Dr Bogdan Ghita
Profiles

Dr Bogdan Ghita

Associate Professor

School of Engineering, Computing and Mathematics (Faculty of Science and Engineering)

Dr Bogdan Ghita can be contacted through arrangement with our Press Office, to speak to the media on these areas of expertise.
  • Internet of things
  • Computer networks
  • Network performance
  • Network security
  • Wireless and mobile networks
Biography

Biography

Associate Dean International, Faculty of Science and Engineering

Leader of network research within the Centre for Security, Communications, and Network research

Qualifications

1999-2004 PhD, "Performance Characterisation of IP Networks"
2001-2002 Postgraduate Certificate of Learning and Teaching in Higher Education (LTHE)
1993-1998 Diploma Engineer

Professional membership

2005-2012   Member of the British Computer Society (MBCS)
2012-       Fellow of the British Computer Society (FBCS)
2010-2019   Member of the Institute of Electrical and Electronic Engineers (MIEEE)
2019-       Senior Member of the Institute of Electrical and Electronic Engineers (MIEEE)

Roles on external bodies

Technical programme committee member for 100+ international conference events, conference chair for the International Networking Conference (2014-) and referee for IEEE Communications Letters, Computer Communications (Elsevier), Computer Journal (Elsevier), Computers and Security (Elsevier), Future Generation Computer Systems (Elsevier), and International Journal of Computer Science and Security (CSC Journals).

External panel member for programme approval of twelve programmes, past/current external examiner for five programmes. 
Examination of research degrees appointments – eight PhD external examiner, one MPhil external examiner, nine PhD internal examiner


Teaching

Teaching

Teaching interests

Undergraduate teaching

  • COMP1002 - Cyber Security and Networks
  • COMP3011 - Ethical Hacking
  • CNET350SL - Network Monitoring

Postgraduate teaching

  • COMP5003 - Ethical Hacking

Staff serving as external examiners

2014 - Security Audit Compliance for Cloud Computing, Plymouth University (internal examiner)
2014 - The Holistic Optimisation of Packet Filters Across a Domain, Glyndwr University
2013 - Improving network performance through dynamic IP filtering techniques, Glyndwr University
2012 - Behaviour Profiling for Mobile Devices, Plymouth University (internal examiner)
2012 - Incident Prioritisation for Intrusion Response Systems, Plymouth University (internal examiner)
2012 - Multi-Dimensional-Personalization in online and offline contexts, Plymouth University (internal examiner)
2011 - Video Quality Prediction for Video over Wireless Access Networks (UMTS and WLAN), Plymouth University (internal examiner)
2011 - Improving Intrusion Prevention, Detection, and Response, Plymouth University (internal examiner)
2009 - Enhancement of Perceived Quality of Service for Voice over Internet Protocol Systems, PhD thesis, University of Plymouth (internal examiner), UK
2008 - An Adaptive Mobility and Quality Service Enabler for Streaming Applications over IP Multimedia Subsystem, PhD thesis, University of Glamorgan, UK
2007 - Estimating Long-Range Dependent Self-Similar Network Traffic: Performance Evaluation and Control, PhD thesis, North East Wales Institute, UK
2007 - A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks, PhD thesis, University of Plymouth (internal examiner), UK

Research

Research

Research interests

Performance measurement and evaluation for IP networks.
Performance modelling for TCP-based applications.
Decentralised services orchestration, testing, and trust.
Network security.

Research groups

Research degrees awarded to supervised students

  • Dr Denis Hock, Detecting Energy Theft and Anomalous Power Usage in Smart Meter Data (2020)
  • Dr Samah Alshathri, On Energy Optimization Scheduling for Cloud Computing Data Centers (2020, DoS)
  • Dr Yaseen Saleem Yaseen, Optimisation of Power Consumption for Communities Using P2P Management (2020, DoS)
  • Dr Hussein Oudah, Traffic characterisation and anomaly detection in computer networks (2020, DoS)
  • Dr Faisal Shaman, User Traffic Profiling in Computer Networks (2020, DoS)
  • Dr Muhammad Dawood, Automotive Cognitive Access (2020)
  • Dr Leith Abed, Designing and implementing access control scheme in cloud computing (2019)
  • Dr Hind Al-Obaidi, Transparent Authentication Utilising Gait Recognition (2019)
  • Dr Sameer Al-Obaidi, Reducing power consumption using OFDM variants and other DSP data transmission techniques (2018)
  • Dr Markus Glaab, Integration of Vehicles into a Future Web of Services (2018)
  • Dr Michael Steinheimer, Automated solution for provisioning and optimisation of user composed services in Smart Grids and Smart Homes (2018)
  • Dr Thomas Mansfield, Data Communications for Navigation (2017, DoS)
  • Dr Hussain Alshamrani, Detecting IP prefix hijack events using BGP activity and AS connectivity analysis (2017, DoS)
  • Dr Taimur Bakhshi, User-Centric Traffic engineering in Software Defined Networks (2017, DoS)
  • Dr Patrick Wacht, Framework for Automated Functional Tests within Value-Added Service Environments (2016)
  • Dr Jims Marchang, Optimizing application performance with QoS support of Real-Time data for Ad-Hoc Networks (2016, DoS)
  • Dr Sandra Frei, Optimisation of Traffic Steering for Heterogeneous Mobile Networks (2015)
  • Dr Thomas Eichelmann, Automated continuous solution for the provisioning of value-added services in Next Generation Networks (2015)
  • Dr Armin Lehmann, Service composition based on SIP peer-to-peer networks (2014)Dr Frank Weber, Quality of Service optimisation framework for Next Generation Networks (2012)
  • Dr Chris Tucker, Performance Metrics for Network Intrusion Systems (2013)
  • Dr Mohamed Arabi, Improving Fairness and Utilisation in Ad Hoc Networks (2012)
  • Dr Mark Culverhouse, User-Centric Quality of Service Provisioning in IP Networks (2012)
  • Dr Andreas Diehl, Software Architecture for Data Storage Concepts within Future Mobile Telecommunication Systems (2008)
  • Dr Aruna Thakur, Feed forward controller for layered video coding (2007)

