Date


Download Available

245 results

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...

An agent based Bayesian forecasting model for enhanced network security.

Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...

A topological insight into restricted Boltzmann machines

Journal Article
Mocanu, D. C., Mocanu, E., Nguyen, P. H., Gibescu, M., & Liotta, A. (2016)
A topological insight into restricted Boltzmann machines. Machine Learning, 104(2-3), 243-270. https://doi.org/10.1007/s10994-016-5570-z
Restricted Boltzmann Machines (RBMs) and models derived from them have been successfully used as basic building blocks in deep artificial neural networks for automatic feature...

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Conference Proceeding
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network

Conference Proceeding
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (2020)
A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)https://doi.org/10.1109/WF-IoT48130.2020.9221036
The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as ...

Immunological inspiration for building a new generation of autonomic systems.

Conference Proceeding
Hart, E., Davoudani, D., & McEwan, C. (2007)
Immunological inspiration for building a new generation of autonomic systems. In Autonomics '07 Proceedings of the 1st international conference on Autonomic computing and communication systems
Autonomic computing systems of the future will be required to exhibit a number of properties which cannot be engineered using current technologies and algorithms. The most dir...

Hybrid Tree-rule Firewall for High Speed Data Transmission

Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC.

Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017)
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications, (317-335). CHAM: Springer
The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the...

New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks

Journal Article
Bani Khalaf, M., Al-Dubai, A. Y., & Min, G. (2015)
New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks. Journal of Computer and System Sciences, 81(1), 97-109. https://doi.org/10.1016/j.jcss.2014.06.014
Most existing route discovery schemes in MANETs are based on probabilistic models by which MANETs usually deploy broadcast mechanisms to discover routes between nodes. This is...

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors

Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., …Tripathi, S. S. (2018)
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760
Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to ...
8 results

International Conference Grant

2009 - 2009
International Travel
Funder: Royal Society of Edinburgh | Value: £1,000

Next Generation Trust Architecture

2018 - 2020
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Funder: Digital Health Institute | Value: £149,959

Reliable Internet of Things based monitoring & Surveillance in Oil & Gas Fields (RsIoT)

2015 - 2017
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
Value: £66,635

Building new research partnerships with the Qatari Institutions

2012 - 2012
This short research visit aims at building research collaborative links with the Texas A & M University at Qatar and the University of Qatar
Funder: Carnegie Trust for the Universities of Scotland | Value: £1,700

The Sound Beneath Our Feet

2022 - 2022
This project will develop an immersive audio installation in which to experience sonified seismic data from volcanic activity. The environment will foster new ways of experiencing data from both scien...
Funder: Arts & Humanities Research Council | Value: £4,915

IPv6 Business Case Demonstrators for Farrpoint

2013 - 2013
The development of interesting use cases for IPv6.
Funder: Scottish Funding Council | Value: £5,000

Trisent: Innovation Voucher for Personal Context Data Project

2018 - 2018
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project. Trisent’s core technology is called the Personal Context Management System (PCM...
Funder: Scottish Funding Council | Value: £5,000

ENSEMBLE Performing Together Apart: Enhancing Immersive Multi-Location Co-Performance in Real Time

2018 - 2018
The feeling of being immersed within a live performance by an ensemble of world class musicians can be a deeply engaging and highly valued cultural experience for audiences as well as for the performe...
Funder: Arts & Humanities Research Council | Value: £58,268
5 results

Date