Date


People

Download Available

266 results

A New Spectrum Management Scheme for Road Safety in Smart Cities

Journal Article
Alsarhan, A., Al-Dubai, A. Y., Min, G., Zomaya, A. Y., & Bsoul, M. (2018)
A New Spectrum Management Scheme for Road Safety in Smart Cities. IEEE Transactions on Intelligent Transportation Systems, 1-11. https://doi.org/10.1109/TITS.2017.2784548
Traffic management in roads is one of the major challenges faced in developing efficient intelligent transportation systems. Recently, wireless networks have received signific...

Mobile User Authentication System for E-commerce Applications.

Presentation / Conference
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June)
Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014, Bejaia, Algeria
E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is ...

Cloud Security, Privacy, and Trust Baselines

Book Chapter
Pitropakis, N., Katsikas, S., & Lambrinoudakis, C. (2016)
Cloud Security, Privacy, and Trust Baselines. In Cloud Computing Security Foundations and Challenges. Boca Raton: CRC Press (Taylor and Francis Group
According to ISO 27001, a threat is a potential event. When a threat turns into an actual event, it may cause an undesirable incident. It is undesirable because the incident...

10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking

Journal Article
Asif, R., & Haithem, M. (2017)
10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking. Optics Communications, 391, 106-110. https://doi.org/10.1016/j.optcom.2017.01.022
Generalized few-mode-fiber (FMF) transmission uses N coherent receivers for mode detection, where N scales with the number of fiber modes. Multiple coherent receivers increase...

A Trust-based Intrusion Detection System for Mobile RPL Based Networks

Conference Proceeding
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (2018)
A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113
Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be ...

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study

Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...

Distance Measurement Methods for Improved Insider Threat Detection

Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...

Decentralized dynamic understanding of hidden relations in complex networks

Journal Article
Mocanu, D. C., Exarchakos, G., & Liotta, A. (2018)
Decentralized dynamic understanding of hidden relations in complex networks. Scientific Reports, 8(1), https://doi.org/10.1038/s41598-018-19356-4
Almost all the natural or human made systems can be understood and controlled using complex networks. This is a difficult problem due to the very large number of elements in s...

Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication

Journal Article
Hawbani, A., Torbosh, E., Wang, X., Sincak, P., Zhao, L., & Al-Dubai, A. (2021)
Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication. IEEE Transactions on Fuzzy Systems, 29(3), 612-626. https://doi.org/10.1109/tfuzz.2019.2957254
This paper modeled the multihop data-routing in Vehicular Ad-hoc Networks(VANET) as Multiple Criteria Decision Making (MCDM) in four steps. First, the criteria which have an i...

An Enhanced Cyber Attack Attribution Framework

Conference Proceeding
Pitropakis, N., Panaousis, E., Giannakoulias, A., Kalpakis, G., Rodriguez, R. D., & Sarigiannidis, P. (2018)
An Enhanced Cyber Attack Attribution Framework. In S. Furnell, H. Mouratidis, & G. Pernul (Eds.), Trust, Privacy and Security in Digital Business. TrustBus 2018, 213-228. https://doi.org/10.1007/978-3-319-98385-1_15
Advanced Persistent Threats (APTs) are considered as the threats that are the most challenging to detect and defend against. As APTs use sophisticated attack methods, cyber si...

Date


9 results

International Conference Grant

2009 - 2009
International Travel
Funder: Royal Society of Edinburgh | Value: £1,000

Next Generation Trust Architecture

2018 - 2020
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Funder: Digital Health Institute | Value: £149,959

MeCCSA 2025 Conference: Identity and Belonging

2024 - 2025
Media and culture play a crucial role in shaping identity, especially in contemporary contexts marked by economic struggles, conflict, and migration. The significance of identity is heightened as indi...

Reliable Internet of Things based monitoring & Surveillance in Oil & Gas Fields (RsIoT)

2015 - 2017
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
Value: £66,635

Building new research partnerships with the Qatari Institutions

2012 - 2012
This short research visit aims at building research collaborative links with the Texas A & M University at Qatar and the University of Qatar
Funder: Carnegie Trust for the Universities of Scotland | Value: £1,700

The Sound Beneath Our Feet

2022 - 2022
This project will develop an immersive audio installation in which to experience sonified seismic data from volcanic activity. The environment will foster new ways of experiencing data from both scien...
Funder: Arts & Humanities Research Council | Value: £4,915

Trisent: Innovation Voucher for Personal Context Data Project

2018 - 2018
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project. Trisent’s core technology is called the Personal Context Management System (PCM...
Funder: Scottish Funding Council | Value: £5,000

ENSEMBLE Performing Together Apart: Enhancing Immersive Multi-Location Co-Performance in Real Time

2018 - 2018
The feeling of being immersed within a live performance by an ensemble of world class musicians can be a deeply engaging and highly valued cultural experience for audiences as well as for the performe...
Funder: Arts & Humanities Research Council | Value: £58,268

IPv6 Business Case Demonstrators for Farrpoint

2013 - 2013
The development of interesting use cases for IPv6.
Funder: Scottish Funding Council | Value: £5,000

Date


Qualification level

10 results

A closer look at adaptation mechanisms in simulated environment-driven evolutionary swarm robotics

2013 - 2018
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...
Dr Andreas Steyven | Director of Studies: Prof Emma Hart | Second Supervisor: Prof Ben Paechter

Investigating communicating sequential processes for Java to support ubiquitous computing

2005 - 2009
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
Dr Kevin Chalmers | Director of Studies: Prof Jon Kerridge | Second Supervisor: Dr Imed Romdhani

Autopoietic organisation of knowledge, creativity and innovation: a case study of the automotive manufacturer Daimler AG

2007 - 2012
Abstract Creativity and innovation are very important capabilities within an org...
Dr Jan Auernhammer | Director of Studies: George Stonehouse | Second Supervisor: Prof Hazel Hall

Adaptive energy management mechanisms for clustering based routing wireless sensor networks

2013 - 2017
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Mr Mohamed Eshaftri | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Reliable and energy efficient scheduling protocols for Wireless Body Area Networks (WBAN)

2014 - 2018
Miss Marwa Salayma | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Privacy-preserving systems around security, trust and identity

2019 - 2022
Dr Pavlos Papadopoulos | Director of Studies: Dr Nick Pitropakis | Second Supervisor: Prof Bill Buchanan

Contributions to crypto-ransomware analysis and detection

2020 - 2024
Dr Simon Davies | Director of Studies: Rich Macfarlane | Second Supervisor: Prof Bill Buchanan

Development of a 3D audio panning and realtime visualisation toolset using emerging technologies

2004 - 2010
Dr Paul Ferguson | Second Supervisor: Dr Gregory Leplatre

Mobile User Authentication System (MUAS) for e-commerce applications

2009 - 2017
Rania Molla | Director of Studies: Dr Imed Romdhani | Second Supervisor: Prof Bill Buchanan

Reliable and energy efficient mechanisms for wireless sensor networks

2013 - 2019
Mr Alsnousi Ali | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani