Research explorer tool

Date


School

Download Available

51 results

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop

Journal Article
Babar, M., Arif, F., Jan, M. A., Tan, Z., & Khan, F. (2019)
Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. Future Generation Computer Systems, 96, 398-409. https://doi.org/10.1016/j.future.2019.02.035
The unbroken amplfi cation of a versatile urban setup is challenged by huge Big Data processing. Understanding the voluminous data generated in a smart urban environment for d...

Software development for engineers.

Book
Buchanan, W. J. (1996)
Software development for engineers. Butterworth-Heinemann Newton, MA, USA
Specialisation in software has become a thing of the past. With the move towards graphical user interface programming, engineers must have a sound knowledge of several program...

A new scalable broadcast algorithm for multiport meshes with minimum communication steps

Journal Article
Ould-Khaoua, M., Al-Dubai, A., Al-Dubai, A., & Ould-Khaoua, M. (2003)
A new scalable broadcast algorithm for multiport meshes with minimum communication steps. Microprocessors and Microsystems, 27(3), 101-113. doi:10.1016/s0141-9331(02)00094-7
Many broadcast algorithms have been proposed for the mesh in the literature. However, most of these algorithms do not exhibit good scalability properties as the network size i...

A Simulation Study of Scalable Broadcast in High-Performance Regular Networks

Journal Article
Al-Dubai, A. Y., Ould-Khaoua, M., & Obaidat, M. S. (2004)
A Simulation Study of Scalable Broadcast in High-Performance Regular Networks. SIMULATION, 80(4-5), 207-220. https://doi.org/10.1177/0037549704044325
Broadcast is an important communication operation required by many real-world applications encountered in parallel, cluster, and grid computing environments. Broadcasting on r...

Towards scalable collective communication for multicomputer interconnection networks

Journal Article
Al-Dubai, A., Ould-Khaoua, M., El-Zayyat, K., Ababneh, I., & Al-Dobai, S. (2004)
Towards scalable collective communication for multicomputer interconnection networks. Information Sciences, 163(4), 293-306. https://doi.org/10.1016/j.ins.2003.06.014
A considerable number of broadcast algorithms have been proposed for the mesh over the past decade. Nonetheless, most of these algorithms do not exhibit good scalability prope...

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data

Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...

The impact of routing schemes on group communication throughput in scalable networks.

Conference Proceeding
Al-Dubai, A. (2008)
The impact of routing schemes on group communication throughput in scalable networks. In Proceedings of the 2008 IEEE international parallel & distributed processing symposium, 1-8. https://doi.org/10.1109/IPDPS.2008.4536490
Multicast communication has been a major avenue for many studies in interconnection networks. However, such a communication pattern has been studied under either limited opera...

Investigating false positive reduction in HTTP via procedure analysis.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
Investigating false positive reduction in HTTP via procedure analysis. https://doi.org/10.1109/ICNS.2006.65
This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection sys...

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...