Skip to main content

Research Repository

Advanced Search

All Outputs (242)

O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification (2019)
Journal Article
Kakavand, M., Mustapha, A., Tan, Z., Foroozana, S., & Arulsamy, L. (2019). O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification. IEEE Access, 7, 167141-167156. https://doi.org/10.1109/access.2019.2953791

Most active research in Host and Network Intrusion Detection Systems are only able to detect attacks of the computer systems and attacks at the network layer, which are not sufficient to counteract SOAP/REST or XML/JSON-related attacks. In dealing wi... Read More about O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification.

CityFlow: Supporting Spatial-Temporal Edge Computing for Urban Machine Learning Applications (2019)
Presentation / Conference Contribution
Kawano, M., Yonezawa, T., Tanimura, T., Giang, N. K., Broadbent, M., Lea, R., & Nakazawa, J. (2018, November). CityFlow: Supporting Spatial-Temporal Edge Computing for Urban Machine Learning Applications. Presented at EAI International Conference on IoT in Urban Space, Guimarães, Portugal

A growing trend in smart cities is the use of machine learning techniques to gather city data, formulate learning tasks and models, and use these to develop solutions to city problems. However, although these processes are sufficient for theoretical... Read More about CityFlow: Supporting Spatial-Temporal Edge Computing for Urban Machine Learning Applications.

Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node (2019)
Presentation / Conference Contribution
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2019, August). Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node. Presented at 2019 IEEE International Conference on Smart Internet of Things, Tianjin, China

In Wireless Sensor Networks (WSNs) the use of Mobile Sink Nodes (MSNs) has been proposed in order to negate the ”hotspot” issue. This where nodes closest to the sink node shall run out of energy fastest, affecting network lifetime. However, in using... Read More about Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node.

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels (2019)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2019, July). WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels. Presented at 15th IEEE International Conference on Control & Automation (ICCA), Edinburgh, Scotland

Industrial Control Systems (ICS) have faced a growing number of threats over the past few years. Reliance on isolated controls networks or air-gapped computers is no longer a feasible solution when it comes to protecting ICS. It is because the new ar... Read More about WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels.

A novel statistical analysis and autoencoder driven intelligent intrusion detection approach (2019)
Journal Article
Ieracitano, C., Adeel, A., Morabito, F. C., & Hussain, A. (2020). A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing, 387, 51-62. https://doi.org/10.1016/j.neucom.2019.11.016

In the current digital era, one of the most critical and challenging issues is ensuring cybersecurity in information technology (IT) infrastructures. With significant improvements in technology, hackers have been developing ever more complex and dang... Read More about A novel statistical analysis and autoencoder driven intelligent intrusion detection approach.

A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids (2019)
Journal Article
Adeel, A., Ahmad, J., Larijani, H., & Hussain, A. (2020). A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids. Cognitive Computation, 12, 589-601. https://doi.org/10.1007/s12559-019-09653-z

Next-generation audio-visual (AV) hearing aids stand as a major enabler to realize more intelligible audio. However, high data rate, low latency, low computational complexity, and privacy are some of the major bottlenecks to the successful deployment... Read More about A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids.

Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network (2019)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2019). Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network. Sensors, 19(22), Article 4930. https://doi.org/10.3390/s19224930

The hotspot issue in wireless sensor networks, with nodes nearest the sink node losing energy fastest and degrading network lifetime, is a well referenced problem. Mobile sink nodes have been proposed as a solution to this. This does not completely r... Read More about Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network.

Unsupervised Anomaly Thresholding from Reconstruction Errors (2019)
Presentation / Conference Contribution
Ndubuaku, M. U., Anjum, A., & Liotta, A. (2019). Unsupervised Anomaly Thresholding from Reconstruction Errors. In Unsupervised Anomaly Thresholding from Reconstruction Errors (123-129). https://doi.org/10.1007/978-3-030-34914-1_12

Internet of Things (IoT) sensors generate massive streaming data which needs to be processed in real-time for many applications. Anomaly detection is one popular way to process such data and discover nuggets of information. Various machine learning t... Read More about Unsupervised Anomaly Thresholding from Reconstruction Errors.

Development of a design tool to optimise acceptance of exoskeletons by older adults (2019)
Thesis
Shore, L. (2019). Development of a design tool to optimise acceptance of exoskeletons by older adults. (Thesis). University of Limerick, Ireland. http://researchrepository.napier.ac.uk/Output/2757643

Older adults may have some prior use and knowledge of technology, but may also express or experience the digital divide, whereby the pace of emerging technology can present challenges to older adults and their ability to ‘keep up’. This can be a fact... Read More about Development of a design tool to optimise acceptance of exoskeletons by older adults.

