PLC Memory Attack Detection and Response in a Clean Water Supply System
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003
Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens ...
Leaf-based Routing Mechanism for Low-Power and Lossy Networks
Patent
Ghaleb, B., & Al-Dubai, A. (2018)
Leaf-based Routing Mechanism for Low-Power and Lossy Networks. 1800668.4. Intellectual Property Office, UK
Unlike existing solutions, our invention provides a “Leaf-Based” mechanism for establishing the Downward routes in Low-Power and Lossy Networks (LLNs) that seeks to provide a ...
Enhanced Methods of Coursework Provision in Computer Networks.
Conference Proceeding
Buchanan, W. J., & Saliou, L. (2005)
Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education, 111-115. https://doi.org/10.1109/ITRE.2004.1393657
Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from ...
A 3D Smooth Random Walk Mobility Model for FANETs
Conference Proceeding
Lin, N., Gao, F., Zhao, L., Al-Dubai, A., & Tan, Z. (2019)
A 3D Smooth Random Walk Mobility Model for FANETs. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00075
The number of Unmanned Aerial Vehicles (UAVs) applications has increased over the past few years. Among all scenarios, UAV group consisting multi-UAVs is normally used to prov...
A Multi-UAV Clustering Strategy for Reducing Insecure Communication Range
Journal Article
Wu, J., Zou, L., Zhao, L., Al-Dubai, A., Mackenzie, L., & Min, G. (2019)
A Multi-UAV Clustering Strategy for Reducing Insecure Communication Range. Computer Networks, 158, 132-142. https://doi.org/10.1016/j.comnet.2019.04.028
Multi-unmanned aerial vehicle (UAV) flight formations can be deployed to monitor large areas. Individual UAVs communicate and exchange information while formation flying. but, s...
FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment
Journal Article
Zhang, S., Liu, Y., Li, S., Tan, Z., Zhao, X., & Zhou, J. (2020)
FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment. IEEE Access, 8, 17356-17365. https://doi.org/10.1109/access.2020.2966399
Edge computing is a research hotspot that extends cloud computing to the edge of the network. Due to the recent developments in computation, storage and network technology for...
Decentralized dynamic understanding of hidden relations in complex networks
Journal Article
Mocanu, D. C., Exarchakos, G., & Liotta, A. (2018)
Decentralized dynamic understanding of hidden relations in complex networks. Scientific Reports, 8(1), https://doi.org/10.1038/s41598-018-19356-4
Almost all the natural or human made systems can be understood and controlled using complex networks. This is a difficult problem due to the very large number of elements in s...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture
Journal Article
Chrysoulas, C., & Pitropakis, N. (2018)
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture. EAI Endorsed Transactions on Ambient Systems, 4(12), 153551. https://doi.org/10.4108/eai.10-1-2018.153551
QoS and Security features are playing an important role in modern network architecures. Dynamic selection of services and by extension of service providers are vital in today’...
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT
Conference Proceeding
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017)
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wireless and Mobile Communications
The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious ...