Items where Author is "Marchang, Jims"

[Atom feed] Atom [RSS2 feed] RSS
Group by: Item Type | Full Text | No Grouping
Number of items: 30.

file
POPOOLA, Olusogo, RODRIGUES, Marcos, MARCHANG, Jims, SHENFIELD, Alex, IKPEHAI, Augustine and POPOOLA, Jumoke (2024). An Optimized Hybrid Encryption Framework for Smart Home Healthcare: Ensuring Data Confidentiality and Security. Internet of Things; Engineering Cyber Physical Human Systems, 27: 101314. [Article]

file
GHITA, Bogdan, KUZMINYKH, Ievgeniia, USAMA, Abubakar, BAKHSHI, Taimur and MARCHANG, Jims (2024). Deepfake Image Detection using Vision Transformer Models. In: 2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 332-335. [Book Section]

file
MARCHANG, Jims, MCDONALD, Jade, KEISHING, Solan, ZOUGHALIAN, Kavyan, MAWANDA, Raymond, DELHON-BUGARD, Corentin, BOUILLET, Nicolas and SANDERS, Ben (2024). Secure-by-Design Real-Time Internet of Medical Things Architecture: e-Health Population Monitoring (RTPM). Telecom, 5 (3), 609-631. [Article]

filefile
POPOOLA, Olusogo, RODRIGUES, Marcos, MARCHANG, Jims, SHENFIELD, Alex, IKPEHAI, Augustine and POPOOLA, Jumoke (2024). A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: problems, challenges and solutions. Blockchain: Research and Applications, 5 (2): 100178. [Article]

file
ZOUGHALIAN, Kavyan, MARCHANG, Jims and DI NUOVO, Alessandro (2024). Access Control Architecture of Assistive Robots for Physical Activity Wellbeing Data. In: 2024 IEEE International Conference on Industrial Technology (ICIT). IEEE. [Book Section]

file
MAWANDA, Raymond, KEISHING, Solan, WANG, Jing and MARCHANG, Jims (2024). Secure by Design Smart Authentication for Care Robots to Support the Elderly. In: 2024 IEEE International Conference on Industrial Technology (ICIT). IEEE. [Book Section]

file
REJI, Alan, PRANGGONO, Bernardi, MARCHANG, Jims and SHENFIELD, Alex (2023). Anomaly detection for the internet-of-medical-things. In: 2023 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 1944-1949. [Book Section]

ZOUGHALIAN, Kavyan, MARCHANG, Jims and DI NUOVO, Alessandro (2023). Access control mechanism framework for assistive robots in healthcare. In: TAROS’23 & Joint Robotics CDTs Conference, Department of Engineering Cambridge University, 13-15 Sep 2023. 76-79. [Conference or Workshop Item]

file
MARCHANG, Jims, DI NUOVO, Alessandro, ELLIOTT, Chris, MEESE, Helen, VINANZI, Samuele and ZECCA, Massimiliano (2023). Security and privacy in assistive robotics: cybersecurity challenges for healthcare. Other. EPSRC UK-RAS Network. [Monograph]

file
ZOUGHALIAN, Kavyan, MARCHANG, Jims and GHITA, Bogdan (2022). A blockchain secured pharmaceutical distribution system to fight counterfeiting. International Journal of Environmental Research and Public Health, 19 (7). [Article]

file
MARCHANG, Jims and NUOVO, Alessandro Di (2022). Assistive multimodal robotic system (AMRSys): security and privacy issues, challenges, and possible solutions. Applied Sciences, 12 (4). [Article]

file
ENAMAMU, Timibloudi, OTEBOLAKU, Abayomi, MARCHANG, Jims and DANY, Joy (2020). Continuous m-Health Data Authentication Using Wavelet Decomposition for Feature Extraction. Sensors, 20 (19): 5690. [Article]

file
OTEBOLAKU, Abayomi, ENAMAMU, Timibloudi, ALFOUDI, Ali, IKPEHAI, Augustine, MARCHANG, Jims and LEE, Gyu Myoung (2020). Deep Sensing: Inertial and Ambient Sensing for Activity Context Recognition using Deep Convolutional Neural Networks. Sensors, 20 (13), e3803. [Article]

file
INGHAM, Max, MARCHANG, Jims and BHOWMIK, Deepayan (2020). IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN. IET Information Security. [Article]

file
MARCHANG, Jims, WANG, Jing, OTEBOLAKU, Abayomi, ENAMAMU, Timibloudi, PORTER, Daniel and SANDERS, Benjamin (2019). Multidimensional: User with File Content and Server’s status based Authentication for Secure File Operations in Cloud. Current Trends in Computer Sciences & Applications (CTCSA), 1 (5), 108-118. [Article]

file
MARCHANG, Jims and DOUGLAS, Roderick (2019). Selecting tools for penetration testing. In: Penetration Testing A Guide for Business and IT Management. BCS, The Chartered Institute for IT. [Book Section]

file
MARCHANG, Jims and DOUGLAS, Roderick (2019). Scoping a penetration test. In: Penetration Testing A Guide for Business and IT Management. BCS, The Chartered Institute for IT. [Book Section]

file
MARCHANG, Jims, IBBOTSON, Gregg and WHEWAY, Paul (2019). Will Blockchain technology become a reality in sensor networks? In: 2019 Wireless Days (WD). IEEE. [Book Section]

file
MARCHANG, Jims, BEAVERS, Jake and FAULKS, Mike (2019). Hacking NHS Pacemakers: A Feasibility Study. In: 12th International conference on Global Security, Safety & Sustainability, London, UK, 16-18 Jan 2019. IEEE. (Unpublished) [Conference or Workshop Item]

file
MARCHANG, Jims, SANDERS, Benjamin and JOY, Dany (2018). Adaptive V2V routing with RSUs and gateway support to enhance network performance in VANET. In: CHOWDHURY, K. R., DI FELICE, M., MATTA, A. and SHENG, B., (eds.) Wired/Wireless Internet Communications: 16th IFIP WG 6.2 international conference 2018 proceedings. Lecture Notes in Computer Science: Computer Communication Networks and Telecommunications (10866). Springer, 293-310. [Book Section]

file
MARCHANG, Jims, DOUGLAS, Roderick, GHITA, Bogdan, LANCASTER, David and SANDERS, Benjamin (2018). Dynamic neighbour aware power-controlled MAC for multi-hop ad hoc networks. Ad hoc Networks, 75-76, 119-134. [Article]

MARCHANG, Jims (2017). Optimising Application Performance in Ad Hoc Networks. Germany, Scholars' Press. [Authored Book]

filefile
MARCHANG, Jims, GHITA, Bogdan and LANCASTER, David (2017). Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks. Ad Hoc Networks, 63, 62-78. [Article]

filefile
SANDERS, Benjamin and MARCHANG, Jims (2016). A novel taxonomy of opportunities and risks in massively multiplayer online role playing games. In: Proceedings of the International ACM conference on management of Digital Ecosystems. ACM Digital Library, 90-98. [Book Section]

file
MARCHANG, Jims, GHITA, Bogdan and LANCASTER, David (2016). Location based transmission using a neighbour aware-cross layer MAC for ad hoc networks. In: MAMATAS, Lefteris, MATTA, Ibrahim, PAPADIMITRIOU, Panagiotis and YEVGENI, Koucheryavy, (eds.) WWIC 2016: Wired/Wireless Internet Communications. Lecture Notes in Computer Science (9674). Cham, Springer, 15-27. [Book Section]

file
MARCHANG, Jims, GHITA, Bogdan and LANCASTER, David (2015). Dynamic queue utilization based MAC for multi-hop ad hoc networks. Infocommunications Journal, 7 (3), 25-32. [Article]

file
MARCHANG, Jims, GHITA, B. and LANCASTER, D. (2015). Queue utilization with hop based enhanced arbitrary inter frame spacing MAC for saturated ad HOC networks. In: 2015 14th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET). IEEE, 1-8. [Book Section]

file
MARCHANG, Jims, GHITA, B. and LANCASTER, D. (2015). Dynamic Queue Utilization Based MAC for multi-hop Ad Hoc networks. In: Proceedings of European Wireless 2015; 21th European Wireless Conference. IEEE, 25-32. [Book Section]

file
MARCHANG, Jims, GHITA, B. and LANCASTER, D. (2014). Hop-Based dynamic fair scheduler for wireless Ad-Hoc networks. In: 2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 1-6. [Book Section]

file
MARCHANG, Jims and NANDI, Sukumar (2011). Need for cross layer in wireless multi hop ad-hoc networks. In: Advanced Computing Applications, Databases and Networks. Alpha Science International Limited. [Book Section]

This list was generated on Sat Dec 21 15:38:32 2024 UTC.