Skip to main content

Research Repository

Advanced Search

All Outputs (2072)

Green Building: An antidote to sick buliding syndrome menace in Africa (2023)
Presentation / Conference Contribution
Liphadzi, M., Osunsanmi, T., Aigbavboa, C. O., Thwala, W., Phuti, T., & Aliu, J. (2023). Green Building: An antidote to sick buliding syndrome menace in Africa. In Proceedings of the Creative Construction Conference 2023 (632-644). https://doi.org/10.331

Sick building syndrome (SBS) is the leading cause of the reduction in the building's occupancy level of satisfaction, poor indoor air quality, and other shenanigans responsible for the underperformance of building occupants and loss in property value... Read More about Green Building: An antidote to sick buliding syndrome menace in Africa.

An exploration of diversity in Embodied Music Interaction (2023)
Presentation / Conference Contribution
Di Donato, B. (2023, May). An exploration of diversity in Embodied Music Interaction. Presented at CHIME: Music Interaction and Physical Disability, University of Edinburgh, Edinburgh

This is an exploration of diversity in Embodied Music Interaction through three case studies entitled (i) Accessible interactive digital signage for the visually impaired, (ii) Human-Sound Interaction and (iii) BSL in Embodied Music Interaction (EMI)... Read More about An exploration of diversity in Embodied Music Interaction.

A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs (2023)
Presentation / Conference Contribution
McLaren, R. A., Babaagba, K., & Tan, Z. (2023). A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. In Machine Learning, Optimization, and Data Science: 8th International Conference, LOD 2022, Certosa di Po

As the field of malware detection continues to grow, a shift in focus is occurring from feature vectors and other common, but easily obfuscated elements to a semantics based approach. This is due to the emergence of more complex malware families that... Read More about A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs.

Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain (2023)
Presentation / Conference Contribution
Moradpoor, N., Barati, M., Robles-Durazno, A., Abah, E., & McWhinnie, J. (2023). Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain. In Proceedings of the International Conference on Cybersecurity, Situational Awaren

The protection of critical national infrastructures such as drinking water, gas, and electricity is extremely important as nations are dependent on their operation and steadiness. However, despite the value of such utilities their security issues hav... Read More about Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain.

Practical Cyber Threat Intelligence in the UK Energy Sector (2023)
Presentation / Conference Contribution
Paice, A., & McKeown, S. (2023). Practical Cyber Threat Intelligence in the UK Energy Sector. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media (3-23). https://doi.org/10.1007/978-981-19-6414-5_1

The UK energy sector is a prime target for cyber-attacks by foreign states, criminals, ‘hacktivist’ groups, and terrorists. As Critical National Infrastructure (CNI), the industry needs to understand the threats it faces to mitigate risks and make ef... Read More about Practical Cyber Threat Intelligence in the UK Energy Sector.

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device (2022)
Presentation / Conference Contribution
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022). Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICI

Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discret... Read More about Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device.

Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets (2022)
Presentation / Conference Contribution
Alharigy, L. M., Al-Nuaim, H. A., & Moradpoor, N. (2022). Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets. In 2022 14th International Conference on Computational Intelligence and Communica

Cyberbullying is a widespread problem that has only increased in recent years due to the massive dependence on social media. Although, there are many approaches for detecting cyberbullying they still need to be improved upon for more accurate detecti... Read More about Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets.

Developing a Digital ForensicsTerminology Using Natural Language Processing (2022)
Presentation / Conference Contribution
Le Gall, M., Cole, C., Haynes, D., & Nic Daeid, N. (2022). Developing a Digital ForensicsTerminology Using Natural Language Processing. In M. Lykke, T. Svarre, D. Haynes, M. Skov, M. Thellesfsen, & D. Martinez-Avila (Eds.), Knowledge Organization across D

High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network (2022)
Presentation / Conference Contribution
Zhang, Z., Li, Y., Liu, Q., & Liu, X. (2022). High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network. In 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, I

A basic stage of hydrological research is to automatically extract water body information from high-resolution remote sensing images. Various methods based on deep learning convolutional neural networks have been proposed in recent studies to achieve... Read More about High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network.

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) (2022)
Presentation / Conference Contribution
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022, September). Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). Presented at 27th European Symposium on Research in Computer Security

Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detecting attacks. However, the lack of transparency in their decision-making pro... Read More about Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract).

Multi-Agent Modelling Notation (MAMN): A multi-layered graphical modelling notation for agent-based simulations (2022)
Presentation / Conference Contribution
Nguyen, J., Powers, S., Urquhart, N., Farrenkopf, T., & Guckert, M. (2022). Multi-Agent Modelling Notation (MAMN): A multi-layered graphical modelling notation for agent-based simulations. In PRIMA 2022: Principles and Practice of Multi-Agent Systems - 2

Cause-effect graphs have been applied in non agent-based simulations, where they are used to model chained causal relations between input parameters and system behaviour measured by appropriate indicators. This can be useful for the analysis and inte... Read More about Multi-Agent Modelling Notation (MAMN): A multi-layered graphical modelling notation for agent-based simulations.

