12 results

Mobile IP conditional binding update.

Conference Proceeding
Romdhani, I., & Al-Dubai, A. (2007)
Mobile IP conditional binding update. In 1st IEEE Workshop on Autonomic Communication and Network Management ACNM-2007, 10th IFIP/IEEE Symposium on Integrated Management, 64-70
Mobile IP protocols use a correspondent registration procedure between a Mobile Node (MN) and its Correspondent Nodes (CNs) to maintain a valid and up-to-date binding associat...

A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT

Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Romdhani, I., Nasser, Y., & Boukerche, A. (2018)
A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT. IEEE Internet of Things, 5(6), 12. https://doi.org/10.1109/JIOT.2018.2862364
In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of t...

Embedded document security using sticky policies and identity based encryption

Thesis
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090564
Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perim...

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Secure Lightweight Stream Data Outsourcing for Internet of Things

Journal Article
Peng, S., Zhao, L., Al-Dubai, A., Zomaya, A., Hu, J., Min, G., & Wang, Q. (2021)
Secure Lightweight Stream Data Outsourcing for Internet of Things. IEEE Internet of Things Journal, 8(13), 10815-10829. https://doi.org/10.1109/JIOT.2021.3050732
The epoch of the Internet of Things (IoT) has come by enabling almost everything to gather and share electronic information. Considering the unreliable factors of public IoT, ...

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things

Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015)
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1118-1122). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.167
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...

ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things

Conference Proceeding
Qasem, M., Al-Dubai, A., Imed, R., & Yassien, M. B. (2015)
ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things. In ICEMIS '15 Proceedings of the The International Conference on Engineering & MIS 2015https://doi.org/10.1145/2832987.2833058
Energy is a precious resource in Internet of Things (IoT) especially with battery operated nodes, the overhead that consumes the battery power of the sensor nodes is a fundame...

An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation

Journal Article
Fang, D., Liu, X., Romdhani, I., Jamshidi, P., & Pahl, C. (2016)
An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation. Future Generation Computer Systems, 56, 11-26. https://doi.org/10.1016/j.future.2015.09.025
Cloud computing enables a revolutionary paradigm of consuming ICT services. However, due to the inadequately described service information, users often feel confused while try...

Towards OWL 2 Natively Supported Fuzzy Cloud Ontology

Conference Proceeding
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012)
Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. In 6th IEEE International Workshop Quality-Oriented Reuse of Software (IEEE QUORS’12), (328-333). https://doi.org/10.1109/compsacw.2012.66
Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applicati...

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations.

Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J. & Munoz, J. (2006)
Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In Hutchinson, W. (Ed.). ISBN 1905305206 & 9781905305209
Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, th...