Research explorer tool

Date


People

Download Available

Dewey Decimal

899 results

A methodology for the security evaluation within third-party Android Marketplaces

Journal Article
Buchanan, W. J., Chiale, S., & Macfarlane, R. (2017)
A methodology for the security evaluation within third-party Android Marketplaces. Digital Investigation, 23, 88-98. https://doi.org/10.1016/j.diin.2017.10.002
This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia...

A framework for data security in cloud using collaborative intrusion detection scheme

Conference Proceeding
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017)
A framework for data security in cloud using collaborative intrusion detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks. , (188-193). https://doi.org/10.1145/3136825.3136905
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...

A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system

Journal Article
Liu, X., & Liu, Q. (2018)
A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system. Personal and Ubiquitous Computing, https://doi.org/10.1007/s00779-017-1093-2
In a non-uniformly distributed network, the dataconcentrating centre equipped with sparse nodes rapidly depletes its battery energy due to the hotspot problem. To solve this p...

Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space

Conference Proceeding
Singh Jamnal, G., Liu, X., & Fan, L. (2017)
Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space. In Proceedings of The 29th International Conference on Software Engineering and Knowledge Engineering
In this paper, we proposed a new type of decision making system to achieve the intelligent goal for automated smart environments. The artificial intelligence techniques, used ...

ESBSC: Energy-Aware Service Brokering Strategy in Clouds

Conference Proceeding
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017)
ESBSC: Energy-Aware Service Brokering Strategy in Clouds. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)https://doi.org/10.1109/compsac.2017.120
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the jo...

A Cognitive-IoE Approach to Ambient-intelligent Smart Home

Conference Proceeding
Jamnal, G., & Liu, X. (2017)
A Cognitive-IoE Approach to Ambient-intelligent Smart Home. In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, (302-308). https://doi.org/10.5220/0006304103020308
In today’s world, we are living in busy metropolitan cities and want our homes to be ambient intelligent enough towards our cognitive requirements for assisted living in smart...

An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment

Conference Proceeding
Liu, X., & Liu, Q. (2017)
An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), (128-131). https://doi.org/10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to imbalance...

Power Consuming Activity Recognition in Home Environment

Conference Proceeding
Liu, X., & Liu, Q. (2017)
Power Consuming Activity Recognition in Home Environment. In X. Sun, H. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security. ICCCS 2017, (361-372). https://doi.org/10.1007/978-3-319-68505-2_31
This work proposed an activity recognition model which focus on the power con-suming activity in home environment, to help residents modify their behavior. We set the IoT syst...

Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies

Conference Proceeding
Asif, R. (2017)
Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedingshttps://doi.org/10.1109/NOF.2017.8251243
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...

A New Spectrum Management Scheme for Road Safety in Smart Cities

Journal Article
Alsarhan, A., Al-Dubai, A. Y., Min, G., Zomaya, A. Y., & Bsoul, M. (2018)
A New Spectrum Management Scheme for Road Safety in Smart Cities. IEEE Transactions on Intelligent Transportation Systems, 1-11. https://doi.org/10.1109/TITS.2017.2784548
Traffic management in roads is one of the major challenges faced in developing efficient intelligent transportation systems. Recently, wireless networks have received signific...