Research explorer tool

Date


Output Type

Download Available

170 results

10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking

Journal Article
Asif, R., & Haithem, M. (2017)
10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking. Optics Communications, 391, 106-110. https://doi.org/10.1016/j.optcom.2017.01.022
Generalized few-mode-fiber (FMF) transmission uses N coherent receivers for mode detection, where N scales with the number of fiber modes. Multiple coherent receivers increase...

A New Spectrum Management Scheme for Road Safety in Smart Cities

Journal Article
Alsarhan, A., Al-Dubai, A. Y., Min, G., Zomaya, A. Y., & Bsoul, M. (2018)
A New Spectrum Management Scheme for Road Safety in Smart Cities. IEEE Transactions on Intelligent Transportation Systems, 1-11. https://doi.org/10.1109/TITS.2017.2784548
Traffic management in roads is one of the major challenges faced in developing efficient intelligent transportation systems. Recently, wireless networks have received signific...

Distance Measurement Methods for Improved Insider Threat Detection

Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study

Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...

Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBAN)

Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2018)
Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBAN). IEEE Transactions on Green Communications and Networking, 1-1. https://doi.org/10.1109/tgcn.2018.2813060
Medium Access Control (MAC) protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, traditional static TDMA techni...

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait

Journal Article
Khan, F., ur Rehman, A., Usman, M., Tan, Z., & Puthal, D. (2018)
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait. Mobile Networks and Applications, https://doi.org/10.1007/s11036-018-1020-4
The enormous developments in the field of wireless communication technologies have made the unlicensed spectrum bands crowded, resulting uncontrolled interference to the tradi...

Lightweight cryptography methods

Journal Article
Buchanan, W. J., Li, S., & Asif, R. (2018)
Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processi...

Machine learning and semantic analysis of in-game chat for cyber bullying

Journal Article
Murnion, S., Buchanan, W. J., Smales, A., & Russell, G. (2018)
Machine learning and semantic analysis of in-game chat for cyber bullying. Computers and Security, 76, 197-213. https://doi.org/10.1016/j.cose.2018.02.016
One major problem with cyberbullying research is the lack of data, since researchers are traditionally forced to rely on survey data where victims and perpetrators self-report...

Hybrid Tree-rule Firewall for High Speed Data Transmission

Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm

Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification bu...