Skip to main content

Research Repository

Advanced Search

All Outputs (238)

Developing a Digital ForensicsTerminology Using Natural Language Processing (2022)
Presentation / Conference Contribution
Le Gall, M., Cole, C., Haynes, D., & Nic Daeid, N. (2022, July). Developing a Digital ForensicsTerminology Using Natural Language Processing. Presented at Knowledge Organization across Disciplines, Domains, Services, and Technologies, Aalborg, Denmark

Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets (2022)
Presentation / Conference Contribution
Alharigy, L. M., Al-Nuaim, H. A., & Moradpoor, N. (2022, December). Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets. Presented at 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN), Al Khobar, Saudi Arabia

Cyberbullying is a widespread problem that has only increased in recent years due to the massive dependence on social media. Although, there are many approaches for detecting cyberbullying they still need to be improved upon for more accurate detecti... Read More about Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets.

Selected poems: Lorna Lloyd (2022)
Book
Ryan, B., & Hall, H. (Eds.). (2022). Selected poems: Lorna Lloyd. Edinburgh: Edinburgh Napier University

This volume comprises 37 poems by Lorna Lloyd (1914-1942) arranged by date of composition: 1928-1930 (11); early 1930s (11); mid to late 1930s (10); early 1940s (5). It was produced as an output of the AHRC Creative Informatics 'Platform to platform'... Read More about Selected poems: Lorna Lloyd.

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (2022)
Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers

In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromise... Read More about Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence.

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device (2022)
Presentation / Conference Contribution
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022, February). Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. Presented at 8th International Conference on Information Systems Security and Privacy, Online

Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discret... Read More about Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device.

Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World (2022)
Book
Urquhart, N. (2022). Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World. Cham: Springer. https://doi.org/10.1007/978-3-030-98108-2

This book explains classic routing and transportation problems and solutions, before offering insights based on successful real-world solutions. The chapters in Part I introduce and explain the traveling salesperson problem (TSP), vehicle routing pro... Read More about Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World.

High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network (2022)
Presentation / Conference Contribution
Zhang, Z., Li, Y., Liu, Q., & Liu, X. (2022, September). High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network. Presented at 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Falerna, Italy

A basic stage of hydrological research is to automatically extract water body information from high-resolution remote sensing images. Various methods based on deep learning convolutional neural networks have been proposed in recent studies to achieve... Read More about High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network.

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) (2022)
Presentation / Conference Contribution
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022, September). Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). Presented at 27th European Symposium on Research in Computer Security (ESORICS) 2022, Copenhagen, Denmark

Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detecting attacks. However, the lack of transparency in their decision-making pro... Read More about Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract).

A framework for live host-based Bitcoin wallet forensics and triage (2022)
Journal Article
Holmes, A., & Buchanan, W. J. (2023). A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486

Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislation to recover the proceeds of crime from criminals. Recent UK case law has r... Read More about A framework for live host-based Bitcoin wallet forensics and triage.

Accelerating neural network architecture search using multi-GPU high-performance computing (2022)
Journal Article
Lupión, M., Cruz, N. C., Sanjuan, J. F., Paechter, B., & Ortigosa, P. M. (2023). Accelerating neural network architecture search using multi-GPU high-performance computing. Journal of Supercomputing, 79, 7609-7625. https://doi.org/10.1007/s11227-022-04960-z

Neural networks stand out from artificial intelligence because they can complete challenging tasks, such as image classification. However, designing a neural network for a particular problem requires experience and tedious trial and error. Automating... Read More about Accelerating neural network architecture search using multi-GPU high-performance computing.

Quantum Dynamic Optimization Algorithm for Neural Architecture Search on Image Classification (2022)
Journal Article
Jin, J., Zhang, Q., He, J., & Yu, H. (2022). Quantum Dynamic Optimization Algorithm for Neural Architecture Search on Image Classification. Electronics, 11(23), Article 3969. https://doi.org/10.3390/electronics11233969

Deep neural networks have proven to be effective in solving computer vision and natural language processing problems. To fully leverage its power, manually designed network templates, i.e., Residual Networks, are introduced to deal with various visio... Read More about Quantum Dynamic Optimization Algorithm for Neural Architecture Search on Image Classification.

