Search for a surname in the box below and then click "Search" to search for Staff.
Qasem, M., Al-Dubai, A., Romdhani, I. & Ghaleb, B. (2017). Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-00
This document proposes an extended Objective Function(OF) that balances the number of children nodes of the parent nodes to avoid the overloading problem and ensure node lifet...
Romdhani, I. (2017). Li, S. & Da Xu, L. (Eds.). Securing the Internet of Things. Elsevier. ISBN 9780128044582
Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures
Explores how the threats...
Salayma, M., Al-Dubai, A., Romdhani, I. & Nasser, Y. (in press). New Dynamic, Reliable and Energy Efficient Scheduling for Wireless Body Area Networks (WBAN). In Proceedings of the IEEE ICC 2017 SAC Symposium E-Health
Wireless body area networks (WBANs) facilitate
efficient and cost-effective e-health care and well-being
applications. The WBAN has unique challenges and features
compared to ...
Do-It-Yourself networking refers to a conceptual approach to the use of low-cost hardware and wireless technology in deploying lo...
To analyse in game communications to predict engagement of players.
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs w...
05 February 2016
IntroductionOn the back of four nomination at the Scottish Knowledge Exchange awards [here], Gordon Stuart, director of operations at Informatics Ventures, has also predicted ...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
03 May 2016
Professor Hazel Hall has been nominated for election as Director-at-large for the Association for Information Science and Technology. She is one of eight candidates standing f...
Lecturer in Cybersecurity, Encryption and Networks
+44 (131) 455 2219
School Research and Innovation Officer
Romdhani, I., Djedjig, N., Medjek, F. & Tandjaoui, D. (in press). New Trust Metric for the RPL Routing Protocol. In Proceedings of ICICS 2017
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...
Hall, H., Cruickshank, P. & Ryan, B. (2017). Community Councillors survey data for IL-DEM project November -December 2016. [Dataset]. doi:10.17869/ENU.2017.682227
Results of online survey of Community Councillors around Scotland. Most questions were around their use of information skills, for a project around information literacy in com...
Hall, H., Cruickshank, P. & Ryan, B. (2017). Community Council Liaison Officer questionnaire data for IL-DEM project November - December 2016. [Dataset]. doi:10.17869/ENU.2017.682243
Results of questionnaire emailed to all Community Council Liaison Officers (1) in Scotland. Questions were around their Community Councils' use of information skills, for a pr...
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B. & Gharibi, W. (2016). A new efficient objective function for routing in Internet of Things paradigm. In 2016 IEEE Conference on Standards for Communications and Networking (CSCN),. doi:10.1109/cscn.2016.7785168. ISBN 978-1-5090-3862-6
Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) ha...
Hall, H., Cruickshank, P. & Ryan, B. (2016). Interviews with Community Councillors for IL-DEm project November - December 2016. [Dataset]. doi:10.17869/ENU.2017.682133
Transcripts of semi-structured interviews with 19 Community Councillors from around Scotland. Most questions were around their use of information skills, for a project around ...
Spyra, G. & Buchanan, W. J. (2016). Protecting Documents with Sticky Policies and Identity-Based Encryption. In Proceedings of the Future Technologies Conference (FTC) 2016
Documents are increasingly being held in public cloud-based systems, and there thus increasingly exposed to accesses from malicious entities. This paper focuses on the integra...
Hall, H., Cruickshank, P. & Ryan, B. (2016). Librarian Questionnaire data for IL-DEM project November - December 2016. [Dataset]. doi:10.17869/ENU.2017.682093
Results of questionnaire emailed to senior public librarians in Scotland. Questions were around their support of Community Councils including support and training of Community...
Binyamin, S., Rutter, M. J. & Smith, S. (2016). The utiliation of system usability scale in learning managment systems: a case study of Jeddah Community College. In ICERI2016 Proceedings, 5314-5323. doi:10.21125/iceri.2016.2290. ISBN 978-84-617-5895-1
Learning Management Systems (LMS) have been widely adopted in many higher educational institutions to support teaching and learning activities. The study was conducte...
