Research explorer tool

8 results

Mobile Multicast Route Optimisation

Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Mobile Multicast Route Optimisation. In IEEE International Conference on Communications, 2006. ICC '06, 1977-1983. doi:10.1109/icc.2006.255060
The multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional ...

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data

Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...

Investigating false positive reduction in HTTP via procedure analysis.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
Investigating false positive reduction in HTTP via procedure analysis. https://doi.org/10.1109/ICNS.2006.65
This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection sys...

NetHost-sensor: Monitoring a target host's application via system calls

Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. (2006)
NetHost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4), 166-175. https://doi.org/10.1016/j.istr.2006.10.003
Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert ...

A framework to detect novel computer viruses via system calls.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2005)
A framework to detect novel computer viruses via system calls. In M. Merabti, R. Pereira, & O. Abuelma'atti (Eds.), 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 308-313
This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries...

Enhancing intrusion detection via an active target host.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2005)
Enhancing intrusion detection via an active target host. In IEEE ICTe Africa 2006
Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of netwo...

Critical analysis and error determination of locating-finding techniques in GSM.

Journal Article
Buchanan, W. J., Raja, A. & Munoz, J. (2005)
Critical analysis and error determination of locating-finding techniques in GSM. International Journal of Mobile Communications. 3, 165-182. doi:10.1504/IJMC.2005.005905. ISSN 1470-949X
GPS is a well-established technique for location-finding, but mobile phone-based methods are generally less expensive to implement, and can give reasonable accuracies. These t...

We know where you are [cellular location tracking]

Journal Article
Raja, K., Buchanan, W., & Munoz, J. (2004)
We know where you are [cellular location tracking]. Communications engineer, 2(3), 34-39. doi:10.1049/ce:20040307

Date


9 results

Network firewalls dynamic performance evaluation and formalisation

2004 - 2009
Lionel Saliou | Director of Studies: Prof Bill Buchanan | Second Supervisor: Jose Munoz

Adoption of information and communication technologies for educational purposes in Malawian secondary schools

2004 - 2009
The adoption of Information and Communication Technologies (ICTs) in Least Developed Countr...
Anthony Ziba | Director of Studies: Prof Lissie Davenport | Second Supervisor: Keith Horton

NetHost-Sensor: Enhancing Intrusion Detection via an Active Target Host

2003 - 2007
Dr Abiola Abimbola | Director of Studies: Jose Munoz | Second Supervisor: Prof Bill Buchanan

MARIAN: Mobile Agents for Routing in Ad-Hoc Networks

2002 - 2005
Nikos Migas | Director of Studies: Prof Bill Buchanan | Second Supervisor: Jose Munoz

Usability of Stereoscopic Augmented Reality

2001 - 2007
Jamie Sands | Director of Studies: Prof Shaun Lawson | Second Supervisor: Jose Munoz

Component-based network test tools platform for network design and maintenance

2000 - 2003
Hasanain Golam | Director of Studies: Prof Bill Buchanan | Second Supervisor: Jose Munoz

Application of activity theory to systems design or contextual evaluation with an activity theoretic emphasis

1999 - 2005
Liisa Dawson | Director of Studies: Dr Phil Turner | Second Supervisor: Prof David Benyon

Congestion control and avoidance for ATM networks

1997 - 2005
Chih-Ming Wu | Director of Studies: Jose Munoz | Second Supervisor: Dr Gordon Russell

Applying experientialism to HCI methods

1997 - 2001
Manuel Imaz | Director of Studies: Prof David Benyon | Second Supervisor: Dr Michael Smyth

Date


Date