Skip to main content

Research Repository

Advanced Search

Outputs (327)

Requirements for 5G based telemetric cardiac monitoring (2018)
Presentation / Conference Contribution
Thuemmler, C., Hindricks, G., Rolffs, C., Buchanan, W., & Bollmann, A. (2018, October). Requirements for 5G based telemetric cardiac monitoring. Presented at 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol, Cyprus

Several white papers have been published on general requirements for 5G in the health vertical. As 5G research and implementation continue more detailed real world information for application research are needed. This paper is focusing on the require... Read More about Requirements for 5G based telemetric cardiac monitoring.

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings (2018)
Presentation / Conference Contribution
(2017, December). Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. Presented at CollaborateCom 2017, Edinburgh, UK

This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2017, held in Edinburgh, UK, in December 2017. The 65 papers presente... Read More about Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings.

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things (2018)
Presentation / Conference Contribution
Semedo, F., Moradpoor, N., & Rafiq, M. (2018, September). Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. Presented at 11th International Conference On Security Of Information and Networks, Cardiff, United Kingdom

The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Positioning devices (GPS) and Local Area Network (LAN) interfaces. Security is by f... Read More about Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things.

Privacy Parameter Variation using RAPPOR on a Malware Dataset (2018)
Presentation / Conference Contribution
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018, August). Privacy Parameter Variation using RAPPOR on a Malware Dataset. Presented at 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA

Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of analysing sensitive user data. The RAPPOR (Randomized Aggregatable Privacy... Read More about Privacy Parameter Variation using RAPPOR on a Malware Dataset.

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device (2018)
Presentation / Conference Contribution
Lo, O., Buchanan, W. J., & Carson, D. (2018, August). Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. Presented at ACM Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany

Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consumption or processing power is limited. Thus, there has been an increasing a... Read More about Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device.

Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network (2018)
Presentation / Conference Contribution
Asif, R., Haithem, M., & Buchanan, W. J. (2018, July). Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network. Presented at Advanced Photonics 2018 (BGPP, IPR, NP, NOMA, Sensors, Networks, SPPCom, SOF)

We report a high capacity Quantum-to-the-Home (QTTH) network in a spatialdivision-multiplexing (SDM) network utilizing 7-core multicore fiber (MCF). Aggregate secure key rates of 33.6 Mbit/s over 9.8 km of fiber are the actual state-of-the-art.

Performance Investigation of RPL Routing in Pipeline Monitoring WSNs (2018)
Presentation / Conference Contribution
Wadhaj, I., Gharebi, W., Al-Dubai, A., & Thomson, C. (2018, June). Performance Investigation of RPL Routing in Pipeline Monitoring WSNs. Presented at 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Exeter, United Kingdom

The adoption of WSN and IEEE 802.15.4 standard for the linear WSN networks were assumed. The interconnection of WSNs with the Internet is possible by assigning IPv6 addresses to low- power devices. The 6LoWPAN adaption layer enables the IPv6 addresse... Read More about Performance Investigation of RPL Routing in Pipeline Monitoring WSNs.

Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks (2018)
Presentation / Conference Contribution
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June). Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Presented at The 16th IEEE International Conference on Smart City (IEEE SmartCity-2018), Exeter

In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional unequal clustering approaches where small clusters located close to the base st... Read More about Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks.

Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases (2018)
Presentation / Conference Contribution
Clavie, B., & Moradpoor, N. (2018, May). Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. Poster presented at 10th ACM Conference on Web Science, Amsterdam

This article explores a perceived bias between two British reddit communities dedicated to discussing British politics.We analyse the popular sources favoured by each community and study semantic indicators that would be indicative of a bias. Althoug... Read More about Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases.

Detection of Algorithmically Generated Malicious Domain (2018)
Presentation / Conference Contribution
Agyepong, E., Buchanan, W., & Jones, K. (2018, May). Detection of Algorithmically Generated Malicious Domain. Presented at Computer Science & Information Technology

In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, D... Read More about Detection of Algorithmically Generated Malicious Domain.

Cloud Computing & Cyber Security (2018)
Presentation / Conference Contribution
Manoussos, B. (2018, April). Cloud Computing & Cyber Security. Presented at The Law Society of Scotland - Law & Technology Roadshow, Glasgow

Presentation on Cloud Computing and Cyber Security in relation to Law Firms in Scotland.

A Trust-based Intrusion Detection System for Mobile RPL Based Networks (2018)
Presentation / Conference Contribution
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017, June). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. Presented at 10th IEEE International Conference on Internet of Things (iThings-2017)

Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be exploited to perform security attacks against the Routing Protocol for Low-... Read More about A Trust-based Intrusion Detection System for Mobile RPL Based Networks.

A new Zigbee-based device for measuring visual reaction time in sport activities (2018)
Presentation / Conference Contribution
Ali, B. B., Dugas, É., Naceur, A., & Romdhani, I. (2017, May). A new Zigbee-based device for measuring visual reaction time in sport activities. Presented at 2017 International Conference on Engineering & MIS (ICEMIS)

There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the major problems is the need to maintain an on-time 1 pulse per second (pps) refe... Read More about A new Zigbee-based device for measuring visual reaction time in sport activities.

Mining malware command and control traces (2018)
Presentation / Conference Contribution
McLaren, P., Russell, G., & Buchanan, B. (2017, July). Mining malware command and control traces. Presented at 2017 Computing Conference

Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, which enables the malware to respond to controller commands. The detection o... Read More about Mining malware command and control traces.

Fast Filtering of Known PNG Files Using Early File Features (2017)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2017, May). Fast Filtering of Known PNG Files Using Early File Features. Presented at Annual Conference on Digital Forensics, Security and Law, Daytona Beach, Florida

A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given media, comparing individual... Read More about Fast Filtering of Known PNG Files Using Early File Features.

A new dynamic weight clustering algorithm for wireless sensor networks (2017)
Presentation / Conference Contribution
Essa, A., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2016, May). A new dynamic weight clustering algorithm for wireless sensor networks. Presented at 1st EAI International Conference on Smart Grid Inspired Future Technologies (SmartGift 2016)

Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WSNs). Most existing approaches consider the residual energy of a single node... Read More about A new dynamic weight clustering algorithm for wireless sensor networks.

Blockchain and Git repositories for sticky policies protected OOXML. (2017)
Presentation / Conference Contribution
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017

The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This work compliments research on secure data sharing
with Office Open XML (OOX... Read More about Blockchain and Git repositories for sticky policies protected OOXML..

Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies (2017)
Presentation / Conference Contribution
Asif, R. (2017, November). Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. Presented at IEEE Network of the Future (NoF) conference, London, UK

Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home (FTTH)' networks and data centers. It is important that the newly designed... Read More about Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies.

Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks (2017)
Presentation / Conference Contribution
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017, October). Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. Presented at 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)

The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing pr... Read More about Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks.

What role will wearables play in future healthcare? (2017)
Presentation / Conference Contribution
Thuemmler, C. (2017, November). What role will wearables play in future healthcare?. Presented at Seminar on the future of Health care, Big Data and Wearables

A better and more efficient health sector through digitalization and the use of Big Data – personalized treatment, prevention and diagnostics based on a more encompassing understanding of the patient; continuous surveillance and home based treatment. Read More about What role will wearables play in future healthcare?.