Research explorer tool

13 results

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack

Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017)
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. In 2017 Seventh International Conference on Emerging Security Technologies (EST),https://doi.org/10.1109/est.2017.8090392
Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted w...

Numerical encoding to tame SQL injection attacks

Conference Proceeding
Uwagbole, S., Buchanan, W. J., & Fan, L. (2016)
Numerical encoding to tame SQL injection attacks. In 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS),https://doi.org/10.1109/NOMS.2016.7502997
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases....

Norms and standards in modular medical architectures.

Conference Proceeding
Fricker, S., Fiedler, M., Grottland, A., Jell, T., Magedanz, T., Thuemmler, C., …Paulin, A. (2014)
Norms and standards in modular medical architectures. In 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom) (IEEE Healthcom 2013), (382-387). https://doi.org/10.1109/HealthCom.2013.6720705
Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet - Private Public Partnershi...

A new efficient distributed route discovery for wireless mobile ad hoc networks.

Conference Proceeding
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2012)
A new efficient distributed route discovery for wireless mobile ad hoc networks. In Wireless Telecommunications Symposium (WTS), 2012, (1-6). https://doi.org/10.1109/WTS.2012.6266129
High performance group communication, such as broadcast, requires matching efficient broadcast algorithms to effective route discovery approach. Broadcast communication in MAN...

DACAR platform for eHealth services cloud.

Conference Proceeding
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011)
DACAR platform for eHealth services cloud. https://doi.org/10.1109/CLOUD.2011.31
The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services,...

A new adaptive broadcasting approach for mobile ad hoc networks

Conference Proceeding
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2010)
A new adaptive broadcasting approach for mobile ad hoc networks. In Proceedings of 2010 6th Conference on Wireless Advanced (WiAD). , (1-6). https://doi.org/10.1109/WIAD.2010.5544944
Mobile ad hoc networks (MANETs) have been gaining tremendous attention owing to the advances in wireless technologies accompanied by many applications and implementations. How...

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems

Conference Proceeding
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010)
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security. , (190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...

Ad-hoc routing metrics and applied weighting for QoS support

Conference Proceeding
Migas, N., & Buchanan, W. J. (2008)
Ad-hoc routing metrics and applied weighting for QoS support. In 22nd IEEE International Parallel & Distributed Processing Symposium. , (1-8). https://doi.org/10.1109/IPDPS.2008.4536496
In the vast majority of ad-hoc routing protocols, the hop-counting mechanisms for identifying the optimal route are dominant. However, this approach oversimplifies such a comp...

Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing

Conference Proceeding
Migas, N., & Buchanan, W. J. (2005)
Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing. In The 2005 IEEE Congress on Evolutionary Computation. , (147-154). https://doi.org/10.1109/ecbs.2005.51
Ad-hoc wireless networks, which use ad-hoc routing methods may prove a good solution in certain applications, especially where networks have to be constructed where there is n...

Enhanced Methods of Coursework Provision in Computer Networks.

Conference Proceeding
Buchanan, W. J., & Saliou, L. (2005)
Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education, 111-115. https://doi.org/10.1109/ITRE.2004.1393657
Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from ...