Grants & contracts

- FORESIGHT - Advanced cyber-security simulation platform for preparedness training in Aviation, Naval and Power-grid environments. 2019. €290,000
- CYBERTRUST - Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things. 2018. €398,395
- Space Data Routers. 2010. €201,982
- Superfast Cornwall Network Performance Assessment. Cornwall Development Company, 2013. £48,048
- Western Mortgage Limited consultancy project on IP Infrastructure Monitoring. 2006: £2500
- DTI Funded project into Behavioural Monitoring of Network Communications. 2007: £40,000
- France Telecom project on QoS Provisioning for IP Networks. 2007: £60,000

Publications

Publications

Key publications

Key publications are highlighted

Journals
Articles
Bakhshi T, Ghita B & Kuzminykh I (2024) 'A Review of IoT Firmware Vulnerabilities and Auditing Techniques' Sensors 24, (2) 708-708 , DOI
Santos N, Ghita B & Masala G (2023) 'Medical Systems Data Security and Biometric Authentication in Public Cloud Servers' IEEE Transactions on Emerging Topics in Computing 1-12 , DOI Open access
TajDini M, Sokolov V, Kuzminykh I & Ghita B (2023) 'Brainwave-based authentication using features fusion' Computers & Security 129, 103198-103198 , DOI Open access
Zoughalian K, Marchang J & Ghita B (2022) 'A Blockchain Secured Pharmaceutical Distribution System to Fight Counterfeiting' International Journal of Environmental Research and Public Health 19, (7) , DOI Open access
Dobric D, Pech A, Ghita B & Wennekers T (2022) 'On the Importance of the Newborn Stage When Learning Patterns with the Spatial Pooler' SN Computer Science 3, (2) , DOI Open access
Aldosari SS, Ghita B & Marocco D (2022) 'A Gesture-Based Educational System that Integrates Simulation and Molecular Visualization to Teach Chemistry' International Journal of Emerging Technologies in Learning 17, (04) 194-211 , DOI Open access
Bakhshi T & Ghita B (2021) 'Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning' Security and Communication Networks 2021, 1-16 , DOI Open access
Kuzminykh I, Ghita B, Sokolov V & Bakhshi T (2021) 'Information Security Risk Assessment' Encyclopedia 1, (3) 602-617 , DOI Open access
TajDini M, Sokolov V, Kuzminykh I, Shiaeles S & Ghita B (2020) 'Wireless Sensors for Brain Activity—A Survey' Electronics 9, (12) 2092-2092 , DOI Open access
Kuzminykh I, Ghita B & Silonosov A (2020) 'Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions' CoRR Author Site Open access
Kuzminykh I, Ghita B & Such JM (2020) 'The Challenges with Internet of Things for Business' Author Site Publisher Site Open access
Ali M, Shiaeles S, Bendiab G & Ghita B (2020) 'MALGRA: Machine Learning and N-Gram Malware Feature Extraction and Detection System' Electronics 9, (11) 1777-1777 , DOI Open access
Dalezios N, Shiaeles S, Kolokotronis N & Ghita B (2020) 'Digital forensics cloud log unification: Implementing CADF in Apache CloudStack' Journal of Information Security and Applications 54, 102555-102555 , DOI Open access
Dobric D, Pech A, Ghita B & Wennekers T (2020) 'Scaling the HTM Spatial Pooler' International Journal of Artificial Intelligence and Applications 11, (4) 83-100 , DOI Open access
Hock D, Kappes M & Ghita B (2020) 'Entropy-Based Metrics for Occupancy Detection Using Energy Demand' Entropy 22, (7) 731-731 , DOI Open access
Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S (2020) 'Blockchain and Trust for Secure, End-User-Based and Decentralized IoT Service Provision' IEEE Access 8, 119961-119979 , DOI Open access
Hock D, Kappes M & Ghita B (2019) 'Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric' Sustainable Energy, Grids and Networks 21, 100290-100290 , DOI Open access
Oudah H, Ghita B, Bakhshi T, Alruban A & Walker DJ (2019) 'Using Burstiness for Network Applications Classification' Journal of Computer Networks and Communications 2019, 1-10 , DOI Open access
Bendiab K, Shiaeles S, Boucherkha S & Ghita B (2019) 'FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management' Computers and Security 86, 270-290 , DOI Open access
Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S (2019) 'Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services' Internet of Things 7, 100058-100058 , DOI Open access
Steinheimer M, Trick U & Ghita B (2019) 'Formal Application Description of Autonomous and Cooperative M2M Application Services' Journal of Communications 33-39 , DOI Open access
Steinheimer M, Trick U & Ghita BV (2019) 'Formal Application Description of Autonomous and Cooperative M2M Application Services' J. Commun. 14, 33-39 , DOI Open access
Santos N, Lentini S, Grosso E, Ghita B & Masala G (2019) 'Performance analysis of data fragmentation techniques on a cloud server' International Journal of Grid and Utility Computing 10, (4) 392-401 , DOI Open access
Alshathri S, Ghita B & Clarke N (2018) 'Sharing with live migration energy optimization scheduler for cloud computing data centers' Future Internet 10, (9) , DOI Open access
Marchang J, Douglas R, Ghita B, Lancaster D & Sanders B (2018) 'Dynamic Neighbour Aware Power-controlled MAC for Multi-hop Ad-hoc networks' Ad Hoc Networks 75-76, 119-134 , DOI Open access
