PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing
Journal Article
Zhu, R., Yu, T., Tan, Z., Du, W., Zhao, L., Li, J., & Xia, X. (2019)
PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing. IEEE Access, 8, 1475-1485. https://doi.org/10.1109/ACCESS.2019.2962066
Outlier detection over sliding window is a fundamental problem in the domain of streaming data management, which has been studied over 10 years. The key of supporting outlier ...
Applications of Blockchain Within Healthcare.
Journal Article
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018)
Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today,
There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical traci...
Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain
Journal Article
Buchanan, B., & Naqvi, N. (2018)
Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain. The Journal of the British Blockchain Association, 1(1), 1-4
A blockchain enabled 'Digital Single Economy " can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a tru...
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study
Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...
Distance Measurement Methods for Improved Insider Threat Detection
Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...
Information literacy in Scotland: making it mainstream.
Journal Article
Crawford, J., Irving, C., & Smith, L. (2015)
Information literacy in Scotland: making it mainstream. CILIP Update, 41-43
How the Right Information an online community of practice, is bringing together information professionals and representatives from other professions to promote information lit...
Co-opetition: facilitating peer learning for knowledge exchange via The AmbITion Approach.
Presentation / Conference
Rudman, H. (2014, March)
Co-opetition: facilitating peer learning for knowledge exchange via The AmbITion Approach. Paper presented at Beyond The Campus: Higher Education and the Creative Economy, CREATe Centre, University of Glasgow
Technical evaluation of an e-health platform.
Conference Proceeding
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012)
Technical evaluation of an e-health platform. In M. Macedo (Ed.), Proceedings of the IADIS International Conference e-Health 2012
Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation...
Creation of an online virtual Cisco router learning environment.
Conference Proceeding
Rietsche, R., Russell, G., & Karduck, A. P. (2011)
Creation of an online virtual Cisco router learning environment. In Proceedings of the 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011)https://doi.org/10.2316/P.2011.734-045
Online learning environments are an important aspect to many University courses. They allow flexibility in student approaches, and permit students from a range of backgrounds ...
Cloud computing - the logistic fundament of future networked care
Journal Article
Thuemmler, C. (2010)
Cloud computing - the logistic fundament of future networked care. PublicTechnology.net,
Cloud computing has the potential to revolutionise data management in health care.