2025
Signature-Based Security Analysis and Detection of IoT Threats in Advanced Message Queuing Protocol.
Network, 2025
2023
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain.
Internet Things, December, 2023
IoT-Based Emergency Vehicle Services in Intelligent Transportation System.
Sensors, 2023
Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2022
An Introduction of a Modular Framework for Securing 5G Networks and Beyond.
Network, 2022
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems.
Comput. Intell., 2022
Formalization and evaluation of EAP-AKA' protocol for 5G network access security.
Array, 2022
2021
DCSS Protocol for Data Caching and Sharing Security in a 5G Network.
Network, 2021
Formal verification of secondary authentication protocol for 5G secondary authentication.
Int. J. Secur. Networks, 2021
2020
Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020
Network Service Federated Identity (NS- FId) Protocol for Service Authorization in 5G Network.
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020
The Case for Federated Identity Management in 5G Communications.
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020
2019
Investigating Network Services Abstraction in 5G Enabled Device-to-Device (D2D) Communications.
Proceedings of the 2019 IEEE SmartWorld, 2019
2018
A security framework for node-to-node communications based on the LISP architecture.
Int. J. Electron. Secur. Digit. Forensics, 2018
Formalization and Analysis of a Resource Allocation Security Protocol for Secure Service Migration.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018
ZKPVM: A Zero-knowledge Authentication Protocol for VMs' Live Migration in Mobile Cloud Computing.
Proceedings of the 13th International Conference on Software Technologies, 2018
2017
Mobile femtocell utilisation in LTE vehicular environment: Vehicular penetration loss elimination and performance enhancement.
Veh. Commun., 2017
Mobility Management for Vehicular User Equipment in LTE/Mobile Femtocell Networks.
Int. J. Inf. Syst. Serv. Sect., 2017
2016
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology.
Inf., 2016
Enhancing the SVDD Accuracy in Intrusion Detection Systems by Removing External Voids.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Machine Learning Based Botnet Identification Traffic.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Interference Management for Co-channel Mobile Femtocells Technology in LTE Networks.
Proceedings of the 12th International Conference on Intelligent Environments, 2016
Toward an Efficient Ontology-Based Event Correlation in SIEM.
Proceedings of the 7th International Conference on Ambient Systems, 2016
2015
Challenges and solutions for secure information centric networks: A case study of the NetInf architecture.
J. Netw. Comput. Appl., 2015
Special issue on information-centric network architecture, protocols, algorithms and applications.
J. Netw. Comput. Appl., 2015
An integrated authentication and authorization approach for the network of information architecture.
J. Netw. Comput. Appl., 2015
Investigating a Mobility-Aware QoS Model for Multimedia Streaming Rate Adaptation.
J. Electr. Comput. Eng., 2015
A formal analysis of authentication protocols for mobile devices in next generation networks.
Concurr. Comput. Pract. Exp., 2015
U-Sphere: Strengthening scalable flat-name routing for decentralized networks.
Comput. Networks, 2015
Virtualization and Cyber Security: Arming Future Security Practitioners.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
A Formally Verified Access Control Mechanism for Information Centric Networks.
Proceedings of the SECRYPT 2015, 2015
Will ToR Achieve Its Goals in the "Future Internet"? An Empirical Study of Using ToR with Cloud Computing.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Introducing a Hybrid Infrastructure and Information-Centric Approach for Secure Cloud Computing.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
Concern level assessment: Building domain knowledge into a visual system to support network-security situation awareness.
,
,
,
,
,
,
,
,
,
,
,
Inf. Vis., 2014
Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR.
Int. J. Commun. Syst., 2014
Dynamic Traffic Management for Interactive Cloud Services: Localising Traffic Based on Network Throughput and User Mobility.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014
Exploring a New Security Framework for Cloud Storage Using Capabilities.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014
Investigating the Impact of Live Migration on the Network Infrastructure in Enterprise Environments.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Dynamic Edge-Caching for Mobile Users: Minimising Inter-AS traffic by Moving Cloud Services and VMs.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
A Secure Framework for Communications in Heterogeneous Networks.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Secure Live Virtual Machines Migration: Issues and Solutions.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
2013
On the Investigation of Cloud-Based Mobile Media Environments With Service-Populating and QoS-Aware Mechanisms.
IEEE Trans. Multim., 2013
Securing Address Registration in Location/ID Split Protocol Using ID-Based Cryptography.
Proceedings of the Wired/Wireless Internet Communication - 11th International Conference, 2013
A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR.
Proceedings of the Network and System Security - 7th International Conference, 2013
A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture.
Proceedings of the Network and System Security - 7th International Conference, 2013
From fixed to mobile femtocells in LTE systems: Issues and challenges.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
Supporting communications in the IoTs using the location/ID split protocol: A security analysis.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
Security analysis of the constrained application protocol in the Internet of Things.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
2012
Exploiting Location and Contextual Information to Develop a Comprehensive Framework for Proactive Handover in Heterogeneous Environments.
J. Comput. Networks Commun., 2012
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach.
Int. J. Commun. Syst., 2012
A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR.
EURASIP J. Wirel. Commun. Netw., 2012
A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks
CoRR, 2012
A survey of potential architectures for communication in heterogeneous networks.
Proceedings of the 2012 Wireless Telecommunications Symposium, 2012
A Formally Verified Device Authentication Protocol Using Casper/FDR.
Proceedings of the 11th IEEE International Conference on Trust, 2012
M-Sieve: A visualisation tool for supporting network security analysts: VAST 2012 Mini Challenge 1 award: "Subject matter expert's award".
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012
2011
Exploring Multi-homing Issues in Heterogeneous Environments.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
Security Models for Heterogeneous Networking.
Proceedings of the SECRYPT 2010, 2010
Providing Security in 4G Systems: Unveiling the Challenges.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010
2009
Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks.
Proceedings of the NBiS 2009, 2009