6 results

Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks

Presentation / Conference
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June)
Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Paper presented at The 16th IEEE International Conference on Smart City (IEEE SmartCity-2018), Exeter, UK
In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional uneq...

Secure and Scalable Identity Management for the Aviation Industry

Presentation / Conference
Kintis, P., Kountouras, A., Pitropakis, N., Dagon, D., Antonakakis, M., Markou, C., & Buchner, P. (2017, May)
Secure and Scalable Identity Management for the Aviation Industry
No abstract available.

5G: What Architecture to Serve Vertical Industries?

Presentation / Conference
Thuemmler, C. (2017, May)
5G: What Architecture to Serve Vertical Industries?. Presented at IEEE ICC 2017
The implementation and roll out of 5G technology is progressing at increasing speed and will impact all industrial verticals. Health is globally a very important industry wort...

Mobile User Authentication System for E-commerce Applications.

Presentation / Conference
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June)
Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014, Bejaia, Algeria
E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is ...

A nonlinear correlation measure for Intrusion Detection

Presentation / Conference
Ambusaidi, M., Lu, L. F., He, X., Tan, Z., Jamdagni, A., & Nanda, P. (2012, November)
A nonlinear correlation measure for Intrusion Detection. Paper presented at The 7th International Conference on Frontier of Computer Science and Technology (FCST-12
The popularity of using internet contains some risks of network attacks. It has attracted the attention of many researchers to overcome this problem. One of the effective ways...

Covert channel analysis and detection using reverse proxy servers.

Presentation / Conference
Buchanan, W. J., & Llamas, D. (2004, June)
Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC), London
Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls...