Skip to main content

Research Repository

Advanced Search

Outputs (4095)

Mitigating Disaster using Secure Threshold-Cloud Architecture (2018)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., & Russell, G. (2018, November). Mitigating Disaster using Secure Threshold-Cloud Architecture

There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to apply secret sharing methods as used in cryptography to create shares of crypt... Read More about Mitigating Disaster using Secure Threshold-Cloud Architecture.

Blockchain Technologies for the Internet of Things: Research Issues and Challenges (2018)
Journal Article
Ferrag, M. A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Janicke, H. (2019). Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet of Things, 6(2), 2188-2204. https://doi.org/10.1109/jiot.2018.2882794

This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we pr... Read More about Blockchain Technologies for the Internet of Things: Research Issues and Challenges.

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services (2018)
Journal Article
Zhang, S., Li, X., Tan, Z., Peng, T., & Wang, G. (2019). A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Generation Computer Systems, 94, 40-50. https://doi.org/10.1016/j.future.2018.10.053

With the rapid pervasion of location-based services (LBSs), protection of location privacy has become a significant concern. In most continuous LBSs' privacy-preserving solutions, users need to transmit the location query data to an untrusted locatio... Read More about A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.

Teaching Live Coding of Electronic Dance Music: A Case Study (2018)
Journal Article
Cheng, L. (2018). Teaching Live Coding of Electronic Dance Music: A Case Study. Dancecult: Journal of Electronic Dance Music Culture, 10(1), https://doi.org/10.12801/1947-5403.2018.10.01.10

Live coding is a relatively new performance practice that emphasizes the expressive possibilities afforded by computer programming. Live coding has often been associated with contemporary musical styles such as electronic dance music (EDM), which fav... Read More about Teaching Live Coding of Electronic Dance Music: A Case Study.

The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime (2018)
Journal Article
Dyson, S., Buchanan, W., & Bell, L. (2018). The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime. The Journal of the British Blockchain Association, 1(2), 1-6. https://doi.org/10.31585/jbba-1-2-%288%292018

We increasingly live in a world where there is a balance between the rights to privacy and the requirements for consent, and the rights of society to protect itself. Within this world, there is an ever-increasing requirement to protect the identities... Read More about The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime.

The Nature of Risk and the Privacy Calculus (2018)
Presentation / Conference Contribution
Haynes, D. (2018, November). The Nature of Risk and the Privacy Calculus. Poster presented at Royal Academy of Engineering Annual Research Forum, London

Haynes, D. (2018, November). The Nature of Risk and the Privacy Calculus. Poster presented at Royal Academy of Engineering Annual Research Forum, London.

Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates (2018)
Presentation / Conference Contribution
Rooney, L., Chute, C., Buchanan, W. J., Smales, A., & Hepburn, L.-A. (2018, November). Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates. Presented at Global Health 2018, Athens, Greece

Long-term conditions in Scotland account for 80% of all GP consultations; they also account for 60% of all deaths in Scotland. Asthma and Chronic Obstructive Pulmonary Disease (COPD) are common long-term respiratory diseases [1]. Asthma is a heteroge... Read More about Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates.

How a view of language underpins approaches to supporting higher education students that facilitate neo-liberalism, and how to resist this (2018)
Journal Article
Richards, K., & Pilcher, N. (2018). How a view of language underpins approaches to supporting higher education students that facilitate neo-liberalism, and how to resist this. Power and Education, 175774381881180. https://doi.org/10.1177/1757743818811801

In this article we argue a particular view of language underpins approaches to supporting students in Higher Education, and that this view facilitates neoliberalism. Universities worldwide have glossaries of terms such as 'describe' or 'discuss', and... Read More about How a view of language underpins approaches to supporting higher education students that facilitate neo-liberalism, and how to resist this.

Use of machine learning techniques to model wind damage to forests (2018)
Journal Article
Hart, E., Sim, K., Kamimura, K., Meredieu, C., Guyon, D., & Gardiner, B. (2019). Use of machine learning techniques to model wind damage to forests. Agricultural and forest meteorology, 265, 16-29. https://doi.org/10.1016/j.agrformet.2018.10.022

This paper tested the ability of machine learning techniques, namely artificial neural networks and random forests, to predict the individual trees within a forest most at risk of damage in storms. Models based on these techniques were developed i... Read More about Use of machine learning techniques to model wind damage to forests.

Impact of cyberattacks on stock performance: a comparative study (2018)
Journal Article
Tweneboah-Kodua, S., Atsu, F., & Buchanan, W. (2018). Impact of cyberattacks on stock performance: a comparative study. Information and Computer Security, 26(5), 637-652. https://doi.org/10.1108/ics-05-2018-0060

The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period January 03, 2013 and December 29, 2017.
The empirical analysis was performed in two ways: cross-section and industry level. We employ statistical tests... Read More about Impact of cyberattacks on stock performance: a comparative study.