Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System
Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. In CITT 2018. , (91-103). https://doi.org/10.1007/978-3-030-05532-5_7
Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, s...
RESCUE: Resilient Secret Sharing Cloud-based Architecture.
Conference Proceeding
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015)
RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1, (872-879). https://doi.org/10.1109/Trustcom.2015.459
This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without use...
Security issues of a publicly accessible cloud computing infrastructure.
Conference Proceeding
Russell, G., & Macfarlane, R. (2012)
Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 1210-1216. https://doi.org/10.1109/TrustCom.2012.259
Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accident...
Insider threat detection using principal component analysis and self-organising map
Conference Proceeding
Moradpoor, N., Brown, M., & Russell, G. (2017)
Insider threat detection using principal component analysis and self-organising map. In 10th International Conference on Security of Information and Networks (SIN 2017)https://doi.org/10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval.
Conference Proceeding
Fang, D., Liu, X., & Romdhani, I. (2015)
A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. In W. Zimmerman, Y. W. Lee, & C. Reich (Eds.), Cloud Computing 2014: the Fifth International Conference on Cloud Computing, Grids and Virtualization, 6-11
As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While...
Cross layer neighbourhood load routing for wireless mesh networks.
Conference Proceeding
Zhao, L., Al-Dubai, A., & Min, G. (2010)
Cross layer neighbourhood load routing for wireless mesh networks. In Proceedings of IEEE IPDPS 2010, (1-7). https://doi.org/10.1109/IPDPSW.2010.5470790
Wireless Mesh Network (WMN) has been considered as a key emerging technology to construct next generation wireless communication networks. It combines the advantages of both m...
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things
Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015)
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1118-1122). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.167
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...
Investigating false positive reduction in HTTP via procedure analysis.
Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
Investigating false positive reduction in HTTP via procedure analysis. https://doi.org/10.1109/ICNS.2006.65
This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection sys...
Enhancing intrusion detection via an active target host.
Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2005)
Enhancing intrusion detection via an active target host. In IEEE ICTe Africa 2006
Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of netwo...
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)
Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015)
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), (1109-1117). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.166
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and...