A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications
Almalkawi, I. T., Halloush, . R., Alsarhan, A., Al-Dubai, A., & Al-karaki, J. N. (2019)
A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications. Journal of Information Security and Applications, 49, https://doi.org/10.1016/j.jisa.2019.102384
Due to limited processing capabilities and other constraints of most wireless networks, many existing security algorithms do not consider the network efficiency. This is becau...
A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles
Yao, W., Yahya, A., Khan, F., Tan, Z., Rehman, A. U., Chuma, J. M., …Babar, M. (2019)
A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles. IEEE Access, 7, 160889-160900. https://doi.org/10.1109/ACCESS.2019.2945610
The advancements in hardware technologies have driven the evolution of vehicular ad hoc networks into the Internet of Vehicles (IoV). The IoV is a decentralized network of IoT...
Fast contraband detection in large capacity disk drives.
Penrose, P., Buchanan, W. J., & Macfarlane, R. (2015)
Fast contraband detection in large capacity disk drives. Digital Investigation, 12(S1), S22-S29. https://doi.org/10.1016/j.diin.2015.01.007
In recent years the capacity of digital storage devices has been increasing at a rate that has left digital forensic services struggling to cope. There is an acknowledgement t...
Formal security policy implementations in network firewalls.
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012)
Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific ...
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019)
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, https://doi.org/10.3390/s19194321
The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks p...
O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification
Kakavand, M., Mustapha, A., Tan, Z., Foroozana, S., & Arulsamy, L. (2019)
O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification. IEEE Access, 7, 167141-167156. https://doi.org/10.1109/access.2019.2953791
Most active research in Host and Network Intrusion Detection Systems are only able to detect attacks of the computer systems and attacks at the network layer, which are not su...
Privacy-Preserving Passive DNS
Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020)
Privacy-Preserving Passive DNS. Computers, 9(3), https://doi.org/10.3390/computers9030064
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern...
FPDP: Flexible Privacy-preserving Data Publishing Scheme for Smart Agriculture
Song, J., Zhong, Q., Su, C., Tan, Z., & Liu, Y. (2021)
FPDP: Flexible Privacy-preserving Data Publishing Scheme for Smart Agriculture. IEEE Sensors Journal, 21(16), 17430-17438. https://doi.org/10.1109/JSEN.2020.3017695
Food security is a global concern. Benefit from the development of 5G, IoT is used in agriculture to help the farmers to maintain and improve productivity. It not only enables...
Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (in press)
Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems,
Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant sha...
Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment
Zhao, L., Huang, H., Su, C., Ding, S., Huang, H., Tan, Z., & Li, Z. (2021)
Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment. IEEE Internet of Things Journal, 8(5), 3211-3223. https://doi.org/10.1109/jiot.2020.3019732
Device-free localization (DFL) locates targets without equipping with wireless devices or tag under the Internet-of-Things (IoT) architectures. As an emerging technology, DFL ...