9 results

Technical evaluation of an e-health platform.

Conference Proceeding
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012)
Technical evaluation of an e-health platform. In M. Macedo (Ed.), Proceedings of the IADIS International Conference e-Health 2012
Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation...

Enhancing intrusion detection via an active target host.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2005)
Enhancing intrusion detection via an active target host. In IEEE ICTe Africa 2006
Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of netwo...

Security issues of a publicly accessible cloud computing infrastructure.

Conference Proceeding
Russell, G., & Macfarlane, R. (2012)
Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 1210-1216. https://doi.org/10.1109/TrustCom.2012.259
Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accident...

A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval.

Conference Proceeding
Fang, D., Liu, X., & Romdhani, I. (2015)
A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. In W. Zimmerman, Y. W. Lee, & C. Reich (Eds.), Cloud Computing 2014: the Fifth International Conference on Cloud Computing, Grids and Virtualization, 6-11
As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While...

MAMBO: Membership-Aware Multicast with Bushiness Optimisation.

Conference Proceeding
Fan, L., Taylor, H. & Trinder, P. (2007)
MAMBO: Membership-Aware Multicast with Bushiness Optimisation
Efficient application-level multicast (ALM) is an important research area supporting applications such as P2P file sharing, multi-player online games, and multimedia streaming...

Affliate advertising fraud and an investigatory fraud framework.

Conference Proceeding
Miehling, M. J., Buchanan, W. J. & Lawson, A. (2010)
Affliate advertising fraud and an investigatory fraud framework. In CyberForensics 2011
This paper outlines the details of a real-life scam, which involves creating fraudulent Web sites which pretend to sell goods, but are actually used to perform click-through c...

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS).

Conference Proceeding
Buchanan, W. J., Flandrin, F., Macfarlane, R. & Graves, J. (2010)
A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011
This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system...

Requirements for getting a robot to grow up.

Conference Proceeding
Ross, P., Hart, E., Lawson, A., Webb, A., Prem, E., Poelz, P. & Morgavi, G. (2003)
Requirements for getting a robot to grow up. ISBN 9783540200574

Unlocking the semantics of Roget's Thesaurus.

Conference Proceeding
Old, L. J. (2004)
Unlocking the semantics of Roget's Thesaurus
Roget's Thesaurus is a semantic dictionary that is organized by concepts rather than words. It has an elaborate implicit structure that has not, in the 150 years since its inc...