E-Health: chances and challenges of distributed, service oriented architectures
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012)
E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,
Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remai...
"I am Spartacus" – privacy enhancing technologies and privacy as a public good
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2014)
"I am Spartacus" – privacy enhancing technologies and privacy as a public good. Artificial Intelligence and Law, 22(2), 113-139. https://doi.org/10.1007/s10506-014-9155-5
The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This understanding of privacy has...
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...
A Novel Heuristic Data Routing for Urban Vehicular Ad-hoc Networks
Hawbani, A., Wang, X., Al-Dubai, A., Zhao, L., Busaileh, . O., Liu, P., & Al-qaness, M. (2021)
A Novel Heuristic Data Routing for Urban Vehicular Ad-hoc Networks. IEEE Internet of Things Journal, 8(11), 8976-8989. https://doi.org/10.1109/JIOT.2021.3055504
This work is devoted to solving the problem of multi-criteria multi-hop routing in vehicular ad-hoc networks (VANETs), aiming at three goals, increasing the end-to-end deliver...
Vehicular Computation Offloading for Industrial Mobile Edge Computing
Zhao, L., Yang, K., Tan, Z., Song, H., Al-Dubai, A., & Zomaya, A. (2021)
Vehicular Computation Offloading for Industrial Mobile Edge Computing. IEEE Transactions on Industrial Informatics, 17(11), 7871-7881. https://doi.org/10.1109/TII.2021.3059640
Due to the limited local computation resource, industrial vehicular computation requires offloading the computation tasks with time-delay sensitive and complex demands to othe...
Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBAN)
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2018)
Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBAN). IEEE Transactions on Green Communications and Networking, 1-1. https://doi.org/10.1109/tgcn.2018.2813060
Medium Access Control (MAC) protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, traditional static TDMA techni...
Machine Learning-driven Optimization for SVM-based Intrusion Detection System in Vehicular Ad Hoc Networks
Alsarhan, A., Alauthman, M., Alshdaifat, E., Al-Ghuwairi, A., & Al-Dubai, A. (in press)
Machine Learning-driven Optimization for SVM-based Intrusion Detection System in Vehicular Ad Hoc Networks. Journal of Ambient Intelligence and Humanized Computing, https://doi.org/10.1007/s12652-021-02963-x
Machine Learning (ML) driven solutions have been widely used to secure wireless communications Vehicular ad hoc networks (VANETs) in recent studies. Unlike existing works, thi...
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait
Khan, F., ur Rehman, A., Usman, M., Tan, Z., & Puthal, D. (2018)
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait. Mobile Networks and Applications, https://doi.org/10.1007/s11036-018-1020-4
The enormous developments in the field of wireless communication technologies have made the unlicensed spectrum bands crowded, resulting uncontrolled interference to the tradi...
Lightweight cryptography methods
Buchanan, W. J., Li, S., & Asif, R. (2018)
Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processi...
Machine learning and semantic analysis of in-game chat for cyber bullying
Murnion, S., Buchanan, W. J., Smales, A., & Russell, G. (2018)
Machine learning and semantic analysis of in-game chat for cyber bullying. Computers and Security, 76, 197-213. https://doi.org/10.1016/j.cose.2018.02.016
One major problem with cyberbullying research is the lack of data, since researchers are traditionally forced to rely on survey data where victims and perpetrators self-report...