Oudah H, Ghita B & Bakhshi T (2018) 'A Novel Feature Set for Application Identification' International Journal for Information Security Research 8, (1) 764-773 , DOI Open access
Marchang J, Ghita B & Lancaster D (2017) 'Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks' Ad Hoc Networks 63, 62-78 , DOI Open access
Mansfield TO, Ghita BV & Ambroze MA (2017) 'Signals of opportunity geolocation methods for urban and indoor environments' Annals of Telecommunications 72, (3-4) 145-155 , DOI Open access
Steinheimer M, Trick U, Fuhrmann W, Ghita B & Frick G (2017) 'M2M Application Service Provision: An Autonomous and Decentralised Approach' Journal of Communications , DOI Open access
Bakhshi T & Ghita B (2016) 'On Internet Traffic Classification: A Two-Phased Machine Learning Approach' Journal of Computer Networks and Communications 2016, 0-0 , DOI Open access
Glaab M, Fuhrmann W, Wietzke J & Ghita B (2015) 'Toward enhanced data exchange capabilities for the oneM2M service platform' IEEE Communications Magazine 53, (12) 42-50 , DOI Open access
Tucker CJ, Furnell SM, Ghita BV & Brooke PJ (2007) 'A new taxonomy for comparing intrusion detection systems' INTERNET RESEARCH 17, (1) 88-98 , DOI
Furnell S & Ghita B (2006) 'Usability pitfalls in Wireless LAN security' Network Security 2006, 4 - 8-4 - 8 Publisher Site , DOI
Ghita BV, Furnell SM, Lines BM & Ifeachor EC (2003) 'Endpoint study of Internet paths and Web pages transfers' Campus-Wide Information Systems 20, 90-97
Ngini CU, Furnell SM & Ghita BV (2002) 'Assessing the global accessibility of the Internet' INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY 12, (4) 329-338 , DOI
Talal E, Ghita BV & Wang X 'DSP-based bottleneck bandwidth estimation' Simulation Modelling Practice and Theory 17, (3) 538-547 , DOI
Chapters
Kuzminykh I, Mathur S & Ghita B (2023) 'Performance Analysis of Free Text Keystroke Authentication Using XGBoost' Advances in Computer Science for Engineering and Education VI Springer Nature Switzerland 429-439 , DOI
Kuzminykh I, Ghita B & Such JM (2022) 'The Challenges with Internet of Things Security for Business' Lecture Notes in Computer Science Springer International Publishing 46-58 Publisher Site , DOI Open access
Tung SP, Wong KY, Kuzminykh I, Bakhshi T & Ghita B (2022) 'Using a Machine Learning Model for Malicious URL Type Detection' Lecture Notes in Computer Science Springer International Publishing 493-505 , DOI Open access
Bakhshi T & Ghita B (2021) 'Perspectives on Auditing and Regulatory Compliance in Blockchain Transactions' Trust Models for Next-Generation Blockchain Ecosystems Springer International Publishing 37-65 Publisher Site , DOI Open access
Kelli V, Sfakianakis EG, Ghita B & Sarigiannidis P (2021) 'IoT Reference Architectures' Internet of Things, Threats, Landscape, and Countermeasures CRC Press 47-96 , DOI
Clarke NL, Ghita BV & Furnell SM (2021) 'Delay-tolerant networks (DTNs) for deep-space communications' Advances in Delay-Tolerant Networks (DTNs) Elsevier 47-58 , DOI
Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S (2020) 'Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service Platforms' Advanced Information Networking and Applications: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020) Springer International Publishing 547-558 , DOI Open access
Shire R, Shiaeles S, Bendiab K, Ghita B & Kolokotronis N (2019) 'Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation' Open access
Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S (2018) 'Blockchain-Based Trust Communities for Decentralized M2M Application Services' Advances on P2P, Parallel, Grid, Cloud and Internet Computing Springer International Publishing 62-73 , DOI Open access
Khambari N & Ghita B (2018) 'QoE Enhancements for Video Traffic in Wireless Networks through Selective Packet Drops' Lecture Notes in Electrical Engineering Springer Singapore 295-304 , DOI
Clarke NL, Ghita BV & Furnell SM (2015) '3 Delay-tolerant networks (DTNs) for deep-space communications' Advances in Delay-Tolerant Networks (DTNs) Elsevier 49-60 , DOI
Clarke N, Ghita B & Furnell S (2014) 'Delay-tolerant networks (DTNs) for deep-space communications' in Rodrigues JJPC Advances in Delay-tolerant Networks (DTNs) Architecture and Enhanced Performance Elsevier
Conference Papers
Bakhshi T, Ghita B & Kuzminykh I (2023) 'SAFE: a Standardized Automotive Forensic Engine for Law Enforcement Agencies' 2023 15th International Conference on Innovations in Information Technology (IIT) 1-/-1/20231-/-1/2023IEEE , DOI
Xi T, Kuzminykh I, Ghita B & Bakhshi T (2023) 'Evaluating Learning Algorithms for Keystroke Based User Authentication' 2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom) 7-/-0/20237-/-0/2023IEEE , DOI
Redkins B, Kuzminykh I & Ghita B (2023) 'Work-in-Progress: Security of Public-Key Schemes in the Quantum Computing Era – A Literature Review' 2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom) 7-/-0/20237-/-0/2023IEEE , DOI
Alshumrani A, Clarke N & Ghita B (2023) 'A Unified Forensics Analysis Approach to Digital Investigation' Academic Conferences International Ltd 466-475 , DOI Open access
Mateichyk V, Gritsuk I, Smieszek M, Ghita B, Chernenko V & Polishchuk O (2023) 'Information system for monitoring of a ship power plant and prediction of technical condition' Elsevier BV 1179-1186 , DOI
Seng A, Trick U, Lehmann A & Ghita B (2022) 'A Concept Approach for Network Slicing in Wireless Mesh Disaster Networks' 46-51 Open access
Frick G, Trick U, Lehmann A & Ghita B (2022) 'Resilient Placement of VNFs and Distributed MANO Components in a WMN-based NFV Infrastructure' 52-57 Open access
Kuzminykh I, Ghita B, Xiao H, Yevdokymenko M & Yeremenko O (2021) 'Investigating Threshold Concept and Troublesome Knowledge in Cyber Security' 2021 1st Conference on Online Teaching for Mobile Education (OT4ME) 1-/-1/20211-/-1/2021IEEE , DOI Open access
Kuzminykh I, Ghita B & Xiao H (2021) 'The Relationship Between Student Engagement and Academic Performance in Online Education' ICSET 2021: 2021 5th International Conference on E-Society, E-Education and E-Technology ACM , DOI Open access
Santos N, Younis W, Ghita B & Masala G (2021) 'Enhancing Medical Data Security on Public Cloud' 2021 IEEE International Conference on Cyber Security and Resilience (CSR) 7-/-0/20217-/-0/2021IEEE , DOI
Dobric D, Pech A, Ghita B & Wennekers T (2021) 'Improved HTM Spatial Pooler with Homeostatic Plasticity Control' 10th International Conference on Pattern Recognition Applications and Methods 2-/-0/20212-/-0/2021SCITEPRESS - Science and Technology Publications , DOI Open access
Brown R, Bendiab G, Shiaeles S & Ghita B (2021) 'A Novel Multimodal Biometric Authentication System Using Machine Learning and Blockchain' Springer International Publishing 31-46 , DOI Open access
Kuzminykh I, Ghita B & Silonosov A (2021) 'On Keystroke Pattern Variability in Virtual Desktop Infrastructure' Publishing House Helvetica (Publications) 238-248 , DOI Open access
Seng A, Trick U, Lehmann A & Ghita B (2021) 'Path determination for network slicing in wireless mesh disaster networks' 111-116 Open access
Kuzminykh I, Ghita B & Shiaeles S (2020) 'Comparative Analysis of Cryptographic Key Management Systems' Springer International Publishing 80-94 , DOI Open access
Dobric D, Pech A, Ghita B & Wennekers T (2020) 'On the Relationship Between Input Sparsity and Noise Robustness in Hierarchical Temporal Memory Spatial Pooler' ESSE 2020: 2020 European Symposium on Software Engineering ACM , DOI Open access
Dobric D, Pech A, Ghita B & Wennekers T (2020) 'The Parallel HTM Spatial Pooler with Actor Model' 8th International Conference of Security, Privacy and Trust Management (SPTM 2020) AIRCC Publishing Corporation , DOI Open access
Koutsouvelis V, Shiaeles S, Ghita B & Bendiab G (2020) 'Detection of Insider Threats using Artificial Intelligence and Visualisation' 2020 6th IEEE International Conference on Network Softwarization (NetSoft) 6-/-0/20207-/-0/2020IEEE , DOI Open access
Reich O, Hubner E, Ghita B, Wagner M & Schafer J (2020) 'Performance Evaluation of Bluetooth in a Wireless Body Area Network for Practical Applications' 2020 IEEE 11th Sensor Array and Multichannel Signal Processing Workshop (SAM) 6-/-0/20206-/-0/2020IEEE , DOI Open access
Reich O, Hubner E, Ghita B, Wagner M & Schafer J (2020) 'Bluetooth Performance Evaluation based on Notify for Real-time Body-Area Sensor Networks' 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0&IoT) 6-/-0/20206-/-0/2020IEEE , DOI Open access
Reich O, Hubner E, Ghita B, Wagner MF & Schafer J (2020) 'A Survey Investigating the Combination and Number of IMUs on the Human Body Used for Detecting Activities and Human Tracking' 2020 World Conference on Computing and Communication Technologies (WCCCT) 5-/-0/20205-/-0/2020IEEE , DOI Open access
Tchinda AP, Frick G, Trick U, Lehmann A & Ghita B (2020) 'High Throughput WMN for the Communication in Disaster Scenario' 2020 World Conference on Computing and Communication Technologies (WCCCT) 5-/-0/20205-/-0/2020IEEE , DOI Open access
Frick G, Tchinda AP, Trick U, Lehmann A & Ghita B (2020) 'Possible Challenges and Appropriate Measures for a Resilient WMN-Based Disaster Network' 2020 World Conference on Computing and Communication Technologies (WCCCT) 5-/-0/20205-/-0/2020IEEE , DOI Open access
Kuzminykh I, Shevchuk D, Shiaeles S & Ghita B (2020) 'Audio Interval Retrieval Using Convolutional Neural Networks' Springer International Publishing 229-240 , DOI Open access
Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S (2020) 'Distributed ledger technology for trust management optimisation in M2M' 93-98 Open access
Frick G, Tchinda AP, Shala B, Trick U, Lehmann A & Ghita B (2019) 'Requirements for a Distributed NFV Orchestration in a WMN-Based Disaster Network' 2019 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) 2-/-1/20192-/-1/2019IEEE , DOI Open access
Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S (2019) 'Trusted, Decentralized and Blockchain-Based M2M Application Service Provision' in Barolli L; Hellinckx P; Enokido T Cham Springer International Publishing 210-221 Open access
