A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks
Conference Proceeding
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2021)
A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks. In ICC 2021 - IEEE International Conference on Communicationshttps://doi.org/10.1109/ICC42927.2021.9500407
Long-Range (LoRa) has been a major avenue for deploying the Internet of Things (IoT) in large scale environments due to its long-scale connection, energy efficiency, and cost-...
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites
Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2020)
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. In Applications of Evolutionary Computation. EvoApplications 2020. , (117-132). https://doi.org/10.1007/978-3-030-43722-0_8
In the field of metamorphic malware detection, training a detection model with malware samples that reflect potential mutants of the malware is crucial in developing a model r...
Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies
Conference Proceeding
Asif, R. (2017)
Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedingshttps://doi.org/10.1109/NOF.2017.8251243
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay
Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2017)
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. In 2016 IEEE Trustcom/BigDataSE/ISPA, (178-184). https://doi.org/10.1109/trustcom.2016.0061
The firewalls were invented since 1990s [1] and have been developed to operate more secure and faster. From the first era of the firewalls until today, they still regulate pac...
Performance Evaluation of a Fragmented Secret Share System
Conference Proceeding
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017)
Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)https://doi.org/10.1109/cybersa.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
On the design of scalable pipelined broadcasting for mesh networks
Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2002)
On the design of scalable pipelined broadcasting for mesh networks. In High Performance Computing Systems and Applications, 98-105. https://doi.org/10.1109/HPCSA.2002.1019140
Minimising the communication latency and achieving considerable scalability are of paramount importance when designing high performance broadcast algorithms. Many algorithms f...
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching
Conference Proceeding
Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2022)
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. In 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699138
The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up wi...
PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020)
PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing. https://doi.org/10.1145/3448823.3448875
The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ether...
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers
Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...
Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions
Conference Proceeding
Wadhaj, I., Ghaleb, B., & Thomson, C. (2021)
Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions. In Proceedings of International Conference on Emerging Technologies and Intelligent Systems ICETIS 2021: Volume 2 (547-563). https://doi.org/10.1007/978-3-030-85990-9_44
Effective measurement and monitoring of certain parameters (temperature, pressure, flow etc.) is crucial for the safety and optimization of processes in the Oil and Gas Indust...