Skip to main content

Research Repository

Advanced Search

All Outputs (1026)

Implementation and evaluation of a botnet analysis and detection method in a virtual environment (2012)
Thesis
Waheed, S. (2012). Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5667

Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a form of malware controlled by a Botmaster using Command and Control (C&C).... Read More about Implementation and evaluation of a botnet analysis and detection method in a virtual environment.

A visual and contextual comparative study of the work of Picasso and Chanel towards an understanding of the overlaps between Modern Art and Fashion (2012)
Journal Article
Vettese-Forster, S. (2012). A visual and contextual comparative study of the work of Picasso and Chanel towards an understanding of the overlaps between Modern Art and Fashion. The International Journal of Costume and Fashion, 12, 15-32

From the beginning of the twentieth century, ``Modernism`` impacted and transformed art and clothing. Pablo Picasso and Gabrielle ``Coco`` Chanel were two of the most central characters in Modernism working simultaneously in their disciplines. Picass... Read More about A visual and contextual comparative study of the work of Picasso and Chanel towards an understanding of the overlaps between Modern Art and Fashion.

Novel tracking of rogue network packets using danger theory approach (2012)
Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012). Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286

Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disrupt computer networks and gain access to private confidential data. A typica... Read More about Novel tracking of rogue network packets using danger theory approach.

Enlightened trial and error (2012)
Journal Article
Turner, P., Turner, S., & Flint, T. (2012). Enlightened trial and error. Interaction Design and Architecture(s) IxDetA, 13/14, 64-83

Human-computer interaction as a rationalistic, engineering discipline has been taught successfully for more than 25 years. The established narrative is one of designing usable systems for users, some of whom have been described as “naïve”, safely ins... Read More about Enlightened trial and error.

Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes. (2012)
Presentation / Conference Contribution
Tsiros, A., LePlâtre, G., & Smyth, M. (2012). Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes. In 9th Sound and Music Computing Conference (409-507)

This paper presents a prototype allowing the control of a concatenative synthesis algorithm using a 2D sketching interface. The design of the system is underpinned by a preliminary discussion in which isomorphisms between auditory and visual phen... Read More about Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes..

E-Health: chances and challenges of distributed, service oriented architectures (2012)
Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012). E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,

Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remain affordable for governments and individuals. Mobile technology and cloud c... Read More about E-Health: chances and challenges of distributed, service oriented architectures.

Real World Views 23.1 [Learning Curve]. (2012)
Book Chapter
Steven, G. (2011). Real World Views 23.1 [Learning Curve]. In Management and Cost Accounting (Eighth Edition), 620. Cengage Learning EMEA

No decision about me without me: concordance operationalised (2012)
Journal Article
Snowden, A., & Marland, G. (2012). No decision about me without me: concordance operationalised. Journal of Clinical Nursing, 22, 1353-1360. https://doi.org/10.1111/j.1365-2702.2012.04337.x

Aims and objectives To demonstrate that concordance can be operationalised to the benefit of patients. Concordance can be understood as a composite of knowledge, health beliefs and collaboration. Background In discussing any clinical decision, i... Read More about No decision about me without me: concordance operationalised.

Concurrent analysis: a pragmatic justification (2012)
Journal Article
Snowden, A., & Atkinson, J. (2012). Concurrent analysis: a pragmatic justification. Nursing Philosophy, 13, 126-141. https://doi.org/10.1111/j.1466-769X.2011.00523.x

Concurrent analysis (CA) is a process of synthesizing conceptually equivalent data for the purpose of producing a coherent and predictive model in social science. The process of CA is detailed. In short, CA uses Thagard's concept of coherence as a me... Read More about Concurrent analysis: a pragmatic justification.

A Hyper-Heuristic classifier for one dimensional bin packing problems: Improving classification accuracy by attribute evolution. (2012)
Presentation / Conference Contribution
Sim, K., Hart, E., & Paechter, B. (2012). A Hyper-Heuristic classifier for one dimensional bin packing problems: Improving classification accuracy by attribute evolution. In Parallel Problem Solving from Nature: PPSN XII (348-357). https://doi.org/10.100

A hyper-heuristic for the one dimensional bin packing problem is presented that uses an Evolutionary Algorithm (EA) to evolve a set of attributes that characterise a problem instance. The EA evolves divisions of variable quantity and dimension that r... Read More about A Hyper-Heuristic classifier for one dimensional bin packing problems: Improving classification accuracy by attribute evolution..

Structural optimisation of timber off-site modern methods of construction. (2012)
Presentation / Conference Contribution
Sanna, F., Hairstans, R., Leitch, K., Crawford, D., Menendez, J., & Turnbull, D. (2012). Structural optimisation of timber off-site modern methods of construction.

Efficient and sustainable building systems are required in order to achieve the UK government’s target of building three million new homes by 2016. Given the current lack of activity in the housing construction market to achieve this target, incr... Read More about Structural optimisation of timber off-site modern methods of construction..

Autophagic targeting of Src promotes cancer cell survival following reduced FAK signalling (2012)
Journal Article
Sandilands, E., Serrels, B., McEwan, D. G., Morton, J. P., Macagno, J. P., McLeod, K., …Frame, M. C. (2012). Autophagic targeting of Src promotes cancer cell survival following reduced FAK signalling. Nature Cell Biology, 14(1), 51-60. https://doi.org/1

Here we describe a mechanism that cancer cells use to survive when flux through the Src/FAK pathway is severely perturbed. Depletion of FAK, detachment of FAK-proficient cells or expression of non-phosphorylatable FAK proteins causes sequestration of... Read More about Autophagic targeting of Src promotes cancer cell survival following reduced FAK signalling.

A forensic image description language for generating test images. (2012)
Presentation / Conference Contribution
Russell, G., Macfarlane, R., & Ludwiniak, R. (2012). A forensic image description language for generating test images. In Proceedings of the 6th International Conference on Cybercrime Forensics Education & Training

Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study. At Edinburgh Napier University this topic has been taught with flexible an... Read More about A forensic image description language for generating test images..

Security issues of a publicly accessible cloud computing infrastructure. (2012)
Presentation / Conference Contribution
Russell, G., & Macfarlane, R. (2012). Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012) (1210-1

Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accidental or deliberate acts by users can be dangerous to other systems. This pape... Read More about Security issues of a publicly accessible cloud computing infrastructure..