Skip to main content

Research Repository

Advanced Search

Outputs (75)

Risk analysis for criminal context in information sharing policies. (2011)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, August). Risk analysis for criminal context in information sharing policies. Paper presented at SCONE - the Scottish Networking event

This presentation outlines of a novel system which maps the information sharing between two domains. It involves the definition of a formalized information sharing policy, which maps the organisation infrastructure which is exposed for the sharing be... Read More about Risk analysis for criminal context in information sharing policies..

Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011, August). Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. Paper presented at SCONE-the Scottish Networking Event

This presentation focuses on outlining criminal activity within affiliate marketing related to click-through and ID theft crime, based on real-life crime data. It shows the mechanisms that criminals might use in order to act fraudulently, and present... Read More about Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing..

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications (2011)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011, July). Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. Presented at 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops

Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context information is naturally distributed among different spatial or logical domains. Ma... Read More about Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications.

Editorial: TLAD 2011 (2011)
Presentation / Conference Contribution
Leimich, P. (2011, July). Editorial: TLAD 2011. Presented at 9th International Workshop on Teaching, Learning and Assessment of Databases

No abstract available.

Learning to Cope with Digital Technology (2011)
Presentation / Conference Contribution
Sobolewska, E., & Benyon, D. (2011). Learning to Cope with Digital Technology. In BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction (561-564)

Technology surrounds people; it functions as their best friend and the worst enemy. From a trip to the local supermarket, to almost every aspect of people's professional and social lives technology is present; mediating their interactions, demanding... Read More about Learning to Cope with Digital Technology.

Project output versus influence in practice: impact as a dimension of research quality (2011)
Presentation / Conference Contribution
Hall, H. (2011, June). Project output versus influence in practice: impact as a dimension of research quality. Presented at 6th International Evidence Based Library and Information Practice (EBLIP6) conference

Keynote presentation. Presentation slides can be found on slideshare - https://www.slideshare.net/HazelHall/2011-hall-eblip6salford

Next generation secure e-health platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, June). Next generation secure e-health platform. Paper presented at BCS ISSG seminar "The Insider Threat"

A patient-centric approach to integrating assisted living and formal health care and how the opportunity for insider threats is reduced through the enhanced identity checking system.

Cloud-based digital forensics evaluation test (D-FET) platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., …Ludwiniak, R. (2011, June). Cloud-based digital forensics evaluation test (D-FET) platform. Paper presented at Cyberforensics 2011

This paper outlines the specification of the Cloud-based DFET platform which is used to evaluate the performance of digital forensics tools, which aim to detect the presence of trails of evidence, such as for the presence of illicit images and determ... Read More about Cloud-based digital forensics evaluation test (D-FET) platform..

Coalition and collaboration: supporting the development of LIS research in the UK (2011)
Presentation / Conference Contribution
Hall, H. (2011, June). Coalition and collaboration: supporting the development of LIS research in the UK. Presented at Information: interactions and impact 2011 (i3)

Keynote presentation. Presentation slides can be found on slideshare - https://www.slideshare.net/HazelHall/coalition-and-collaboration-supporting-the-development-of-lis-research-in-the-uk

System architectures for infrared pedestrian tracking. (2011)
Presentation / Conference Contribution
Walczyk, R., Balazs, A., Armitage, A., & Binnie, D. (2011, June). System architectures for infrared pedestrian tracking. Paper presented at 22nd IET Irish Signals and Systems Conference

This paper describes an FPGA-based implementation of a real-time pedestrian detection and tracking system for infrared (IR) video streams. The system includes hardware accelerators for adaptive background subtraction, morphological filtering and conn... Read More about System architectures for infrared pedestrian tracking..