Skip to main content

Research Repository

Advanced Search

Evaluation on multivariate correlation analysis based denial-of-service attack detection system (2012)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., Nanda, P., He, X., & Liu, R. P. (2012, August). Evaluation on multivariate correlation analysis based denial-of-service attack detection system. Presented at Proceedings of the First International Conference on Security of Internet of Things - SecurIT '12, Kollam, India

In this paper, a Denial-of-Service (DoS) attack detection system is explored, where a multivariate correlation analysis technique based on Euclidean distance is applied for network traffic characterization and the principal of anomaly-based detection... Read More about Evaluation on multivariate correlation analysis based denial-of-service attack detection system.

A new efficient distributed route discovery for wireless mobile ad hoc networks. (2012)
Presentation / Conference Contribution
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2012, April). A new efficient distributed route discovery for wireless mobile ad hoc networks. Presented at Wireless Telecommunications Symposium (WTS), 2012

High performance group communication, such as broadcast, requires matching efficient broadcast algorithms to effective route discovery approach. Broadcast communication in MANETs is essential for a wide range of important applications. Nevertheless,... Read More about A new efficient distributed route discovery for wireless mobile ad hoc networks..

Experimental investigation of link layer adaptation in IEEE 802.11n WLANs (2012)
Presentation / Conference Contribution
Al-Adhami, M., Al-Dubai, A. Y., & Romdhani, I. (2012, April). Experimental investigation of link layer adaptation in IEEE 802.11n WLANs. Presented at Wireless Telecommunications Symposium 2012

Due to its low cost wireless communication methodology and improvements in both its physical (PHY) and MAC (Link) layers, the IEEE 802.11n wireless LAN (WLAN) technology has been adopted widely. However, fairness of current 802.11n rate adaptation (R... Read More about Experimental investigation of link layer adaptation in IEEE 802.11n WLANs.

Rich Pictures: collaborative communication through icons (2012)
Journal Article
Berg, T., & Pooley, R. (2013). Rich Pictures: collaborative communication through icons. Systemic Practice and Action Research, 26(4), 361-376. https://doi.org/10.1007/s11213-012-9238-8

A visual language of pictures, such as the rich picture used in the Soft System Methodology, offers a way of global communication that far exceeds the limitations of text and speech. Simple graphics can be rapidly communicated, processed and transmit... Read More about Rich Pictures: collaborative communication through icons.

Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection (2012)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2012, June). Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. Presented at 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications

Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. However, there are some critical security issues residing in cloud computing,... Read More about Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.

Training the next generation. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Training the next generation

This presentation outlines how cloud infrastructures could be used to deliver the in-depth skills required for a cyber professional.

Education & training for future threats. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, May). Education & training for future threats. Paper presented at ITEC 2012

This presentation gives an outline of the aspects for virtualised training for security and cybercrime.

Energy Performance Assessment of Virtualization Technologies Using Small Environmental Monitoring Sensors (2012)
Journal Article
Liu, L., Masfary, O., & Antonopoulos, N. (2012). Energy Performance Assessment of Virtualization Technologies Using Small Environmental Monitoring Sensors. Sensors, 12(5), 6610-6628. https://doi.org/10.3390/s120506610

The increasing trends of electrical consumption within data centres are a growing concern for business owners as they are quickly becoming a large fraction of the total cost of ownership. Ultra small sensors could be deployed within a data centre to... Read More about Energy Performance Assessment of Virtualization Technologies Using Small Environmental Monitoring Sensors.

Cloud4Health. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May). Cloud4Health. Paper presented at Symposium on the Future of e-Health

The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to reduce patient risks. This presentation outlines how it integrates assisted liv... Read More about Cloud4Health..

Context-aware service utilisation in the clouds and energy conservation (2012)
Journal Article
Kiani, S. L., Anjum, A., Antonopoulos, N., & Knappmeyer, M. (2014). Context-aware service utilisation in the clouds and energy conservation. Journal of Ambient Intelligence and Humanized Computing, 5(1), 111-131. https://doi.org/10.1007/s12652-012-0131-1

Ubiquitous computing environments are characterised by smart, interconnected artefacts embedded in our physical world that provide useful services to human inhabitants unobtrusively. Mobile devices are becoming the primary tools for human interaction... Read More about Context-aware service utilisation in the clouds and energy conservation.

Integrating assisted living with primary and secondary health care. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May). Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing

This presentation outlines the Cloud4Health platform.

Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing (2012)
Journal Article
Liu, Z., Liu, L., Hardy, J., Anjum, A., Hill, R., & Antonopoulos, N. (2012). Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing. Journal of cloud computing: advances, systems and applications, 1(1), 3. https://doi.org/10.1186/2192-113X-1-3

Cloud computing has dramatically reshaped the whole IT industry in recent years. With the transition from IPv4 to IPv6, services running in Cloud computing will face problems associated with IPv6 addressing: the notation is too long (39 bytes), there... Read More about Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing.

Adaptive service discovery on service-oriented and spontaneous sensor systems (2012)
Journal Article
Liu, L., Xu, J., Antonopoulos, N., Li, J., & Wu, K. (2012). Adaptive service discovery on service-oriented and spontaneous sensor systems. Adhoc and Sensor Wireless Networks, 14(1-2), 107-132

Natural and man-made disasters can significantly impact both people and environments. Enhanced effect can be achieved through dynamic networking of people, systems and procedures and seamless integration of them to fulfil mission objectives with serv... Read More about Adaptive service discovery on service-oriented and spontaneous sensor systems.

Designing tangible interaction for embodied facilitation (2012)
Presentation / Conference Contribution
Esteves, A. (2012, February). Designing tangible interaction for embodied facilitation. Presented at Proceedings of the Sixth International Conference on Tangible, Embedded and Embodied Interaction - TEI '12

Designing and evaluating tangible interaction is a challenging ad-hoc process. This paper argues that if the field of tangible interaction is to continue to develop, it will need to adopt design methodologies and guidelines that reflect its unique fe... Read More about Designing tangible interaction for embodied facilitation.

New Threats (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, January). New Threats. Paper presented at Transatlantic Conference 2012

This presentation provides an overview of some of the new threats that exist within Cyber space, especially around Hacktivism and Social Networks.

An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments (2012)
Thesis
Jaroucheh, Z. An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/5348

The concept of context-awareness is widely used in mobile and pervasive computing to reduce explicit user input and customization through the increased use of implicit input. It is considered to be the corner stone technique for developing pervasive... Read More about An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments.