2020 applicants
People

Dr Martin Reed

Senior Lecturer
School of Computer Science and Electronic Engineering (CSEE)
Dr Martin Reed
  • Email

  • Location

    1NW.4.18, Colchester Campus

  • Academic support hours

    During Autumn Term 2020 my Academic Support Hour will be 10-11 am on Tuesday. The zoom link for this is available from my profile on my CE321/CE324/CE823 Course Moodle page. Please wait in the waiting room until I can admit you.

Profile

Biography

Martin is a Senior Lecturer in the School of Computer Science and Electronic Engineering. His research interests include computer networking and network security, in particular recent interests are security for IoT, SDN security, information/content centric networking, software defined networking and the transmission of multimedia over networks. He has been involved in a number of EU, EPSRC and Industrially funded projects (see below).

Qualifications

  • PhD University of Essex, (1997)

  • BEng (1st Class) with Industrial Year at BBC Research Department University of Surrey, (1989)

Research and professional activities

Research interests

Information Centric Networking

Open to supervise

Network security

Open to supervise

quality of Service mechanisms for Internet protocol networks

Open to supervise

management and control of optical and core networks

Open to supervise

multimedia Internet applications

Open to supervise

Teaching and supervision

Current teaching responsibilities

  • Computer and Data Networks (CE231)

  • Network Engineering (CE321)

  • Network Security (CE324)

  • Computer Security (CE708)

  • Network Security (CE823)

Previous supervision

Karis Louise Bailey
Karis Louise Bailey
Thesis title: Measuring Interactivity in Audio Teleconferencing Using Conversation Analysis
Degree subject: Computer Science
Degree type: Doctor of Philosophy
Awarded date: 31/7/2020
Mohammed Qasim Shawkat Al-Khalidi
Mohammed Qasim Shawkat Al-Khalidi
Thesis title: Anchor Free Mobility
Degree subject: Electronic Systems Engineering
Degree type: Doctor of Philosophy
Awarded date: 9/9/2019
Hildebrand Jacobus Weisenborn
Hildebrand Jacobus Weisenborn
Thesis title: Video Popularity Metrics and Bubble Cache Eviction Algorithm Analysis
Degree subject: Computer Science
Degree type: Doctor of Philosophy
Awarded date: 11/7/2018
Paul Farrow
Paul Farrow
Thesis title: Optimising Networks for Ultra-High Definition Video
Degree subject: Computer Science
Degree type: Doctor of Philosophy
Awarded date: 29/4/2016
Bander Ahmad Alzahrani
Bander Ahmad Alzahrani
Thesis title: Securing the Forwarding Plane of Mediated Information Centric Networks
Degree subject: Computer Science
Degree type: Doctor of Philosophy
Awarded date: 12/5/2015
Mohammed Alhomidi
Mohammed Alhomidi
Thesis title: Managing Information Security Risk Through Attack Graph Analysis
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 5/11/2014
Rajasekhar Sadda
Rajasekhar Sadda
Thesis title: Securing Networks From Layer 2 Attacks
Degree subject: Computing and Electronic Systems
Degree type: Master of Science (by Dissertation)
Awarded date: 5/11/2014
Mohammed NMF Alenezi
Mohammed NMF Alenezi
Thesis title: Detecting, Tracing and Mitigating Against Denial of Service in Ip Networks
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 29/8/2014
Karis Louise Bailey
Karis Louise Bailey
Thesis title: Comparing Narrowband and Wideband Speech Communication
Degree subject: Computer Science
Degree type: Master of Science (by Dissertation)
Awarded date: 23/12/2013
Okung-Dike Ntofon
Okung-Dike Ntofon
Thesis title: Controlling Beyond High Definition Media in Future Networks
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 4/9/2013
Laura Carrea
Laura Carrea
Thesis title: Optimised Probabilistic Data Structures for Forwarding in Information Centric Networking
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 26/7/2013
Ian Mothersole
Ian Mothersole
Thesis title: Optimising Network Layer Firewalls Using Rule Manipulation
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 5/7/2013

Publications

Journal articles (31)

Carrea, L., Vernitski, A. and Reed, MJ., Yes-no Bloom filter: A way of representing sets with fewer false positives

Shen, M., Xu, K., Du, X., Reed, MJ., Bhuiyan, MZA., Zhang, L. and Mijumbi, R., (2020). Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities. IEEE Internet of Things Journal. 7 (5), 3897-3900

Mitev, M., Chorti, A., Reed, M. and Musavian, L., (2020). Authenticated secret key generation in delay-constrained wireless systems. EURASIP Journal on Wireless Communications and Networking. 2020 (1), 122-122

Hu, J., Reed, MJ., Al-Naday, MF. and Thomos, N., (2020). Blockchain-Aided Flow Insertion and Verification in Software Defined Networks.. CoRR. abs/2006.14513

Hu, J., Reed, M., Thomos, N., Al-Naday, MF. and Yang, K., (2020). Securing SDN controlled IoT Networks Through Edge-Blockchain. IEEE Internet of Things Journal, 1-1

Assis, KDR., Almeida, RC., Waldman, H., Santos, AF., Alencar, MS., Reed, MJ., Hammad, A. and Simeonidou, D., (2019). SLA Formulation for Squeezed Protection in Elastic Optical Networks Considering the Modulation Format. Journal of Optical Communications and Networking. 11 (5), 202-212

Al-Khalidi, MQ., Thomos, N., Reed, M., Al-Naday, M. and Trossen, D., (2019). Anchor Free IP Mobility. IEEE Transactions on Mobile Computing. 18 (1), 56-69

AL-Naday, MF., Thomos, N. and Reed, MJ., (2017). Information-Centric Multilayer Networking: Improving Performance Through an ICN/WDM Architecture. IEEE/ACM Transactions on Networking. 25 (1), 83-97

Reed, MJ., Al-Naday, M., Thomos, N., Trossen, D., Petropoulos, G. and Spirou, S., (2016). Stateless multicast switching in software defined networks. 2016 IEEE International Conference on Communications, ICC 2016. abs/1511.06069

Al-Khalidi, M., Thomos, N., Reed, MJ., Al-Naday, MF. and Trossen, D., (2016). Network Controlled Mobility Management using IP over ICN Architecture.. CoRR. abs/1610.09011

Asghar, MN., Ghanbari, M., Fleury, M. and Reed, MJ., (2015). Sufficient encryption based on entropy coding syntax elements of H.264/SVC. Multimedia Tools and Applications. 74 (23), 10215-10241

Al-Naday, MF., Thomos, N. and Reed, MJ., (2015). Information-centric Multilayer Network: ICN/WDM.. CoRR. abs/1511.04698

Alzahrani, BA., Reed, MJ., Riihijärvi, J. and Vassilakis, VG., (2015). Scalability of information centric networking using mediated topology management. Journal of Network and Computer Applications. 50, 126-133

Asghar, MN., Ghanbari, M., Fleury, M. and Reed, MJ., (2014). Confidentiality of a selectively encrypted H.264 coded video bit-stream. Journal of Visual Communication and Image Representation. 25 (2), 487-498

Al-Naday, MF., Reed, MJ., Trossen, D. and Yang, K., (2014). Information resilience: Source recovery in an information-centric network. IEEE Network. 28 (3), 36-42

Alenezi, MN. and Reed, MJ., (2014). Uniform DoS traceback. Computers & Security. 45, 17-26

Carrea, L., Vernitski, A. and Reed, M., (2014). Optimized hash for network path encoding with minimized false positives. Computer Networks. 58 (1), 180-191

Alhomidi, M. and Reed, M., (2014). Attack Graph-Based Risk Assessment and Optimisation Approach. International Journal of Network Security & Its Applications. 6 (3), 31-43

Ntofon, OD., Reed, MJ., Malewski, S., Glowiak, M. and Simeonidou, D., (2013). Service-Oriented Control Framework for Next Generation Media Applications Over Future Networks. Journal of Optical Communications and Networking. 5 (7), 784-784

Shan-shan, T., Shao-zhang, N. and Reed, MJ., (2013). Access control based on ABE and IBS for the cloud outsourced data. International Journal of Applied Mathematics and Statistics. 46 (16), 85-92