Al-Issa AE, Bentaleb A, Barakabitze AA, Zinner T & Ghita B (2019) 'Bandwidth Prediction Schemes for Defining Bitrate Levels in SDN-enabled Adaptive Streaming' 2019 15th International Conference on Network and Service Management (CNSM) 0-/-1/20190-/-1/2019IEEE , DOI Open access
Santos NL, Ghita B & Masala GL (2019) 'Enhancing Data Security in Cloud using Random Pattern Fragmentation and a Distributed NoSQL Database' 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC) 0-/-1/20190-/-1/2019IEEE , DOI Open access
Frick G, Tchinda AP, Trick U, Lehmann A & Ghita B (2019) 'NFV Resource Advertisement and Discovery Protocol for a Distributed NFV Orchestration in a WMN-based Disaster Network' 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 9-/-0/20199-/-0/2019IEEE , DOI Open access
Al-Saadi M, Ghita BV, Shiaeles S & Sarigiannidis P (2019) 'A novel approach for performance-based clustering and management of network traffic flows' 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC) 6-/-0/20196-/-0/2019IEEE , DOI Open access
Constantinides C, Shiaeles S, Ghita B & Kolokotronis N (2019) 'A Novel Online Incremental Learning Intrusion Prevention System' 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 6-/-0/20196-/-0/2019IEEE , DOI Open access
Shaman F, Ghita B, Clarke N & Alruban A (2019) 'User Profiling Based on Application-Level Using Network Metadata' 2019 7th International Symposium on Digital Forensics and Security (ISDFS) 6-/-0/20196-/-0/2019IEEE , DOI Open access
Siracusano M, Shiaeles S & Ghita B (2019) 'Detection of LDDoS Attacks Based on TCP Connection Parameters' 2018 Global Information Infrastructure and Networking Symposium (GIIS) 0-/-1/20180-/-1/2018IEEE , DOI Open access
Al-Issa AE, Bentaleb A, Zinner T, Mkwawa I-H & Ghita B (2019) 'BBGDASH: A Max-Min Bounded Bitrate Guidance for SDN Enabled Adaptive Video Streaming' 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) 2-/-0/20192-/-0/2019IEEE , DOI Open access
Yaseen Y & Ghita B (2019) 'Willingness Impact to the PAR Optimisation of R-users Community using EMS' 5th International Conference on Power and Energy Systems Engineering (CPESE 2018) Elsevier 315-320 , DOI Open access
Oudah H, Ghita B & Bakhshi T (2019) 'A Novel Features Set for Internet Traffic Classification using Burstiness' 5th International Conference on Information Systems Security and Privacy 2-/-0/20192-/-0/2019SCITEPRESS - Science and Technology Publications , DOI Open access
Panagiotou A, Ghita B, Shiaeles S & Bendiab K (2019) 'FaceWallGraph: Using Machine Learning for Profiling User Behaviour from Facebook Wall' Springer International Publishing 125-134 , DOI
Shire R, Shiaeles S, Bendiab K, Ghita B & Kolokotronis N (2019) 'Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation' Springer International Publishing 65-76 , DOI
Abed L, Clarke N, Ghita B & Alruban A (2019) 'Securing Cloud Storage by Transparent Biometric Cryptography' Springer International Publishing 97-108 , DOI
Ali M, Shiaeles S, Papadaki M & Ghita BV (2018) 'Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis' 2018 Global Information Infrastructure and Networking Symposium (GIIS) 0-/-1/20180-/-1/2018IEEE , DOI Open access
Shala B, Trick U, Lehmann A, Shala B, Ghita B & Shiaeles S (2018) 'Trust-Based Composition of M2M Application Services' 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) 7-/-0/20187-/-0/2018IEEE , DOI Open access
Frick G, Tchinda AP, Trick U, Lehmann A, Frick G, Tchinda AP & Ghita B (2018) 'Distributed NFV Orchestration in a WMN-Based Disaster Network' 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) 7-/-0/20187-/-0/2018IEEE , DOI Open access
Ghita B & Bakhshi T (2018) 'Internet of Profiling - Traffic, Users and Applications' 2018 12th International Conference on Communications (COMM) 6-/-0/20186-/-0/2018IEEE , DOI
Ghita B & Bakhshi T (2018) 'Internet of Profiling - Traffic, Users and Applications' 2018 12th International Conference on Communications (COMM) 6-/-0/20186-/-0/2018IEEE , DOI
Hock D, Kappes M & Ghita B (2018) 'Non-Intrusive Appliance Load Monitoring using Genetic Algorithms' IOP Publishing 012003-012003 , DOI Open access
Al-Obaidi H, Li F, Clarke N, Ghita B & Ketab S (2018) 'A multi-algorithmic approach for gait recognition' 20-28
Ali M, Shiaeles S, Papadaki M & Ghita BV (2018) 'Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis' IEEE 1-5 Publisher Site
Siracusano M, Shiaeles S & Ghita BV (2018) 'Detection of LDDoS Attacks Based on TCP Connection Parameters' IEEE 1-6 Publisher Site
Bakhshi T & Ghita B (2017) 'Towards dynamic network policy composition and conflict resolution in software defined networking' 2017 International Conference on Information and Communication Technologies (ICICT) 2-/-1/20172-/-1/2017IEEE , DOI
Tchinda AP, Frick G, Trick U, Lehmann A, Tchinda AP & Ghita B (2017) 'Performance analysis of WMN routing protocols for disaster networks' 2017 IEEE Symposium on Communications and Vehicular Technology (SCVT) 1-/-1/20171-/-1/2017IEEE , DOI Open access
