Research explorer tool

Date


School

Output Type

Download Available

144 results

Trust-Based Defence Model Against MAC Unfairness Attacks for IoT

Conference Proceeding
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017)
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wireless and Mobile Communications
The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious ...

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis

Conference Proceeding
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017)
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/I​SPA Conference Proceedingshttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...

A new dynamic weight clustering algorithm for wireless sensor networks

Conference Proceeding
Essa, A., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017)
A new dynamic weight clustering algorithm for wireless sensor networks. In S. Yang, J. Gao, Y. Zhang, K. Yang, V. C. M. Leung, & J. Hu (Eds.), Smart Grid Inspired Future Technologies: First International Conference, Liverpool, UK, May 19-20, 2016 SmartGIFT 2016, 195-203
Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WS...

Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases

Conference Proceeding
Clavie, B., & Moradpoor, N. (in press)
Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. In Proceedings of posters presented at 10th ACM Conference on Web Science
This article explores a perceived bias between two British reddit communities dedicated to discussing British politics.We analyse the popular sources favoured by each communit...

Intrusion detection using GSAD model for HTTP traffic on web services

Conference Proceeding
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. P. (2010)
Intrusion detection using GSAD model for HTTP traffic on web services. In IWCMC '10 Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, (1193-1197). https://doi.org/10.1145/1815396.1815669
Intrusion detection systems are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. Hypertext Transport Protocol (HTT...

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization

Conference Proceeding
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011)
Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization. In S. Qing, W. Susilo, G. Wang, & D. Liu (Eds.), Information and Communications Security. , (388-398). https://doi.org/10.1007/978-3-642-25243-3_31
The quality of feature has significant impact on the performance of detection techniques used for Denial-of-Service (DoS) attack. The features that fail to provide accurate ch...

On balancing traffic load in path-based multicast communication.

Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., El-Zayyat, K., & Mackenzie, L. (2002)
On balancing traffic load in path-based multicast communication. In SPECTS '03, 533-540
Multicast is the most primitive collective capability of any message-passing network. It is itself central to many important parallel applications in Science and Engineering b...

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment

Conference Proceeding
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014)
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (205-211). https://doi.org/10.1109/trustcom.2014.31
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovat...

Mobile IP conditional binding update.

Conference Proceeding
Romdhani, I., & Al-Dubai, A. (2007)
Mobile IP conditional binding update. In 1st IEEE Workshop on Autonomic Communication and Network Management ACNM-2007, 10th IFIP/IEEE Symposium on Integrated Management, 64-70
Mobile IP protocols use a correspondent registration procedure between a Mobile Node (MN) and its Correspondent Nodes (CNs) to maintain a valid and up-to-date binding associat...

Sub-file Hashing Strategies for Fast Contraband Detection

Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018)
Sub-file Hashing Strategies for Fast Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560680
Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for man...