Research explorer tool

29 results

On balancing traffic load in path-based multicast communication.

Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., El-Zayyat, K., & Mackenzie, L. (2002)
On balancing traffic load in path-based multicast communication. In SPECTS '03, 533-540
Multicast is the most primitive collective capability of any message-passing network. It is itself central to many important parallel applications in Science and Engineering b...

Network Firewall Dynamic Performance Evaluation and Formalisation

Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2599
Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to...

Scenario Analysis using Out-of-line Firewall Evaluation Framework.

Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007)
Scenario Analysis using Out-of-line Firewall Evaluation Framework
Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These a...

Towards a scalable broadcast in wormhole-switched mesh networks

Conference Proceeding
Al-Dubai, A. Y., Ould-Khaoua, M., & Mackenzie, L. M. (2002)
Towards a scalable broadcast in wormhole-switched mesh networks. In Proceedings of the 2002 ACM symposium on Applied computing, 840-844. https://doi.org/10.1145/508791.508955
Broadcast algorithms for wormhole--switched meshes have been widely reported in the literature. However, most of these algorithms handle broadcast in a sequential manner and d...

A new scalable broadcast algorithm for multiport meshes with minimum communication steps

Journal Article
Ould-Khaoua, M., Al-Dubai, A., Al-Dubai, A., & Ould-Khaoua, M. (2003)
A new scalable broadcast algorithm for multiport meshes with minimum communication steps. Microprocessors and Microsystems, 27(3), 101-113. doi:10.1016/s0141-9331(02)00094-7
Many broadcast algorithms have been proposed for the mesh in the literature. However, most of these algorithms do not exhibit good scalability properties as the network size i...

A scalable broadcast algorithm for multiport meshes with minimum communication steps

Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2003)
A scalable broadcast algorithm for multiport meshes with minimum communication steps. In Proceedings of the Ninth International Conference on Parallel and Distributed Systems (ICPADS’02), 203-208. doi:10.1109/icpads.2002.1183400
Many broadcast algorithms have been proposed for the mesh over the past decade. However, most of these algorithms do not exhibit good scalability properties as the network siz...

Component-based network test tools platform for network design and maintenance

Thesis
Golam, H. (2003)
Component-based network test tools platform for network design and maintenance. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4066
Tools development for testing real time systems rely heavily on frameworks that are capable of delivering the advantages of precise control, the availability of a range of fun...

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm

Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification bu...

Cloud-based identity and identity meta-data: secure and control own data in globalization era.

Journal Article
Spyra, G., Buchanan, W. J., Cruickshank, P., & Ekonomou, E. (2014)
Cloud-based identity and identity meta-data: secure and control own data in globalization era. International Journal of Reliable and Quality E-Healthcare, 3, https://doi.org/10.4018/ijrqeh.2014010105
This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care,...

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture.

Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013)
Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy, (91-101). https://doi.org/10.1007/978-3-642-41205-9_8
We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, org...