Home > Research > Browse

Results for Network security

Publications & Outputs

  1. MUD-Based Behavioral Profiling Security Framework for Software-Defined IoT Networks

    Krishnan, P., Jain, K., Buyya, R., Vijayakumar, P., Nayyar, A., Bilal, M. & Song, H., 1/05/2022, In: IEEE Internet of Things Journal. 9, 9, p. 6611-6622 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Network Policies in Software Defined Internet of Everything

    Amin, R., Hussain, M. & Bilal, M., 13/01/2022, Software Defined Internet of Everything. Springer, p. 79-96 18 p. (Internet of Things).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Secrecy Wireless-Powered Sensor Networks for Internet of Things

    Li, J., Zhao, H., Chen, X., Chu, Z., Zhen, L., Jiang, J. & Pervaiz, H., 22/09/2020, In: Wireless Communications and Mobile Computing. 2020, 12 p., 8859264.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. ThermoSim: Deep learning based framework for modeling and simulation of thermal-aware resource management for cloud computing environments

    Gill, S. S., Tuli, S., Toosi, A. N., Cuadrado, F., Garraghan, P., Bahsoon, R., Lutfiyya, H., Sakellariou, R., Rana, O., Dustdar, S. & Buyya, R., 1/08/2020, In: Journal of Systems and Software. 166, 20 p., 110596.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Safe and Secure Software-Defined Networks for Smart Electricity Substations

    Holik, F., Broadbent, M., Findrik, M., Smith, P. & Race, N., 3/03/2020, Intelligent Information and Database Systems - 12th Asian Conference, ACIIDS 2020, Proceedings. Sitek, P., Pietranik, M., Krótkiewicz, M. & Srinilta, C. (eds.). Singapore: Springer, p. 179-191 13 p. (Communications in Computer and Information Science; vol. 1178 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

    Demir, K., Nayyer, F. & Suri, N., 1/06/2019, In: International Journal of Critical Infrastructure Protection. 25, p. 84-101 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Simulation of Si nanowire quantum-dot devices for authentication

    Carrillo-Nunez, H., Wang, C., Asenov, A., Young, R. & Georgiev, V., 1/04/2019.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In: International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Towards DDoS attack resilient wide area monitoring systems

    Demir, K. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 7 p. 99

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

More results »