Khambari N, Ghita B & Sun L (2017) 'QoE-driven video enhancements in wireless networks through predictive packet drops' 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 0-/-1/20170-/-1/2017IEEE , DOI
Dawood M, Fuhrmann W & Ghita BV (2017) 'Assay of IP mobility management in SDN based mobile network architecture' 2017 Internet Technologies and Applications (ITA) 9-/-0/20179-/-0/2017IEEE , DOI Open access
Shala B, Wacht P, Trick U, Lehmann A, Shala B, Ghita B & Shiaeles S (2017) 'Automated functional testing of P2P-based M2M applications' 2017 Internet Technologies and Applications (ITA) 9-/-0/20179-/-0/2017IEEE , DOI
Steinheimer M, Trick U, Steinheimer M, Ghita B & Fuhrmann W (2017) 'Autonomous decentralised M2M application service provision' 2017 Internet Technologies and Applications (ITA) 9-/-0/20179-/-0/2017IEEE , DOI
Shala B, Wacht P, Trick U, Lehmann A, Shala B, Ghita B & Shiaeles S (2017) 'Ensuring trustworthiness for P2P-based M2M applications' 2017 Internet Technologies and Applications (ITA) 9-/-0/20179-/-0/2017IEEE , DOI
Yaseen Y & Ghita B (2017) 'Peak-to-average reduction by community-based DSM' 2017 IEEE International Conference on Smart Energy Grid Engineering (SEGE) 8-/-0/20178-/-0/2017IEEE , DOI
Shala B, Wacht P, Trick U, Lehmann A, Ghita B & Shiaeles S (2017) 'Trust Integration for Security Optimisation in P2P-Based M2M Applications' 2017 IEEE Trustcom/BigDataSE/ICESS 8-/-0/20178-/-0/2017IEEE , DOI Open access
Steinheimer M, Trick U, Steinheimer M, Ghita B & Fuhrmann W (2017) 'Decentralised system architecture for autonomous and cooperative M2M application service provision' 2017 IEEE International Conference on Smart Grid and Smart Cities (ICSGSC) 7-/-0/20177-/-0/2017IEEE , DOI
Shala B, Wacht P, Trick U, Lehmann A, Shala B, Ghita B & Shiaeles S (2017) 'Framework for automated functional testing of P2P-based M2M applications' 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) 7-/-0/20177-/-0/2017IEEE , DOI
Vijay Y & Ghita BV (2017) 'Evaluating cloud computing scheduling algorithms under different environment and scenarios' 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 7-/-0/20177-/-0/2017IEEE , DOI
Al-Obaidi S, Ambroze M, Outram N & Ghita B (2017) 'Bit precision and Cyclic prefix effect on OFDM Power Consumption Estimation' ICCBN '17: 5th International Conference on Communications and Broadband Networking ACM , DOI Open access
Bakhshi T & Ghita B (2016) 'User-Centric Network Provisioning in Software Defined Data Center Environment' 2016 IEEE 41st Conference on Local Computer Networks (LCN) 1-/-1/20161-/-1/2016IEEE , DOI
Bakhshi T & Ghita B (2016) 'OpenFlow-enabled user traffic profiling in campus software defined networks' 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 0-/-1/20160-/-1/2016IEEE , DOI
Alshamrani H & Ghita B (2016) 'IP prefix hijack detection using BGP connectivity monitoring' 2016 IEEE 17th International Conference on High Performance Switching and Routing (HPSR) 6-/-0/20166-/-0/2016IEEE , DOI Open access
Alshamrani H & Ghita B (2016) 'IP Prefix Hijack Detection Using BGP Attack Signatures and Connectivity Tracking' 2016 International Conference on Software Networking (ICSN) 5-/-0/20165-/-0/2016IEEE , DOI
Bakhshi T & Ghita B (2016) 'User-centric traffic optimization in residential software defined networks' 2016 23rd International Conference on Telecommunications (ICT) 5-/-0/20165-/-0/2016IEEE , DOI
Bakhshi T & Ghita B (2016) 'Traffic Profiling: Evaluating Stability in Multi-device User Environments' 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA) 3-/-0/20163-/-0/2016IEEE , DOI
Hock D, Kappes M & Ghita B (2016) 'A Pre-clustering Method To Improve Anomaly Detection' International Conference on Security and Cryptography 7-/-0/20167-/-0/2016SCITEPRESS - Science and Technology Publications , DOI
Alshamrani H & Ghita B (2016) 'Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases' International Conference on Data Communication Networking 7-/-0/20167-/-0/2016SCITEPRESS - Science and Technology Publications , DOI
Al-Obaidi S, Ambroze M, Ghita B, Giakoumidis E & Tsokanos A (2016) 'A review on power consumption reduction techniques on OFDM' 3-8
Dawood M, Fuhrmann W & Ghita BV (2016) 'Assay of multipath TCP for session continuity in distributed mobility management' 141-146
Wacht P, Trick U, Fuhrmann W & Ghita B (2016) 'Efficient test case derivation from statecharts-based models' 127-132
(2016) 'Eleventh International Network Conference, INC 2016, Frankfurt, Germany, July 19-21, 2016. Proceedings' in Alekseev S; Dowland P; Ghita BV; Schneider O Plymouth University
Marchang J, Ghita B & Lancaster D (2016) 'Location Based Transmission Using a Neighbour Aware-Cross Layer MAC for Ad Hoc Networks' Springer International Publishing 15-27 , DOI
Frank H, Fuhrmann W & Ghita B (2016) 'Mobile Edge Computing: Requirements for powerful mobile near real-time applications' 63-66
