Date


Download Available

92 results

Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things

Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021)
Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, https://doi.org/10.1016/j.ijcip.2021.100436
Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been ...

Crowdfunding Can Serve as a Pathway to Higher Education

Book Chapter
Romdhani, I., El Youssi, A., Al Mennai, M., Babah, E., & Yahya, R. (2018)
Crowdfunding Can Serve as a Pathway to Higher Education. In M. Mohieldin, & D. Petkoski (Eds.), Financing Sustainable Development: Ideas for Action 2018, 43-49
The Al-Derb platform provides a way for individual and group funding (crowdfunding) to help young people obtain grants for high-quality online education and training courses o...

Trust-Based Defence Model Against MAC Unfairness Attacks for IoT

Conference Proceeding
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017)
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wireless and Mobile Communications
The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious ...

A new dynamic weight clustering algorithm for wireless sensor networks

Conference Proceeding
Essa, A., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017)
A new dynamic weight clustering algorithm for wireless sensor networks. In S. Yang, J. Gao, Y. Zhang, K. Yang, V. C. M. Leung, & J. Hu (Eds.), Smart Grid Inspired Future Technologies: First International Conference, Liverpool, UK, May 19-20, 2016 SmartGIFT 2016, 195-203
Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WS...

Hierarchical Home Agent Architecture for Mobile IP Communications

Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Hierarchical Home Agent Architecture for Mobile IP Communications. In 11th IEEE Symposium on Computers and Communications, 2006. ISCC '06. Proceedings, 136-141. doi:10.1109/iscc.2006.84
While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile nod...

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...

Ontology-based Course Teacher Assignment within Universities

Journal Article
Ashour, G., Al-Dubai, A., & Romdhani, I. (2020)
Ontology-based Course Teacher Assignment within Universities. International Journal of Advanced Computer Science and Applications, 11(7), https://doi.org/10.14569/ijacsa.2020.0110787
Educational institutions suffer from the enormous amount of data that keeps growing continuously. These data are usually scattered and unorganised, and it comes from different...

A critique of JCSP networking.

Conference Proceeding
Chalmers, K., Kerridge, J., & Romdhani, I. (2008)
A critique of JCSP networking. In P. H. Welch, S. Stepney, F. Polack, F. R. M. Barnes, A. McEwan, G. S. Stiles, …A. T. Sampson (Eds.), Communicating Process Architectures 2008, 271-291. doi:10.3233/978-1-58603-907-3-271
We present a critical investigation of the current implementation of JCSP Networking, examining in detail the structure and behavior of the current architecture. Information i...

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC.

Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017)
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications, (317-335). CHAM: Springer
The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the...

A Trust-based Intrusion Detection System for Mobile RPL Based Networks

Conference Proceeding
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (2018)
A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113
Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be ...

Date


Qualification level

21 results

An approach to dynamic and elastic cloud service specification, recommendation and provision

2011 - 2015
Along with the rapid development of expansion of the cloud computing market, not only the number of cloud ap...
Daren Fang | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Dr Imed Romdhani

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

Investigating communicating sequential processes for Java to support ubiquitous computing

2005 - 2009
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
Dr Kevin Chalmers | Director of Studies: Prof Jon Kerridge | Second Supervisor: Dr Imed Romdhani

Adaptive energy management mechanisms for clustering based routing wireless sensor networks

2013 - 2017
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Mr Mohamed Eshaftri | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Real-time 3D graphic augmentation of music therapy sessions for people on the autism spectrum

2015 - 2019
Autism Spectrum Disorder (ASD) is a lifelong neurodevelopmental disorder that can affect people in a number...
Dr John McGowan | Director of Studies: Dr Gregory Leplatre | Second Supervisor: Dr Iain McGregor

Reliable and energy efficient scheduling protocols for Wireless Body Area Networks (WBAN)

2014 - 2018
Miss Marwa Salayma | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Evolving planar mechanisms for the conceptual stage of mechanical design

2015 - 2020
Dr Paul Lapok | Director of Studies: Alistair Lawson | Second Supervisor: Prof Ben Paechter

Using Deep Reinforcement Learning for Internet of Things Security

2023 - date
Soad Almabdy | Director of Studies: Dr Amjad Ullah | Second Supervisor: Dr Imed Romdhani

Blockchain-based Privacy-preserving Cybersecurity Intelligence Sharing

2022 - date
Elfatih Ahmed | Director of Studies: Dr Jawad Ahmad | Second Supervisor: Dr Baraq Ghaleb

Unifying Data Driven Decision Making and Evolutionary Computing

2021 - date
Katarina Alexander | Director of Studies: Dr Shufan Yang | Second Supervisor: Prof Emma Hart

Date