A Novel Heuristic Data Routing for Urban Vehicular Ad-hoc Networks
Journal Article
Hawbani, A., Wang, X., Al-Dubai, A., Zhao, L., Busaileh, . O., Liu, P., & Al-qaness, M. (in press)
A Novel Heuristic Data Routing for Urban Vehicular Ad-hoc Networks. IEEE Internet of Things Journal,
This work is devoted to solving the problem of multi-criteria multi-hop routing in vehicular ad-hoc networks (VANETs), aiming at three goals, increasing the end-to-end deliver...
A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks
Conference Proceeding
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (in press)
A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks
Long-Range (LoRa) has been a major avenue for deploying the Internet of Things (IoT) in large scale environments due to its long-scale connection, energy efficiency, and cost-...
Secure Lightweight Stream Data Outsourcing for Internet of Things
Journal Article
Peng, S., Zhao, L., Al-Dubai, A., Zomaya, A., Hu, J., Min, G., & Wang, Q. (in press)
Secure Lightweight Stream Data Outsourcing for Internet of Things. IEEE Internet of Things Journal,
The epoch of the Internet of Things (IoT) has come by enabling almost everything to gather and share electronic information. Considering the unreliable factors of public IoT, ...
Understanding Personal Online Risk To Individuals Via Ontology Development
Conference Proceeding
Haynes, D. (2020)
Understanding Personal Online Risk To Individuals Via Ontology Development. In Knowledge Organization at the Interface: Proceedings of the Sixteenth International ISKO Conference, 2020, Aalborg, Denmark. , (171-180). https://doi.org/10.5771/9783956507762-171
The concept of risk is widely misunderstood because of the different contexts in which it is used. This paper describes the development of an ontology of risk as a way of bett...
Privacy-preserving Surveillance Methods using Homomorphic Encryption
Conference Proceeding
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020)
Privacy-preserving Surveillance Methods using Homomorphic Encryption. In ICISSP: Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (240-248). https://doi.org/10.5220/0008864902400248
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encrypt...
Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach
Conference Proceeding
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020)
Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. In Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (289-298). https://doi.org/10.5220/0008902202890298
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high ...
Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms
Journal Article
Ghanami, A., Li, . J., Hawbani, A., & Al-Dubai, A. (in press)
Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms. Expert Systems with Applications, https://doi.org/10.1016/j.eswa.2020.114525
Initialization is the first and a major step in the implementation of evolutionary algorithms (EAs). Although there are many common general methods to initialize EAs such as t...
Novel Online Sequential Learning-based Adaptive Routing for Edge Software-Defined Vehicular Networks
Journal Article
Zhao, L., Zhao, W., Hawbani, A., Al-Dubai, A., Min, G., Zomaya, A., & Gong, C. (in press)
Novel Online Sequential Learning-based Adaptive Routing for Edge Software-Defined Vehicular Networks. IEEE Transactions on Wireless Communications,
To provide efficient networking services at the edge of Internet-of-Vehicles (IoV), Software-Defined Vehicular Network (SDVN) has been a promising technology to enable intelli...
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing
Journal Article
Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., …Papadopoulos, P. (2020)
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. Frontiers in Communications and Networks, https://doi.org/10.3389/frcmn.2020.583376
The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tr...
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric
Journal Article
Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., & Buchanan, .. J. (2020)
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors, 20(22), https://doi.org/10.3390/s20226587
Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches ofte...