Evaluation on multivariate correlation analysis based denial-of-service attack detection system
Conference Proceeding
Tan, Z., Jamdagni, A., Nanda, P., He, X., & Liu, R. P. (2012)
Evaluation on multivariate correlation analysis based denial-of-service attack detection system. In SecurIT '12 Proceedings of the First International Conference on Security of Internet of Things, 160-164. https://doi.org/10.1145/2490428.2490450
In this paper, a Denial-of-Service (DoS) attack detection system is explored, where a multivariate correlation analysis technique based on Euclidean distance is applied for ne...
Hybrid parameter control approach applied to a diversity-based multi-objective Memetic Algorithm for frequency assignment problems
Conference Proceeding
Segredo, E., Paechter, B., Hart, E., & Gonz´alez-Vila, C. I. (2016)
Hybrid parameter control approach applied to a diversity-based multi-objective Memetic Algorithm for frequency assignment problems. In 2016 IEEE Congress on Evolutionary Computation (CEC)https://doi.org/10.1109/CEC.2016.7743969
In order to address the difficult issue of parameter setting within a diversity-based Multi-objective Evolutionary Algorithm (MOEA), we recently proposed a hybrid control sche...
Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture.
Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013)
Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy, (91-101). https://doi.org/10.1007/978-3-642-41205-9_8
We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, org...
Analysis and migration of location-finding methods for GSM and 3G networks.
Conference Proceeding
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004)
Analysis and migration of location-finding methods for GSM and 3G networks. https://doi.org/10.1049/cp%3A20040695
This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observ...
Finding Fair Negotiation Algorithms to Reduce Peak Electricity Consumption in Micro Grids
Conference Proceeding
Powers, S. T., Meanwell, O., & Cai, Z. (2019)
Finding Fair Negotiation Algorithms to Reduce Peak Electricity Consumption in Micro Grids. In PAAMS 2019: Advances in Practical Applications of Survivable Agents and Multi-Agent Systems: The PAAMS Collection, 269-272. https://doi.org/10.1007/978-3-030-24209-1_28
Reducing peak electricity consumption is important to maximise use of renewable energy sources, and reduce the total amount of capacity required on a grid. Most approaches use...
Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report
Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2002)
Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report. In Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210), 155-162. https://doi.org/10.1109/IPCCC.2001.918648
Broadcast is an important collective communication operation required by many real-world parallel applications. This paper proposes the Coded Path Routing (or CPR for short) a...
Mining malware command and control traces
Conference Proceeding
McLaren, P., Russell, G., & Buchanan, B. (2018)
Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017https://doi.org/10.1109/SAI.2017.8252185
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...
A Multi-attributes-based Trust Model of Internet of Vehicle
Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security. , (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...
Towards Modelling and Reasoning about Uncertain Data of Sensor Measurements for Decision Support in Smart Spaces.
Conference Proceeding
Bamgboye, O., Liu, X., & Cruickshank, P. (2018)
Towards Modelling and Reasoning about Uncertain Data of Sensor Measurements for Decision Support in Smart Spaces. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)https://doi.org/10.1109/COMPSAC.2018.10330
Smart Spaces currently benefits from Internet of Things (IoT) infrastructures in order to realise its objectives. In many cases, it demonstrates this through certain automated...
A novel hybrid intelligence approach for 2D packing through internet crowdsourcing
Conference Proceeding
Agrawal, A., Yadav, P., Upadhyay, C. K., Corney, J. R., Vasantha, G. A., Jagadeesan, A., & Lynn, A. (2015)
A novel hybrid intelligence approach for 2D packing through internet crowdsourcing. In Technological Innovation in ICT for Agriculture and Rural Development (TIAR), 2015 IEEE, 33-39. https://doi.org/10.1109/TIAR.2015.7358527
Packing problems on its current state are being utilized for wide area of industrial applications. The aim of present research is to create and implement an intelligent system...