Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges
Journal Article
Liu, Q., Yang, Z., Ji, R., Zhang, Y., Bilal, M., Liu, X., …Xu, X. (2023)
Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges. IEEE Systems, Man, and Cybernetics Magazine, 9(4), 4-12. https://doi.org/10.1109/msmc.2022.3216943
Radars are widely used to obtain echo information for effective prediction, such as precipitation nowcasting. In this article, recent relevant scientific investigation and pra...
Developing a Digital ForensicsTerminology Using Natural Language Processing
Conference Proceeding
Le Gall, M., Cole, C., Haynes, D., & Nic Daeid, N. (2022)
Developing a Digital ForensicsTerminology Using Natural Language Processing. In M. Lykke, T. Svarre, D. Haynes, M. Skov, M. Thellesfsen, & D. Martinez-Avila (Eds.), Knowledge Organization across Disciplines, Domains, Services and Technologies: Proceedings of the Seventeenth International ISKO Conference (173-186
Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle
Conference Proceeding
Cunningham, S., & Mcgregor, I. (2022)
Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle. In AM '22: Audio Mostly 2022
Foley artistry is an essential part of the audio post-production process for film, television, games, and animation. By extension, it is as crucial in emergent media such as v...
Selected poems: Lorna Lloyd
Book
Ryan, B., & Hall, H. (Eds.)
(2022). Selected poems: Lorna Lloyd. Edinburgh: Edinburgh Napier University
This volume comprises 37 poems by Lorna Lloyd (1914-1942) arranged by date of composition: 1928-1930 (11); early 1930s (11); mid to late 1930s (10); early 1940s (5). It was pr...
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence
Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for sing...
Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World
Book
Urquhart, N. (2022)
Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World. Cham: Springer. https://doi.org/10.1007/978-3-030-98108-2
This book explains classic routing and transportation problems and solutions, before offering insights based on successful real-world solutions. The chapters in Part I introdu...
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
Conference Proceeding
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022)
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP (551-561). https://doi.org/10.5220/0010903000003120
Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on ...
Signalling new opportunities? An analysis of UK job adverts for degree apprenticeships
Journal Article
Fabian, K., Taylor-Smith, E., Smith, S., & Bratton, A. (in press)
Signalling new opportunities? An analysis of UK job adverts for degree apprenticeships. Higher Education, Skills and Work-based Learning, https://doi.org/10.1108/HESWBL-02-2022-0037
Purpose
The purpose of this study is to gain insight into the degree apprenticeship labour market and employers’ strategies for apprenticeship recruitment using job advertisem...
Editorial: 6G Wireless Communication Systems- Applications, Opportunities and Challenges
Journal Article
Anoh, K., See, C. H., Dama, Y., Abd-Alhameed, R. A., & Keates, S. (2022)
Editorial: 6G Wireless Communication Systems- Applications, Opportunities and Challenges. Future Internet, 14(12), Article 379. https://doi.org/10.3390/fi14120379
As the technical specifications of the 5th Generation (5G) wireless communication standard are being wrapped up, there are growing efforts amongst researchers, industrialists ...
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract)
Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022)
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8
Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detect...