Research explorer tool

Date


Output Type

Download Available

221 results

NapierOne: A modern mixed file data set alternative to Govdocs1

Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022)
NapierOne: A modern mixed file data set alternative to Govdocs1. Forensic Science International: Digital Investigation, 40, https://doi.org/10.1016/j.fsidi.2021.301330
It was found when reviewing the ransomware detection research literature that almost no proposal provided enough detail on how the test data set was created, or sufficient des...

A VMD and LSTM based hybrid model of load forecasting for power grid security

Journal Article
Lv, L., Wu, Z., Zhang, J., Tan, Z., Zhang, L., & Tian, Z. (in press)
A VMD and LSTM based hybrid model of load forecasting for power grid security. IEEE Transactions on Industrial Informatics, https://doi.org/10.1109/tii.2021.3130237
As the basis for the static security of the power grid, power load forecasting directly affects the safety of grid operation, the rationality of grid planning, and the economy...

A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks

Journal Article
Zhao, L., Li, Z., Al-Dubai, A., Min, G., Li, J., Hawbani, A., & Zomaya, A. (in press)
A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems, https://doi.org/10.1109/TITS.2021.3123276
Temporal information is critical for routing computation in the vehicular network. It plays a vital role in the vehicular network. Till now, most existing routing schemes in v...

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT

Journal Article
Almas Khan, M., Khan, M. A., Ullah Jan, S., Ahmad, J., Jamal, S. S., Shah, A. A., …Markakis, E. K. (2021)
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors, 21(21), https://doi.org/10.3390/s21217016
A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely ...

A Blockchain Framework in Post-Quantum Decentralization

Journal Article
Saha, R., Kumar, G., Devgun, T., Buchanan, W., Thomas, R., Alazab, M., …Rodrigues, J. (in press)
A Blockchain Framework in Post-Quantum Decentralization. IEEE Transactions on Services Computing, https://doi.org/10.1109/tsc.2021.3116896
The decentralization and transparency have provided wide acceptance of blockchain technology in various sectors through numerous applications. The claimed security services by...

Editorial: Big data technologies and applications

Journal Article
Wu, Y., Pan, Y., Barnaghi, P., Tan, Z., Ge, J., & Wang, H. (in press)
Editorial: Big data technologies and applications. Wireless Networks, https://doi.org/10.1007/s11276-021-02787-9

A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions

Journal Article
Saha, R., Geetha, G., Kumar, G., Buchanan, W. J., & Kim, T. (2021)
A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions. Applied Sciences, 11(17), https://doi.org/10.3390/app11178073
Cryptographic algorithms and functions should possess some of the important functional requirements such as: non-linearity, resiliency, propagation and immunity. Several previ...

Deep Learning in Mobile Computing: Architecture, Applications, and Future Challenges

Journal Article
Yang, X., Tan, Z., & Luo, Z. (2021)
Deep Learning in Mobile Computing: Architecture, Applications, and Future Challenges. Mobile Information Systems, 2021, 1-3. https://doi.org/10.1155/2021/9874724
No abstract available.

Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection

Journal Article
Cui, C., Lu, L., Tan, Z., & Hussain, A. (2021)
Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection. Neurocomputing, 464, 252-264. https://doi.org/10.1016/j.neucom.2021.08.026
Segmentation-based methods are widely used for scene text detection due to their superiority in describing arbitrary-shaped text instances. However, two major problems still e...

LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments

Journal Article
Kim, T., Kumar, G., Saha, R., Buchanan, W. J., Devgun, T., & Thomas, R. (2021)
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments. IEEE Access, 9, 100972-100980. https://doi.org/10.1109/access.2021.3097267
There is an increasing drive to provide improved levels of trust within an Internet-of-Things (IoTs) environments, but the devices and sensors used tend to be limited in their...