Lehmann A, Tchinda AP & Trick U (2016) 'Optimization of Wireless Disaster Network through Network Virtualization' in Alekseev S; Dowland P; Ghita BV; Schneider O Plymouth University 165-170 Publisher Site
Steinheimer M, Trick U, Fuhrmann W & Ghita B (2016) 'P2P-based M2M community applications' 115-120
Ghita B & Trick U (2016) 'Preface'
Khambari N, Ghita B, Lancaster D & Sun L (2016) 'QoE enhancements in IEEE 802.11e EDCA for video transmission through selective queueing' 85-90
Alshamrani H, Ghita B & Lancaster D (2015) 'Detecting IP prefix hijacking using data reduction-based and Binary Search Algorithm' 2015 Internet Technologies and Applications (ITA) 9-/-0/20159-/-0/2015IEEE , DOI
Glaab M, Fuhrmann W, Wietzke J & Ghita B (2015) 'Enhanced data exchange capabilities for M2M applications' 2015 Internet Technologies and Applications (ITA) 9-/-0/20159-/-0/2015IEEE , DOI
Steinheimer M, Trick U, Ghita B & Fuhrmann W (2015) 'P2P based service provisioning in M2M networks' 2015 Internet Technologies and Applications (ITA) 9-/-0/20159-/-0/2015IEEE , DOI
Fuhrmann W, Dawood M & Ghita BV (2015) 'Prospects for TV White Space access in the Evolved Packet Core environment' 2015 Internet Technologies and Applications (ITA) 9-/-0/20159-/-0/2015IEEE , DOI
Bakhshi T & Ghita B (2015) 'User traffic profiling' 2015 Internet Technologies and Applications (ITA) 9-/-0/20159-/-0/2015IEEE , DOI
Marchang J, Ghita B & Lancaster D (2015) 'Dynamic Queue Utilization Based MAC for multi-hop Ad Hoc networks' 25-32
Marchang J, Ghita B & Lancaster D (2015) 'Queue utilization with hop based enhanced arbitrary inter frame spacing MAC for saturated ad HOC networks' 2015 14th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET) 6-/-0/20156-/-0/2015IEEE , DOI
Ghita B, Ambroze M & O. Mansfield T (2015) 'Improving Signal of Opportunity Localisation Estimates in Multipath Environments' Fourth International Conference on Telecommunications and Remote Sensing 9-/-0/20159-/-0/2015SCITEPRESS - Science and and Technology Publications , DOI
Marchang J, Ghita B & Lancaster D (2015) 'Dynamic Queue Utilization Based MAC for Multi-Hop Ad Hoc Networks' 25-32
Bakhshi T & Ghita B (2015) 'User Traffic Profiling In a Software Defined Networking Context' 91-97
Glaab M, Fuhrmann W, Wietzke J & Ghita BV (2014) 'A M2M-based automotive service delivery platform for distributed vehicular applications' 35-45
Mansfield TO, Ghita BV & Ambroze MA (2014) 'Achieving improved network subscriber geo-location' 107-116
(2014) 'Tenth International Network Conference, INC 2014, Plymouth, UK, July 8-10, 2014. Proceedings' in Dowland P; Furnell S; Ghita BV Plymouth University
Dawood M, Fuhrmann W & Ghita BV (2014) 'Assay of white space technology standards for vehicular cognitive access' 23-33
Marchang J, Ghita B & Lancaster D (2013) 'Hop-Based dynamic fair scheduler for wireless Ad-Hoc networks' 2013 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS) 2-/-1/20132-/-1/2013IEEE , DOI
Wacht P, Trick U, Fuhrmann W & Ghita B (2013) 'A new service description for communication services as basis for automated functional testing' 2013 Second International Conference on Future Generation Communication Technologies (FGCT) 1-/-1/20131-/-1/2013IEEE , DOI
Steinheimer M, Trick U, Fuhrmann W, Steinheimer M & Ghita B (2013) 'P2p-based community concept for M2M applications' 2013 Second International Conference on Future Generation Communication Technology (FGCT) 1-/-1/20131-/-1/2013IEEE , DOI
Frei S, Fuhrmann W & Ghita B (2013) 'Generic Real-Time Traffic Distribution Framework: Black Rider' 2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013) 7-/-0/20138-/-0/2013IEEE , DOI
Frei S, Fuhrmann WF & Ghita BV (2013) 'Framework for Generic Context- and Policy-Based Traffic Distribution in Heterogeneous Wireless Networks: Black Rider' in Barolli L; Xhafa F; Takizawa M; Enokido T; Hsu H-H IEEE Computer Society 534-541 Publisher Site , DOI
Steinheimer M, Trick U, Ruhrig P, Fuhrmann W & Ghita B (2013) 'LOAD REDUCTION IN DISTRIBUTION NETWORKS THROUGH P2P NETWORKED ENERGY-COMMUNITY' 90-97
Goetzelmann M (2012) 'Space Data Routers for the Exploitation of Space Data' SpaceOps 2012 American Institute of Aeronautics and Astronautics , DOI
Clarke N, Katos V, Menesidou SA, Ghita B & Furnell S (2012) 'A novel security architecture for a space-data DTN' Springer Berlin/Heidelberg 342-349
Frei S, Fuhrmann WF, Rinkel A & Ghita BV (2012) 'Prospects for WLAN in the Evolved Packet Core Environment' in Levi A; Badra M; Cesana M; Ghassemian M; Gürbüz Ö; Jabeur N; Klonowski M; Maña A; Sargento S; Zeadally S IEEE 1-5 Publisher Site
Lehmann A, Trick U, Fuhrmann W & Ghita B (2011) 'A new service description language as basis for service composition in SIP-based peer-to-peer infrastructures' 1 -8-1 -8 , DOI
Arabi M & Ghita B (2011) 'Transmission rate control through MAC layer acknowledgements feedback' 1 -7-1 -7 , DOI
Culverhouse ME, Ghita BV & Reynolds P (2011) 'User-centric quality of service provisioning' 35 -41-35 -41 , DOI
Wacht P, Eichelmann T, Lehmann A, Fuhrmann W, Trick U & Ghita BV (2011) 'A New Approach to Model a Formalised Description of a Communication Service for the Purpose of Functional Testing' 262-269-262-269