Internet of drones security: taxonomies, open issues, and future directions (2022)
Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., Maglaras, L., & Khan, F. A. (2023). Internet of drones security: taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.vehcom.2022.100552

Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast array of applications and paved the way for a diversity of innovative solutions... Read More about Internet of drones security: taxonomies, open issues, and future directions.

An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant (2022)
Journal Article
Jemmali, M., Bashir, A. K., Boulila, W., Melhim, L. K. B., Jhaveri, R. H., & Ahmad, J. (2023). An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant. IEEE Transactions on Intelligent Transportation Systems, 24(12), 15633 - 15641. https://doi.org/10.1109/tits.2022.3219568

Nowadays, developing environmental solutions to ensure the preservation and sustainability of natural resources is one of the core research topics for providing a better life quality. Using renewable energy sources, such as solar energy, is one of th... Read More about An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant.

Circuit Modelling of Broadband Antenna Using Vector Fitting and Foster Form Approaches for IoT Applications (2022)
Journal Article
Ez-zaki, F., Belaid, K. A., Ahmad, S., Belahrach, H., Ghammaz, A., Al-Gburi, A. J. A., & Parachin, N. O. (2022). Circuit Modelling of Broadband Antenna Using Vector Fitting and Foster Form Approaches for IoT Applications. Electronics, 11(22), Article 3724. https://doi.org/10.3390/electronics11223724

Computation of the broadband antenna impedance behavior requires the wideband lumped equivalent circuit. This work aims to provide a comprehensive study of broadband antenna equivalent circuit models over broad frequency ranges for Internet of Things... Read More about Circuit Modelling of Broadband Antenna Using Vector Fitting and Foster Form Approaches for IoT Applications.

Multi-Agent Modelling Notation (MAMN): A multi-layered graphical modelling notation for agent-based simulations (2022)
Presentation / Conference Contribution
Nguyen, J., Powers, S., Urquhart, N., Farrenkopf, T., & Guckert, M. (2022, November). Multi-Agent Modelling Notation (MAMN): A multi-layered graphical modelling notation for agent-based simulations. Presented at 24th International Conference on Principles and Practice of Multi-Agent Systems, Valencia, Spain

Cause-effect graphs have been applied in non agent-based simulations, where they are used to model chained causal relations between input parameters and system behaviour measured by appropriate indicators. This can be useful for the analysis and inte... Read More about Multi-Agent Modelling Notation (MAMN): A multi-layered graphical modelling notation for agent-based simulations.

Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things (2022)
Journal Article
Hasan, A., Khan, M. A., Shabir, B., Munir, A., Malik, A. W., Anwar, Z., & Ahmad, J. (2022). Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences, 12(22), Article 11442. https://doi.org/10.3390/app122211442

The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedicated to securing these systems, but various vulnerabilities remain. Notably,... Read More about Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things.

Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring (2022)
Journal Article
Ghadi, Y. Y., Alsuhibany, S. A., Ahmad, J., Kumar, H., Boulila, W., Alsaedi, M., Khan, K., & Bhatti, S. A. (2022). Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring. Journal of Healthcare Engineering, 2022, Article 7745132. https://doi.org/10.1155/2022/7745132

With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based occupancy monitoring and wireless channels, especially Wi-Fi hotspot, pose s... Read More about Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring.

A Proposal of a New Chaotic Map for Application in the Image Encryption Domain (2022)
Journal Article
Abu-Amara, F., & Ahmad, J. (2023). A Proposal of a New Chaotic Map for Application in the Image Encryption Domain. Journal of Information and Knowledge Management, 22(2), Article 2250088. https://doi.org/10.1142/s0219649222500885

Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption scheme has pros and cons regarding its speed, complexity, and security. This paper proposes a new chaotic map called Power-Chaotic Map (PCM). Characte... Read More about A Proposal of a New Chaotic Map for Application in the Image Encryption Domain.