Skip to main content

Research Repository

Advanced Search

All Outputs (3)

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Conference Proceeding
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (in press). Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Barriers and enabling factors for error analysis in NLG research (2023)
Journal Article
Van Miltenburg, E., Clinciu, M., Dušek, O., Gkatzia, D., Inglis, S., Leppänen, L., …Wen, L. (2023). Barriers and enabling factors for error analysis in NLG research. Northern European Journal of Language Technology, 9(1), https://doi.org/10.3384/nejlt.2000-1533.2023.4529

Earlier research has shown that few studies in Natural Language Generation (NLG) evaluate their system outputs using an error analysis, despite known limitations of automatic evaluation metrics and human ratings. This position paper takes the stance... Read More about Barriers and enabling factors for error analysis in NLG research.

The Mobile Attacks Under Internet of Things Networks (2023)
Conference Proceeding
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2023). The Mobile Attacks Under Internet of Things Networks. In Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems ICETIS 2022: Volume 1 (523-532). https://doi.org/10.1007/978-3-031-25274-7_44

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.