Skip to main content

Research Repository

Advanced Search

Browse


Privacy-preserving Surveillance Methods using Homomorphic Encryption (2020)
Conference Proceeding
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020). Privacy-preserving Surveillance Methods using Homomorphic Encryption. In ICISSP: Proceedings of the 6th International Conference on Information Systems Security and Privacy (240-248). https://doi.org/10.5220/0008864902400248

Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encryption to protect all states of the data: in-transit, at-rest, and in-memory.... Read More about Privacy-preserving Surveillance Methods using Homomorphic Encryption.

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach (2020)
Conference Proceeding
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020). Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (289-298). https://doi.org/10.5220/0008902202890298

Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high situational awareness, it can still be hard for users to continually be awa... Read More about Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach.

Props Alive: A Framework for Augmented Reality Stop Motion Animation (2020)
Conference Proceeding
Casas, L., Kosek, M., & Mitchell, K. (2020). Props Alive: A Framework for Augmented Reality Stop Motion Animation. In 2017 IEEE 10th Workshop on Software Engineering and Architectures for Realtime Interactive Systems (SEARIS). https://doi.org/10.1109/SEARIS41720.2017.9183487

Stop motion animation evolved in the early days of cinema with the aim to create an illusion of movement with static puppets posed manually each frame. Current stop motion movies introduced 3D printing processes in order to acquire animations more ac... Read More about Props Alive: A Framework for Augmented Reality Stop Motion Animation.

BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN (2020)
Conference Proceeding
Boukria, S., Guerroumi, M., & Romdhani, I. (2020). BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN. In 2019 IEEE Symposium on Computers and Communications (ISCC) (1034-1039). https://doi.org/10.1109/ISCC47284.2019.8969780

Software Defined Networking (SDN) technology increases the evolution of Internet and network development. SDN, with its logical centralization of controllers and global network overview changes the network's characteristics, on term of flexibility, a... Read More about BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN.

Photo-Realistic Facial Details Synthesis from Single Image (2019)
Conference Proceeding
Chen, A., Chen, Z., Zhang, G., Zhang, Z., Mitchell, K., & Yu, J. (2019). Photo-Realistic Facial Details Synthesis from Single Image. In 2019 IEEE/CVF International Conference on Computer Vision (ICCV) (9429-9439). https://doi.org/10.1109/ICCV.2019.00952

We present a single-image 3D face synthesis technique that can handle challenging facial expressions while recovering fine geometric details. Our technique employs expression analysis for proxy face geometry generation and combines supervised and uns... Read More about Photo-Realistic Facial Details Synthesis from Single Image.

A Multi-attributes-based Trust Model of Internet of Vehicle (2019)
Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019). A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security (706-713). https://doi.org/10.1007/978-3-030-36938-5_45

Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establish a trustworthy mechanism. Through transmission and dissemination of trust,... Read More about A Multi-attributes-based Trust Model of Internet of Vehicle.

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels (2019)
Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2019). WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels. In Proceedings of 15th IEEE International Conference on Control & Automation (ICCA). https://doi.org/10.1109/ICCA.2019.8899564

Industrial Control Systems (ICS) have faced a growing number of threats over the past few years. Reliance on isolated controls networks or air-gapped computers is no longer a feasible solution when it comes to protecting ICS. It is because the new ar... Read More about WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels.

Wattom: Ambient Eco-feedback with Mid-air Input (2019)
Conference Proceeding
Esteves, A., Quintal, F., Caires, F., Baptista, V., & Mendes, P. (2019). Wattom: Ambient Eco-feedback with Mid-air Input. In 2019 5th Experiment International Conference (exp.at'19). https://doi.org/10.1109/EXPAT.2019.8876565

This paper presents Wattom, a highly interactive ambient eco-feedback smart plug that aims to promote a more sustainable use of electricity in the home. This paper describes our latest implementation of the Wattom plug, and three system applications.... Read More about Wattom: Ambient Eco-feedback with Mid-air Input.

A novel adaptive routing and switching scheme for software-defined vehicular Networks (2019)
Conference Proceeding
Zhoa, L., Zhao, W., Gong, C., Al-Dubai, A., & Min, G. (2019). A novel adaptive routing and switching scheme for software-defined vehicular Networks. In Proceedings of the IEEE International Conference on Communications. https://doi.org/10.1109/ICC.2019.8761365

Software-Defined Vehicular Networks (SDVNs) technology has been attracting significant attention as it can make Vehicular Ad Hoc Network (VANET) more efficient and intelligent. SDVN provides a flexible architecture which can decouple the network mana... Read More about A novel adaptive routing and switching scheme for software-defined vehicular Networks.

A temporal-information-based adaptive routing algorithm for software defined vehicular networks (2019)
Conference Proceeding
Zhao, L., Li, Z., Li, J., Al-Dubai, A., Min, G., & Zomaya, A. Y. (2019). A temporal-information-based adaptive routing algorithm for software defined vehicular networks. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC). https://doi.org/10.1109/ICC.2019.8761680

In Software Defined Vehicular Networks (SDVNs), most existing studies of routing consider the vehicular network as a static graph and compute the flow table based on static information. However, a static graph could only contain partial network data.... Read More about A temporal-information-based adaptive routing algorithm for software defined vehicular networks.

Increasing Trust in Meta-Heuristics by Using MAP-Elites (2019)
Conference Proceeding
Urquhart, N., Guckert, M., & Powers, S. (2019). Increasing Trust in Meta-Heuristics by Using MAP-Elites. In GECCO '19 Companion (1345-1348). https://doi.org/10.1145/3319619.3326816

Intelligent AI systems using approaches containing emergent elements often encounter acceptance problems. Results do not get sufficiently explained and the procedure itself can not be fully retraced because the flow of control is dependent on stochas... Read More about Increasing Trust in Meta-Heuristics by Using MAP-Elites.

