13 results

Decentralised Privacy: A Distributed Ledger Approach

Book Chapter
Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2021)
Decentralised Privacy: A Distributed Ledger Approach. In C. Mustansar Hussain, & P. Di Sia (Eds.), Handbook of Smart Materials, Technologies, and Devices (1-26). Cham: Springer. https://doi.org/10.1007/978-3-030-58675-1_58-1
Our world due to the technological progress became fast-paced and is constantly evolving, thus changing every single day. Consequently, the most valuable asset on earth is not...

Case for Health 4.0

Book Chapter
Thuemmler, C. (2017)
Case for Health 4.0. In C. Bai, & C. Thuemmler (Eds.), Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare, 1-22. (1). BMC
No abstract available.

Health 4.0: Application of Industry 4.0 Design Principles in Future Asthma Management .

Book Chapter
Thuemmler, C., & Bai, C. (2017)
Health 4.0: Application of Industry 4.0 Design Principles in Future Asthma Management . In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare, 23-37. (1). BMC
No abstract available.

A Health 4.0 Based Approach Towards the Management of Multiple Sclerosis

Book Chapter
Grigoriadis, N., Bakirtzis, C., Politis, C., Danas, K., Thuemmler, C., & Keow Lim, A. (2017)
A Health 4.0 Based Approach Towards the Management of Multiple Sclerosis. In C. Thuemmler, & C. Bai (Eds.), Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (205-218). (1). Springer
No abstract available.

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC.

Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017)
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications, (317-335). CHAM: Springer
The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the...

Towards Trust and Governance in Integrated Health and Social Care Platforms

Book Chapter
Buchanan, W., Thuemmler, C., Spyra, G., Smales, A., & Prajapati, B. (2017)
Towards Trust and Governance in Integrated Health and Social Care Platforms
The way we are sharing health and care data will be changing considerably over the years to come. One of the reasons is an increasing move towards patient-centric approaches w...

Security for Cyber-Physical Systems in Healthcare

Book Chapter
Saleem, K., Tan, Z., & Buchanan, W. (2017)
Security for Cyber-Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (233-251). Springer. https://doi.org/10.1007/978-3-319-47617-9_12
The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients wi...

Architecting the Internet of Things: State of the Art

Book Chapter
Abdmeziem, M. R., Romdhani, I., & Tandjaoui, D. (2016)
Architecting the Internet of Things: State of the Art. In A. Koubaa, & E. Shakshuki (Eds.), Robots and Sensor Clouds; Studies in Systems, Decision and Control, (55-75). Springer. https://doi.org/10.1007/978-3-319-22168-7_3
Internet of things (IoT) constitutes one of the most important technological development in the last decade. It has the potential to deeply affect our life style. However, its...

Routing metrics for wireless mesh networks: a survey

Book Chapter
Zhao, L., & Al-Dubai, A. (2012)
Routing metrics for wireless mesh networks: a survey. In Recent Advances in Computer Science and Information Engineering (311-316). (127). Springer. https://doi.org/10.1007/978-3-642-25769-8_45
Wireless Mesh Network (WMN) is a key emerging technology to construct next generation wireless multi-hop network. It combines the advantages of both mobile ad-hoc network (MAN...

Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

Book Chapter
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011)
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. In Neural Information Processing; Lecture Notes in Computer Science (756-765). Springer. https://doi.org/10.1007/978-3-642-24965-5_85
The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detecti...