Eichelmann T, Fuhrmann W, Trick U & Ghita BV (2011) 'Discussion on a Framework and its Service Structures for generating JSLEE based Value-Added Services' 169-177-169-177
Frei S, Fuhrmann W, Rinkel A & Ghita BV (2011) 'EPS QoS Enforcement on Layer 3 with Diffserv' 199-204-199-204
Arabi M & Ghita BV (2011) 'Improving Fairness in Ad Hoc Networks Based on Neighbour’s Transmission Rate' 292-299-292-299
Frei S, Fuhrmann W, Rinkel A & Ghita BV (2011) 'Improvements to Inter System Handover in the EPC Environment' 1 -5-1 -5 , DOI
Frei S, Fuhrmann W, Rinkel A & Ghita BV (2011) 'Improvements to Inter System Handover in the EPC Environment' New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on 1-5
Ulliac A & Ghita BV (2010) 'Non-intrusive Identification of Peer-to-Peer Traffic' Communication Theory, Reliability, and Quality of Service (CTRQ), 2010 Third International Conference on 116-121
Culverhouse ME, Ghita BV, Reynolds P & Wang X (2010) 'Optimising Quality of Service through the controlled aggregation of traffic' Internet Technology and Secured Transactions (ICITST), 2010 International Conference for 1-7
Arabi M, Ghita B & Wang X (2010) 'Improving Fairness in Ad Hoc Networks through Collision Rate Control' 51-59
Weber F, Fuhrmann W, Trick U, Bleimann U & Ghita B (2009) 'AI-based QoS profiling for NGN user terminals' 539-548
Frei S, Fuhrmann W, Rinkel A & Ghita B (2009) 'Reference architecture for end-to-end QoS in heterogeneous wireless network environments' 630-639
Dini P, Meadows C, Roing J, Falk R, Goudalo W, Harkins D, Jiang D, Chen EY, Ghita B & Gritzalis S (2009) 'Preface: SECURWARE 2009'
Cunningham S, Grout V & Ghita BV (2009) 'A Sample of Consumer Wi-Fi Use & Security in the UK' 386-+ , DOI
(2009) 'Preface' 2009 Third International Conference on Emerging Security Information, Systems and Technologies 6-/-0/20096-/-0/2009IEEE , DOI
(2008) 'Preface' 2008 Second International Conference on Emerging Security Information, Systems and Technologies 8-/-0/20088-/-0/2008IEEE , DOI
Ghita B & Furnell S (2008) 'Neural network estimation of TCP performance' 53-58 , DOI
Weber F, Fuhrmann W, Trick U, Bleimann U & Ghita B (2008) 'A framework for improved QoS evaluation and control in SIP-based NGN' 27-37
Culverhouse ME & Ghita BV (2007) 'Quality of service monitoring and accounting' 292-300
Edwan TA, Ghita BV & Wang X (2007) 'Bottleneck Bandwidth Estimation Using Frequency Analysis' IEEE 1204-1209 Publisher Site
Tarr AJ & Ghita BV (2007) 'Preemptive retransmission - Improving the performance of short-lived TCP connections' Proceedings of the Sixth Iasted International Conference on Communication Systems and Networks 63-68
Ghita B, Furnell S, Lines B & Ifeachor E (2005) 'TCP performance estimation using neural networks modelling'
Ghita BV, Furnell S, Lines BM & Ifeachor EC (2002) 'Endpoint study of Internet paths and web pages transfers' in Furnell S; Dowland PS University of Plymouth 261-270
Ghita BV, Furnell SM, Lines BM, Le-Foll D & Ifeachor EC (2001) 'Network quality of service monitoring for IP telephony' 26-34 , DOI
Ghita BV 'A Bootstrap Mechanism for NGN QoS Profiling' International Networking Conference (INC) Heidelberg, Germany 7-/-0/20107-/-0/2010
Weber F, Fuhrmann W, Trick U & Ghita BV 'Enhanced Concept of the TeamCom SCE for Automated Generated Services Based on JSLEE' International Networking Conference (INC) Heidelberg, Germany 7-/-0/20107-/-0/201075-84
Frei S, Fuhrmann W, Rinkel A & Ghita BV 'Signalling Effort Evaluation of Mobility Protocols within Evolved Packet Core Network' International Networking Conference (INC) Heidelberg 7-/-0/20107-/-0/201099-108
Tucker C, Furnell SM, Ghita BV & Brooke PJ 'A New Taxonomy for Intrusion Detection' Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK 7-/-0/20067-/-0/2006253-260
Diehl A, Soler J, Fuhrmann W, Bleimann U, Reynolds PL & Ghita BV 'New Architecture for a Centralized Next Generation Profile Register in Future Mobile Telecommunication Networks' Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK 7-/-0/20067-/-0/2006307-314
Salama E, Ghita BV & Furnell SM 'HTTP-Aware Anonymisation of Packet Traces' Proceedings of the First International Conference on Internet Technologies and Applications, Wrexham, UK 9-/-0/20059-/-0/2005421-431
Patents
Method for Evaluating the Bandwidth of a Digital Link. WO2004086678
Personal

Personal

Reports & invited lectures

"Watching the internet - from numbers to images", Keynote Lecture, Third International Conference on Usability Engineering, University of Oviedo, Spain, 20 May 2008.
"Evolution and trends in network monitoring", Invited Speech, JDSU, Plymouth, UK, 11 October 2006
"Network Monitoring - from ping to present", Keynote Speech, 11th Conference on Human Computer Interaction, Oviedo, Spain, 22-24 March 2006

Conferences organised

INC2016 - the 11th International Network Conference : INC 2016, Frankfurt, Germany, 19-21 July 2016
INC2020 - the 12th International Network Conference 2020 (INC2020), Rhodes, Greece, 19-21 September 2020