Software Research Institute (Midlands): Recent submissions
Now showing items 81-100 of 137
-
Effectiveness of crypto-transcoding for H.264/AVC and HEVC video bit-streams.
(Springer, 2019-03-22)To avoid delays arising from a need to decrypt a video prior to transcoding and then re-encrypt it afterwards, this paper assesses a selective encryption (SE) content protection scheme. The scheme is suited to both recent ... -
Visual surveillance within the EU general data protection regulation: a technology perspective.
(IEEE, 2019-08-23)From an individual's perspective, technological advancement has merits and demerits. Video captured by surveillance cameras while a person goes about their daily life may improve their personal safety but the images collected ... -
Establishing trust in cloud services via integration of cloud trust protocol with a trust label system.
(Springer, 2017-04)Cloud computing has transformed the computing landscape by enabling flexible compute-resource provisioning. The rapid growth of cloud computing and its large-scale nature provide many advantages to business enterprises. ... -
Situational awareness based risk-adaptable access control in enterprise networks.
(Association for Computing Machinery, 2017-03)As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT), enterprises are moving away from traditional perimeter based security models toward so called “zero trust networking” ... -
Host based intrusion detection system with combined CNN/RNN model.
(Springer, 2018-09)Cyber security has become one of the most challenging aspects of modern world digital technology and it has become imperative to minimize and possibly avoid the impact of cybercrimes. Host based intrusion detection systems ... -
Fuzzy‑logic threat classification for multi‑level selective encryption over real‑time video streams.
(Springer, 2020-04-22)This paper proposes a Fuzzy-logic Threat Classification (FTC) model as the basis of a method to auto-detect three different confidentiality levels for videos streamed from heterogeneous, mobile devices via web edge servers, ... -
NetFlow anomaly detection through parallel cluster density analysis in continuous time-series.
(Springer, 2017-06)The increase in malicious network based attacks has resulted in a growing interest in network anomaly detection. The ability to detect unauthorized or malicious activity on a network is of importance to any organization. ... -
B-ICP: Backpressure Interest Control Protocol for Multipath Communication in NDN.
(IEEE, 2018-01)Named Data Networking (NDN) is a promising communication paradigm to support content distribution for the Future Internet. The objective of this paper is to maximize the consumer downloading rate by retrieving content via ... -
HLAF: heterogeneous-latency adaptive forwarding strategy for peer-assisted video streaming in NDN.
(IEEE, 2017-09)Named Data Networking (NDN) is a promising Future Internet architecture to support efficient content distribution. Specifically, P2P may gain benefits from NDN, as NDN inherently provides a flexible forwarding plane for ... -
An architecture pattern for trusted orchestration in IoT Edge clouds.
(IEEE, 2018-04)Fog and edge architectures provide a link between centralised clouds and the world of IoT and sensors. The architectures consist of devices of different sizes that coordinate the communication with sensors and cloud services, ... -
Dynamic collaboration of centralized & Edge processing for coordinated data management in an IoT paradigm.
(IEEE, 2018-05)Over the past decade, much focus in the area of Technology has deviated towards two relatively new areas; "The Internet of Things" and "Machine Learning". Although completely separate technologies, they have one major ... -
An adaptive policy approach to video quality assurance.
(IEEE, 2018-12)Video in all its forms is probably the most important service carried on networks today and few would argue that video quality assurance is one of the most daunting network management challenges. Quite often, video ... -
A tutorial for olfaction-based multisensorial media application design and evaluation.
(ACM, 2017-09)Recently, multimedia researchers have added several so-called new media to the traditional multimedia components (e.g., olfaction, haptic, and gustation). Evaluating multimedia user-perceived Quality of Experience (QoE) ... -
Bidirectional LSTM autoencoder for sequence based anomaly detection in cyber security.
(United Kingdom Simulation Society, 2019)Cyber-security is concerned with protecting information, a vital asset in today’s world. The volume of data that is generated can be usefully analyzed when cyber-security systems are effectively implemented with the aid ... -
Access control policy enforcement for zero-trust-networking.
(IEEE, 2018-06)The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal ... -
A federated learning system for optimised environmental control of consecutive areas.
(IADIS, 2019)Building management systems have led to artificially controlled environmental conditions. While new infrastructure will lead to a lower carbon footprint and a better working environment, the costs cannot justify the rewards ... -
A quality of experience evaluation system and research challenges for networked virtual reality-based teleoperation applications.
(ACM, 2019-06)Teleoperation applications are designed to assist humans in operating complex mechanical systems. Interfaces to teleoperation systems have always been challenging. Recently the potential of virtual reality (VR) has been ... -
Towards improved trust in threat intelligence sharing using Blockchain and trusted computing.
(IEEE Xplore, 2019-10)Threat intelligence sharing is posited as an important aid to help counter cybersecurity attacks and a number of threat intelligence sharing communities exist. There is a general consensus that many challenges remain to ... -
MCP2P: Layer-dependency-aware live MVC video streaming over peer-to-peer networks.
(Elsevier, 2018-07)Multiview video supports observing a scene from different viewpoints. The Joint Video Team (JVT) developed H.264/MVC to enhance the compression efficiency for multiview video, however, MVC encoded multiview video (MVC ... -
A physiology-based QoE comparison of interactive augmented reality and tablet-based applications.
(IEEE Xplore, 2020-03)The availability of affordable head-mounted display technology has facilitated new, potentially more immersive, interactive multimedia experiences. These technologies were traditionally focused on entertainment; however, ...