Select Publications
Conference Papers
2001, 'Implementing Bandwidth Broker using COPS-PR in Java', in IEEE Local Computer Network Conference (LCN2001), Tampa, Florida, USA, presented at IEEE Local Computer Network Conference (LCN2001), Tampa, Florida, USA, 14 November 2001 - 15 November 2001
,2001, 'Current Directions in Active Programmable Networks', in 9th IEEE International Conference on Networks, Bangkok, Thailand, presented at 9th IEEE International Conference on Networks, Bangkok, Thailand, 10 October 2001 - 12 October 2001
,2001, 'Internet Charging - Behind the Time', in 9th IEEE International Conference on Networks, Bangkok, Thailand, presented at 9th IEEE International Conference on Networks, Bangkok, Thailand, 10 October 2001 - 12 October 2001
,2001, 'Experimenting with flow and service seperation using open MPLS test bed', in Quality of Service over Next-Generation Data Networks (part of ITCom, Denver, Colorado, presented at Quality of Service over Next-Generation Data Networks (part of ITCom, Denver, Colorado, 19 August 2001
,2001, 'An Analysis of Web Server Performance With an Accelerator', in IEEE International Conference on Telecommunications ICT2001, IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001
,2001, 'Cell-Hopping: A New Model for Wireless Communications', in IEEE International Conference on Telecommunications ICT2001, IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001
,2001, 'GPS Based Infrastructure for Internet Performance Measurement', in IEEE International Conference on Telecommunications ICT2001, IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001
,1996, 'Continuous media playback and jitter control', in International Conference on Multimedia Computing and Systems -Proceedings, pp. 245 - 251
,1994, 'Capacity planning of LAN using network management', in Conference on Local Computer Networks, pp. 425 - 430
,'Robust extended Kalman filter applied to location tracking and trajectory prediction for PCS networks', in Proceedings of the 2004 IEEE International Conference on Control Applications, 2004., IEEE, presented at Proceedings of the 2004 IEEE International Conference on Control Applications, http://dx.doi.org/10.1109/cca.2004.1387188
,Conference Posters
2015, 'Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things', Seoul Korea, presented at ACM Conference on Embedded Networked Sensor Systems, Seoul Korea, 01 November 2015 - 04 November 2015, http://dx.doi.org/10.1145/2809695.2817896
,2015, 'Poster abstract: Fair scheduling for energy harvesting WSN in smart city', pp. 419 - 420, http://dx.doi.org/10.1145/2809695.2817893
,2015, 'Poster: Were you in the cafe yesterday? Location proof generation & verification for mobile users', pp. 429 - 430, http://dx.doi.org/10.1145/2809695.2817898
,(ed.), 2013, 'Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency', Cambridge, Massachusetts, USA, presented at The IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2013), Cambridge, Massachusetts, USA, 21 May 2013 - 23 May 2013
,(eds.), 2012, 'Reliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna', Clearwater, Florida, pp. 156 - 159, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6423595
,Conference Presentations
2013, 'Joint Channel and Delay Aware User Scheduling for Multiuser MIMO system over LTE-A Network', presented at IEEE International Symposium on Quality of Service(IWQoS) 2013, Montreal, canada, 03 June 2013 - 04 June 2013
,Conference Abstracts
2016, 'Demo abstract: Location fingerprint evidence and authorisation using WiFi channel characteristics', in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, http://dx.doi.org/10.1109/PERCOMW.2016.7457077
,2015, 'Securing the Timestamping of Sensor Data from Wearable Healthcare Devices', ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Sydney, Australia, pp. 310 - 310, presented at BodyNets '15 Proceedings of the 10th EAI International Conference on Body Area Networks, Sydney, Australia, 28 September 2015 - 30 September 2015, http://dx.doi.org/10.4108/eai.28-9-2015.2261552
,2014, 'An SDN-based framework for detection of illegal rebroadcasting of channels in P2PTV', in VideoNEXT 2014 - Proceedings of the 2014 Workshop on Design, Quality and Deployment of Adaptive Video Streaming, pp. 47 - 49, http://dx.doi.org/10.1145/2676652.2683465
,2014, 'MalwareMonitor: An SDN-based framework for securing large networks', in CoNEXT Student Workshop 2014 - Proceedings of the 2014 Workshop, pp. 40 - 42, http://dx.doi.org/10.1145/2680821.2680829
,(ed.), 2004, 'The REKF Localization System: Node Localization Using Mobile Robots', in International Conference on Embedded Systems, Baltimore, Maryland, USA, pp. 321 - 321, presented at International Conference on Embedded Systems, Baltimore, Maryland, USA, 03 November 2004 - 05 November 2004
,Reports
2023, Vulnerability Disclosure Consultation Paper
,Working Papers
2020, De-anonymisation attacks on Tor: A Survey [v3], http://dx.doi.org10.48550/arXiv.2009.13018
,2020, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, Institute of Electrical and Electronics Engineers (IEEE), http://dx.doi.org10.1109/ICBC48266.2020.9169429
,2020, Anonymity with Tor: A Survey on Tor Attacks [v1, v2], http://dx.doi.org, https://dblp.org/rec/journals/corr/abs-2009-13018.html
,Preprints
2022, PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool, , http://dx.doi.org/10.1109/TIFS.2022.3164212.
,2022, FLAP: Federated Learning with Attack and Privacy Awareness, , http://dx.doi.org/10.36227/techrxiv.19766023
,2022, Fake News Quick Detection on Dynamic Heterogeneous Information Networks, , http://dx.doi.org/10.48550/arxiv.2205.07039
,2021, HaS-Net: A Heal and Select Mechanism to Securely Train DNNs against Backdoor Attacks, , http://dx.doi.org/10.36227/techrxiv.16571184
,2021, Man versus Machine: AutoML and Human Experts' Role in Phishing Detection, , http://dx.doi.org/10.48550/arxiv.2108.12193
,2021, DIMY: Enabling Privacy-preserving Contact Tracing, , http://dx.doi.org/10.48550/arxiv.2103.05873
,2021, All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks, , http://dx.doi.org/10.48550/arxiv.2102.01944
,2020, HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios, , http://dx.doi.org/10.48550/arxiv.2012.07474
,2020, De-anonymisation attacks on Tor: A Survey, , http://dx.doi.org/10.48550/arxiv.2009.13018
,2020, Nephalai: Towards LPWAN C-RAN with Physical Layer Compression, , http://dx.doi.org/10.48550/arxiv.2008.02599
,2020, A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases, , http://dx.doi.org/10.48550/arxiv.2007.15906
,2020, PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites, , http://dx.doi.org/10.48550/arxiv.2007.11955
,2020, B-FERL: Blockchain based Framework for Securing Smart Vehicles, , http://dx.doi.org/10.48550/arxiv.2007.10528
,2020, A Survey of COVID-19 Contact Tracing Apps, , http://dx.doi.org/10.48550/arxiv.2006.10306
,2020, Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud, , http://dx.doi.org/10.48550/arxiv.2005.07987
,2019, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, , http://dx.doi.org/10.48550/arxiv.1912.11044
,2019, Measurement, Characterization and Modeling of LoRa Technology in Multi-floor Buildings, , http://dx.doi.org/10.48550/arxiv.1909.03900
,2019, Risk Analysis Study of Fully Autonomous Vehicle, , http://dx.doi.org/10.48550/arxiv.1905.10910
,2018, Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems, , http://dx.doi.org/10.48550/arxiv.1809.06988
,2018, Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations, , http://dx.doi.org/10.48550/arxiv.1807.02593
,2018, B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication, , http://arxiv.org/abs/1806.06169v1
,2018, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions, , http://dx.doi.org/10.48550/arxiv.1804.00262
,2018, A Blockchain Based Liability Attribution Framework for Autonomous Vehicles, , http://dx.doi.org/10.48550/arxiv.1802.05050
,2017, WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks, , http://dx.doi.org/10.48550/arxiv.1708.05477
,2016, Towards Policy Enforcement Point as a Service (PEPS), , http://dx.doi.org/10.48550/arxiv.1610.02526
,