Date


People

Output Type

Download Available

Library Of Congress

Dewey Decimal

978 results

MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features

Journal Article
Saha, R., Geetha, G., Kumar, G., Kim, T., & Buchanan, W. J. (2019)
MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weigh...

A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks

Journal Article
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019)
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, https://doi.org/10.3390/s19194321
The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks p...

The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts

Journal Article
Ullah, Z., Arshad, & Ahmad, J. (2022)
The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts. Energies, 15(21), Article 8171. https://doi.org/10.3390/en15218171
By coordinating the operation of regionally interconnected virtual power plants (VPPs), the growing penetration problem of renewable energy sources (RESs) into the power syste...

Persuasive dialogue understanding: The baselines and negative results

Journal Article
Chen, H., Ghosal, D., Majumder, N., Hussain, A., & Poria, S. (2021)
Persuasive dialogue understanding: The baselines and negative results. Neurocomputing, 431, 47-56. https://doi.org/10.1016/j.neucom.2020.11.040
Persuasion aims at forming one’s opinion and action via a series of persuasive messages containing persuader’s strategies. Due to its potential application in persuasive dialo...

A novel visual attention method for target detection from SAR images

Journal Article
Gao, F., Liu, A., Liu, K., Yang, E., & Hussain, A. (2019)
A novel visual attention method for target detection from SAR images. Chinese Journal of Aeronautics, 32(8), 1946-1958. https://doi.org/10.1016/j.cja.2019.03.021
Synthetic Aperture Radar (SAR) imaging systems have been widely used in civil and military fields due to their all-weather and all-day abilities and various other advantages. ...

Privacy-Preserving Passive DNS

Journal Article
Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020)
Privacy-Preserving Passive DNS. Computers, 9(3), https://doi.org/10.3390/computers9030064
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern...

Understanding Public Perceptions of COVID-19 Contact Tracing Apps: Artificial Intelligence–Enabled Social Media Analysis

Journal Article
Cresswell, K., Tahir, A., Sheikh, Z., Hussain, Z., Domínguez Hernández, A., Harrison, E., …Hussain, A. (2021)
Understanding Public Perceptions of COVID-19 Contact Tracing Apps: Artificial Intelligence–Enabled Social Media Analysis. Journal of Medical Internet Research, 23(5), https://doi.org/10.2196/26618
Background: The emergence of SARS-CoV-2 in late 2019 and its subsequent spread worldwide continues to be a global health crisis. Many governments consider contact tracing of c...

Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques

Journal Article
Khan, E., Rehman, M. Z. U., Ahmed, F., Alfouzan, F. A., Alzahrani, N. M., & Ahmad, J. (2022)
Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques. Sensors, 22(3), Article 1211. https://doi.org/10.3390/s22031211
Recent technological developments pave the path for deep learning-based techniques to be used in almost every domain of life. The precision of deep learning techniques make it...

Mapping the UK information workforce in the library, archives, records, information management, knowledge management and related professions

Journal Article
Hall, H., & Raeside, R. (2016)
Mapping the UK information workforce in the library, archives, records, information management, knowledge management and related professions. Proceedings of the Association for Information Science and Technology, 53(1), 1-4. https://doi.org/10.1002/pra2.2016.14505301117
A workforce mapping project was carried out in the UK between August 2014 and October 2015. It was commissioned by the Chartered Institute of Library and Information Professio...

Lightweight cryptography methods

Journal Article
Buchanan, W. J., Li, S., & Asif, R. (2018)
Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processi...