Research explorer tool

5 results

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset

Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...

Towards efficient collective communications for interconnection networks.

Thesis
Al-Dubai, A. (2004)
Towards efficient collective communications for interconnection networks. (Thesis). University of Glasgow. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3679

Higher-order statistics-based nonlinear speech analysis

Journal Article
Soraghan, J. J., Hussain, A., Alkulabi, A., & Durrani, T. (2002)
Higher-order statistics-based nonlinear speech analysis. Control and Intelligent Systems, 30, 11-18
A fast and robust three-level binary higher order statistics (HOS) based algorithm for simultaneous voiced/unvoiced detection and pitch estimation of speech signals in coloure...

Software agents and computer network security.

Conference Proceeding
Pikoulas, J., Mannion, M., & Buchanan, W. J. (2000)
Software agents and computer network security. In Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the, 211-217. https://doi.org/10.1109/ECBS.2000.839879
Preventing unauthorised access to corporate information systems is essential for many organisations. To address this problem we built a security enhancement software system us...