Date


School

Output Type

Download Available

77 results

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach

Conference Proceeding
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. In CITT 2018. , (91-103). https://doi.org/10.1007/978-3-030-05532-5_7
Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, s...

A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking

Conference Proceeding
Zhao, L., Liu, Y., Al-Dubai, A., Tan, Z., Min, G., & Xu, L. (2019)
A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking. https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00082
With the rapid development of mobile applications, networking technologies have been constantly evolved to offer a more convenient way of sharing information and online-commun...

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...

A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations.

Conference Proceeding
Wu, Y., Min, G., Li, K., & Al-Dubai, A. (2009)
A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations. In GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference (1-6). https://doi.org/10.1109/GLOCOM.2009.5425390
The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points. Wireless mesh ne...

A temporal-information-based adaptive routing algorithm for software defined vehicular networks

Conference Proceeding
Zhao, L., Li, Z., Li, J., Al-Dubai, A., Min, G., & Zomaya, A. Y. (2019)
A temporal-information-based adaptive routing algorithm for software defined vehicular networks. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC)https://doi.org/10.1109/ICC.2019.8761680
In Software Defined Vehicular Networks (SDVNs), most existing studies of routing consider the vehicular network as a static graph and compute the flow table based on static in...

A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks

Conference Proceeding
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2021)
A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks. In ICC 2021 - IEEE International Conference on Communicationshttps://doi.org/10.1109/ICC42927.2021.9500407
Long-Range (LoRa) has been a major avenue for deploying the Internet of Things (IoT) in large scale environments due to its long-scale connection, energy efficiency, and cost-...

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable

Conference Proceeding
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015)
Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1620-1625). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.244
In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random varia...

Security issues of a publicly accessible cloud computing infrastructure.

Conference Proceeding
Russell, G., & Macfarlane, R. (2012)
Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 1210-1216. https://doi.org/10.1109/TrustCom.2012.259
Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accident...

A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval.

Conference Proceeding
Fang, D., Liu, X., & Romdhani, I. (2015)
A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. In W. Zimmerman, Y. W. Lee, & C. Reich (Eds.), Cloud Computing 2014: the Fifth International Conference on Cloud Computing, Grids and Virtualization, 6-11
As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While...