Skip to main content

Research Repository

Advanced Search

Outputs (4095)

PGCert-2014 Academic Paper and Pedagogy model outline (2014)
Presentation / Conference Contribution
Sheykhkanloo, N. M. (2014, October). PGCert-2014 Academic Paper and Pedagogy model outline. Paper presented at Teaching and Learning Enhancement Conference

This paper aims to explore the development of the Abertay Graduate Attributes (AGAs) into one of the computing modules, Issues in Network Security, for third year digital forensic students in school of Science Engineering and Technology (SET) at Univ... Read More about PGCert-2014 Academic Paper and Pedagogy model outline.

Enhancing Big Data Security with Collaborative Intrusion Detection (2014)
Journal Article
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014). Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. https://doi.org/10.1109/mcc.2014.53

Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a data-driven process. The security and privacy of this data, however, have al... Read More about Enhancing Big Data Security with Collaborative Intrusion Detection.

Shielding the Grid World: An Overview (2014)
Journal Article
Chrysoulas, C. (2014). Shielding the Grid World: An Overview. International Journal of Electronics and Information Engineering, 1(1), 23-28

Continues research and development efforts within the Grid community have produced protocols, services, and tools that address the challenges arising when we seek to build scalable virtual organizations (VOs). The technologies that have evolved from... Read More about Shielding the Grid World: An Overview.

A Novel Feature Selection Approach for Intrusion Detection Data Classification (2014)
Presentation / Conference Contribution
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F., & Nagar, U. T. (2014, September). A Novel Feature Selection Approach for Intrusion Detection Data Classification. Presented at 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications

Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats. However, the routinely produced analytical data from computer networks ar... Read More about A Novel Feature Selection Approach for Intrusion Detection Data Classification.

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment (2014)
Presentation / Conference Contribution
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014, September). A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. Presented at 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications

The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to represent itself in the digital wo... Read More about A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning (2014)
Presentation / Conference Contribution
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014, September). Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. Presented at 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications

The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish the task, and these algorithms require a large number of labeled training d... Read More about Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.

A Stateful Mechanism for the Tree-Rule Firewall (2014)
Presentation / Conference Contribution
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014, September). A Stateful Mechanism for the Tree-Rule Firewall. Presented at 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications

In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewall model based on the proposed connection tracking mechanism is then develop... Read More about A Stateful Mechanism for the Tree-Rule Firewall.

Arrowhead compliant virtual market of energy (2014)
Presentation / Conference Contribution
Ferreira, L. L., Siksnys, L., Pedersen, P., Stluka, P., Chrysoulas, C., le Guilly, T., Albano, M., Skou, A., Teixeira, C., & Pedersen, T. (2014, September). Arrowhead compliant virtual market of energy. Presented at 2014 IEEE Emerging Technology and Factory Automation (ETFA), Barcelona, Spain

Industrial processes use energy to transform raw materials and intermediate goods into final products. Many efforts have been done on the minimization of energy costs in industrial plants. Apart from working on “how” an industrial process is implemen... Read More about Arrowhead compliant virtual market of energy.

AGADE how individual guidance leads to group behaviour and how this can be simulated (2014)
Presentation / Conference Contribution
Farrenkopf, T., Guckert, M., Hoffmann, B., & Urquhart, N. B. (2014, September). AGADE how individual guidance leads to group behaviour and how this can be simulated. Presented at 12th German Conference, MATES 2014, Stuttgart, Germany

In this paper we will demonstrate how BDI agents can be used to model individuals as participants in social structures where they act as potential buyers in a simple mobile phone market simulation. The simulation presented here is run in AGADE (Agile... Read More about AGADE how individual guidance leads to group behaviour and how this can be simulated.

Spaces of Interaction, places for experience. (2014)
Book
Benyon, D. (2014). Spaces of Interaction, places for experience. Morgan & Claypool Publishers. https://doi.org/10.2200/S00595ED1V01Y201409HCI022

Spaces of Interaction, Places for Experience is a book about Human-Computer Interaction (HCI), interaction design (ID) and user experience (UX) in the age of ubiquitous computing. The book explores interaction and experience through the different spa... Read More about Spaces of Interaction, places for experience..