Skip to main content

Research Repository

Advanced Search

All Outputs (97)

Blockchain for Cybersecurity in Cyber-Physical Systems (2023)
Book
Maleh, Y., Alazab, M., & Romdhani, I. (Eds.). (2023). Blockchain for Cybersecurity in Cyber-Physical Systems. Cham: Springer. https://doi.org/10.1007/978-3-031-25506-9

This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems. It presents crucial issues in this field and provides a sample of recent advances and insights into the research pr... Read More about Blockchain for Cybersecurity in Cyber-Physical Systems.

Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World (2022)
Book
Urquhart, N. (2022). Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World. Cham: Springer. https://doi.org/10.1007/978-3-030-98108-2

This book explains classic routing and transportation problems and solutions, before offering insights based on successful real-world solutions. The chapters in Part I introduce and explain the traveling salesperson problem (TSP), vehicle routing pro... Read More about Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World.

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (2022)
Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers

In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromise... Read More about Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence.

Selected poems: Lorna Lloyd (2022)
Book
Ryan, B., & Hall, H. (Eds.). (2022). Selected poems: Lorna Lloyd. Edinburgh: Edinburgh Napier University

This volume comprises 37 poems by Lorna Lloyd (1914-1942) arranged by date of composition: 1928-1930 (11); early 1930s (11); mid to late 1930s (10); early 1940s (5). It was produced as an output of the AHRC Creative Informatics 'Platform to platform'... Read More about Selected poems: Lorna Lloyd.

Applications of Evolutionary Computation: 25th European Conference, EvoApplications 2022, Held as Part of EvoStar 2022, Madrid, Spain, April 20–22, 2022, Proceedings (2022)
Book
Jiménez Laredo, J. L., Hidalgo, J. I., & Babaagba, K. O. (Eds.). (2022). Applications of Evolutionary Computation: 25th European Conference, EvoApplications 2022, Held as Part of EvoStar 2022, Madrid, Spain, April 20–22, 2022, Proceedings. Springer. https://doi.org/10.1007/978-3-031-02462-7

This book constitutes the refereed proceedings of the 25th International Conference on Applications of Evolutionary Computation, EvoApplications 2022, held as part of Evo*2022, in April 2022, co-located with the Evo*2022 events EuroGP, EvoCOP, and Ev... Read More about Applications of Evolutionary Computation: 25th European Conference, EvoApplications 2022, Held as Part of EvoStar 2022, Madrid, Spain, April 20–22, 2022, Proceedings.

Enhancing Student Support in Higher Education: A Subject-Focused Approach (2022)
Book
Pilcher, N., & Richards, K. (2022). Enhancing Student Support in Higher Education: A Subject-Focused Approach. Palgrave Macmillan. https://doi.org/10.1007/978-3-030-81724-4

This book is about supporting students in Higher Education using language, and specifically using a combination of written text based linguistic approaches alongside and with other non-text related languages. The authors call this a beyond-text subje... Read More about Enhancing Student Support in Higher Education: A Subject-Focused Approach.

Beyond Speculative Design: Past – Present – Future (2021)
Book
Mitrović, I., Auger, J., Hanna, J., & Helgason, I. (Eds.). (2021). Beyond Speculative Design: Past – Present – Future. Split: SpeculativeEdu; Arts Academy, University of Split

The book Beyond Speculative Design: Past – Present – Future consists of six main sections. After the introduction, there is a brief history of speculation in radically different contexts, followed by a broad overview of speculative design practice an... Read More about Beyond Speculative Design: Past – Present – Future.

Parallel Programming Made Simple: Using Groovy Parallel Patterns (2021)
Book
Kerridge, J. (2021). Parallel Programming Made Simple: Using Groovy Parallel Patterns. Copenhagen: Bookboon.com

The use of the Groovy Parallel Patterns Library is described, using many diverse examples, showing how a parallel application can be easily created from existing sequential codes.

