Decrypting Live SSH Traffic in Virtual Environments
Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...
5G: What Architecture to Serve Vertical Industries?
Presentation / Conference
Thuemmler, C. (2017, May)
5G: What Architecture to Serve Vertical Industries?. Presented at IEEE ICC 2017
The implementation and roll out of 5G technology is progressing at increasing speed and will impact all industrial verticals. Health is globally a very important industry wort...
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications
Journal Article
Yassin, A., Nasser, Y., Awad, M., Al-Dubai, A., Liu, R., Yuen, C., …Aboutanios, E. (2017)
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications. Communications Surveys and Tutorials, IEEE Communications Society, 19(2), 1327-1346. https://doi.org/10.1109/comst.2016.2632427
Nowadays, the availability of the location information becomes a key factor in today’s communications systems for allowing location based services. In outdoor scenarios, the M...
Hybrid Tree-rule Firewall for High Speed Data Transmission
Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...