Is the public library included? An analysis of local government documentation on the integration of forced migrants in Scotland (2022)
Presentation / Conference Contribution
Salzano, R., Hall, H., Webster, G., & Brazier, D. (2022, May). Is the public library included? An analysis of local government documentation on the integration of forced migrants in Scotland. Presented at Conceptions of Library and Information Science, Os

Introduction - Library and information science researchers identify public library roles in the integration of forced migrants into local communities. Here an analysis of formal documentation issued by local authorities allowed for an exploration of... Read More about Is the public library included? An analysis of local government documentation on the integration of forced migrants in Scotland.

A Quantitative Field Study of a Persuasive Security Technology in the Wild (2022)
Presentation / Conference Contribution
Vargheese, J. P., Collinson, M., & Masthoff, J. (2022). A Quantitative Field Study of a Persuasive Security Technology in the Wild. In Social Informatics: 13th International Conference, SocInfo 2022, Glasgow, UK, October 19–21, 2022, Proceedings (211-2

Persuasive techniques and persuasive technologies have been suggested as a means to improve user cybersecurity behaviour, but there have been few quantitative studies in this area. In this paper, we present a large scale evaluation of persuasive mess... Read More about A Quantitative Field Study of a Persuasive Security Technology in the Wild.

Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle (2022)
Presentation / Conference Contribution
Cunningham, S., & Mcgregor, I. (2022). Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle. In AM '22: Proceedings of the 17th International Audio Mostly Conference (113-120). https://doi.org/1

Foley artistry is an essential part of the audio post-production process for film, television, games, and animation. By extension, it is as crucial in emergent media such as virtual, mixed, and augmented reality. Footsteps are a core activity that a... Read More about Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle.

Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures (2022)
Presentation / Conference Contribution
Zheng, C., Zhen, C., Xie, H., & Yang, S. (2022). Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures. In 2022 IEEE Conference on Dependable and Secure Computing (DSC). https://doi.org/10.1109/dsc54232.2022.9888

Reinforcement Learning (RL) is one of the most popular methods for solving complex sequential decision-making problems. Deep RL needs careful sensing of the environment, selecting algorithms as well as hyper-parameters via soft agents, and simultaneo... Read More about Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures.

A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling (2022)
Presentation / Conference Contribution
Turnbull, L., Tan, Z., & Babaagba, K. (2022). A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. In 2022 IEEE Conference on Dependable and Secure Computing (DSC). https://doi.org/10.1109/DSC54232

Malicious software trends show a persistent yearly increase in volume and cost impact. More than 350,000 new malicious or unwanted programs that target various technologies were registered daily over the past year. Metamorphic malware is a specifical... Read More about A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling.

The creative use of digitised archives: case study of Lorna Lloyd’s ‘Diary of the War’ podcast series (2022)
Presentation / Conference Contribution
Ryan, B., Hall, H., Wilson, M., & Berger, J. (2022, September). The creative use of digitised archives: case study of Lorna Lloyd’s ‘Diary of the War’ podcast series. Presented at The BBC at 100 Symposium, National Science and Media Museum, Bradford

The roundtable discussion is concerned with the creative use of digitised archives in the work undertaken for the AHRC Creative Informatics funded Platform to Platform project. This centres on the exploitation, augmentation, and exhibition of a set o... Read More about The creative use of digitised archives: case study of Lorna Lloyd’s ‘Diary of the War’ podcast series.

Seguranca digital e o regulacao do metaverso (in Portuguese) (2022)
Presentation / Conference Contribution
Haynes, D. (2022, September). Seguranca digital e o regulacao do metaverso (in Portuguese)

This summarises the research questions being investigated in the Starter grant 2021 to investigate the usage of and attitudes towards the metaverse in the UK. The purpose of the talk is to stimulate discussion with Brazilian partners to form the basi... Read More about Seguranca digital e o regulacao do metaverso (in Portuguese).

Seguranca e o Metaverso (2022)
Presentation / Conference Contribution
Haynes, D. (2022, September). Seguranca e o Metaverso. Presented at Unesp and UFSC Universities, Sao Paulo State, Brazil [online]

Talk in Portuguese to colleagues at Unesp and UFSC Universities in Sao Paulo state, Brazil. The talk was delivered via an online connection and is available as a recording on YouTube. The talk outlined some of the problems of privacy and security... Read More about Seguranca e o Metaverso.

Evaluating Colour in Concept Diagrams (2022)
Presentation / Conference Contribution
McGrath, S., Blake, A., Stapleton, G., Touloumis, A., Chapman, P., Jamnik, M., & Shams, Z. (2022). Evaluating Colour in Concept Diagrams. In Diagrammatic Representation and Inference: 13th International Conference, Diagrams 2022, Rome, Italy, September

This paper is the first to establish the impact of colour on users' ability to interpret the informational content of concept diagrams, a logic designed for ontology engineering. Motivation comes from results for Euler diagrams, which form a fragment... Read More about Evaluating Colour in Concept Diagrams.