Skip to main content

Research Repository

Advanced Search

All Outputs (291)

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System (2018)
Book Chapter
Cook, A., Smith, R., Maglaras, L., & Janicke, H. (2018). SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (1168-1183). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch057

The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for inv... Read More about SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.

A Novel Method for Calculating Customer Reviews Ratings (2018)
Book Chapter
Vourgidis, I. S., Carter, J., Maglaras, L., Janicke, H., Folia, Z., & Fragkou, P. (2018). A Novel Method for Calculating Customer Reviews Ratings. In A. Elçi (Ed.), Handbook of Research on Contemporary Perspectives on Web-Based Systems (460-478). IGI Global. https://doi.org/10.4018/978-1-5225-5384-7.ch020

The number of consumers consulting online reviews in order to purchase a product or service, keeps growing. In addition to that, consumers can add an online review in order to express their experience upon the services or products received. This iter... Read More about A Novel Method for Calculating Customer Reviews Ratings.

CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems (2018)
Book Chapter
Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Janicke, H., & Jones, K. (2018). CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (622-637). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch033

Cyber Security of ICS/SCADA systems is a major aspect of current research focus. Cyber Ranges and Test-beds can serve as means of vulnerability and threat analysis of real SCADA systems with low costs. Significantly lacking from current research, is... Read More about CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems.

Performance Analysis of Support Vector Machine-Based Classifier for Spectrum Sensing in Cognitive Radio Networks (2018)
Presentation / Conference Contribution
Jan, S. U., Vu, V. H., & Koo, I. S. (2018, October). Performance Analysis of Support Vector Machine-Based Classifier for Spectrum Sensing in Cognitive Radio Networks. Presented at 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Zhengzhou, China

In this work, the performance of support vector machine (SVM)-based classifier, applied for spectrum sensing in cognitive radio (CR) networks, is analyzed. A single observation given input to classifier is composed of three statistical features extra... Read More about Performance Analysis of Support Vector Machine-Based Classifier for Spectrum Sensing in Cognitive Radio Networks.

Social learning and cultural evolution in artificial life (2018)
Journal Article
Marriott, C., Borg, J. M., Andras, P., & Smaldino, P. E. (2018). Social learning and cultural evolution in artificial life. Artificial Life, 24(1), 5-9. https://doi.org/10.1162/ARTL_a_00250

We describe the questions and discussions raised at the First Workshop on Social Learning and Cultural Evolution held at theArtificial Life Conference 2016 in Cancún, Mexico in July 2016. The purpose of the workshop was to assemble artificial life re... Read More about Social learning and cultural evolution in artificial life.

Cooperation in Repeated Rock-Paper-Scissors Games in Uncertain Environments (2018)
Presentation / Conference Contribution
Andras, P. (2018). Cooperation in Repeated Rock-Paper-Scissors Games in Uncertain Environments. In ALIFE 2018: The 2018 Conference on Artificial Life (404-411). https://doi.org/10.1162/isal_a_00078

Cooperation among selfish individuals provides the fundamentals for social organization among animals and humans. Cooperation games capture this behavior at an abstract level and provide the tools for the analysis of the evolution of cooperation. Her... Read More about Cooperation in Repeated Rock-Paper-Scissors Games in Uncertain Environments.

Metadata, Ethics and Trust (2018)
Journal Article
Haynes, D. (2018). Metadata, Ethics and Trust. Catalogue & Index, 2-6

Abstract not available.

Preface (2018)
Presentation / Conference Contribution
Ren, J., Hussain, A., Zheng, J., Liu, C., Luo, B., Zhao, H., & Zhao, X. (2018). Preface. In Advances in Brain Inspired Cognitive Systems (V-VI). https://doi.org/10.1007/978-3-030-00563-4

Learning from limited datasets: Implications for Natural Language Generation and Human-Robot Interaction (2018)
Presentation / Conference Contribution
Belakova, J., & Gkatzia, D. (2018). Learning from limited datasets: Implications for Natural Language Generation and Human-Robot Interaction. In Proceedings of the Workshop on NLG for Human–Robot Interaction (8-11)

One of the most natural ways for human robot communication is through spoken language. Training human-robot interaction systems require access to large datasets which are expensive to obtain and labour intensive. In this paper, we des... Read More about Learning from limited datasets: Implications for Natural Language Generation and Human-Robot Interaction.

