Date


School

Output Type

Download Available

51 results

A Multi-attributes-based Trust Model of Internet of Vehicle

Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security. , (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018)
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)https://doi.org/10.1109/CyberSecPODS.2018.8560683
Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development ov...

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings

Conference Proceeding
(2018)
Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. In I. Romdhani, L. Shu, H. Takahiro, Z. Zhou, T. Gordon, & D. Zeng (Eds.), Collaborative Computing: Networking, Applications and Worksharinghttps://doi.org/10.1007/978-3-030-00916-8
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, Collabora...

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things

Conference Proceeding
Semedo, F., Moradpoor, N., & Rafiq, M. (2018)
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. In SIN '18 Proceedings of the 11th International Conference on Security of Information and Networkshttps://doi.org/10.1145/3264437.3264438
The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Position...

Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases

Conference Proceeding
Clavie, B., & Moradpoor, N. (in press)
Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. In Proceedings of posters presented at 10th ACM Conference on Web Science
This article explores a perceived bias between two British reddit communities dedicated to discussing British politics.We analyse the popular sources favoured by each communit...

A new Zigbee-based device for measuring visual reaction time in sport activities

Conference Proceeding
Ali, B. B., Dugas, É., Naceur, A., & Romdhani, I. (2018)
A new Zigbee-based device for measuring visual reaction time in sport activities. In 2017 International Conference on Engineering & MIS (ICEMIS)https://doi.org/10.1109/icemis.2017.8273005
There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the majo...

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack

Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017)
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. In 2017 Seventh International Conference on Emerging Security Technologies (EST),https://doi.org/10.1109/est.2017.8090392
Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted w...

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks

Conference Proceeding
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017)
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESShttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...

Simultaneous context inference and mapping using mm-Wave for indoor scenarios

Conference Proceeding
Yassin, A., Nasser, Y., Awad, M., & Al-Dubai, A. (2017)
Simultaneous context inference and mapping using mm-Wave for indoor scenarios. In IEEE ICC 2017, (1-6). https://doi.org/10.1109/icc.2017.7996976
We introduce in this paper two main approaches, Triangulateration (TL) and Angle-Difference-of-Arrival (ADoA) for indoor localization and mapping using single-anchor and milli...

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT

Conference Proceeding
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017)
Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC). , (1-6). https://doi.org/10.1109/icc.2017.7996819
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...