KINDI Center for Computing Research: Recent submissions
Now showing items 141-160 of 178
-
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
( Academic Press Inc. , 2017 , Article)Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ... -
PriviPK: Certificate-less and secure email communication
( Elsevier Ltd , 2017 , Article)We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ... -
Context-aware RAON middleware for opportunistic network
( Elsevier B.V. , 2017 , Article)Application development and deployment on Mobile Ad Hoc Networks (MANET) is a major challenge in the widespread use of MANET. The increasing D2D communication in 5G networks has renewed interest in an effective middleware ... -
Data confidentiality in cloud-based pervasive system
( Association for Computing Machinery , 2017 , Conference Paper)Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ... -
Role updating in information systems using model checking
( Springer London , 2017 , Article)The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ... -
Enabling broadcast communications in presence of jamming via probabilistic pairing
( Elsevier B.V. , 2017 , Article)This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ... -
Survey of Information Visualization Techniques for Enhancing Visual Analysis
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Visualization of data helps to transform a problem into a perceptual task that is easier to comprehend. It helps users to perceive patterns from large amount of data in order to make informed decisions. When visualization ... -
An Interactive Visualization Web Solution for Electricity Consumption in Qatar
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ... -
Prediction of infarction volume and infarction growth rate in acute ischemic stroke
( Nature Publishing Group , 2017 , Article)The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ... -
Empirical performance evaluation of QUIC protocol for Tor anonymity network
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ... -
CloudSafe: A tool for an automated security analysis for cloud computing
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ... -
Systematic identification of threats in the cloud: A Survey
( Elsevier B.V. , 2019 , Article)When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ... -
The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report
( Churchill Livingstone , 2019 , Article)Background The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions. Objective To discover the ... -
SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution
( SAGE Publications Ltd , 2019 , Article)Spatial data indexing methods are of extreme importance as they massively build up as a result of the explosive growth in capturing data with spatial features. No matter how much the data size is, eventually it will reside ... -
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ... -
Multi-Objective Security Hardening Optimisation for Dynamic Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ... -
Multi-moth flame optimization for solving the link prediction problem in complex networks
( Springer Verlag , 2019 , Article)Providing a solution for the link prediction problem attracts several computer science fields and becomes a popular challenge in researches. This challenge is presented by introducing several approaches keen to provide the ... -
Secure smart contract-enabled control of battery energy storage systems against cyber-attacks
( Elsevier B.V. , 2019 , Article)Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and ... -
Stateless Security Risk Assessment for Dynamic Networks
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Emerging networking technologies, such as cloud and Software Defined Networking, provide flexibility, elasticity and functionalities to change the network configurations over time. However, changes also impose unpredictable ... -
SpiralSRA: A threat-specific security risk assessment framework for the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ...