Research explorer tool

Date


People

Output Type

Download Available

309 results

Mining malware command and control traces

Conference Proceeding
McLaren, P., Russell, G., & Buchanan, B. (2018)
Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017https://doi.org/10.1109/SAI.2017.8252185
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...

A new efficient objective function for routing in Internet of Things paradigm

Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., & Gharibi, W. (2016)
A new efficient objective function for routing in Internet of Things paradigm. In 2016 IEEE Conference on Standards for Communications and Networking (CSCN). https://doi.org/10.1109/cscn.2016.7785168
Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) ha...

Employing Neural Networks for the Detection of SQL Injection Attack

Conference Proceeding
Sheykhkanloo, N. M. (2013)
Employing Neural Networks for the Detection of SQL Injection Attack. In SIN '14 Proceedings of the 7th International Conference on Security of Information and Networksdoi:10.1145/2659651.2659675
Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into the SQL database by simply using web browse...

A semi-independent structure for the architectural design of the converged scenario for integrated hybrid PON with wireless technologies for next generation broadband access networks

Conference Proceeding
Moradpoor, N. (2014)
A semi-independent structure for the architectural design of the converged scenario for integrated hybrid PON with wireless technologies for next generation broadband access networks. In Proceedings of the 2013 2nd International Workshop on Optical Wireless Communications (IWOW)doi:10.1109/iwow.2013.6777781
Optical and wireless technology integration schemes merge the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of wi...

A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks

Conference Proceeding
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013)
A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks. In 2013 5th Proceedings of the Computer Science and Electronic Engineering Conference (CEEC 2013)doi:10.1109/ceec.2013.6659439
Optical and wireless integration scheme merges the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of the wireless ...

Employing machine learning techniques for detection and classification of phishing emails

Conference Proceeding
Moradpoor, N., Clavie, B., & Buchanan, B. (2018)
Employing machine learning techniques for detection and classification of phishing emails. In Proceedings of the IEEE Technically Sponsored Computing Conference 2017doi:10.1109/SAI.2017.8252096
A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or d...

A Task Orientated Requirements Ontology for Cloud Computing Services

Conference Proceeding
Greenwell, R., Liu, X., Chalmers, K., & Pahl, C. (2016)
A Task Orientated Requirements Ontology for Cloud Computing Services. In Proceedings of the 6th International Conference on Cloud Computing and Services Science (CLOSER 2016), (121-128). https://doi.org/10.5220/0005752301210128
Requirements ontology offers a mechanism to map requirements for cloud computing services to cloud computing resources. Multiple stakeholders can capture and map knowledge in ...

DEEPC: Dynamic Energy Profiling of Components

Conference Proceeding
Liu, X., Chinenyeze, S. J., & Al-Dubai, A. (2016)
DEEPC: Dynamic Energy Profiling of Components. In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)https://doi.org/10.1109/COMPSAC.2016.90
Many software projects are built using reusable components (i.e. reusable objects - as per component and connectors in software architectures). During component selection in C...

A Coordination-Based Brokerage Architecture for Multi-cloud Resource Markets

Conference Proceeding
Aldawood, S., Fowley, F., Pahl, C., Taibi, D., & Liu, X. (2016)
A Coordination-Based Brokerage Architecture for Multi-cloud Resource Markets. In IEEE International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)https://doi.org/10.1109/w-ficloud.2016.19
With an increasing number of service providers in the cloud market, the competition between these is also increasing. Each provider attempts to attract customers by providing ...

Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention

Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017)
Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM),https://doi.org/10.23919/INM.2017.7987433
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...