Skip to main content

Research Repository

Advanced Search

Outputs (293)

Developing Cyber Buffer Zones (2020)
Book Chapter
Robinson, M., Jones, K., Janicke, H., & Maglaras, L. (2020). Developing Cyber Buffer Zones. In M. Khosrow-Pour (Ed.), Encyclopedia of Criminal Activities and the Deep Web (287-303). IGI Global. https://doi.org/10.4018/978-1-5225-9715-5.ch019

Cyber peacekeeping is a new and novel field of research that focuses on the ways that nations and society can restore peace and security in the aftermath of cyber warfare. In this article, the authors make an original contribution to the field by dev... Read More about Developing Cyber Buffer Zones.

Cyber Threats in the Healthcare Sector and Countermeasures (2020)
Book Chapter
Ahmed, M. M., Maglaras, L., & Ferrag, M. A. (2020). Cyber Threats in the Healthcare Sector and Countermeasures. In A. Masouras, G. Maris, & A. Kavoura (Eds.), Entrepreneurial Development and Innovation in Family Businesses and SMEs (109-124). IGI Global. https://doi.org/10.4018/978-1-7998-3648-3.ch007

Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get una... Read More about Cyber Threats in the Healthcare Sector and Countermeasures.

The Cost Perspective of Password Security (2020)
Book Chapter
Maglaras, L., Janicke, H., & Ferrag, M. A. (2020). The Cost Perspective of Password Security. In B. B. Gupta, & D. Gupta (Eds.), Handbook of Research on Multimedia Cyber Security (319-330). IGI Global. https://doi.org/10.4018/978-1-7998-2701-6.ch017

This study technically analyses the maximum number of combinations for common passwords up to 12 characters long. A maximum storage size necessary for the creation of a data base that holds all possible passwords up to 12 characters is also presented... Read More about The Cost Perspective of Password Security.

Privacy Preserving Demand Forecasting to Encourage Consumer Acceptance of Smart Energy Meters (2020)
Conference Proceeding
Briggs, C., Fan, Z., & Andras, P. (2020). Privacy Preserving Demand Forecasting to Encourage Consumer Acceptance of Smart Energy Meters. In NeurIPS 2020 Workshop: Tackling Climate Change with Machine Learning

In this proposal paper we highlight the need for privacy preserving energy demand forecasting to allay a major concern consumers have about smart meter installations. High resolution smart meter data can expose many private aspects of a consumer’s ho... Read More about Privacy Preserving Demand Forecasting to Encourage Consumer Acceptance of Smart Energy Meters.

Ontology-based Course Teacher Assignment within Universities (2020)
Journal Article
Ashour, G., Al-Dubai, A., & Romdhani, I. (2020). Ontology-based Course Teacher Assignment within Universities. International Journal of Advanced Computer Science and Applications, 11(7), https://doi.org/10.14569/ijacsa.2020.0110787

Educational institutions suffer from the enormous amount of data that keeps growing continuously. These data are usually scattered and unorganised, and it comes from different resources with different formats. Besides, modernization vision within the... Read More about Ontology-based Course Teacher Assignment within Universities.

The Effects of UTAUT and Usability Qualities on Students’ Use of Learning Management Systems in Saudi Tertiary Education (2020)
Journal Article
Alshehri, A., J Rutter, M., & Smith, S. (2020). The Effects of UTAUT and Usability Qualities on Students’ Use of Learning Management Systems in Saudi Tertiary Education. Journal of Information Technology Education, 19, 891-930. https://doi.org/10.28945/4659

Aim/Purpose This study proposes a theoretical framework that amalgamates Unified Theory of Acceptance and Use of Technology (UTAUT) variables with usability metrics to investigate the impact on students’ intention and use of the Learning Management... Read More about The Effects of UTAUT and Usability Qualities on Students’ Use of Learning Management Systems in Saudi Tertiary Education.

Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks (2020)
Journal Article
Zhao, L., Zhao, W., Hawbani, A., Al-Dubai, A. Y., Min, G., Zomaya, A., & Gong, C. (2021). Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks. IEEE Transactions on Wireless Communications, 20(5), 2991-3004. https://doi.org/10.1109/twc.2020.3046275

To provide efficient networking services at the edge of Internet-of-Vehicles (IoV), Software-Defined Vehicular Network (SDVN) has been a promising technology to enable intelligent data exchange without giving additional duties to the resource constra... Read More about Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks.

Generating Unambiguous and Diverse Referring Expressions   (2020)
Journal Article
Panagiaris, N., Hart, E., & Gkatzia, D. (2021). Generating Unambiguous and Diverse Referring Expressions  . Computer Speech and Language, 68, Article 101184. https://doi.org/10.1016/j.csl.2020.101184

Neural Referring Expression Generation (REG) models have shown promising results in generating expressions which uniquely describe visual objects. However, current REG models still lack the ability to produce diverse and unambiguous referring express... Read More about Generating Unambiguous and Diverse Referring Expressions  .