Proceedings of the Workshop on NLG for Human–Robot Interaction (2018)
Presentation / Conference Contribution
(2018). Proceedings of the Workshop on NLG for Human–Robot Interaction. In M. Ellen Foster, H. Buschmeier, & D. Gkatzia (Eds.),

Ellen Foster, M., H. Buschmeier, & D. Gkatzia (Eds.) (2018). Proceedings of the Workshop on NLG for Human–Robot Interaction.

System and method for management of confidential data (2018)
Patent
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (2018). System and method for management of confidential data. GB2561176A

This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to carry out data management operations. These include the identification of data... Read More about System and method for management of confidential data.

A tool for generating synthetic data (2018)
Presentation / Conference Contribution
Peng, T., & Telle, A. (2018). A tool for generating synthetic data. In DATA '18 Proceedings of the First International Conference on Data Science, E-learning and Information Systems. https://doi.org/10.1145/3279996.3280018

It is popular to use real-world data to evaluate data mining techniques. However, there are some disadvantages to use real-world data for such purposes. Firstly, real-world data in most domains is difficult to obtain for several reasons, such as budg... Read More about A tool for generating synthetic data.

A Dual-spine Approach to Load Error Repair in a HEMS Sensor Network (2018)
Journal Article
Liu, X., Liu, Q., & Sun, M. (2018). A Dual-spine Approach to Load Error Repair in a HEMS Sensor Network. Computers, Materials & Continua, 57(2), 179-194. https://doi.org/10.32604/cmc.2018.04025

In a home energy management system (HEMS), appliances are becoming diversified and intelligent, so that certain simple maintenance work can be completed by appliances themselves. During the measurement, collection and transmission of electricity load... Read More about A Dual-spine Approach to Load Error Repair in a HEMS Sensor Network.

An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment (2018)
Journal Article
Jin, D., Liu, Q., Liu, X., & Linge, N. (2019). An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment. Journal of Computers, 30(3), 130-142. https://doi.org/10.3966/199115992019063003010

Hadoop is a famous parallel computing framework that is applied to process large-scale data, but there exists such a task in hadoop framework, which is called “Straggling task” and has a serious impact on Hadoop. Speculative execution (SE) is an effe... Read More about An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment.

Applications of Evolutionary Computation (2018)
Presentation / Conference Contribution
(2018). Applications of Evolutionary Computation. In K. Sim, & P. Kaufmann (Eds.), Applications of Evolutionary Computation. https://doi.org/10.1007/978-3-319-77538-8

This book constitutes the refereed conference proceedings of the 21st International Conference on the Applications of Evolutionary Computation, EvoApplications 2018, held in Parma, Italy, in April 2018, collocated with the Evo* 2018 events EuroGP, Ev... Read More about Applications of Evolutionary Computation.

A Look at the Effects of Handheld and Projected Augmented-reality on a Collaborative Task (2018)
Presentation / Conference Contribution
Mackamul, E. B., & Esteves, A. (2018, October). A Look at the Effects of Handheld and Projected Augmented-reality on a Collaborative Task. Presented at 6th ACM Symposium on Spatial User Interaction, Berlin, Germany

This paper presents a comparative study between two popular AR systems during a collocated collaborative task. The goal of the study is to start a body of knowledge that describes the effects of different AR approaches in users' experience and perfor... Read More about A Look at the Effects of Handheld and Projected Augmented-reality on a Collaborative Task.

Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns (2018)
Presentation / Conference Contribution
Mcneill, M., Lawson, A., Raeside, R., & Peisl, T. (2018, July). Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns. Presented at 32nd International BCS Human Computer Interaction Conference (HCI 2018), Belfast

Creating a good crowdfunding campaign is difficult. By understanding why people contribute to crowdfunding campaigns we can make campaigns better and raise more money. Crowdfunding websites allow entrepreneurs to make a pitch, which is watched by pot... Read More about Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns.