Date


People

Download Available

Dewey Decimal

894 results

Visualization of Online Datasets

Journal Article
Peng, T., & Downie, C. (2017)
Visualization of Online Datasets. International Journal of Networked and Distributed Computing, 6(1), 11-23. https://doi.org/10.2991/ijndc.2018.6.1.2
As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, information visualization becomes even mo...

Blockchain and Git repositories for sticky policies protected OOXML.

Presentation / Conference
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November)
Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based Information Rights Management (IRM) model extension with enhanced accountability for both a sticky policy and an attached data. This wor...

Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies

Conference Proceeding
Asif, R. (2017)
Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedingshttps://doi.org/10.1109/NOF.2017.8251243
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...

Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks

Conference Proceeding
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017)
Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. In Wireless and Mobile Computing, Networking and Communications (WiMob)https://doi.org/10.1109/wimob.2017.8115854
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads...

What can we learn from simulating commuters?

Presentation / Conference
Urquhart, N. (2017, November)
What can we learn from simulating commuters?. Presented at U!REKA
Commuting affects just about every member of the workforce in the UK, those who do not commute are affected by the congestion and pollution generated by such activities. There...

Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks

Journal Article
Torres Vega, M., Koonen, A. M. J., Liotta, A., & Famaey, J. (2018)
Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks. IEEE Wireless Communications Letters, 7(2), 278-281. https://doi.org/10.1109/lwc.2017.2771771
In light of the extreme radio congestion, the time has come to consider the upper parts of the electromagnetic spectrum. Optical beam-steered wireless communications offer gre...

A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system

Journal Article
Liu, X., & Liu, Q. (2018)
A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system. Personal and Ubiquitous Computing, https://doi.org/10.1007/s00779-017-1093-2
In a non-uniformly distributed network, the dataconcentrating centre equipped with sparse nodes rapidly depletes its battery energy due to the hotspot problem. To solve this p...

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack

Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017)
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. In 2017 Seventh International Conference on Emerging Security Technologies (EST),https://doi.org/10.1109/est.2017.8090392
Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted w...

Power Consuming Activity Recognition in Home Environment

Conference Proceeding
Liu, X., & Liu, Q. (2017)
Power Consuming Activity Recognition in Home Environment. In X. Sun, H. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security. ICCCS 2017, (361-372). https://doi.org/10.1007/978-3-319-68505-2_31
This work proposed an activity recognition model which focus on the power con-suming activity in home environment, to help residents modify their behavior. We set the IoT syst...

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

Conference Proceeding
Kintis, P., Miramirkhani, N., Lever, C., Chen, Y., Romero-Gómez, R., Pitropakis, N., …Antonakakis, M. (2017)
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. In CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Securityhttps://doi.org/10.1145/3133956.3134002
Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific typ...