Evolving robust policies for community energy system management (2019)
Conference Proceeding
Cardoso, R., Hart, E., & Pitt, J. (2019). Evolving robust policies for community energy system management. In GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion (1120-1128). https://doi.org/10.1145/3321707.3321763

Community energy systems (CESs) are shared energy systems in which multiple communities generate and consume energy from renewable resources. At regular time intervals, each participating community decides whether to self-supply, store, trade, or sel... Read More about Evolving robust policies for community energy system management.

Algorithm selection using deep learning without feature extraction (2019)
Conference Proceeding
Alissa, M., Sim, K., & Hart, E. (2019). Algorithm selection using deep learning without feature extraction. In GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion (198-206). https://doi.org/10.1145/3321707.3321845

We propose a novel technique for algorithm-selection which adopts a deep-learning approach, specifically a Recurrent-Neural Network with Long-Short-Term-Memory (RNN-LSTM). In contrast to the majority of work in algorithm-selection, the approach does... Read More about Algorithm selection using deep learning without feature extraction.

An Illumination Algorithm Approach to Solving the Micro-Depot Routing Problem (2019)
Conference Proceeding
Urquhart, N., Hoehl, S., & Hart, E. (2019). An Illumination Algorithm Approach to Solving the Micro-Depot Routing Problem. In GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion (1347-1355). https://doi.org/10.1145/3321707.3321767

An increasing emphasis on reducing pollution and congestion in city centres combined with an increase in online shopping is changing the ways in which logistics companies address vehicle routing problems (VRP). We introduce the {\em micro-depot}-VRP,... Read More about An Illumination Algorithm Approach to Solving the Micro-Depot Routing Problem.

Reviving legacy enterprise systems with microservice-based architecture within cloud environments (2019)
Conference Proceeding
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019). Reviving legacy enterprise systems with microservice-based architecture within cloud environments. In Computer Science Conference Proceedings. https://doi.org/10.5121/csit.2019.90713

Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most effective means to re-architect legacy enterprise systems and to reengineer th... Read More about Reviving legacy enterprise systems with microservice-based architecture within cloud environments.

Identity and belonging for graduate apprenticeships in computing: the experience of first cohort degree apprentices in Scotland (2019)
Conference Proceeding
Taylor-Smith, E., Smith, S., & Smith, C. (2019). Identity and belonging for graduate apprenticeships in computing: the experience of first cohort degree apprentices in Scotland. In Proceedings of the 24th Annual Conference on Innovation & Technology in Computer Science Education (ITiCSE’19) (2-8). https://doi.org/10.1145/3304221.3319753

In September 2017, our university’s first graduate apprentices began degrees in Software Development, Cybersecurity, and Information Technology Management for Business. This study explores how apprentices experience their association with the univers... Read More about Identity and belonging for graduate apprenticeships in computing: the experience of first cohort degree apprentices in Scotland.

Simulating Dynamic Vehicle Routing Problems with Athos (2019)
Conference Proceeding
Hoffman, B., Guckert, M., Chalmers, K., & Urquhart, N. (2019). Simulating Dynamic Vehicle Routing Problems with Athos. In Proceedings of the 33rd International ECMS Conference on Modelling and Simulation ECMS 2019 (296-302). https://doi.org/10.7148/2019-0296

Complex routing problems, such as vehicle routing problems with additional constraints, are both hard to solve and hard to express in a form that is accessible to the human expert and at the same time processible by a computer system that is supposed... Read More about Simulating Dynamic Vehicle Routing Problems with Athos.

Finding Fair Negotiation Algorithms to Reduce Peak Electricity Consumption in Micro Grids (2019)
Conference Proceeding
Powers, S. T., Meanwell, O., & Cai, Z. (2019). Finding Fair Negotiation Algorithms to Reduce Peak Electricity Consumption in Micro Grids. In PAAMS 2019: Advances in Practical Applications of Survivable Agents and Multi-Agent Systems: The PAAMS Collection (269-272). https://doi.org/10.1007/978-3-030-24209-1_28

Reducing peak electricity consumption is important to maximise use of renewable energy sources, and reduce the total amount of capacity required on a grid. Most approaches use a centralised optimisation algorithm run by a utility company. Here we dev... Read More about Finding Fair Negotiation Algorithms to Reduce Peak Electricity Consumption in Micro Grids.

An Agent Based Technique for Improving Multi-Stakeholder Optimisation Problems (2019)
Conference Proceeding
Urquhart, N., & Powers, S. T. (2019). An Agent Based Technique for Improving Multi-Stakeholder Optimisation Problems. In PAAMS 2019: Advances in Practical Applications of Survivable Agents and Multi-Agent Systems: The PAAMS Collection: vol 1 – Main track and Demos proceedings (285-289). https://doi.org/10.1007/978-3-030-24209-1_32

We present an agent based framework for improving multi-stakeholder optimisation problems, which we define as optimisation problems where the solution is utilised by a number of stakeholders who have their own local preferences. We explore our ideas... Read More about An Agent Based Technique for Improving Multi-Stakeholder Optimisation Problems.

Identifying Vulnerabilities Using Internet-wide Scanning Data (2019)
Conference Proceeding
O'Hare, J., Macfarlane, R., & Lo, O. (2019). Identifying Vulnerabilities Using Internet-wide Scanning Data. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) (1-10). https://doi.org/10.1109/ICGS3.2019.8688018

Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect active reconnaissance results for online devices. Access to this information is provided through associated websites. The Internet-wide scanning data can be used... Read More about Identifying Vulnerabilities Using Internet-wide Scanning Data.