Testing And Hardening IoT Devices Against the Mirai Botnet
Conference Proceeding
Kelly, C., Pitropakis, N., McKeown, S., & Lambrinoudakis, C. (2020)
Testing And Hardening IoT Devices Against the Mirai Botnet. https://doi.org/10.1109/CyberSecurity49315.2020.9138887
A large majority of cheap Internet of Things (IoT) devices that arrive brand new, and are configured with out-of-the-box settings, are not being properly secured by the manufa...
Transparent Handover for Mobile Multicast Sources
Conference Proceeding
Romdhani, I., Bettahar, H., & Bouabdallah, A. (2006)
Transparent Handover for Mobile Multicast Sources. In International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006, 145-145. doi:10.1109/icniconsmcl.2006.217
The Internet research community has proposed many routing protocols to support efficient multicast application. However, these protocols were developed for multicast parties w...
Privacy-preserving Surveillance Methods using Homomorphic Encryption
Conference Proceeding
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020)
Privacy-preserving Surveillance Methods using Homomorphic Encryption. In ICISSP: Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (240-248). https://doi.org/10.5220/0008864902400248
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encrypt...
Scenario Analysis using Out-of-line Firewall Evaluation Framework.
Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007)
Scenario Analysis using Out-of-line Firewall Evaluation Framework
Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These a...
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach
Conference Proceeding
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...
Can Federated Models Be Rectified Through Learning Negative Gradients?
Conference Proceeding
Tahir, A., Tan, Z., & Babaagba, K. O. (2024)
Can Federated Models Be Rectified Through Learning Negative Gradients?. In Big Data Technologies and Applications (18-32). https://doi.org/10.1007/978-3-031-52265-9_2
Federated Learning (FL) is a method to train machine learning (ML) models in a decentralised manner, while preserving the privacy of data from multiple clients. However, FL is...
Ethical assessment in e-Health
Conference Proceeding
Gonzalez-Pinto, A., Ruiz de Azua, S., Mival, O. H., Thuernmler, C., Jumelle, A. K. L., Ispas, I., …González-Pinto, A. (2015)
Ethical assessment in e-Health. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 262-268. https://doi.org/10.1109/healthcom.2014.7001852
While innovative e-Health and m-Health technologies and solutions will eventually change the way health and social care are delivered, it raises many challenges regarding what...
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System
Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. In CITT 2018. , (91-103). https://doi.org/10.1007/978-3-030-05532-5_7
Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, s...
A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking
Conference Proceeding
Zhao, L., Liu, Y., Al-Dubai, A., Tan, Z., Min, G., & Xu, L. (2019)
A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking. https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00082
With the rapid development of mobile applications, networking technologies have been constantly evolved to offer a more convenient way of sharing information and online-commun...
Controlling a simulated Khepera with an XCS classifier system with memory.
Conference Proceeding
Webb, A., Hart, E., Ross, P. & Lawson, A. (2003)
Controlling a simulated Khepera with an XCS classifier system with memory. ISBN 9783540200574
Autonomous agents commonly suffer from perceptual aliasing in which differing situations are perceived as identical by the robots sensors, yet require different courses of act...