Skip to main content

Research Repository

Advanced Search

Outputs (225)

A new distributed MIKEY mode to secure e-health applications. (2016)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016, April). A new distributed MIKEY mode to secure e-health applications. Presented at International Conference on Internet of Things and Big Data (IoTBD 2016)

Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing standard based protocols. Among these protocols, MIKEY (Multimedia Interne... Read More about A new distributed MIKEY mode to secure e-health applications..

Secret shares to protect health records in Cloud-based infrastructures (2016)
Presentation / Conference Contribution
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2015, October). Secret shares to protect health records in Cloud-based infrastructures. Presented at BCS Health Informatics 2015

Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyl... Read More about Secret shares to protect health records in Cloud-based infrastructures.

Hybrid Tree-rule Firewall for High Speed Data Transmission (2016)
Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016). Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE Transactions on Cloud Computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548

Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create rule conflicts, and slows down the firewall. To overcome this problem, we hav... Read More about Hybrid Tree-rule Firewall for High Speed Data Transmission.

Viewing speech in action: speech articulation videos in the public domain that demonstrate the sounds of the International Phonetic Alphabet (IPA) (2016)
Journal Article
Nakai, S., Beavan, D., Lawson, E., Leplâtre, G., Scobbie, J. M., & Stuart-Smith, J. (2016). Viewing speech in action: speech articulation videos in the public domain that demonstrate the sounds of the International Phonetic Alphabet (IPA). Innovation in Language Learning and Teaching, 1-9. https://doi.org/10.1080/17501229.2016.1165230

In this article, we introduce recently released, publicly available resources, which allow users to watch videos of hidden articulators (e.g. the tongue) during the production of various types of sounds found in the world’s languages. The articulatio... Read More about Viewing speech in action: speech articulation videos in the public domain that demonstrate the sounds of the International Phonetic Alphabet (IPA).

Developing and Debugging Proof Strategies by Tinkering (2016)
Presentation / Conference Contribution
Lin, Y., Le Bras, P., & Grov, G. (2016, April). Developing and Debugging Proof Strategies by Tinkering. Presented at 22nd International Conference, TACAS 2016, Eindhoven, The Netherlands

Previously, we have developed a graphical proof strategy language, called PSGraph [4], to support the development and maintenance of large and complex proof tactics for interactive theorem provers. By using labelled hierarchical graphs this formalisa... Read More about Developing and Debugging Proof Strategies by Tinkering.

Biologically Inspired Progressive Enhancement Target Detection from Heavy Cluttered SAR Images (2016)
Journal Article
Gao, F., Ma, F., Zhang, Y., Wang, J., Sun, J., Yang, E., & Hussain, A. (2016). Biologically Inspired Progressive Enhancement Target Detection from Heavy Cluttered SAR Images. Cognitive Computation, 8(5), 955-966. https://doi.org/10.1007/s12559-016-9405-9

High-resolution synthetic aperture radar (SAR) can provide a rich information source for target detection and greatly increase the types and number of target characteristics. How to efficiently extract the target of interest from large amounts of SAR... Read More about Biologically Inspired Progressive Enhancement Target Detection from Heavy Cluttered SAR Images.

Towards workload-aware fine-grained control over cloud resources: student research abstract (2016)
Presentation / Conference Contribution
Ullah, A. (2016, April). Towards workload-aware fine-grained control over cloud resources: student research abstract. Paper presented at SAC 2016: Symposium on Applied Computing, Pisa, Italy

The systems deployed over cloud are subject to unpredictable workload conditions that vary from time to time, e.g. an ecommerce website may face higher workloads than normal during festivals or promotional schemes. In order to maintain the performanc... Read More about Towards workload-aware fine-grained control over cloud resources: student research abstract.

The Internet of Things: a security point of view. (2016)
Journal Article
Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: a security point of view. Internet Research, 26(2), 337-359. https://doi.org/10.1108/IntR-07-2014-0173

Purpose
-- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.
Design/methodology/approa... Read More about The Internet of Things: a security point of view..

Risk assessment for mobile systems through a multilayered hierarchical Bayesian network. (2016)
Journal Article
Li, S., Tryfonas, T., Russell, G., & Andriotis, P. (2016). Risk assessment for mobile systems through a multilayered hierarchical Bayesian network. IEEE Transactions on Cybernetics, 46(8), 1749-1759. https://doi.org/10.1109/TCYB.2016.2537649

Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess the security... Read More about Risk assessment for mobile systems through a multilayered hierarchical Bayesian network..

Jupiter Artland Minecraft Experience (2016)
Digital Artefact
Flint, T., & McGregor, I. (2016). Jupiter Artland Minecraft Experience. [https://vimeo.com/166204060]

This Android application is free to download from the Google Play Store. This mixed reality game connects the real world with a virtual Minecraft version of Jupiter Artland. The game was launched at the Edinburgh International Science Festival.