Research explorer tool

Date


Output Type

Download Available

102 results

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment

Journal Article
Babar, M., Khan, F., Iqbal, . W., Yahya, A., Arif, F., Tan, Z., & Chuma, J. (2018)
A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access, 6, 43088-43099
Smart societies have an increasing demand for quality-oriented services and infrastructure in an Industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numero...

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services

Journal Article
Zhang, S., Li, X., Tan, Z., Peng, T., & Wang, G. (2019)
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Generation Computer Systems, 94, 40-50. doi:10.1016/j.future.2018.10.053
With the rapid pervasion of location-based services (LBSs), protection of location privacy has become a significant concern. In most continuous LBSs' privacy-preserving soluti...

The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime

Journal Article
Dyson, S., Buchanan, W., & Bell, L. (2018)
The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime. The Journal of the British Blockchain Association, 1(2), 1-6. https://doi.org/10.31585/jbba-1-2-%288%292018
We increasingly live in a world where there is a balance between the rights to privacy and the requirements for consent, and the rights of society to protect itself. Within th...

Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning

Journal Article
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2019)
Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, 128, 56-63. https://doi.org/10.1016/j.jnca.2018.12.002
Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce users to click and then redirect them to a phishing webpage. To protect IoT sys...

Copy-move forgery detection using combined features and transitive matching

Journal Article
Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H., & Tan, Z. (2019)
Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications, 78(21), 30081-30096. https://doi.org/10.1007/s11042-018-6922-4
Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be ta...

Mitigating Disaster using Secure Threshold-Cloud Architecture

Journal Article
Ukwandu, E., Buchanan, W. J., & Russell, G. (2018)
Mitigating Disaster using Secure Threshold-Cloud Architecture. Current Trends in Computer Sciences & Applications, 1(2),
There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to app...

Impact of cyberattacks on stock performance: a comparative study

Journal Article
Tweneboah-Kodua, S., Atsu, F., & Buchanan, W. (2018)
Impact of cyberattacks on stock performance: a comparative study. Information and Computer Security, 26(5), 637-652. doi:10.1108/ics-05-2018-0060
The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period January 03, 2013 and December 29, 2017. The empirical analysis was performed i...

Protecting mobile agents from external replay attacks

Journal Article
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009)
Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching ...

Radio frequency identification (RFID) in pervasive healthcare

Journal Article
Fekri, A. H., Thuemmler, C., Buchanan, W., Fekri, H., & Lawson, A. (2009)
Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management, 10(1/2), 119. doi:10.1504/ijhtm.2009.023731
Active and passive RFID (Radio Frequency Identification) technology are available and licensed for the use in hospitals, and can be used to establish highly reliable pervasive...

Intrusion detection method based on nonlinear correlation measure

Journal Article
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2014)
Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. https://doi.org/10.1504/ijipt.2014.066377
Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services,...