Skip to main content

Research Repository

Advanced Search

Outputs (75)

Evaluating the VIPER pedigree visualisation: detecting inheritance inconsistencies in genotyped pedigrees. (2011)
Presentation / Conference Contribution
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2011, October). Evaluating the VIPER pedigree visualisation: detecting inheritance inconsistencies in genotyped pedigrees. Presented at 1st IEEE Symposium on Biological Data Visualization

VIPER (Visual Pedigree Explorer) is a tool for exploring large complex animal pedigrees and their associated genotype data. The tool combines a novel, space-efficient visualisation of the pedigree structure with an inheritance-checking algorithm. Thi... Read More about Evaluating the VIPER pedigree visualisation: detecting inheritance inconsistencies in genotyped pedigrees..

Affliate advertising fraud and an investigatory fraud framework. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011). Affliate advertising fraud and an investigatory fraud framework. In CyberForensics 2011

This paper outlines the details of a real-life scam, which involves creating fraudulent Web sites which pretend to sell goods, but are actually used to perform click-through crime or use identity fraud to claim commission on the sale of goods. It inv... Read More about Affliate advertising fraud and an investigatory fraud framework..

Evaluating an emergent behaviour algorithm in JCSP for energy conservation in lighting systems. (2011)
Presentation / Conference Contribution
Kosek, A., Syed, A., & Kerridge, J. (2011, June). Evaluating an emergent behaviour algorithm in JCSP for energy conservation in lighting systems. Presented at 33rd Communicating Process Architecture (CPA) conference

Since the invention of the light bulb, artificial light is accompanying people all around the world every day and night. As the light bulb itself evolved a lot through years, light control systems are still switch-based and require users to make most... Read More about Evaluating an emergent behaviour algorithm in JCSP for energy conservation in lighting systems..

An engineering-Informed modelling approach to AIS. (2011)
Presentation / Conference Contribution
Hart, E., & Davoudani, D. (2011). An engineering-Informed modelling approach to AIS. In Proceedings of International Conference on Artificial Immune Systems (ICARIS 2010) (240-253). https://doi.org/10.1007/978-3-642-22371-6_22

A recent shift in thinking in Artificial Immune Systems (AIS) advocates developing a greater understanding of the underlying biological systems that serve as inspiration for engineering such systems by developing abstract computational models of t... Read More about An engineering-Informed modelling approach to AIS..

DACAR platform for eHealth services cloud. (2011)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011). DACAR platform for eHealth services cloud. . https://doi.org/10.1109/CLOUD.2011.31

The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services, but concerns over service integration, large scale deployment, and securit... Read More about DACAR platform for eHealth services cloud..

An Integrated Cloud-based Healthcare Infrastructure. (2011)
Presentation / Conference Contribution
Ekonomou, E., Fan, L., Buchanan, W. J., & Thuemmler, C. (2011, November). An Integrated Cloud-based Healthcare Infrastructure

We present a cloud-based healthcare system that integrates a formal care system (DACAR) with an informal care system (Microsoft HealthVault). The system provides high levels of security and privacy within a cloud environment, enabling sharing of both... Read More about An Integrated Cloud-based Healthcare Infrastructure..

Performance of the distributed CPA protocol and architecture on traditional networks. (2011)
Presentation / Conference Contribution
Chalmers, K. (2011, June). Performance of the distributed CPA protocol and architecture on traditional networks. Presented at 33rd Communicating Process Architecture (CPA) conference

Performance of communication mechanisms is very important in distributed systems frameworks, especially when the aim is to provide a particular type of behavior across a network. In this paper, performance measurements of the distributed Communicatin... Read More about Performance of the distributed CPA protocol and architecture on traditional networks..

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). (2011)
Presentation / Conference Contribution
Buchanan, W. J., Flandrin, F., Macfarlane, R., & Graves, J. (2011). A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011

This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system uses realistic background traffic along with attacking traffic, with four... Read More about A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS)..