Date


Output Type

Download Available

24 results

A Privacy preserving method using privacy enhancing techniques for location based services

Journal Article
Buchanan, W. J., Kwecka, Z., & Ekonomou, E. (2012)
A Privacy preserving method using privacy enhancing techniques for location based services. Mobile Networks and Applications, https://doi.org/10.1007/s11036-012-0362-6
Two of the major changes within computing, at the present time, are the move towards service-oriented architectures and the increasing usage of mobile devices to access these ...

NetHost-sensor: Monitoring a target host's application via system calls

Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. (2006)
NetHost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4), 166-175. https://doi.org/10.1016/j.istr.2006.10.003
Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert ...

Towards scalable collective communication for multicomputer interconnection networks

Journal Article
Al-Dubai, A., Ould-Khaoua, M., El-Zayyat, K., Ababneh, I., & Al-Dobai, S. (2004)
Towards scalable collective communication for multicomputer interconnection networks. Information Sciences, 163(4), 293-306. https://doi.org/10.1016/j.ins.2003.06.014
A considerable number of broadcast algorithms have been proposed for the mesh over the past decade. Nonetheless, most of these algorithms do not exhibit good scalability prope...

E-Health: chances and challenges of distributed, service oriented architectures

Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012)
E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,
Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remai...

Mitigating Disaster using Secure Threshold-Cloud Architecture

Journal Article
Ukwandu, E., Buchanan, W. J., & Russell, G. (2018)
Mitigating Disaster using Secure Threshold-Cloud Architecture. Current Trends in Computer Sciences & Applications, 1(2),
There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to app...

The Internet of Things: a security point of view.

Journal Article
Li, S., Tryfonas, T., & Li, H. (2016)
The Internet of Things: a security point of view. Internet Research, 26(2), 337-359. https://doi.org/10.1108/IntR-07-2014-0173
Purpose -- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technol...

QoS-aware Inter-domain multicast for scalable wireless community networks

Journal Article
Al-Dubai, A. Y., Zhao, L., Zomaya, A. Y., & Min, G. (2014)
QoS-aware Inter-domain multicast for scalable wireless community networks. IEEE Transactions on Parallel and Distributed Systems, 26(11), 3136-3148. https://doi.org/10.1109/TPDS.2014.2365190
Wireless Community Networks (WCNs) have emerged as a cost-effective ubiquitous broadband connectivity solution, offering a wide range of services in a given geographical area....

A plane-based broadcast algorithm for multicomputer networks

Journal Article
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2005)
A plane-based broadcast algorithm for multicomputer networks. Journal of Systems Architecture, 51(10-11), 617-632. https://doi.org/10.1016/j.sysarc.2005.01.003
Maximising the performance of parallel systems requires matching message-passing algorithms and application characteristics with a suitable underling interconnection network. ...

Evaluation of TFTP DDoS amplification attack

Journal Article
Sieklik, B., Macfarlane, R., & Buchanan, W. J. (2016)
Evaluation of TFTP DDoS amplification attack. Computers and Security, 57, 67-92. https://doi.org/10.1016/j.cose.2015.09.006
Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to ...

A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations

Journal Article
Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Alsarhan, A., Nasser, Y., Mackenzie, L. M., & Boukerche, A. (2018)
A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations. Communications Surveys and Tutorials, IEEE Communications Society, https://doi.org/10.1109/COMST.2018.2874356
Driven by the special requirements of the Low-power and Lossy Networks (LLNs), the IPv6 Routing Protocol for LLNs (RPL) was standardized by the IETF some six years ago to tack...