A Alzahrani, B., G. Vassilakis, V. and J. Reed, M., (2013). Key Management in Information Centric Networking. International journal of Computer Networks & Communications. 5 (6), 153-166

AL-Naday, MF., Almeida, RC., Guild, KM. and Reed, MJ., (2012). Design proposal of a photonic multicast Bloom filter node. Photonic Network Communications. 24 (2), 132-137

Thomas, M., Hunter, D. and Reed, M., (2008). Pseudo-node Reduction on Multi-access Networks for Algorithmic Simplification. IEEE Communications Letters. 12 (7), 538-540

Flores Lucio, G., Reed, MJ. and Henning, ID., (2007). Guided local search as a network planning algorithm that incorporates uncertain traffic demands. Computer Networks. 51 (11), 3172-3196

Flores-Mosri, A. and Reed, MJ., (2006). TCP-friendly transmission of layered coded streams. Electronics Letters. 42 (22), 1316-1316

Lucio, GF., Farrera, MP., Jammeh, E., Fleury, M., Reed, MJ. and Ghanbari, M., (2006). Packet by Packet Analysis in Contemporary Network Simulators. IEEE Latin America Transactions. 4 (4), 299-307

Reed, MJ., Hawksford, MO. and Hughes, P., (2005). Acoustic echo cancellation for stereophonic systems derived from pairwise panning of monophonic speech. IEE Proceedings - Vision, Image, and Signal Processing. 152 (1), 122-122

Reed, MJ. and Hawksford, MOJ., (2000). Efficient implementation of the Volterra filter. IEE Proceedings - Vision, Image, and Signal Processing. 147 (2), 109-109

Reed, MJ. and Hawksford, MOJ., (1998). Acoustic echo cancellation with the fast affine projection. IEE Colloquium (Digest) (470)

Reed, MJ. and Hawksford, MOJ., (1996). Identification of discrete Volterra series using maximum length sequences. IEE Proceedings - Circuits, Devices and Systems. 143 (5), 241-241

Fairwood, RC. and Reed, MJ., (1991). Digital measurement and comparison of current-voltage output capability of amplifiers and demands of loudspeakers. Journal of the Audio Engineering Society. 39 (5), 344-354

Book chapters (3)

Mambretti, J., Chen, J., Yeh, F., Ge, J., You, J., Li, T., de Laat, C., Grosso, P., Liu, T-L., Luo, M-Y., Nakao, A., Müller, P., van der Pol, R., Reed, M., Stanton, M. and Yang, C-S., (2016). Creating a Worldwide Network for the Global Environment for Network Innovations (GENI) and Related Experimental Environments. In: The GENI Book. Springer International Publishing. 589- 632. 9783319337678

Reed, M., (2012). Multiprotocol label switching martin reed. In: The Cable and Telecommunications Professionals' Reference: Transport Networks. 377- 402. 9780240807485

Reed, MJ., (2012). Voice over internet protocol networks. In: The Cable and Telecommunications Professionals' Reference: PSTN, IP and Cellular Networks, and Mathematical Techniques. 170- 206. 9780240807478

Conferences (73)

Hu, J., Reed, M., Al-Naday, M. and Thomos, N., (2020). Blockchain-Aided Flow Insertion and Verification in Software Defined Networks

Assis, KDR., Almeida, RC., Waldman, H., Reed, MJ., Jaumard, B. and Simeonidou, D., (2020). Linear formulation for the design of elastic optical networks with squeezing protection and shared risk link group: Invited Paper

Amangele, P., Reed, MJ., Al-Naday, M., Thomos, N. and Nowak, M., (2019). Hierarchical Machine Learning for IoT Anomaly Detection in SDN

Mitev, M., Chorti, A. and Reed, M., (2019). Optimal Resource Allocation in Joint Secret Key Generation and Data Transfer Schemes

Hernandez-Ramos, JL., Baldini, G., Neisse, R., Al-Naday, M. and Reed, MJ., (2019). A Policy-based Framework in Fog enabled Internet of Things for Cooperative ITS

Zeeshan, N., Reed, M. and Siddiqui, Z., (2019). Three-way Security Framework for Cloud based IoT Network

