Date


School

Download Available

86 results

E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks

Conference Proceeding
Ghaleb, B., Al-Dubai, A., & Ekonomou, E. (2015)
E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)https://doi.org/10.1109/cit/iucc/dasc/picom.2015.168
Routing Protocol for Low Power and Lossy networks (RPL) is the de-facto standard for routing in resource-constrained low-power and lossy networks (LLNs) which represent the bu...

Towards a new health and social care information sharing architecture.

Presentation / Conference
Buchanan, W. J. (2012, May)
Towards a new health and social care information sharing architecture
This presentation outlines the integration of the safi.re information sharing architecture.

Resilience of Video Streaming Services to Network Impairments

Journal Article
Torres Vega, M., Perra, C., & Liotta, A. (2018)
Resilience of Video Streaming Services to Network Impairments. IEEE Transactions on Broadcasting, 64(2), 220-234. https://doi.org/10.1109/tbc.2017.2781125
When dealing with networks, performance management through conventional quality of service (QoS)-based methods becomes difficult and is often ineffective. In fact, quality eme...

An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0

Journal Article
Pace, P., Aloi, G., Gravina, R., Caliciuri, G., Fortino, G., & Liotta, A. (2019)
An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0. IEEE Transactions on Industrial Informatics, 15(1), 481-489. https://doi.org/10.1109/tii.2018.2843169
Edge computing paradigm has attracted many interests in the last few years as a valid alternative to the standard cloud-based approaches to reduce the interaction timing and t...

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems

Conference Proceeding
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010)
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security. , (190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...

Bilingual word association networks.

Book Chapter
Priss, U., & Old, L. J. (2007)
Bilingual word association networks. In U. Priss, S. Polovina, & R. Hill (Eds.), Conceptual Structures: Knowledge Architectures for Smart Applications, 310-320. Springer-Verlag. https://doi.org/10.1007/978-3-540-73681-3_23
Bilingual word association networks can be beneficial as a tool in foreign language education because they show relationships among cognate words of different languages and c...

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018)
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)https://doi.org/10.1109/CyberSecPODS.2018.8560683
Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development ov...

Ad-hoc routing metrics and applied weighting for QoS support

Conference Proceeding
Migas, N., & Buchanan, W. J. (2008)
Ad-hoc routing metrics and applied weighting for QoS support. In 22nd IEEE International Parallel & Distributed Processing Symposium. , (1-8). https://doi.org/10.1109/IPDPS.2008.4536496
In the vast majority of ad-hoc routing protocols, the hop-counting mechanisms for identifying the optimal route are dominant. However, this approach oversimplifies such a comp...

A new distributed MIKEY mode to secure e-health applications.

Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016)
A new distributed MIKEY mode to secure e-health applications. In V. Chang, V. Méndez Muñoz, R. Walters, G. Wills, & M. Ramachandran (Eds.), Proceedings of the International Conference on Internet of Things and Big Data, (88-95). https://doi.org/10.5220/0005945300880095
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...

Analyzing Objective and Subjective Data in Social Sciences: Implications for Smart Cities

Journal Article
Erhan, L., Ndubuaku, M., Ferrara, E., Richardson, M., Sheffield, D., Ferguson, F. J., …Liotta, A. (2019)
Analyzing Objective and Subjective Data in Social Sciences: Implications for Smart Cities. IEEE Access, 7, 19890-19906. https://doi.org/10.1109/access.2019.2897217
The ease of deployment of digital technologies and the Internet of Things gives us the opportunity to carry out large-scale social studies and to collect vast amounts of data ...