A Trust-based Intrusion Detection System for Mobile RPL Based Networks
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (2018)
A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113
Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be ...
Numerical encoding to tame SQL injection attacks
Uwagbole, S., Buchanan, W. J., & Fan, L. (2016)
Numerical encoding to tame SQL injection attacks. In 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS),https://doi.org/10.1109/NOMS.2016.7502997
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases....
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples
Babaagba, K., Tan, Z., & Hart, E. (2020)
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. https://doi.org/10.1109/CEC48606.2020.9185668
Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this,...
Fast Probabilistic Consensus with Weighted Votes
Müller, S., Penzkofer, A., Ku´smierz, B., Camargo, D., & Buchanan, W. J. (2020)
Fast Probabilistic Consensus with Weighted Votes. In Proceedings of the Future Technologies Conference (FTC) 2020, Volume 2. , (360-378). https://doi.org/10.1007/978-3-030-63089-8_24
The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure. We propose an adaption of the FPC to a setting ...
A temporal-information-based adaptive routing algorithm for software defined vehicular networks
Zhao, L., Li, Z., Li, J., Al-Dubai, A., Min, G., & Zomaya, A. Y. (2019)
A temporal-information-based adaptive routing algorithm for software defined vehicular networks. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC)https://doi.org/10.1109/ICC.2019.8761680
In Software Defined Vehicular Networks (SDVNs), most existing studies of routing consider the vehicular network as a static graph and compute the flow table based on static in...
Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method
Ou, W., Deng, M., Luo, E., Shi, W., Tan, Z., & Bhuiyan, M. (2019)
Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method. In 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). , (687-693). https://doi.org/10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00131
Proof of Work (PoW) is used to provide a consensus mechanism for Bitcoin. In this mechanism, the process of generating a new block in the blockchain is referred to as mining. ...
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, (89-98). https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...
Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis.
Akram, R. N., Markantonakis, K., & Mayes, K. (2012)
Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis. In A. Mana, & M. Klonowski (Eds.), 5th International Conference on New Technologies, Mobility and Security (NTMS), 1-7. https://doi.org/10.1109/NTMS.2012.6208760
Smart cards rely on pseudorandom number generators to provide uniqueness and freshness in their cryptographic services i.e. encryption and digital signatures. Their implementa...
A scalable broadcast algorithm for multiport meshes with minimum communication steps
Al-Dubai, A., & Ould-Khaoua, M. (2003)
A scalable broadcast algorithm for multiport meshes with minimum communication steps. In Proceedings of the Ninth International Conference on Parallel and Distributed Systems (ICPADS’02), 203-208. doi:10.1109/icpads.2002.1183400
Many broadcast algorithms have been proposed for the mesh over the past decade. However, most of these algorithms do not exhibit good scalability properties as the network siz...
Migration of mobile agents in ad-hoc wireless networks.
Migas, N., Buchanan, W. J., & McArtney, K. (2004)
Migration of mobile agents in ad-hoc wireless networks. In Proceeding of the 11th IEEE International Conference and Workshop on the Engineering of Computer-based systems, 530-535. https://doi.org/10.1109/ECBS.2004.1316743
This paper focuses on the design and development of a novel architecture called MARIAN, which utilises static agents, mobile agents, and also a hybrid approach, in order to pe...