Artificial Intelligence and Blockchain for Future Cybersecurity Applications (2021)
Book
Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Cham: Springer. https://doi.org/10.1007/978-3-030-74575-2

Presents the state-of-the-art and the latest discoveries in the field of Artificial Intelligence and Blockchain techniques and methods for future cybersecurity applications Proposes new models, practical solutions and technological advances related... Read More about Artificial Intelligence and Blockchain for Future Cybersecurity Applications.

Sound Design (2020)
Book
McGregor, I. (2020). Sound Design. (3rd)

This book explores the underlying principles of sound design for linear and interactive media, and specifically how they apply to theatre, radio and film. The focus of the text is about how to design effective sound so that audiences' experiences are... Read More about Sound Design.

Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications (2020)
Book
Maleh, Y., Shojaafar, M., Alazab, M., & Romdhani, I. (Eds.). (2020). Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. CRC Press

Blockchain Technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction... Read More about Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications.

Sound Design (2019)
Book
McGregor, I. (2019). Sound Design. (2nd)

This book explores the underlying principles of sound design for linear and interactive media, and specifically how they apply to theatre and radio. The focus of the text is about how to design effective sound so that audiences' experiences are as cl... Read More about Sound Design.

The Human Position in an Artificial World: creativity, ethics and AI in knowledge organization. ISKO UK Sixth Biennial Conference London, 15-16th July 2019 (2019)
Book
Haynes, D., & Vernau, J. (Eds.). (2019). The Human Position in an Artificial World: creativity, ethics and AI in knowledge organization. ISKO UK Sixth Biennial Conference London, 15-16th July 2019. Ergon Verlag

Haynes, David – Vernau, Judi (eds.) The Human Position in an Artificial World: Creativity, Ethics and AI in Knowledge Organization ISKO UK Sixth Biennial Conference London, 15-16th July 2019 2019. 312 p. – 155 × 225 mm. Softcover ISBN 978-3-95650-549... Read More about The Human Position in an Artificial World: creativity, ethics and AI in knowledge organization. ISKO UK Sixth Biennial Conference London, 15-16th July 2019.

GDPR and Cyber Security for Business Information Systems (2018)
Book
Gobeo, A., Fowler, C., & Buchanan, B. (2018). GDPR and Cyber Security for Business Information Systems. River Publishers

The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals i... Read More about GDPR and Cyber Security for Business Information Systems.

Sound Design (2018)
Book
McGregor, I. (2018). Sound Design

This book explores the underlying principles of sound design for linear and interactive media, and specifically how they apply to theatre. The focus of the text is about how to design effective sound so that audiences' experiences are as close as pos... Read More about Sound Design.

Metadata for Information Management and Retrieval: understanding metadata and its use (2018)
Book
Haynes, D. (2018). Metadata for Information Management and Retrieval: understanding metadata and its use. (2nd edition). Facet Publishing

PART I: Metadata concepts Part I introduces the concepts that underpin metadata, starting with an historical perspective. In Chapter 1 some examples of metadata that people come across in their daily life are demonstrated along with some altern... Read More about Metadata for Information Management and Retrieval: understanding metadata and its use.

A psychology of User Experience: Involvement, affect and aesthetics (2017)
Book
Turner, P. (2017). A psychology of User Experience: Involvement, affect and aesthetics. Springer. https://doi.org/10.1007/978-3-319-70653-5

It is well-established that while cognitive psychology provides a sound foundation for an understanding of our interactions with digital technology, this is no longer sufficient to make sense of how we use and experience the personal, relational and... Read More about A psychology of User Experience: Involvement, affect and aesthetics.

Cryptography (2017)
Book
Buchanan, B. (2017). Cryptography. River Publishers

Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to d... Read More about Cryptography.

Securing the Internet of Things (2017)
Book
Romdhani, I. (2017). S. Li, & L. Da Xu (Eds.), Securing the Internet of Things. Elsevier

Key Features Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures Explores how the threats in IoT are different from traditional ad hoc or infrastructural network... Read More about Securing the Internet of Things.