4 results

Decrypting Live SSH Traffic in Virtual Environments

Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait

Journal Article
Khan, F., ur Rehman, A., Usman, M., Tan, Z., & Puthal, D. (2018)
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait. Mobile Networks and Applications, https://doi.org/10.1007/s11036-018-1020-4
The enormous developments in the field of wireless communication technologies have made the unlicensed spectrum bands crowded, resulting uncontrolled interference to the tradi...

Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications

Journal Article
Yassin, A., Nasser, Y., Awad, M., Al-Dubai, A., Liu, R., Yuen, C., …Aboutanios, E. (2017)
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications. Communications Surveys and Tutorials, IEEE Communications Society, 19(2), 1327-1346. https://doi.org/10.1109/comst.2016.2632427
Nowadays, the availability of the location information becomes a key factor in today’s communications systems for allowing location based services. In outdoor scenarios, the M...

Hybrid Tree-rule Firewall for High Speed Data Transmission

Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...