Date


Output Type

Download Available

85 results

5G - What architecture to serve vertical industry

Presentation / Conference
Thuemmler, C. (2017, May)
5G - What architecture to serve vertical industry. Presented at IEEE ICC 2017, Paris
5G offers the promise to dynamically satisfy a multiplicity of concurrent requirements originating from various business models of vertical industries. The 5G PPP has publishe...

5G as an enabler for Medical IOT - 5GMIOT

Presentation / Conference
Thuemmler, C., & Jefefries, N. (2016, December)
5G as an enabler for Medical IOT - 5GMIOT. Presented at IEEE Globecom 2016
Short Power Point presentation on 5G as enabler for Medical IoT – 5GMIOT Standards, policies and strategies for social technological alignment of 5G technology

3LS-authenticate: an e-commerce challenge-response mobile application.

Presentation / Conference
Molla, R., Romdhani, I., & Buchanan, B. (2016, November)
3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016, Agadir, Morocco
The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determini...

Performance evaluation of RPL objective functions.

Presentation / Conference
Altwassi, H., Qasem, M., Yassein, M. B., & Al-Dubai, A. (2015, October)
Performance evaluation of RPL objective functions. Paper presented at International Workshop on Internet of Things and Smart Spaces (IoT-Smart-2015): Applications, Challenges and Future Trends in conjunction with the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), Liverpool, UK
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard for Wireless Sensors Networks. RPL uses two different ‘objective functions’ (OFs), namely Minimum Ra...

Inspired counter based broadcasting in dynamic source routing protocol.

Presentation / Conference
Yassein, M. B., & Al-Dubai, A. (2015, October)
Inspired counter based broadcasting in dynamic source routing protocol. Paper presented at 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2015), Liverpool, UUK
The broadcast storm problem is one of the most challenging issues in Mobile ad Hoc Networks (MANETs). However, it is still a challenging problem despite the great deal of rela...

A load-balancing cluster based protocol for Wireless Sensor Networks.

Presentation / Conference
Eshaftri, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, September)
A load-balancing cluster based protocol for Wireless Sensor Networks. Paper presented at 4th International Conference on Wireless Sensor Networks (WSN'15), Lodz, Poland

Evaluation of the DFET Cloud.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...

A decentralized group key management protocol for mobile Internet of things (DBGK)

Presentation / Conference
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, August)
A decentralized group key management protocol for mobile Internet of things (DBGK). Paper presented at The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15

Cyber security challenges for cloud based services.

Presentation / Conference
Buchanan, W. J. (2015, June)
Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...