The impact of routing schemes on group communication throughput in scalable networks.
Al-Dubai, A. (2008)
The impact of routing schemes on group communication throughput in scalable networks. In Proceedings of the 2008 IEEE international parallel & distributed processing symposium, 1-8. https://doi.org/10.1109/IPDPS.2008.4536490
Multicast communication has been a major avenue for many studies in interconnection networks. However, such a communication pattern has been studied under either limited opera...
The future of computer science education and observations from on-line learning.
Presentation / Conference
Buchanan, W. J. (2014, January)
The future of computer science education and observations from on-line learning. Paper presented at Higher Computing Science National Qualifications Support, Edinburgh
This session will look at the opportunities at the present time and in the future for Computing, and provide key pointer to the skills that are required to undertake a career ...
Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021)
Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, https://doi.org/10.1016/j.ijcip.2021.100436
Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been ...
Applied web traffic analysis for numerical encoding of SQL Injection attack features
Uwagbole, S., Buchanan, W., & Fan, L. (2016)
Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...
US hack shows data is the new frontier in cyber security conflict.
Buchanan, W. J. (2015)
US hack shows data is the new frontier in cyber security conflict
More than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government ...
Leaf-based Routing Mechanism for Low-Power and Lossy Networks
Ghaleb, B., & Al-Dubai, A. (2018)
Leaf-based Routing Mechanism for Low-Power and Lossy Networks. 1800668.4. Intellectual Property Office, UK
Unlike existing solutions, our invention provides a “Leaf-Based” mechanism for establishing the Downward routes in Low-Power and Lossy Networks (LLNs) that seeks to provide a ...
Secret shares to protect health records in Cloud-based infrastructures
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...
Enhanced Methods of Coursework Provision in Computer Networks.
Buchanan, W. J., & Saliou, L. (2005)
Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education, 111-115. https://doi.org/10.1109/ITRE.2004.1393657
Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from ...
A 3D Smooth Random Walk Mobility Model for FANETs
Lin, N., Gao, F., Zhao, L., Al-Dubai, A., & Tan, Z. (2019)
A 3D Smooth Random Walk Mobility Model for FANETs. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00075
The number of Unmanned Aerial Vehicles (UAVs) applications has increased over the past few years. Among all scenarios, UAV group consisting multi-UAVs is normally used to prov...
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...