Date


School

Download Available

85 results

Mastering the Internet.

Book
Buchanan, W. J. (1996)
Mastering the Internet. Macmillan Press
This work offers an up-to-date account of all the component parts of the Internet and the World Wide Web, from architecture to networking. The book discusses key specification...

Advanced data communications and networks.

Book
Buchanan, W. J. (1996)
Advanced data communications and networks. Chapman and Hall
The use of data communications and computer networks is constantly increasing, bringing benefits to most of the countries and peoples of the world, and serving as the lifeline...

Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing

Conference Proceeding
Migas, N., & Buchanan, W. J. (2005)
Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing. In The 2005 IEEE Congress on Evolutionary Computation. , (147-154). https://doi.org/10.1109/ecbs.2005.51
Ad-hoc wireless networks, which use ad-hoc routing methods may prove a good solution in certain applications, especially where networks have to be constructed where there is n...

Enhancing network management using mobile agents.

Conference Proceeding
Buchanan, W. J., Naylor, M., & Scott, A. (2000)
Enhancing network management using mobile agents. In Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop on the, 218-226. https://doi.org/10.1109/ECBS.2000.839880
Agent mobility addresses some limitations faced by classic client/server architecture, namely, in minimising bandwidth consumption, in supporting adaptive network load balanci...

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks

Conference Proceeding
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017)
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESShttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...

E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks

Conference Proceeding
Ghaleb, B., Al-Dubai, A., & Ekonomou, E. (2015)
E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)https://doi.org/10.1109/cit/iucc/dasc/picom.2015.168
Routing Protocol for Low Power and Lossy networks (RPL) is the de-facto standard for routing in resource-constrained low-power and lossy networks (LLNs) which represent the bu...

Towards a new health and social care information sharing architecture.

Presentation / Conference
Buchanan, W. J. (2012, May)
Towards a new health and social care information sharing architecture
This presentation outlines the integration of the safi.re information sharing architecture.

Resilience of Video Streaming Services to Network Impairments

Journal Article
Torres Vega, M., Perra, C., & Liotta, A. (2018)
Resilience of Video Streaming Services to Network Impairments. IEEE Transactions on Broadcasting, 64(2), 220-234. https://doi.org/10.1109/tbc.2017.2781125
When dealing with networks, performance management through conventional quality of service (QoS)-based methods becomes difficult and is often ineffective. In fact, quality eme...

An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0

Journal Article
Pace, P., Aloi, G., Gravina, R., Caliciuri, G., Fortino, G., & Liotta, A. (2019)
An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0. IEEE Transactions on Industrial Informatics, 15(1), 481-489. https://doi.org/10.1109/tii.2018.2843169
Edge computing paradigm has attracted many interests in the last few years as a valid alternative to the standard cloud-based approaches to reduce the interaction timing and t...

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems

Conference Proceeding
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010)
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security. , (190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...