9 results

PLC Memory Attack Detection and Response in a Clean Water Supply System

Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003
Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens ...

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. In CITT 2018. , (91-103). https://doi.org/10.1007/978-3-030-05532-5_7
Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, s...

Decrypting Live SSH Traffic in Virtual Environments

Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...

Leaf-based Routing Mechanism for Low-Power and Lossy Networks

Patent
Ghaleb, B., & Al-Dubai, A. (2018)
Leaf-based Routing Mechanism for Low-Power and Lossy Networks. 1800668.4. Intellectual Property Office, UK
Unlike existing solutions, our invention provides a “Leaf-Based” mechanism for establishing the Downward routes in Low-Power and Lossy Networks (LLNs) that seeks to provide a ...

A new enhanced RPL based routing for Internet of Things

Conference Proceeding
Ghaleb, B., Al-Dubai, A., Ekonomou, E., & Wadhaj, I. (2017)
A new enhanced RPL based routing for Internet of Things. In 2017 IEEE International Conference on Communications. , (1-6). https://doi.org/10.1109/ICCW.2017.7962723
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the ...

Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments

Journal Article
Al-Dubai, A. Y., Zomaya, A. Y., Alsarhan, A., Itradat, A., Al-Dubai, A., Zomaya, A., & Min, G. (2017)
Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments. IEEE Transactions on Parallel and Distributed Systems, 29(1), 31-42. https://doi.org/10.1109/tpds.2017.2748578
In the current cloud business environment, the cloud provider (CP) can provide a means for offering the required quality of service (QoS) for multiple classes of clients. We c...

A Stateful Mechanism for the Tree-Rule Firewall

Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014)
A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (122-129). https://doi.org/10.1109/trustcom.2014.20
In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewal...

Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms

Journal Article
Ghanami, A., Li, . J., Hawbani, A., & Al-Dubai, A. (2021)
Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms. Expert Systems with Applications, 170, https://doi.org/10.1016/j.eswa.2020.114525
Initialization is the first and a major step in the implementation of evolutionary algorithms (EAs). Although there are many common general methods to initialize EAs such as t...

Cloud Security, Privacy, and Trust Baselines

Book Chapter
Pitropakis, N., Katsikas, S., & Lambrinoudakis, C. (2016)
Cloud Security, Privacy, and Trust Baselines. In Cloud Computing Security Foundations and Challenges. Boca Raton: CRC Press (Taylor and Francis Group
According to ISO 27001, a threat is a potential event. When a threat turns into an actual event, it may cause an undesirable incident. It is undesirable because the incident...

Date


Date


Date


Date