Date


School

Download Available

210 results

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for sing...

A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks

Journal Article
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2022)
A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks. Future Generation Computer Systems, 134, 287-302. https://doi.org/10.1016/j.future.2022.04.003
Long Range (LoRa) networks provide long range, cost-effective and energy-efficient communications by utilising the free unlicensed ISM band, which makes them appealing for Int...

SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks

Journal Article
Farooq, M., Wang, X., Hawbani, A., Zhao, L., Al-Dubai, A., & Busaileh, O. (in press)
SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks. IEEE Transactions on Mobile Computing, https://doi.org/10.1109/TMC.2022.3158695
In wireless sensor networks (WSNs), it is inappropriate to use conventional unicast routing due to the broadcast storm problem and spatial diversity of communication links. Op...

A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks

Journal Article
Zhao, L., Li, Z., Al-Dubai, A., Min, G., Li, J., Hawbani, A., & Zomaya, A. (2022)
A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems, 23(8), 13275-13290. https://doi.org/10.1109/TITS.2021.3123276
Temporal information is critical for routing computation in the vehicular network. It plays a vital role in the vehicular network. Till now, most existing routing schemes in v...

A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks

Conference Proceeding
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2021)
A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks. In ICC 2021 - IEEE International Conference on Communicationshttps://doi.org/10.1109/ICC42927.2021.9500407
Long-Range (LoRa) has been a major avenue for deploying the Internet of Things (IoT) in large scale environments due to its long-scale connection, energy efficiency, and cost-...

PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform

Journal Article
Abramson, W., Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2021)
PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform. Software Impacts, 9, https://doi.org/10.1016/j.simpa.2021.100101
PyDentity lowers the entry barrier for parties interested in experimenting with the Hyperledger’s verifiable information exchange platform. It enables educators, developers an...

Artificial Intelligence and Blockchain for Future Cybersecurity Applications

Book
Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Cham: Springer. https://doi.org/10.1007/978-3-030-74575-2
Presents the state-of-the-art and the latest discoveries in the field of Artificial Intelligence and Blockchain techniques and methods for future cybersecurity applications P...

Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things

Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021)
Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, https://doi.org/10.1016/j.ijcip.2021.100436
Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been ...

A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node

Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2021)
A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node. Wireless Networks, 27(5), 3423-3439. https://doi.org/10.1007/s11276-021-02580-8
Utilising the mobilisation of a sink node in a wireless sensor network to combat the energy hole, or hotspot issue, is well referenced. However, another issue , that of energy...

Machine Learning-driven Optimization for SVM-based Intrusion Detection System in Vehicular Ad Hoc Networks

Journal Article
Alsarhan, A., Alauthman, M., Alshdaifat, E., Al-Ghuwairi, A., & Al-Dubai, A. (in press)
Machine Learning-driven Optimization for SVM-based Intrusion Detection System in Vehicular Ad Hoc Networks. Journal of Ambient Intelligence and Humanized Computing, https://doi.org/10.1007/s12652-021-02963-x
Machine Learning (ML) driven solutions have been widely used to secure wireless communications Vehicular ad hoc networks (VANETs) in recent studies. Unlike existing works, thi...
6 results

Next Generation Trust Architecture

2018 - 2020
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Funder: Digital Health Institute | Value: £149,959

Trisent: Innovation Voucher for Personal Context Data Project

2018 - 2018
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project. Trisent’s core technology is called the Personal Context Management System (PCM...
Funder: Scottish Funding Council | Value: £5,000

Reliable Internet of Things based monitoring & Surveillance in Oil & Gas Fields (RsIoT)

2015 - 2017
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
Value: £66,635

IPv6 Business Case Demonstrators for Farrpoint

2013 - 2013
The development of interesting use cases for IPv6.
Funder: Scottish Funding Council | Value: £5,000

Building new research partnerships with the Qatari Institutions

2012 - 2012
This short research visit aims at building research collaborative links with the Texas A & M University at Qatar and the University of Qatar
Funder: Carnegie Trust for the Universities of Scotland | Value: £1,700

International Conference Grant

2009 - 2009
International Travel
Funder: Royal Society of Edinburgh | Value: £1,000