Al-Khalidi, M., Al-Zaidi, R., Woods, J., Reed, M. and Pereira, E., (2019). Securing Marine Data Networks in an IoT Environment

Frotscher, A., Monschiebl, B., Drosou, A., Gelenbe, E., Reed, MJ. and Al-Naday, M., (2019). Improve cybersecurity of C-ITS Road Side Infrastructure Installations: the SerIoT - Secure and Safe IoT approach

Mitev, M., Chorti, A., Belmega, EV. and Reed, M., (2019). Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation

Mitev, M., Chorti, A. and Reed, M., (2019). Subcarrier Scheduling for Joint Data Transfer and Key Generation Schemes in Multicarrier Systems

Zhang, Y., Jiang, J., Xu, K., Nie, X., Reed, MJ., Wang, H., Yao, G., Zhang, M. and Chen, K., (2018). BDS: a centralized near-optimal overlay network for inter-datacenter data replication

Xylomenos, G., Thomas, Y., Vasilakos, X., Georgiades, M., Phinikarides, A., Doumanis, I., Porter, S., Trossen, D., Robitzsch, S., Reed, MJ., Al-Naday, M., Petropoulos, G., Katsaros, K., Xezonaki, M-E. and Riihijarvi, J., (2018). IP Over ICN Goes Live

Psaras, I., Yang, K., Al-Naday, M., Crowcroft, J., Polyzos, G. and Reed, M., (2018). Message from the workshop chairs

Wu, B., Xu, K., Li, Q., Liu, Z., Hu, Y-C., Reed, MJ., Shen, M. and Yang, F., (2018). Enabling Efficient Source and Path Verification via Probabilistic Packet Marking

Al-Khalidi, M., Thomos, N., Al-Naday, M., Reed, M. and Trossen, D., (2017). Seamless Handover in IP over ICN Networks: a Coding Approach

Vasilakos, X., Al-Khalidi, M., Siris, VA., Reed, MJ., Thomos, N. and Polyzos, GC., (2017). Mobility-based Proactive Multicast for Seamless Mobility Support in Cellular Network Environments

Crowcroft, J., Mambretti, J., Pavlou, G., Polyzos, GC., Psaras, I., Yang, K., AL-Naday, M., Katsaros, KV. and Reed, MJ., (2017). Chairs'Welcome Message

Al-Khalidi, M., Thomos, N., Reed, MJ., Al-Naday, MF. and Trossen, D., (2017). Seamless handover in IP over ICN networks: A coding approach.

Alenezi, MN., Reed, MJ. and Alhomidi, MA., (2017). Selective Windowed Rate Limiting for DoS Mitigation

Crowcroft, J., Mambretti, J., Pavlou, G., Polyzos, GC., Psaras, I., Yang, K., AL-Naday, M., Katsaros, KV. and Reed, MJ., (2017). Chairs'Welcome Message

Kim, S-Y., Robitzsch, S., Trossen, D., Reed, M., Al-Naday, M. and Riihijärvi, J., (2016). Realizing IP-based Services over an Information-Centric Networking Transport Network

Reed, MJ., Al-Naday, MF., Thomos, N., Trossen, D., Petropoulos, GP. and Spirou, S., (2016). Stateless multicast switching in software defined networks.

Alzahrani, BA., Reed, MJ. and Vassilakis, VG., (2015). Resistance against brute-force attacks on stateless forwarding in information centric networking

Trossen, D., Reed, MJ., Riihijarvi, J., Georgiades, M., Fotiou, N., Xylomenos, G. and IEEE, (2015). IP Over ICN - The Better IP? An Unusual Take on Information-Centric Networking

Trossen, D., Reed, MJ., Riihijarvi, J., Georgiades, M., Fotiou, N. and Xylomenos, G., (2015). IP over ICN - The better IP?

