Skip to main content

Research Repository

Advanced Search

Outputs (291)

Distance Measurement Methods for Improved Insider Threat Detection (2018)
Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018). Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368

Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account change... Read More about Distance Measurement Methods for Improved Insider Threat Detection.

Leaf-based Routing Mechanism for Low-Power and Lossy Networks (2018)
Patent
Ghaleb, B., & Al-Dubai, A. (2018). Leaf-based Routing Mechanism for Low-Power and Lossy Networks. 1800668.4. Intellectual Property Office, UK

Unlike existing solutions, our invention provides a “Leaf-Based” mechanism for establishing the Downward routes in Low-Power and Lossy Networks (LLNs) that seeks to provide a novel, scalable and efficient routing solution for LLNs, which are the back... Read More about Leaf-based Routing Mechanism for Low-Power and Lossy Networks.

Employing machine learning techniques for detection and classification of phishing emails (2018)
Conference Proceeding
Moradpoor, N., Clavie, B., & Buchanan, B. (2018). Employing machine learning techniques for detection and classification of phishing emails. In Proceedings of the IEEE Technically Sponsored Computing Conference 2017. https://doi.org/10.1109/SAI.2017.8252096

A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or downloads malicious software through clicking on malicious links contained i... Read More about Employing machine learning techniques for detection and classification of phishing emails.

Mining malware command and control traces (2018)
Conference Proceeding
McLaren, P., Russell, G., & Buchanan, B. (2018). Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017. https://doi.org/10.1109/SAI.2017.8252185

Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, which enables the malware to respond to controller commands. The detection o... Read More about Mining malware command and control traces.

Computational Intelligence Techniques for Mobile Network Optimization [Guest Editorial] (2018)
Journal Article
Qadir, J., Hussain, A., Yau, K., Imran, M., & Wolisz, A. (2018). Computational Intelligence Techniques for Mobile Network Optimization [Guest Editorial]. IEEE Computational Intelligence Magazine, 13(1), 28. https://doi.org/10.1109/MCI.2017.2773799

Modern society has become increasingly reliant on mobile networks for their communication needs. Such networks are characterized by their dynamic, heterogeneous, complex, and data intensive nature, which makes them more amenable to automated mobile n... Read More about Computational Intelligence Techniques for Mobile Network Optimization [Guest Editorial].

Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture (2018)
Journal Article
Chrysoulas, C., & Pitropakis, N. (2018). Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 4(12), 153551. https://doi.org/10.4108/eai.10-1-2018.153551

QoS and Security features are playing an important role in modern network architecures. Dynamic selection of services and by extension of service providers are vital in today’s liberalized market of energy. On the other hand it is equally important f... Read More about Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture.

Managing association of information system outsourcing: A case of information technology (IT) service provider (2018)
Conference Proceeding
Mehmood, K., & Hussain, A. (2018). Managing association of information system outsourcing: A case of information technology (IT) service provider. . https://doi.org/10.1109/ICSAI.2017.8248558

Managing relationship is vital fundamental realistic concern in the accomplishment development of outsourcing information system (IS) and also begins to be a realistic dilemma that epidemic business of firms' information system. while the information... Read More about Managing association of information system outsourcing: A case of information technology (IT) service provider.

Knowledge-oriented leadership and innovation: A mediating role of knowledge creation: A case of software industry (2018)
Conference Proceeding
Mehmood, K., & Hussain, A. (2018). Knowledge-oriented leadership and innovation: A mediating role of knowledge creation: A case of software industry. . https://doi.org/10.1109/ICSAI.2017.8248548

This study describes the mediating role of knowledge creation between knowledge-oriented leadership and innovation. We investigate 150 respondents in the software industry of Pakistan. The path analysis demonstrates that knowledge creation mediates t... Read More about Knowledge-oriented leadership and innovation: A mediating role of knowledge creation: A case of software industry.

Technology Acceptance and User-Centred Design of Assistive Exoskeletons for Older Adults: A Commentary (2018)
Journal Article
Shore, L., Power, V., de Eyto, A., & O’Sullivan, L. (2018). Technology Acceptance and User-Centred Design of Assistive Exoskeletons for Older Adults: A Commentary. Robotics, 7(1), Article 3. https://doi.org/10.3390/robotics7010003

Assistive robots are emerging as technologies that enable older adults to perform activities of daily living with autonomy. Exoskeletons are a subset of assistive robots that can support mobility. Perceptions and acceptance of these technologies requ... Read More about Technology Acceptance and User-Centred Design of Assistive Exoskeletons for Older Adults: A Commentary.

Resilience of Video Streaming Services to Network Impairments (2018)
Journal Article
Torres Vega, M., Perra, C., & Liotta, A. (2018). Resilience of Video Streaming Services to Network Impairments. IEEE Transactions on Broadcasting, 64(2), 220-234. https://doi.org/10.1109/tbc.2017.2781125

When dealing with networks, performance management through conventional quality of service (QoS)-based methods becomes difficult and is often ineffective. In fact, quality emerges as an end-to-end factor, for it is particularly sensitive to the end-u... Read More about Resilience of Video Streaming Services to Network Impairments.