built upon computing and communication hardware, and whose resilience is undermined by the security of its hardware building blocks, which has not ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £2,500

Security and Privacy in Vehicular Ad-hoc Networks

2022 - 2024
The great leap forward in wireless communications technology drives the recent advancements of Vehicular Ad hoc NETworks (VANETs). As a key part of the Intelligent Transportation Systems (ITS) framewo...
Funder: Royal Society | Value: £12,000

Repairing Polluted Artificial Intelligent Systems with Machine Unlearning

2019 - 2021
This project is intended to seek in-depth understanding of the new promising decentralised machine learning scheme, namely federated learning, and develop a proof-of-concept algorithm-independent unle...
Funder: ENU Development Trust | Value: £29,998

MemoryCrypt

2019 - 2020
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £10,759

Date


Qualification level

16 results

Digital Forensic Triage Methods for Prioritization, based on Computer System and User Classification

2024 - date
Mark McLeod | Director of Studies: Dr Sean McKeown | Second Supervisor: Rich Macfarlane

Decentralized Finance (DeFi) Compositions and Derivatives on Blockchains: A Comprehensive Analysis, Design Framework, and Risk Assessment

2023 - date
Trevor Oakley | Director of Studies: Dr Zakwan Jaroucheh | Second Supervisor: Dr Thomas Tan

Evaluation of Federated Machine Unlearning using Membership Inference Attacks

2023 - date
Jordan Wylie | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Amir Hussain

Implement "Right to be forgotten" with machine unlearning

2022 - date
Michael Orme | Director of Studies: Dr Thomas Tan | Second Supervisor: Dr Yanchao Yu

Natural Language Interfaces to support career decision-making of young people

2021 - date
Exploring how natural language interfaces can be used to support young people with career decision making, including ethics...
Marianne Wilson | Director of Studies: Dr David Brazier | Second Supervisor: Dr Dimitra Gkatzia

Divulging the Secrets of Artificial Intelligence

2021 - date
Mr Yanfei Zhu | Director of Studies: Dr Thomas Tan | Second Supervisor: Dr Chan Hwang See

Internationalisation-at-home for Computing & Engineering: the experience of a non-first-tier Chinese university

2020 - date
Lijuan Luo | Director of Studies: Dr Peter Cruickshank | Second Supervisor: Dr Kendall Richards

Metaskills Maturity for future workplaces

2019 - date
Katherine Stephen | Director of Studies: Dr David Brazier | Second Supervisor: Prof Hazel Hall

Cyberbullying detection approach using pre-trained models and contrastive self-supervised learning for data augmentation

2019 - date
Lulwah Alharigy | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: Dr Thomas Tan

From algorithm selection to generation using deep learning

2018 - 2022
Mhd Rateb Mhd Ziad Alissa | Director of Studies: Dr Kevin Sim | Second Supervisor: Prof Emma Hart

Date