Moradpoor, N., Clavie, B. & Buchanan, B. (-0001). Employing Machine Learning Techniques for Detection and Classification of Phishing Emails. In Proceedings of the IEEE Technically Sponsored Computing Conference 2017
—A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or ...
Binyamin, S., Smith, S. & Rutter, M. (2016). Evaluating the Usability of Learning Management Systems from Students' Perception: A Case Study of King Abdulaziz University. In 15th European Conference on eLearning (ECEL 2016), 112 - 113. ISBN 978-1-911218-18-0
Abstract: Due to the rapid improvement in Information and Communication Technology (ICT), adopting technologies has become a major focus of interest in the field of education....
Salayma, M., Al-Dubai, A. & Romdhani, I. (in press). Reliability and Energy Efficiency Enhancement in Wireless Body Area Networks for E-Health
Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features com...
McLaren, P., Russell, G. & Buchanan, B. (in press). Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...
The Scottish Informatics & Computer Science Alliance
Research exchange with the Bielefeld Dialogue Systems group
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight int...
Chartered Institute of Library and Information Professionals
The findings of this research will contribute to strategies to improve citizen engagement in the democratic process at community level.
Carnegie Trust for the Universities of Scotland
The Internet of Things (IoT), a network of physical objects that can communicate, sense and act in the world, is rapi...
Peter Aaby - PhD sponsorship
Digital Health Institute
The focus of the project is to use the new breed of motion sensors which can fully capture the movement of hands and fingers, and use this to ...
Scottish Funding Council
Dovecot and the ENU team are exploring innovative digital solution for visitors to experience the work of weavers without disturbing the concentrated work required f...
I-POS produce an Intelligent Point of Sale application which runs on Apple iPad hardware for use in bars and restaurants. The app...
Forestry Commission Scotland
Timber analysis project
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas...
Exploiting industry interconnect standards to gain visibility into devices.
'EverythingPast' is a global project that will link together and make accessible public, private and personal archive through a unique map-led interf...
Analysis of transactional data provided by real time cloud based ordering systems linked within the food supply chain which targets Foodservice sector
When purchasing business insurance, a customer often completes forms each year to fulfil legal disclosure requirements and receive a ‘quote’. Internet services, such as comparison sites, h...
This research explores...
At present the Information Technology profession appears to be dogged by high profile project failure, high...
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. ...
This research will investigate the nature of interactions between people and experience-oriented tec...
Participation Space Studies explore eParticipation ...
This PhD is concerned with the role of online information in the creation, building, and evaluation of personal reputations. In this context term “person...
The thesis describes an investigation into how people learn to cope with non-discretionary use of digital technologies. This includes ...
Hyper-heuristics (HH) have been described as methodologies that aim to offer “good enough -soon enough - cheap enough” solutions to real world...
30 June 2016
This week the Chartered Institute of Library and Information Professionals (CILIP) and the Archives and Records Association (ARA) published a series of 24 fact sheets on the ...
15 June 2016
RBS approached Dr Oli Mival, Principal Research Fellow in the Centre fro Interaction Design, to undertake a program of review of their UX activities and methods with the aim o...
04 May 2016
The FOCAS project was rated as Excellent at its final review, after running for three years. The project coordinator was Emma Hart, with Jennifer Willies as Project Manager.
16 June 2016
Simon Powers will deliver a research seminar about his work on the evolution of institutions.
Abstract Economics, artificial life, and agent-based c...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
07 November 2016
11 November 2016
21 April 2016
Announcement of resultsEmerald and the Indian Academy of Management (IAM) are delighted to offer a research grant for an Indian project in the field of management research.
09 June 2016
Simon Powers will write an article about "defection" (as the term is used in game theory), for the forthcoming Encyclopedia of Evolutionary Psychological Science, edited by To...
18 May 2016
The June 2016 issue of Journal of Information Science (volume 42, issue 3) has just been published. This is a special issue of the journal that comprises twelve articles devel...
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
05 May 2016
Professor Hazel Hall took part in a webinar interview today hosted by Science in Australia Gender Equity (SAGE). The SAGE team asked Hall about her experience of leading Edinb...