Skip to main content

Research Repository

Advanced Search

All Outputs (1696)

Green Building: An antidote to sick buliding syndrome menace in Africa (2023)
Conference Proceeding
Liphadzi, M., Osunsanmi, T., Aigbavboa, C. O., Thwala, W., Phuti, T., & Aliu, J. (2023). Green Building: An antidote to sick buliding syndrome menace in Africa. In Proceedings of the Creative Construction Conference 2023 (632-644). https://doi.org/10.3311/ccc2023-082

Sick building syndrome (SBS) is the leading cause of the reduction in the building's occupancy level of satisfaction, poor indoor air quality, and other shenanigans responsible for the underperformance of building occupants and loss in property value... Read More about Green Building: An antidote to sick buliding syndrome menace in Africa.

A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs (2023)
Conference Proceeding
McLaren, R. A., Babaagba, K., & Tan, Z. (2023). A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. In Machine Learning, Optimization, and Data Science: 8th International Conference, LOD 2022, Certosa di Pontignano, Italy, September 19–22, 2022, Revised Selected Papers, Part II (32-46). https://doi.org/10.1007/978-3-031-25891-6_4

As the field of malware detection continues to grow, a shift in focus is occurring from feature vectors and other common, but easily obfuscated elements to a semantics based approach. This is due to the emergence of more complex malware families that... Read More about A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs.

Practical Cyber Threat Intelligence in the UK Energy Sector (2023)
Conference Proceeding
Paice, A., & McKeown, S. (2023). Practical Cyber Threat Intelligence in the UK Energy Sector. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media (3-23). https://doi.org/10.1007/978-981-19-6414-5_1

The UK energy sector is a prime target for cyber-attacks by foreign states, criminals, ‘hacktivist’ groups, and terrorists. As Critical National Infrastructure (CNI), the industry needs to understand the threats it faces to mitigate risks and make ef... Read More about Practical Cyber Threat Intelligence in the UK Energy Sector.

Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain (2023)
Conference Proceeding
Moradpoor, N., Barati, M., Robles-Durazno, A., Abah, E., & McWhinnie, J. (2023). Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media (437-451). https://doi.org/10.1007/978-981-19-6414-5_24

The protection of critical national infrastructures such as drinking water, gas, and electricity is extremely important as nations are dependent on their operation and steadiness. However, despite the value of such utilities their security issues hav... Read More about Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain.

Developing a Digital ForensicsTerminology Using Natural Language Processing (2022)
Conference Proceeding
Le Gall, M., Cole, C., Haynes, D., & Nic Daeid, N. (2022). Developing a Digital ForensicsTerminology Using Natural Language Processing. In M. Lykke, T. Svarre, D. Haynes, M. Skov, M. Thellesfsen, & D. Martinez-Avila (Eds.), Knowledge Organization across Disciplines, Domains, Services and Technologies: Proceedings of the Seventeenth International ISKO Conference (173-186)

Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets (2022)
Conference Proceeding
Alharigy, L. M., Al-Nuaim, H. A., & Moradpoor, N. (2022). Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets. In 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN). https://doi.org/10.1109/CICN56167.2022.10008274

Cyberbullying is a widespread problem that has only increased in recent years due to the massive dependence on social media. Although, there are many approaches for detecting cyberbullying they still need to be improved upon for more accurate detecti... Read More about Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets.

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device (2022)
Conference Proceeding
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022). Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP (551-561). https://doi.org/10.5220/0010903000003120

Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discret... Read More about Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device.

High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network (2022)
Conference Proceeding
Zhang, Z., Li, Y., Liu, Q., & Liu, X. (2022). High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network. In 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927756

A basic stage of hydrological research is to automatically extract water body information from high-resolution remote sensing images. Various methods based on deep learning convolutional neural networks have been proposed in recent studies to achieve... Read More about High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network.

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) (2022)
Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022). Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8

Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detecting attacks. However, the lack of transparency in their decision-making pro... Read More about Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract).

Multi-Agent Modelling Notation (MAMN): A multi-layered graphical modelling notation for agent-based simulations (2022)
Conference Proceeding
Nguyen, J., Powers, S., Urquhart, N., Farrenkopf, T., & Guckert, M. (2022). Multi-Agent Modelling Notation (MAMN): A multi-layered graphical modelling notation for agent-based simulations. In PRIMA 2022: Principles and Practice of Multi-Agent Systems - 24th International Conference, Valencia, Spain, November 16–18, 2022, Proceedings (640-649). https://doi.org/10.1007/978-3-031-21203-1_42

Cause-effect graphs have been applied in non agent-based simulations, where they are used to model chained causal relations between input parameters and system behaviour measured by appropriate indicators. This can be useful for the analysis and inte... Read More about Multi-Agent Modelling Notation (MAMN): A multi-layered graphical modelling notation for agent-based simulations.

A Quantitative Field Study of a Persuasive Security Technology in the Wild (2022)
Conference Proceeding
Vargheese, J. P., Collinson, M., & Masthoff, J. (2022). A Quantitative Field Study of a Persuasive Security Technology in the Wild. In Social Informatics: 13th International Conference, SocInfo 2022, Glasgow, UK, October 19–21, 2022, Proceedings (211-232). https://doi.org/10.1007/978-3-031-19097-1_13

Persuasive techniques and persuasive technologies have been suggested as a means to improve user cybersecurity behaviour, but there have been few quantitative studies in this area. In this paper, we present a large scale evaluation of persuasive mess... Read More about A Quantitative Field Study of a Persuasive Security Technology in the Wild.

Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle (2022)
Conference Proceeding
Cunningham, S., & Mcgregor, I. (2022). Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle. In AM '22: Proceedings of the 17th International Audio Mostly Conference (113-120). https://doi.org/10.1145/3561212.3561221

Foley artistry is an essential part of the audio post-production process for film, television, games, and animation. By extension, it is as crucial in emergent media such as virtual, mixed, and augmented reality. Footsteps are a core activity that a... Read More about Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle.

Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures (2022)
Conference Proceeding
Zheng, C., Zhen, C., Xie, H., & Yang, S. (2022). Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures. In 2022 IEEE Conference on Dependable and Secure Computing (DSC). https://doi.org/10.1109/dsc54232.2022.9888828

Reinforcement Learning (RL) is one of the most popular methods for solving complex sequential decision-making problems. Deep RL needs careful sensing of the environment, selecting algorithms as well as hyper-parameters via soft agents, and simultaneo... Read More about Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures.

A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling (2022)
Conference Proceeding
Turnbull, L., Tan, Z., & Babaagba, K. (2022). A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. In 2022 IEEE Conference on Dependable and Secure Computing (DSC). https://doi.org/10.1109/DSC54232.2022.9888906

Malicious software trends show a persistent yearly increase in volume and cost impact. More than 350,000 new malicious or unwanted programs that target various technologies were registered daily over the past year. Metamorphic malware is a specifical... Read More about A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling.

Evaluating Colour in Concept Diagrams (2022)
Conference Proceeding
McGrath, S., Blake, A., Stapleton, G., Touloumis, A., Chapman, P., Jamnik, M., & Shams, Z. (2022). Evaluating Colour in Concept Diagrams. In Diagrammatic Representation and Inference: 13th International Conference, Diagrams 2022, Rome, Italy, September 14–16, 2022, Proceedings (168-184). https://doi.org/10.1007/978-3-031-15146-0_14

This paper is the first to establish the impact of colour on users' ability to interpret the informational content of concept diagrams, a logic designed for ontology engineering. Motivation comes from results for Euler diagrams, which form a fragment... Read More about Evaluating Colour in Concept Diagrams.

Participant-centred planning framework for effective gender balance activities in tech (2022)
Conference Proceeding
Taylor-Smith, E., Barnett, C., Smith, S., Barr, M., & Shankland, C. (2022). Participant-centred planning framework for effective gender balance activities in tech. In UKICER '22: Proceedings of the 2022 Conference on United Kingdom & Ireland Computing Education Research. https://doi.org/10.1145/3555009.3555016

The gender imbalance in the tech industry [21], mirrored in computing education [13], is problematic in terms of providing appropriate products and services for the whole population. This lack of diversity and inclusion is also self-perpetuating thro... Read More about Participant-centred planning framework for effective gender balance activities in tech.

A Novelty-Search Approach to Filling an Instance-Space with Diverse and Discriminatory Instances for the Knapsack Problem (2022)
Conference Proceeding
Marrero, A., Segredo, E., León, C., & Hart, E. (2022). A Novelty-Search Approach to Filling an Instance-Space with Diverse and Discriminatory Instances for the Knapsack Problem. In Parallel Problem Solving from Nature – PPSN XVII. PPSN 2022 (223-236). https://doi.org/10.1007/978-3-031-14714-2_16

We propose a new approach to generating synthetic instances in the knapsack domain in order to fill an instance-space. The method uses a novelty-search algorithm to search for instances that are diverse with respect to a feature-space but also elicit... Read More about A Novelty-Search Approach to Filling an Instance-Space with Diverse and Discriminatory Instances for the Knapsack Problem.

Evolutionary Approaches to Improving the Layouts of Instance-Spaces (2022)
Conference Proceeding
Sim, K., & Hart, E. (2022). Evolutionary Approaches to Improving the Layouts of Instance-Spaces. In Parallel Problem Solving from Nature – PPSN XVII. PPSN 2022 (207-219). https://doi.org/10.1007/978-3-031-14714-2_15

We propose two new methods for evolving the layout of an instance-space. Specifically we design three different fitness metrics that seek to: (i) reward layouts which place instances won by the same solver close in the space; (ii) reward layouts that... Read More about Evolutionary Approaches to Improving the Layouts of Instance-Spaces.

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher (2022)
Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2022). Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. In 2022 6th International Conference on Cryptography, Security and Privacy (CSP). https://doi.org/10.1109/CSP55486.2022.00018

Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes... Read More about Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher.

Haptic User Experience Evaluation for Virtual Reality (2022)
Conference Proceeding
Aldhous, J., Sobolewska, E., & Webster, G. (2022). Haptic User Experience Evaluation for Virtual Reality. In Proceedings of the 35th British HCI and Doctoral Consortium 2022, UK. https://doi.org/10.14236/ewic/hci2022.59

Hapticians (engineers, researchers or designers) are developing 'haptic displays' to replicate the complexity of sensations and interactivity accommodated by the hand. Haptic displays hold potential in allowing users to interact with each other and m... Read More about Haptic User Experience Evaluation for Virtual Reality.