2025
XMID-MQTT: explaining machine learning-based intrusion detection system for MQTT protocol in IoT environment.
Int. J. Inf. Sec., June, 2025
Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks.
Clust. Comput., February, 2025
2023
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN).
J. Netw. Syst. Manag., July, 2023
VNDN-Fuzzy - A strategy to mitigate the forwarding interests broadcast storm problem in VNDN networks.
Proceedings of the International Conference on Information Networking, 2023
2020
An extended software defined optical networks slicing architecture.
Comput. Stand. Interfaces, 2020
Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach.
Comput. Stand. Interfaces, 2020
Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review.
Comput. Stand. Interfaces, 2020
2019
A review of security assessment methodologies in industrial control systems.
Inf. Comput. Secur., 2019
Investigating the Schedulability of Periodic Real-Time Tasks in Virtualized Cloud Environment.
IEEE Access, 2019
Securing IPv6 Wireless Networks Against Malicious Router Advertisements.
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019
A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019
BE-SYS: Big Data E-Health System for Analysis and Detection of Risk of Septic Shock in Adult Patients.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
IoT Device Programmable Language Customization for Home Automation.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Alarm Mechanism for Anticipated Detection of Network Unavailability in IP Networks Through Time Series Analysis.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution.
Int. J. Electron. Secur. Digit. Forensics, 2017
A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems.
Comput. Secur., 2017
SONA: Software Defined Optical Networks Slicing Architecture.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
Performance Management of Optical Transport Networks through Time Series Forecasting.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Empirical evaluation of the link and content-based focused Treasure-Crawler.
Comput. Stand. Interfaces, 2016
A focused crawler combinatory link and content model based on T-Graph principles.
Comput. Stand. Interfaces, 2016
A systematic technical survey of DTN and VDTN routing protocols.
Comput. Stand. Interfaces, 2016
Document Selection in a Distributed Search Engine Architecture.
CoRR, 2016
An unfair semi-greedy real-time multiprocessor scheduling algorithm.
Comput. Electr. Eng., 2016
A dominance based rough set classification system for fault diagnosis in electrical smart grid environments.
Artif. Intell. Rev., 2016
2015
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network.
J. Intell. Fuzzy Syst., 2015
Rapid lossless compression of short text messages.
Comput. Stand. Interfaces, 2015
A novel methodology towards a trusted environment in mashup web applications.
Comput. Secur., 2015
MBEEC: A bio-inspired routing protocol with multihop between cluster-heads for energy saving in WSN.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
2014
Strategy to reduce false alarms in intrusion detection and prevention systems.
Int. Arab J. Inf. Technol., 2014
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks.
Eng. Appl. Artif. Intell., 2014
Beyond ubiquitous computing: The Malaysian HoneyBee project for Innovative Digital Economy.
Comput. Stand. Interfaces, 2014
2013
An intrusion detection and prevention system in cloud computing: A systematic review.
J. Netw. Comput. Appl., 2013
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique.
Eng. Appl. Artif. Intell., 2013
Using latency as a QoS indicator for global cloud computing services.
Concurr. Comput. Pract. Exp., 2013
Accessibility algorithm based on site availability to enhance replica selection in a data grid environment.
Comput. Sci. Inf. Syst., 2013
Stable multicast trees based on Ant Colony optimization for vehicular Ad Hoc networks.
Proceedings of the International Conference on Information Networking 2013, 2013
2012
Real-Time Curvature Defect Detection on Outer Surfaces Using Best-Fit Polynomial Interpolation.
Sensors, 2012
An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System.
Inf. Manag. Comput. Secur., 2012
Critical Evaluation of RFID Security Protocols.
Int. J. Inf. Secur. Priv., 2012
Safety Measures for Social Computing in Wiki Learning Environment.
Int. J. Inf. Secur. Priv., 2012
An analysis of web proxy logs with query distribution pattern approach for search engines.
Comput. Stand. Interfaces, 2012
BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Networks, 2012
Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2011
Evaluation of Cheating Detection Methods in Academic Writings.
Libr. Hi Tech, 2011
Design of an Integrated Project Management Information System for Large Scale Public Projects: Iranian Case Study.
J. Inf. Technol. Res., 2011
Design of Secure and Trustworthy Mobile Agent-based E-marketplace System.
Inf. Manag. Comput. Secur., 2011
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card.
Int. J. Inf. Secur. Priv., 2011
Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs.
Int. J. Digit. Crime Forensics, 2011
Application of structured document parsing to focused web crawling.
Comput. Stand. Interfaces, 2011
Analytical model based on green criteria for optical backbone network interconnection.
Comput. Stand. Interfaces, 2011
Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011
Block-based programming approach: challenges and benefits.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011
Whip: A framework for mashup development with block-based development approach.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2011
Assessing Measurements of QoS for Global Cloud Computing Services.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
2010
myKarve: JPEG Image and Thumbnail Carver.
J. Digit. Forensic Pract., 2010
A survey of intrusion detection and prevention systems.
Inf. Manag. Comput. Secur., 2010
A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems.
Inf. Manag. Comput. Secur., 2010
Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System.
Proceedings of the South African Information Security Multi-Conference, 2010
2009
A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols.
Int. J. Mob. Comput. Multim. Commun., 2009
A fast scheme for recovery of deleted files with evidential recording for digital forensics.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
2008
A partial equilibrium view on security and privacy.
Inf. Manag. Comput. Secur., 2008
Frameworks for secure, forensically safe and auditable applications.
Comput. Stand. Interfaces, 2008
Secure and auditable agent-based e-marketplace framework for mobile users.
Comput. Stand. Interfaces, 2008
2007
An open source forensic tool to visualize digital evidence.
Comput. Stand. Interfaces, 2007
Evaluation of service management algorithms in a distributed web search system.
Comput. Stand. Interfaces, 2007
2006
Applying 4-regular grid structures in large-scale access networks.
Comput. Commun., 2006
2005
Formalising Event Time Bounding in Digital Investigations.
Int. J. Digit. EVid., 2005
An automatic computing approach to developing secure, trusted and auditable services for e-business.
Comput. Syst. Sci. Eng., 2005
Formal methods, techniques and tools for secure and reliable applications.
Comput. Stand. Interfaces, 2005
A service-centric model for intrusion detection in next-generation networks.
Comput. Stand. Interfaces, 2005
Evidence processing and privacy issues in evidence-based reputation systems.
Comput. Stand. Interfaces, 2005
Design and Implementation of a Distributed Search and Advertising System.
Proceedings of the iiWAS'2005, 2005
2004
Finite state machine approach to digital event reconstruction.
Digit. Investig., 2004
Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
On Hierarchical Extensions of Large-Scale 4-regular Grid Network Structures.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004
Signal Propagation Delay as a Barrier to Control Applications in WAN.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004
Distributed Search-Based Advertising on The Web.
Proceedings of the iiWAS'2004, 2004
2003
Rule-driven processing of tree-structured data using pointed trees.
Comput. Stand. Interfaces, 2003
CORBA: protocols, applications, process models and standards.
Comput. Stand. Interfaces, 2003
An application of the Reference Model for Open Distributed Processing to electronic brokerage.
Comput. Stand. Interfaces, 2003
Special issue: securing computer communications with Public Key Infrastructure.
Comput. Commun., 2003
Evaluating Database Selection Algorithms for Distributed Search.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Comparison of New Simple Weighting Functions for Web Documents against Existing Methods.
Proceedings of the Computer and Information Sciences, 2003
Ad Hoc Interface Evolution in Soap.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
Simulation Based Approach to Evaluate a Distributed Search Engine.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
Significance of HTML Tags for Document Indexing and Retrieval.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
Effects of Ordered Access Lists in Firewalls.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
Web Document Indexing and Retrieval.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2003
Analyzing Dynamic Memory Allocation in Embedded Systems for Multi-Channel Modems.
Proceedings of the International Conference on Communications in Computing, 2003
2002
An External Broker Interface Based on Existing Trading Protocols.
Electron. Commer. Res., 2002
Using Tree Automata and Regular Expressions to Manipulate Hierarchically Structured Data
CoRR, 2002
Current status and future directions of software architectures for telecommunications.
Comput. Commun., 2002
2001
A Topic-Specific Web Robot Model Based on Restless Bandits.
IEEE Internet Comput., 2001
Access control mechanisms in digital library services.
Comput. Stand. Interfaces, 2001
Independent Proprietorship and Competition in Distributed Web Search.
Proceedings of the 7th International Conference on Engineering of Complex Computer Systems (ICECCS 2001), 2001
2000
An inclusive and extensible architecture for electronic brokerage.
Decis. Support Syst., 2000
The impact of forensic computing on telecommunications.
IEEE Commun. Mag., 2000
1999
Building Topic-Specific Collections with Intelligent Agents.
Proceedings of the Intelligence in Services and Networks, 1999
Open Architecture for Distributed Search Systems.
Proceedings of the Intelligence in Services and Networks, 1999
An Inclusive and Extensible Architecture for Electronic Brokerage.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999
Security On ATM Networks.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
1998
A functional model of cooperative system management.
Int. J. Netw. Manag., 1998
Requirements and the concept of cooperative system management.
Int. J. Netw. Manag., 1998
Managing automated electronic document delivery using the ISO interlibrary loan protocol over TCP/IP.
Comput. Stand. Interfaces, 1998
Cracking RC5 with Java applets.
Concurr. Pract. Exp., 1998
Intelligent Agent for Collaborative Diagnosis.
Proceedings of the MEDINFO '98, 1998
1997
Design and Implementation of an SNMPv2 Management System for MS-DOS/Novell NetWare and Unix-TCP/IP.
Int. J. Netw. Manag., 1997
Developing a multistack ISO-SR/Z39.50 application gateway.
Comput. Stand. Interfaces, 1997
Performance analysis of an HDLC-based protocol with data compression.
Comput. Commun., 1997
A technique for multi-network access to multimedia messages.
Comput. Commun., 1997
1996
Network Security Guidelines for Health Care Management.
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996
Issues of Security and Network Security in Health Care Information Systems.
Proceedings of the Towards Security in Medical Telematics - Legal and Technical Aspects, 1996
Information modelling for service provisioning -- the DESSERT experience.
Comput. Stand. Interfaces, 1996
The need for an advanced ATM signalling protocol.
Comput. Stand. Interfaces, 1996
An attack detection system for secure computer systems - design of the ADS.
Proceedings of the Information Systems Security, 1996
1995
Design and Implementation of a Composite Performance Evaluation Model for Heterogeneous Network Management Applications.
Int. J. Netw. Manag., 1995
A critical analysis of the DESSERT information model.
Proceedings of the Integrated Network Management IV, 1995
1994
A Generic Management System for Heterogeneous Networks.
Int. J. Netw. Manag., 1994
A Database Handler (DBH) for broadband network administration.
Comput. Commun., 1994
Security management for OSI networks.
Comput. Commun., 1994
1993
Information services: an overview.
Comput. Commun., 1993
Cooperative decision support for medical diagnosis.
Comput. Commun., 1993
High Level Generic Design of an ISDN Programming Communications Interface (PCI) for EuroISDN.
Proceedings of the Advanced Information Processing Techniques for LAN and MAN Management, 1993
Managing Heterogeneous Networks: Integrator-Based Approach.
Proceedings of the Advanced Information Processing Techniques for LAN and MAN Management, 1993
1991
Focused interfaces for end-user network management.
Comput. Commun., 1991
1990
Introduction to names, addresses and routes in an OSI environment.
Comput. Commun., 1990
Network management issues in support of X.32 services.
Comput. Commun., 1990
The principles of computer networking: D Russell <i>Cambridge University Press, UK (1989), ISBN 0-521-33992-8, 513 pp</i>.
Comput. Commun., 1990
1988
Electronic directory services.
Comput. Commun., 1988
1986
Communication network protocols.
Comput. Commun., 1986
The Design of a Small Packet-Switching Node.
Comput. Networks, 1986
The AMIGO Project: advanced group communication model for computer-based communications environment.
Proceedings of the CSCW '86, 1986
1980
Systems Programming for Data Communications on Minicomputers.
Softw. Pract. Exp., 1980