Al-Naday, MF., Bontozoglou, A., Vassilakis, VG. and Reed, MJ., (2014). Quality of service in an information-centric network

Alzahrani, BA., Vassilakis, VG. and Reed, MJ., (2014). Selecting Bloom-filter header lengths for secure information centric networking

Vassilakis, VG., Al-Naday, MF., Reed, MJ., Alzahrani, BA., Yang, K., Moscholios, ID. and Logothetis, MD., (2014). A cache-aware routing scheme for information-centric networks

Alenezi, M. and Reed, MJ., (2013). Denial of service detection through TCP congestion window analysis

Alzahrani, BA., Vassilakis, VG. and Reed, MJ., (2013). Mitigating brute-force attacks on Bloom-filter based forwarding

Alenezi, M. and Reed, MJ., (2013). Selective record route DoS traceback

Alhomidi, MA. and Reed, MJ., (2013). Security risk analysis as a service

Alenezi, M. and Reed, MJ., (2013). Efficient AS DoS traceback

Alzahrani, BA., Vassilakis, VG. and Reed, MJ., (2013). Securing the forwarding plane in information centric networks

Farrow, P. and Reed, M., (2013). Optimising the geographical location of transcoding resources

Alhomidi, M. and Reed, M., (2013). Risk assessment and analysis through population-based attack graph modelling

Fischnaller, F., Singh, YM. and Reed, M., (2013). The Last Supper Interactive: Stereoscopic and ultra-high resolution 4K/3D HD for immersive real-time virtual narrative in Italian Renaissance Art

Alhomidi, M. and Reed, M., (2013). A Genetic Algorithm Approach for the Most Likely Attack Path Problem

Alhomidi, M. and Reed, M., (2013). Finding the minimum cut set in attack graphs using genetic algorithms

Reed, MJ., (2012). Traffic engineering for information-centric networks

Vastardis, N., Bontozoglou, A., Yang, K. and Reed, M., (2012). Simulation tools enabling research on Information-centric Networks

Asghar, MN., Ghanbari, M., Fleury, M. and Reed, MJ., (2012). Analysis of channel error upon selectively encrypted H.264 video

Alhomidi, MA. and Reed, MJ., (2012). Attack graphs representations

Alzahrani, BA., Reed, MJ. and Vassilakis, VG., (2012). Enabling z-Filter updates for self-routing denial-of-service resistant capabilities

Asghar, MN., Ghanbari, M. and Reed, MJ., (2012). Sufficient Encryption with Codewords and Bin-strings of H.264/SVC

Asghar, M., Ghanbari, M., Fleury, M. and Reed, M., (2012). Efficient selective encryption with H.264/SVC CABAC bin-strings

Alenezi, M., Reed, MJ. and ASME, (2011). AUTONOMOUS SYSTEM TRACEBACK FOR DENIAL OF SERVICE MITIGATION

Mothersole, I. and Reed, MJ., (2011). Optimising Rule Order for a Packet Filtering Firewall

Mothersole, I. and Reed, MJ., (2011). A method for moving rules in a network with multiple packet filters

Alenezi, M. and Reed, MJ., (2011). IP traceback methodologies

Reynolds, CJ., Reed, MJ. and Hughes, PJ., (2009). Decentralized headphone based spatialized audio conferencing for low power devices

Qin, Y., Lu, Z., Zervas, G., Reed, MJ., Hunter, DK., Nejabati, R. and Simeonidou, D., (2009). Optimised optical burst aggregation by employing dynamic state-space feedback gain scheduling controller

Qin, Y., Reed, M., Lu, Z., Hunter, D., Rafel, A. and Kang, J., (2009). Fragmentation in a Novel Implementation of Slotted GPON Segmentation and Reassembly

Qin, Y., Zervas, G., Martini, V., Ghandour, M., Savi, M., Baroncelli, F., Martini, B., Castoldi, P., Raffaelli, C., Reed, M., Hunter, D., Nejabati, R. and Simeonidou, D., (2009). Service­Oriented Multi­Granular Optical Network Testbed

Reynolds, CJ., Reed, MJ. and Hughes, PJ., (2008). Analysis of a distributed processing model for spatialized audio conferences

Malfait, L., Gray, P. and Reed, MJ., (2008). Objective listening quality assessment of speech communication systems introducing continuously varying delay (time-warping): A time alignment issue

