Martin J. Reed

Orcid: 0000-0002-6708-4478

Affiliations:
  • University of Essex, Colchester, UK


According to our database1, Martin J. Reed authored at least 77 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Federated deep Q-learning networks for service-based anomaly detection and classification in edge-to-cloud ecosystems.
Ann. des Télécommunications, April, 2024

2023
Service-Based, Multi-Provider, Fog Ecosystem With Joint Optimization of Request Mapping and Response Routing.
IEEE Trans. Serv. Comput., 2023

Service-based Federated Deep Reinforcement Learning for Anomaly Detection in Fog Ecosystems.
Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, 2023

Machine learning based noise suppression in narrow-band speech communication systems.
Proceedings of the 24th International Conference on Digital Signal Processing, 2023

CACLE - Automated Mitigation for Misconfiguration Vulnerabilities in Cloud Systems.
Proceedings of the 7th International Conference on Cloud and Big Data Computing, 2023

2022
A Dynamic Service Trading in a DLT-Assisted Industrial IoT Marketplace.
IEEE Trans. Netw. Serv. Manag., December, 2022

Detection, control and mitigation system for secure vehicular communication.
Veh. Commun., 2022

A Physical Layer, Zero-Round-Trip-Time, Multifactor Authentication Protocol.
IEEE Access, 2022

Seamless device handover for pervasive speech communication.
Proceedings of the 5th International Conference on Communications, 2022

2021
BDS+: An Inter-Datacenter Data Replication System With Dynamic Bandwidth Separation.
IEEE/ACM Trans. Netw., 2021

Hybrid Blockchain for IoT - Energy Analysis and Reward Plan.
Sensors, 2021

Securing SDN-Controlled IoT Networks Through Edge Blockchain.
IEEE Internet Things J., 2021

2020
Virtualization of elastic optical networks and regenerators with traffic grooming.
JOCN, 2020

Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities.
IEEE Internet Things J., 2020

Authenticated secret key generation in delay-constrained wireless systems.
EURASIP J. Wirel. Commun. Netw., 2020

Multi-factor Physical Layer Security Authentication in Short Blocklength Communication.
CoRR, 2020

Linear formulation for the design of elastic optical networks with squeezing protection and shared risk link group: Invited Paper.
Proceedings of the 22nd International Conference on Transparent Optical Networks, 2020

Blockchain-Aided Flow Insertion and Verification in Software Defined Networks.
Proceedings of the 2020 Global Internet of Things Summit, 2020

2019
Anchor Free IP Mobility.
IEEE Trans. Mob. Comput., 2019

SLA Formulation for Squeezed Protection in Elastic Optical Networks Considering the Modulation Format.
JOCN, 2019

Service-based Routing at the Edge.
CoRR, 2019

Optimal Resource Allocation in Joint Secret Key Generation and Data Transfer Schemes.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Improve cybersecurity of C-ITS Road Side Infrastructure Installations: the SerIoT - Secure and Safe IoT approach.
Proceedings of the 2019 IEEE International Conference on Connected Vehicles and Expo, 2019

Subcarrier Scheduling for Joint Data Transfer and Key Generation Schemes in Multicarrier Systems.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Policy-based Framework in Fog enabled Internet of Things for Cooperative ITS.
Proceedings of the 2019 Global IoT Summit, 2019

Securing Marine Data Networks in an IoT Environment.
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019

2018
Service-based Fog architecture without DNS redirection.
CoRR, 2018

fCDN: A Flexible and Efficient CDN Infrastructure without DNS Redirection or Content Reflection.
CoRR, 2018

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

BDS: a centralized near-optimal overlay network for inter-datacenter data replication.
Proceedings of the Thirteenth EuroSys Conference, 2018


2017
Information-Centric Multilayer Networking: Improving Performance Through an ICN/WDM Architecture.
IEEE/ACM Trans. Netw., 2017

Mobility-based Proactive Multicast for Seamless Mobility Support in Cellular Network Environments.
Proceedings of the Workshop on Mobile Edge Communications, 2017

Seamless handover in IP over ICN networks: A coding approach.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Yes-no Bloom filter: A way of representing sets with fewer false positives.
CoRR, 2016

Network Controlled Mobility Management using IP over ICN Architecture.
CoRR, 2016

