Date


Download Available

160 results

A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking

Conference Proceeding
Zhao, L., Liu, Y., Al-Dubai, A., Tan, Z., Min, G., & Xu, L. (2019)
A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking. https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00082
With the rapid development of mobile applications, networking technologies have been constantly evolved to offer a more convenient way of sharing information and online-commun...

A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications

Journal Article
Almalkawi, I. T., Halloush, . R., Alsarhan, A., Al-Dubai, A., & Al-karaki, J. N. (2019)
A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications. Journal of Information Security and Applications, 49, https://doi.org/10.1016/j.jisa.2019.102384
Due to limited processing capabilities and other constraints of most wireless networks, many existing security algorithms do not consider the network efficiency. This is becau...

An AI approach to Collecting and Analyzing Human Interactions with Urban Environments

Journal Article
Ferrara, E., Fragale, L., Fortino, G., Song, W., Perra, C., di Mauro, M., & Liotta, A. (2019)
An AI approach to Collecting and Analyzing Human Interactions with Urban Environments. IEEE Access, 7, 141476-141486. https://doi.org/10.1109/access.2019.2943845
Thanks to advances in Internet of Things and crowd-sensing, it is possible to collect vast amounts of urban data, to better understand how citizens interact with cities and, i...

Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach

Journal Article
Di Mauro, M., & Liotta, A. (2019)
Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach. IEEE Transactions on Network and Service Management, 16(4), 1493-1506. https://doi.org/10.1109/tnsm.2019.2943776
The Next Generation 5G Networks can greatly benefit from the synergy between virtualization paradigms, such as the Network Function Virtualization (NFV), and service provision...

FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks

Journal Article
Liu, P., Wang, X., Hawbani, A., Busaileh, O., Zhao, L., & Al-Dubai, A. (2020)
FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks. IEEE Transactions on Mobile Computing, 19(11), 2623-2639. https://doi.org/10.1109/tmc.2019.2928805
In wireless sensor networks, routing protocols with immutable network policies lacking the flexibility are generally incapable of maintaining desired performance due to the co...

A novel adaptive routing and switching scheme for software-defined vehicular Networks

Conference Proceeding
Zhoa, L., Zhao, W., Gong, C., Al-Dubai, A., & Min, G. (2019)
A novel adaptive routing and switching scheme for software-defined vehicular Networks. In Proceedings of the IEEE International Conference on Communicationshttps://doi.org/10.1109/ICC.2019.8761365
Software-Defined Vehicular Networks (SDVNs) technology has been attracting significant attention as it can make Vehicular Ad Hoc Network (VANET) more efficient and intelligent...

A temporal-information-based adaptive routing algorithm for software defined vehicular networks

Conference Proceeding
Zhao, L., Li, Z., Li, J., Al-Dubai, A., Min, G., & Zomaya, A. Y. (2019)
A temporal-information-based adaptive routing algorithm for software defined vehicular networks. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC)https://doi.org/10.1109/ICC.2019.8761680
In Software Defined Vehicular Networks (SDVNs), most existing studies of routing consider the vehicular network as a static graph and compute the flow table based on static in...

PLC Memory Attack Detection and Response in a Clean Water Supply System

Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003
Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens ...

A Multi-UAV Clustering Strategy for Reducing Insecure Communication Range

Journal Article
Wu, J., Zou, L., Zhao, L., Al-Dubai, A., Mackenzie, L., & Min, G. (2019)
A Multi-UAV Clustering Strategy for Reducing Insecure Communication Range. Computer Networks, 158, 132-142. https://doi.org/10.1016/j.comnet.2019.04.028
Multi-unmanned aerial vehicle (UAV) flight formations can be deployed to monitor large areas. Individual UAVs communicate and exchange information while formation flying. but, s...

Decrypting Live SSH Traffic in Virtual Environments

Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...