Date


Download Available

54 results

Multiple traffic signal control using a genetic algorithm

Conference Proceeding
Kalganova, T., Russell, G., & Cumming, A. (1999)
Multiple traffic signal control using a genetic algorithm. In A. Dobnikar, N. C. Steele, D. W. Pearson, & R. F. Albrecht (Eds.), Artificial Neural Nets and Genetic Algorithms, 220-228. https://doi.org/10.1007/978-3-7091-6384-9_38
Optimising traffic signal timings for a multiple-junction road network is a difficult but important problem. The essential difficulty of this problem is that the traffic signa...

Accurate rapid simulation of urban traffic using discrete modelling.

Report
Russell, G., Shaw, P. & Ferguson, N. (1995)
Accurate rapid simulation of urban traffic using discrete modelling
Increasing model complexity has traditionally been viewed as a key way of improving microscopic model accuracy. However, with complexity comes an increase in execution time. I...

Process algebras and the rapid simulation of highly concurrent systems.

Conference Proceeding
Bate, M., Cowie, A., Milne, G., & Russell, G. (1994)
Process algebras and the rapid simulation of highly concurrent systems. In Proceedings of the 18th Australasian Computer Science Conference, 21-31
No abstract available.

DAIS: An Object-Addressed Processor Cache

Conference Proceeding
Russell, G., Shaw, P., & Cockshott, W. P. (1994)
DAIS: An Object-Addressed Processor Cache. In Persistent Object Systems: Proceedings of the 6th International Workshop on Persistent Object Systems. , (374-386). https://doi.org/10.1007/978-1-4471-2122-0_29
DAIS is a proposed processor incorporating hardware-based object addressing. By providing only the very minimum of support for objects, it allows efficient access via a novel ...

Simulating vehicular traffic flows using the Circal System.

Report
Russell, G., Cowie, A., McInnes, J., Bate, M. & Milne, G. (1993)
Simulating vehicular traffic flows using the Circal System
Modern civil engineers have big problems on their hands; more cars use our road networks every year, leading to ever increasing congestion. Knowing how to change a road networ...

Rapid simulation of urban traffic using FPGAs.

Report
Russell, G., Shaw, P., McInnes, J. & Ferguson, N. (1993)
Rapid simulation of urban traffic using FPGAs
Microscopic simulation of complex traffic models can take hours or even days on simulators build to run on a single processor machine. These simulators use continuous models f...

Shifting register windows.

Journal Article
Russell, G., & Shaw, P. (1993)
Shifting register windows. IEEE Micro, 13, 28-35. https://doi.org/10.1109/40.229712
Shifting register windows is a new register windowing method that attempts to overcome some of the difficulties of traditional fixed- and variable-sized schemes. Using fewer r...

Architectures for persistence

Journal Article
Russell, G., & Cockshott, W. P. (1993)
Architectures for persistence. Microprocessors and Microsystems, 17(3), 117-130. https://doi.org/10.1016/0141-9331%2893%2990042-6
Persistent object oriented architectures have been researched for many years, deriving initially from the Manchester University Atlas machine. In reality, however, few actual ...

Lightweight threads for portable software

Conference Proceeding
Russell, G. (1992)
Lightweight threads for portable software. In Proceedings of the UKUUG/SUKUG
No abstract available.

An object-based processor cache.

Report
Russell, G. & Shaw, P. (1992)
An object-based processor cache
In the past, many persistent object-oriented architecture designs have been based on traditional processor technologies. Such architectures invariantly attempt to insert an ob...
7 results

MEMCRYPT CyberASAP Phase 2

2020 - 2021
Ransomware is a form of malicious software that blocks user access to data by encrypting files. A user is then required to pay the attacker a sum of money to receive the encryption artefacts and start...
Funder: Innovate UK | Value: £52,310

Memcrypt (HGSP)

2020 - 2021
Memcrypt focuses on new ways of detecting the usage encryption keys, and has a focus on addressing ransomware.
Funder: Scottish Enterprise | Value: £109,883

MemCrypt

2020 - 2020
At the core of the work is to addresses risks related to the leakage of encryption keys, and which can lead to data loss issues and trust breaches. Along with detecting keys in memory, the team has de...
Funder: Innovate UK | Value: £31,930

MemoryCrypt

2019 - 2020
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £10,759

vSOC - Virtualised Security Operations Centre

2015 - 2017
The proposal aims to build a Virtualised Security Operation Center [vSoC] and integrates into a currently operating virtualized cyber security Cloud infrastructure (DFET), and use state-of-theart syst...
Funder: Advance HE | Value: £39,268

National Microelectronics Institute

2004 - 2005
To transform the energy emissions monitoring system into a customisable interactive web-based application and customise it for use by other industry associations.
Funder: Innovate UK | Value: £57,956

Prometheus II: Capturing and Relating Character Concept Definitions in Plant Taxonomy

2001 - 2004
Taxonomy has been described as “the science of documenting biodiversity”, which involves collecting, naming, describing, identifying and classifying specimens of organisms. Descriptions are the fundam...
Funder: Biotechnology and Biological Sciences Research Council | Value: £128,444
11 results

Methods for Early Ransomware Attack Detection and Prevention

2023 - date
Alexander Young | Director of Studies: Rich Macfarlane | Second Supervisor: Dr Gordon Russell

Intelligent and Privacy-Preserving Security Solutions for IoT Networks

2023 - date
Iain Baird | Director of Studies: Dr Isam Wadhaj | Second Supervisor: Dr Baraq Ghaleb

Trusted Evidence Gathering and Timeline For Law Enforcement

2022 - date
Director of Studies: Dr Petra Leimich | Second Supervisor: Dr Sean McKeown

Cryptography Artifact and Behavioural Analysis for Malware Detection

2021 - date
Leigh Turnbull | Director of Studies: Rich Macfarlane | Second Supervisor: Dr Gordon Russell

Cybersecurity of Virtualised Infrastructure Through Introspection

2020 - date
Connor Goodwin | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Sean McKeown

Industrial control systems cybersecurity analysis and countermeasures

2017 - 2021
Andres Santiago Robles Durazno | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: James McWhinnie

Investigations into decrypting live secure traffic in virtual environments

2016 - 2019
Dr Peter McLaren | Director of Studies: Dr Gordon Russell | Second Supervisor: Prof Bill Buchanan

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Enhancing bio-inspired intrusion response in ad-hoc networks

2010 - 2013
The topic Addresses the development of novel secrity echanisms for mobile ad hoc networks, inspired by mechanisms apparent in the biological...
Maryamosadat Kazemitabar | Director of Studies: Prof Emma Hart | Second Supervisor: Prof Bill Buchanan