Search for a surname in the box below and then click "Search" to search for Staff.
Principal Research Fellow
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Bishop, C., Esteves, A. & Mcgregor, I. (in press). Head-Mounted Displays as Opera Glasses: Using Mixed-Reality to Deliver an Equalitarian User Experience During Live Events. In Proceedings of 19th ICMI ConferenceISBN n/a
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). An Applied Pattern-Driven Corpus to Predictive Analytics in Mitigating SQL Injection Attack. In Proceedings of the Seventh IEEE International Conference on Emerging Security TechnologiesISBN n/a
Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted w...
Economic and Social Research Council
This research studentship will investigate innovation and best practice in skills development in the workplace in Scotland, drawing comparisons with the rest of the UK and other countries. It will exp...
The DISTRO network brings together leading laboratories in Visual Computing and 3D Computer Graphics research across Europe with the aim of training a new generation of scientists, technologists, and ...
To develop the prototype for a next-generation security platform with advanced detection capabilities.
05 February 2016
IntroductionOn the back of four nomination at the Scottish Knowledge Exchange awards [here], Gordon Stuart, director of operations at Informatics Ventures, has also predicted ...
03 May 2016
Professor Hazel Hall has been nominated for election as Director-at-large for the Association for Information Science and Technology. She is one of eight candidates standing f...
04 May 2016
The FOCAS project was rated as Excellent at its final review, after running for three years. The project coordinator was Emma Hart, with Jennifer Willies as Project Manager.
Lecturer of Cybersecurity, Encryption and Networks
Hall, H., Cruickshank, P. & Ryan, B. (in press). Exploring information literacy through the lens of Activity Theory. In Proceedings of the European Conference on Information LiteracyISBN n/a
Activity Theory (AT) is presented as a framework for explaining Information Literacy (IL) as a technologically mediated social practice. This is achieved in the context of a s...
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y. & Oakley, I. (in press). SmoothMoves: smooth pursuits head movements for augmented reality. In Proceedings of the 30th Annual ACM Symposium on User Interface Software & TechnologyISBN n/a
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Flint, T. & Hood, B. (in press). Eidolon360 – a VR Experience. In Proceedings of BHCI 2017ISBN Tbc
Flint, T. & Dylan, T. H. (in press). Aide Memoire. In Proceedings of BHCI 2017ISBN Tbc
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Buunk, I., Hall, H. & Smith, C. (in press). Skills in Sight: How Social Media Affordances Increase Network Awareness. In Proceedings of the 18th European Conference on Knowledge Management ECKM 2017ISBN n/a
The discussion in this paper derives from an analysis of data from twenty interviews conducted with members of an online knowledge sharing platform between October 2016 and Fe...
Urquhart, N. & Hart, E. (in press). Creating optimised employee travel plans. In TBCISBN TBC
The routing of employees who provide services such as home health or social care is a complex problem. When sending an employee between two addresses , there may exist more th...
Thuemmler, C. (2017). Accroitre-lefficacite-de-la-prestation-des-soins. http://paperjam.lu/news/accroitre-lefficacite-de-la-prestation-des-soins
Interview on socio-economic background of digital agenda in health.
Ennis, L. (2017). The Digital Library. Teaching fellows journal. ISSN 2050-9987
The meteoric rise of the internet has meant that we have access to more information than ever. Our informational lives, and those of our students are complex – fraught with is...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X. & Han, W. (in press). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference ProceedingsISBN NA
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Carnegie Trust for the Universities of Scotland
Derek Hoy was a Scottish nurse based predominantly in Glasgow who died in 2012. He worked for many years in the National Health Service (NHS) in a variety of clinical roles, where he began to experime...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
The Scottish Informatics & Computer Science Alliance
Research exchange with the Bielefeld Dialogue Systems group
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
The Scottish Centre for Telehealth and Telecare
In this project, we will spread the use of an innovative website, designed to support patients and family members in and after Intensive Care. We have already implemented the website at the Royal Infi...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Forestry Commission Scotland
Maintenance and hosting of website database developed in previous project
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight into business risks ...
Chartered Institute of Library and Information Professionals
The findings of this research will contribute to strategies to improve citizen engagement in the democratic process at community level.
Community Councillors are a vital link between local communities...
Plansafe Solutions Ltd
Consultancy for SafetyPro Engineer System
The Internet of Things (IoT), a network of physical objects that can communicate, sense and act in the world, is rapidly expanding and is expected to account for nine billion of inter-connected device...
Timber analysis project
Analysis of transactional data provided by real time cloud based ordering systems linked within the food supply chain which targets Foodservice sector
University of Aberdeen
Portrait is a software tool developed to help care staff get to know personal and social information about clients that live in residential care facilities. The Portrait system consists of a biography...
At present the Information Technology profession appears to be dogged by high profile project failure, high...
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. ...
This research will investigate the nature of interactions between people and experience-oriented technologies such as new-media artw...
This critical appraisal demonstrates three particular themes that are domin...
Despite football being deeply entrenched in Scottish culture it is under-researched from...
Participation Space Studies explore eParticipation ...
This thesis examines the meaning, origin and influence of Edgar Allan Poe’s...
30 June 2016
This week the Chartered Institute of Library and Information Professionals (CILIP) and the Archives and Records Association (ARA) published a series of 24 fact sheets on the ...
15 June 2016
RBS approached Dr Oli Mival, Principal Research Fellow in the Centre fro Interaction Design, to undertake a program of review of their UX activities and methods with the aim o...
16 June 2016
Simon Powers will deliver a research seminar about his work on the evolution of institutions.
Abstract Economics, artificial life, and agent-based c...
12 May 2016
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
07 November 2016
11 November 2016
21 April 2016
Announcement of resultsEmerald and the Indian Academy of Management (IAM) are delighted to offer a research grant for an Indian project in the field of management research.
09 June 2016
Simon Powers will write an article about "defection" (as the term is used in game theory), for the forthcoming Encyclopedia of Evolutionary Psychological Science, edited by To...
23 February 2016
18 May 2016
The June 2016 issue of Journal of Information Science (volume 42, issue 3) has just been published. This is a special issue of the journal that comprises twelve articles devel...