The Importance of Authenticity in Cyber Security Training and Education (2019)
Presentation / Conference Contribution
Macfarlane, R., & Mata de Acuna, J. (2019, November). The Importance of Authenticity in Cyber Security Training and Education. Presented at JISC Security Conference, Newcastle, England

The knowledge gap between academy and industry is a challenging issue that educators face every day. In the field of cyber security, it is important that students understand the need of adapting and acquiring new skills that allow them to put their t... Read More about The Importance of Authenticity in Cyber Security Training and Education.

Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme (2019)
Presentation / Conference Contribution
Babaagba, K. O., Tan, Z., & Hart, E. (2019, November). Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme. Presented at The 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2019), Guangzhou, China

The ability to detect metamorphic malware has generated significant research interest over recent years, particularly given its proliferation on mobile devices. Such malware is particularly hard to detect via signature-based intrusion detection syste... Read More about Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme.

Attention Graph Convolution Network for Image Segmentation in Big SAR Imagery Data (2019)
Journal Article
Ma, F., Gao, F., Sun, J., Zhou, H., & Hussain, A. (2019). Attention Graph Convolution Network for Image Segmentation in Big SAR Imagery Data. Remote Sensing, 11(21), 2586. https://doi.org/10.3390/rs11212586

The recent emergence of high-resolution Synthetic Aperture Radar (SAR) images leads to massive amounts of data. In order to segment these big remotely sensed data in an acceptable time frame, more and more segmentation algorithms based on deep learni... Read More about Attention Graph Convolution Network for Image Segmentation in Big SAR Imagery Data.

HarpCI, Empowering Performers to Control and Transform Harp Sounds in Live Performance (2019)
Journal Article
Di Donato, B., Dooley, J., & Coccioli, L. (2019). HarpCI, Empowering Performers to Control and Transform Harp Sounds in Live Performance. Contemporary Music Review, 38(6), 667-686. https://doi.org/10.1080/07494467.2019.1706351

The goal of our research is to provide harpists with the tools to control and transform the sounds of their instrument in a natural and musical way. We consider the development of music with live electronics, with particular reference to the harp rep... Read More about HarpCI, Empowering Performers to Control and Transform Harp Sounds in Live Performance.

Debugging Ontologies Dataset (2019)
Data
Hou, T., & Chapman, P. (2019). Debugging Ontologies Dataset. [Dataset]. https://doi.org/10.17869/enu.2019.2275806

Visualization has been widely used for the representation of ontologies. However, to the best of our knowledge, visualization has been little employed in ontology debugging. Effective ontology debugging is crucial for engineers and domain experts to... Read More about Debugging Ontologies Dataset.

Measuring perceived clutter in concept diagrams dataset (2019)
Data
Hou, T., & Chapman, P. (2019). Measuring perceived clutter in concept diagrams dataset. [Dataset]. https://doi.org/10.17869/enu.2019.2275800

Clutter in a diagram can be broadly defined as how visually complex the diagram is. It may be that different users perceive clutter in different ways, however. Moreover, it has been shown that, for certain types of diagrams and tasks, an increase in... Read More about Measuring perceived clutter in concept diagrams dataset.

Antipattern comprehension dataset (2019)
Data
Hou, T., & Chapman, P. (2019). Antipattern comprehension dataset. [Dataset]. https://doi.org/10.17869/enu.2019.2275783

Comprehension of justifications is known to be difficult for even experienced ontology engineers, and much more so for other stakeholders. In the paper associated with this data set, we presented two methods for displaying justifications using concep... Read More about Antipattern comprehension dataset.

A non-parametric softmax for improving neural attention in time-series forecasting (2019)
Journal Article
Totaro, S., Hussain, A., & Scardapane, S. (2020). A non-parametric softmax for improving neural attention in time-series forecasting. Neurocomputing, 381, 177-185. https://doi.org/10.1016/j.neucom.2019.10.084

Neural attention has become a key component in many deep learning applications, ranging from machine translation to time series forecasting. While many variations of attention have been developed over recent years, all share a common component in the... Read More about A non-parametric softmax for improving neural attention in time-series forecasting.

RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture (2019)
Thesis
Ukwandu, E. A. RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2455031

Scaling big data infrastructure using multi-cloud environment has led to the demand for highly secure, resilient and reliable data sharing method. Several variants of secret sharing scheme have been proposed but there remains a gap in knowledge on th... Read More about RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture.

Reliable and energy efficient mechanisms for wireless sensor networks (2019)
Thesis
Ali, A. O. E. S. Reliable and energy efficient mechanisms for wireless sensor networks. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2404287

Sensor nodes and their underlying communication technologies are characterised by restricted power resources, restricted processing, limited storage capacities, low data rates and lossy links, and they may also comprise up to a thousand nodes. Wirele... Read More about Reliable and energy efficient mechanisms for wireless sensor networks.