Stateless multicast switching in software defined networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Realizing IP-based Services over an Information-Centric Networking Transport Network.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

Creating a Worldwide Network for the Global Environment for Network Innovations (GENI) and Related Experimental Environments.
Proceedings of the GENI Book, 2016

2015
Sufficient encryption based on entropy coding syntax elements of H.264/SVC.
Multim. Tools Appl., 2015

Scalability of information centric networking using mediated topology management.
J. Netw. Comput. Appl., 2015

IP Over ICN - The Better IP? An Unusual Take on Information-Centric Networking.
CoRR, 2015

Transcoder Migration For Real Time Video Streaming Systems.
CoRR, 2015

Information-centric Multilayer Network: ICN/WDM.
CoRR, 2015

IP over ICN - The better IP?
Proceedings of the 2015 European Conference on Networks and Communications, 2015

Resistance Against Brute-Force Attacks on Stateless Forwarding in Information Centric Networking.
Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems, 2015

2014
Information resilience: source recovery in an information-centric network.
IEEE Netw., 2014

Confidentiality of a selectively encrypted H.264 coded video bit-stream.
J. Vis. Commun. Image Represent., 2014

Uniform DoS traceback.
Comput. Secur., 2014

Optimized hash for network path encoding with minimized false positives.
Comput. Networks, 2014

Quality of service in an information-centric network.
Proceedings of the IEEE Global Communications Conference, 2014

A cache-aware routing scheme for information-centric networks.
Proceedings of the 9th International Symposium on Communication Systems, 2014

Selecting Bloom-filter header lengths for secure information centric networking.
Proceedings of the 9th International Symposium on Communication Systems, 2014

2013
Service-Oriented Control Framework for Next Generation Media Applications Over Future Networks.
JOCN, 2013

Risk assessment and analysis through population-based attack graph modelling.
Proceedings of the 2013 World Congress on Internet Security, 2013

Denial of service detection through TCP congestion window analysis.
Proceedings of the 2013 World Congress on Internet Security, 2013

Security risk analysis as a service.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

The Last Supper Interactive: Stereoscopic and ultra-high resolution 4K/3D HD for immersive real-time virtual narrative in Italian Renaissance Art.
Proceedings of the 1st Digital Heritage International Congress, 2013

Selective record route DoS traceback.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

A Genetic Algorithm Approach for the Most Likely Attack Path Problem.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Design proposal of a photonic multicast Bloom filter node.
Photonic Netw. Commun., 2012

Sufficient Encryption with Codewords and Bin-strings of H.264/SVC.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Efficient selective encryption with H.264/SVC CABAC bin-strings.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Simulation tools enabling research on Information-centric Networks.
Proceedings of IEEE International Conference on Communications, 2012

Traffic engineering for information-centric networks.
Proceedings of IEEE International Conference on Communications, 2012

2009
Decentralized headphone based spatialized audio conferencing for low power devices.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

2008
Pseudo-node Reduction on Multi-access Networks for Algorithmic Simplification.
IEEE Commun. Lett., 2008

Analysis of a distributed processing model for spatialized audio conferences.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Objective listening quality assessment of speech communication systems introducing continuously varying delay (time-warping): A time alignment issue.
Proceedings of the IEEE International Conference on Acoustics, 2008

Fragmentation in a Novel Implementation of Slotted GPON Segmentation and Reassembly.
Proceedings of the AccessNets, Third International Conference on Access Networks, 2008

2007
Guided local search as a network planning algorithm that incorporates uncertain traffic demands.
Comput. Networks, 2007

Spatialized Audio Conferences - IMS Integration and Traffic Modelling.
Proceedings of the SIGMAP 2007, 2007

2005
Improving a Local Search Technique for Network Optimization Using Inexact Forecasts.
Proceedings of the Networking, 2005

2003
MPLS label space for optical packet switched networks.
Proceedings of IEEE International Conference on Communications, 2003

Effects of Routing Algorithms on the Transmission of Layered Streaming Media.
Proceedings of the 4th Mexican International Conference on Computer Science (ENC 2003), 2003

Bandwidth protection in MPLS networks using p-cycle structure.
Proceedings of the Fourth International Workshop on Design of Reliable Communication Networks, 2003


  Loading...