Explore our research

Date


School

People

Output Type

Download Available

200 results

An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks

Conference Proceeding
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Yassein, M. B. (2015)
An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks. In G. Anderst-Kotsis, I. Khalil, M. Steinbaur, & L. Chen (Eds.), MoMM 2015 Proceedings of The 13th International Conference on Advances in Mobile Computing and Multimedia, (189-194). https://doi.org/10.1145/2837126.2837149
In Wireless Sensor Networks (WSNs), clustering techniques are among the effective solutions to reduce energy consumption and prolong the network lifetime. During the iterative...

Applied web traffic analysis for numerical encoding of SQL Injection attack features

Conference Proceeding
Uwagbole, S., Buchanan, W., & Fan, L. (2016)
Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...

Using Amazon Alexa APIs as a Source of Digital Evidence

Conference Proceeding
Krueger, C., & Mckeown, S. (2020)
Using Amazon Alexa APIs as a Source of Digital Evidence. https://doi.org/10.1109/CyberSecurity49315.2020.9138849
With the release of Amazon Alexa and the first Amazon Echo device, the company revolutionised the smart home. It allowed their users to communicate with, and control, their sm...

Forensic Considerations for the High Efficiency Image File Format (HEIF)

Conference Proceeding
Mckeown, S., & Russell, G. (2020)
Forensic Considerations for the High Efficiency Image File Format (HEIF). https://doi.org/10.1109/CyberSecurity49315.2020.9138890
The High Efficiency File Format (HEIF) was adopted by Apple in 2017 as their favoured means of capturing images from their camera application, with Android devices such as the...

Analysis and migration of location-finding methods for GSM and 3G networks.

Conference Proceeding
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004)
Analysis and migration of location-finding methods for GSM and 3G networks. https://doi.org/10.1049/cp%3A20040695
This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observ...

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples

Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (2020)
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. https://doi.org/10.1109/CEC48606.2020.9185668
Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this,...

A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations.

Conference Proceeding
Wu, Y., Min, G., Li, K., & Al-Dubai, A. (2009)
A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations. In GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, (1-6). https://doi.org/10.1109/GLOCOM.2009.5425390
The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points. Wireless mesh ne...

A new efficient distributed route discovery for wireless mobile ad hoc networks.

Conference Proceeding
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2012)
A new efficient distributed route discovery for wireless mobile ad hoc networks. In Wireless Telecommunications Symposium (WTS), 2012, (1-6). https://doi.org/10.1109/WTS.2012.6266129
High performance group communication, such as broadcast, requires matching efficient broadcast algorithms to effective route discovery approach. Broadcast communication in MAN...

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things

Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015)
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1118-1122). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.167
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)

Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015)
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), (1109-1117). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.166
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and...