Reynolds, CJ., Reed, MJ. and Hughes, PJ., (2007). Spatialized audio conferences: IMS integration and traffic modelling

Zervas, G., Nejabati, R., Campi, A., Qin, Y., Simeonidou, D., Callegati, F., O'Mahony, M., Reed, M. and Yu, S., (2007). Demonstration of a fully functional optical burst switched network with application layer resource reservation capability

Lucio, GF., Reed, MJ. and Henning, ID., (2005). Improving a Local Search Technique for Network Optimization Using Inexact Forecasts

Tze-Ven Poh, Jing Jiang and Reed, MJ., (2005). Multicommodity flow optimization in support for packet-switched network traffic engineering

Kang, J. and Reed, MJ., (2005). A scalable control plane for optical-packet-switched networks

Jianghui Kang, (2005). Multi-time scale adaptive optical packet assembly based on Internet traffic prediction

Kang, J. and Reed, MJ., (2004). Traffic grooming in WDM networks using optical packet switches

Reed, MJ., (2003). MPLS label space for optical packet switched networks

Kang, J. and Reed, MJ., (2003). Traffic groondng in WDM networks using optical packet switches

Ranghui Kang and Reed, MJ., (2003). Bandwidth protection in mpls networks using p-cycle structure

Mosri, AF. and Reed, MJ., (2003). Effects of routing algorithms on the transmission of layered streaming media

Reed, MJ., (2002). Network control of optical packet switched networks using GMPLS

Reed, MJ. and Hawksford, MOJ., (1998). Acoustic echo cancellation with the fast affine projection

Reed, MJ., Hawksford, M. and Hollier, M., (1998). Error and convergence properties of the fast affine projection and least mean square echo cancellation algorithms

Reed, MJ. and Hawskford, M., (1997). Comparison of audio system nonlinear performance in Volterra space

Reed, MJ. and Hawksford, M., (1997). Non-Linear Error Correction of Horn Transducers Using a Volterra Filter

Reed, MJ. and Hawksford, M., (1996). Practical Modeling of Nonlinear Audio Systems Using the Volterra Series

Reports and Papers (2)

Al-Naday, M., Reed, MJ., Riihijärvi, J., Trossen, D., Thomos, N. and Al-Khalidi, M., (2018). fCDN: A Flexible and Efficient CDN Infrastructure without DNS Redirection or Content Reflection

AL-Naday, M., Reed, MJ., Riihijärvi, J., Trossen, D., Thomos, N. and Al-Khalidi, MQS., (2018). Service-based Fog architecture without DNS redirection

Grants and funding

2019

MSc studentship

British Telecommunications Plc

2017

SerIoT: Secure and Safe Internet of Things

European Commission

2016

50% To develop innovative monitoring equipment for emergency lighting systems, embed knowledge of embedded systems, computer networks and network security, and create a technical Centre of Excellence.

Technology STrategy Board

50% To develop innovative monitoring equipment for emergency lighting systems, embed knowledge of embedded systems, computer networks and network security, and create a technical Centre of Excellence.

Emergency Lighting Products Ltd

2014

POINT: iP Over IcN - betTer IP?

European Commission (H2020)

2013

Understanding the benefits of wideband audio communications - BT /EPSRC - Studentship - Karis Bailey

British Telecommunications Plc

Information-centric networking for video delivery over existing and emerging ISP networks - BT /EPSRC - Studentship - Hildebrand Weisenborn

British Telecommunications Plc

2012

Assessing the performance and impact of wideband telecommunications

British Telecommunications Plc

2011

VISIONAIR

European Commission (FP7)

PMI2 Connect between Northwestern and University of Essex

British Council

EEDA - Martin Reed

Eeda

2010

Publish Subscribe Internet Technology - PURSUIT

European Commission (FP7)

2009

BT Case Studentship - Laura Carrera

British Telecommunications Plc

Contact

mjreed@essex.ac.uk

Location:

1NW.4.18, Colchester Campus

Academic support hours:

During Autumn Term 2020 my Academic Support Hour will be 10-11 am on Tuesday. The zoom link for this is available from my profile on my CE321/CE324/CE823 Course Moodle page. Please wait in the waiting room until I can admit you.