17 results

NetHost-sensor: Monitoring a target host's application via system calls

Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. (2006)
NetHost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4), 166-175. https://doi.org/10.1016/j.istr.2006.10.003
Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert ...

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors

Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., …Tripathi, S. S. (2018)
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760
Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to ...

Towards scalable collective communication for multicomputer interconnection networks

Journal Article
Al-Dubai, A., Ould-Khaoua, M., El-Zayyat, K., Ababneh, I., & Al-Dobai, S. (2004)
Towards scalable collective communication for multicomputer interconnection networks. Information Sciences, 163(4), 293-306. https://doi.org/10.1016/j.ins.2003.06.014
A considerable number of broadcast algorithms have been proposed for the mesh over the past decade. Nonetheless, most of these algorithms do not exhibit good scalability prope...

NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification

Journal Article
Yazdania, S., Tan, Z., Kakavand, M., & Lau, S. (2022)
NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification. Wireless Networks, 28, 1251-1261. https://doi.org/10.1007/s11276-018-01909-0
Research in financial domain has shown that sentiment aspects of stock news have a profound impact on volume trades, volatility, stock prices and firm earnings. With the ever ...

A plane-based broadcast algorithm for multicomputer networks

Journal Article
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2005)
A plane-based broadcast algorithm for multicomputer networks. Journal of Systems Architecture, 51(10-11), 617-632. https://doi.org/10.1016/j.sysarc.2005.01.003
Maximising the performance of parallel systems requires matching message-passing algorithms and application characteristics with a suitable underling interconnection network. ...

Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop

Journal Article
Babar, M., Arif, F., Jan, M. A., Tan, Z., & Khan, F. (2019)
Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. Future Generation Computer Systems, 96, 398-409. https://doi.org/10.1016/j.future.2019.02.035
The unbroken amplfi cation of a versatile urban setup is challenged by huge Big Data processing. Understanding the voluminous data generated in a smart urban environment for d...

Analysis of an agent-based metric-driven for ad-hoc, on-demand routing.

Journal Article
Buchanan, W. J., Migas, N., Sinclair, G., & McArtney, K. (2006)
Analysis of an agent-based metric-driven for ad-hoc, on-demand routing. Ad hoc networks, 4(2), 146-167. https://doi.org/10.1016/j.adhoc.2004.04.009
Ad-hoc networks could bring many benefits over traditional, fixed networks. Unfortunately, they have many difficulties, including the selection of the optimal route, the avail...

A Simulation Study of Scalable Broadcast in High-Performance Regular Networks

Journal Article
Al-Dubai, A. Y., Ould-Khaoua, M., & Obaidat, M. S. (2004)
A Simulation Study of Scalable Broadcast in High-Performance Regular Networks. SIMULATION, 80(4-5), 207-220. https://doi.org/10.1177/0037549704044325
Broadcast is an important communication operation required by many real-world applications encountered in parallel, cluster, and grid computing environments. Broadcasting on r...

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data

Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...