Enhancing Big Data Security with Collaborative Intrusion Detection
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014)
Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. https://doi.org/10.1109/mcc.2014.53
Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a d...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...
Improving cloud network security using the Tree-Rule firewall
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014)
Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024
This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The r...
Hybrid Tree-rule Firewall for High Speed Data Transmission
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017)
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), 1-38. https://doi.org/10.1145/3041956
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, inclu...
Tradeoffs between latency, complexity and load balancing with multicast algorithms
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2010)
Tradeoffs between latency, complexity and load balancing with multicast algorithms. IEEE Transactions on Computers, 59, 159-173. https://doi.org/10.1109/TC.2009.104
The increasing number of collective communication-based services with a mass interest and the parallel increasing demand for service quality are paving the way toward end-to-e...
Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks
Zhao, L., Al-Dubai, A. Y., & Romdhani, I. (2010)
Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks. In 2010 IEEE 10th International Conference on Computer and Information Technology (CIT),, (336-342). https://doi.org/10.1109/cit.2010.500
Wireless Mesh Networking (WMN) emerges as a new technology to reshape the broadband industry towards a more efficient and cost effective connectivity. The WMN has been the ide...
New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks
Bani Khalaf, M., Al-Dubai, A. Y., & Min, G. (2015)
New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks. Journal of Computer and System Sciences, 81(1), 97-109. doi:10.1016/j.jcss.2014.06.014
Most existing route discovery schemes in MANETs are based on probabilistic models by which MANETs usually deploy broadcast mechanisms to discover routes between nodes. This is...
Password Pattern and Vulnerability Analysis for Web and Mobile Applications
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015)
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), (1600-1605). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.241
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...