5 results

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

Journal Article
Barrowclough, J. P., & Asif, R. (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...

Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

Journal Article
Asif, R., & Buchanan, W. J. (2017)
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847
There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile...

Undermining our data: implications for trust in the population census

Presentation / Conference
Killick, L., Duff, A. S., Deakin, M. & Hall, H. (2017, June)
Undermining our data: implications for trust in the population census. Paper presented at Information: interactions and impact (i3), Robert Gordon University, Aberdeen, Scotland, UK
This paper draws on empirical work conducted as part of a multi-method research study funded by the Arts and Humanities Research Council (AHRC). It is concerned with public p...

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques

Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...

Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds

Conference Proceeding
Thuemmler, C., Mueller, J., Covaci, S., Magedanz, T., de Panfilis, S., Jell, T., …Gavras, A. (2013)
Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds. In 2013 Tenth International Conference on Information Technology: New Generations (ITNG),, 459-463. https://doi.org/10.1109/itng.2013.77
Health care providers have over years continuously rejected Public Cloud technology for understandable concerns regarding privacy and confidentiality. The pick up rate on clou...