Lecturer in Cybersecurity and Networks; Program Leader for MSc Advanced Security & Cybercrime; Winner of Outstanding Woman in Cyber (Scottish Cyber Awards 2017)
Yassein, M. B., Manaseer, S., Al-hassan, A. A., Taye', Z. A., & Al-Dubai, A. Y. (2010). A new probabilistic Linear Exponential Backoff scheme for MANETs. In 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW)doi:10.1109/ipdpsw.2010.5470789
Broadcasting is an essential operation in Mobile ad hoc Networks (MANETs) environments. It is used in the initial phase of route discovery process in many reactive protocols. ...
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009). Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09, 228 - 235. doi:10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...
Romdhani, I. (2009). Patent: A new addressing scheme for multicast IP with an extended scope field to include access rights.
Digital Health Institute
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Scottish Funding Council
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
Arts & Humanities Research Council
The feeling of being immersed within a live performance by an ensemble of world class musicians can be a deeply engaging and highly valued cultural experience for audiences as well as for the performe...
Lecturer in Cybersecurity
Senior Research Fellow
Professor of Data Science and Intelligent Systems
Romdhani, I., & Yassin Al-Dubai, A. (2009). Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...
Wu, Y., Min, G., Li, K., & Al-Dubai, A. (2008). A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations. In GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 1-6. doi:10.1109/GLOCOM.2009.5425390
The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points. Wireless mesh ne...
Zhao, L., Al-Dubai, A., & Liu, X. (2007). A new multicast algorithm for wireless mesh networks. In 9th Annual Postgraduate Symposium, The Convergence of Telecommunications, Networking and Broadcasting
Wireless mesh networks, also known as “community wireless networks”, have been attracting much attention due to its promising technology. It is becoming a major
avenue for the...
Romdhani, I., & Al-Dubai, A. (2007). A multi-channel hybrid MAC protocol for wireless Mesh networks. In Proceedings of the IEEE 8th International Symposium on Computer Networks (ISCN?08), Istanbul, Turkey
Al-Dubai, A. Y., & Romdhani, I. (2007). On The Design of High Throughput Adaptive Multicast Communication. In Proceedings of the 6th International Symposium on Parallel and Distributed Computing (ISPDC-2007), 37-38. doi:10.1109/ispdc.2007.39
The efficient and high throughput multicast communication in interconnection networks is known as a fundamental but hard problem. In the literature, most of the related works ...
Romdhani, I., & Al-Dubai, A. (2007). Mobile IP conditional binding update. In 1st IEEE Workshop on Autonomic Communication and Network Management ACNM-2007, 10th IFIP/IEEE Symposium on Integrated Management, 64-70
Mobile IP protocols use a correspondent registration procedure between a Mobile Node (MN) and its Correspondent Nodes (CNs) to maintain a valid and up-to-date binding associat...
Buchanan, W. J., & Saliou, L. (2005). Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education, 111-115. https://doi.org/10.1109/ITRE.2004.1393657
Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from ...
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2000). An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001, 247 - 254. doi:10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...
Kalganova, T., Russell, G., & Cumming, A. (1998). Multiple traffic signal control using a genetic algorithm. In A. Dobnikar, N. C. Steele, D. W. Pearson, & R. F. Albrecht (Eds.), Artificial Neural Nets and Genetic Algorithms, 220-228. doi:10.1007/978-3-7091-6384-9_38
Optimising traffic signal timings for a multiple-junction road network is a difficult but important problem. The essential difficulty of this problem is that the traffic signa...
Bate, M., Cowie, A., Milne, G., & Russell, G. (1994). Process algebras and the rapid simulation of highly concurrent systems. In Proceedings of the 18th Australasian Computer Science Conference, 21-31
No abstract available.
Russell, G. (1992). Lightweight threads for portable software. In Proceedings of the UKUUG/SUKUG
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016). Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
The development of interesting use cases for IPv6.
Carnegie Trust for the Universities of Scotland
This short research visit aims at building research collaborative links with the Texas A & M University at Qatar and the University of Qatar
Royal Society of Edinburgh
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...
Core 44, Room C44, Merchiston Campus
26 September 2017