Research explorer tool

Date


Output Type

Download Available

198 results

Tradeoffs between latency, complexity and load balancing with multicast algorithms

Journal Article
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2010)
Tradeoffs between latency, complexity and load balancing with multicast algorithms. IEEE Transactions on Computers, 59, 159-173. https://doi.org/10.1109/TC.2009.104
The increasing number of collective communication-based services with a mass interest and the parallel increasing demand for service quality are paving the way toward end-to-e...

Towards scalable collective communication for multicomputer interconnection networks

Journal Article
Al-Dubai, A., Ould-Khaoua, M., El-Zayyat, K., Ababneh, I., & Al-Dobai, S. (2004)
Towards scalable collective communication for multicomputer interconnection networks. Information Sciences, 163(4), 293-306. https://doi.org/10.1016/j.ins.2003.06.014
A considerable number of broadcast algorithms have been proposed for the mesh over the past decade. Nonetheless, most of these algorithms do not exhibit good scalability prope...

New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks

Journal Article
Bani Khalaf, M., Al-Dubai, A. Y., & Min, G. (2015)
New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks. Journal of Computer and System Sciences, 81(1), 97-109. doi:10.1016/j.jcss.2014.06.014
Most existing route discovery schemes in MANETs are based on probabilistic models by which MANETs usually deploy broadcast mechanisms to discover routes between nodes. This is...

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data

Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...

Password Pattern and Vulnerability Analysis for Web and Mobile Applications

Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...

Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs.

Journal Article
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011)
Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,
This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first ca...

Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks

Journal Article
Min, G., Wu, Y., Li, K., & Al-Dubai, A. (2009)
Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks. International Journal of Communication Systems, 23, 1111-1126. https://doi.org/10.1002/dac.1074
The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points (APs). Wireless m...

Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things

Journal Article
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2018)
Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things. International Journal of Sensor Networks, 26(4), 227. https://doi.org/10.1504/ijsnet.2018.090462
E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstanc...

Minimising collateral damage: privacy-preserving Investigative data acquisition platform.

Journal Article
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011)
Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102
Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such ...

Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks

Journal Article
Zhao, L., Zhao, W., Hawbani, A., Al-Dubai, A. Y., Min, G., Zomaya, A., & Gong, C. (2021)
Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks. IEEE Transactions on Wireless Communications, 20(5), 2991-3004. https://doi.org/10.1109/twc.2020.3046275
To provide efficient networking services at the edge of Internet-of-Vehicles (IoV), Software-Defined Vehicular Network (SDVN) has been a promising technology to enable intelli...