Search for a surname in the box below and then click "Search" to search for Staff.
Segredo, E., Lalla-Ruiz, E., Hart, E., Paechter, B. & Voss, S. (2016). Hybridisation of Evolutionary Algorithms through hyper-heuristics for global continuous optimisation. In Festa, P., Sellmann, M. & Vanschoren, J. (Eds.). Learning and Intelligent Optimization: 10th International Conference, LION 10, Ischia, Italy, May 29 -- June 1, 2016, 296-305. doi:10.1007/978-3-319-50349-3_25. ISBN 978-3-319-50348-6, 978-3-319-50349-3,
Choosing the correct algorithm to solve a problem still remains an issue 40 years after the Algorithm Selection Problem was first posed. Here we propose a hyper-heuristic whic...
Essa, A., Al-Dubai, A., Romdhani, I. & Eshaftri, M. (2016). A new dynamic weight clustering algorithm for wireless sensor networks. In Yang, S., Gao, J., Zhang, Y., Yang, K., Leung, V. C. M. & Hu, J. (Eds.). Smart Grid Inspired Future Technologies: First International Conference, Liverpool, UK, May 19-20, 2016 SmartGIFT 2016, 195-203. ISBN 978-3-319-47729-9, 978-3-319-47728-2
Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WS...
Uwagbole, S., Buchanan, W. & Fan, L. (2016). Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016ISBN 9781910810934
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...
Lecturer in Biological Chemistry
Quinton, M., McGregor, I. & Benyon, D. (2016). Sonifying the solar system. In The 22nd International Conference on Auditory Display (ICAD-2016), 28-35. ISBN 0-9670904-3-1
Sound is potentially an effective way of analysing data and it is possible to simultaneously interpret layers of sounds and identify changes. Multiple attempts to use sound wi...
Uwagbole, S., Buchanan, W. J. & Fan, L. (2016). Numerical encoding to tame SQL injection attacks. In 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS),doi:10.1109/NOMS.2016.7502997. ISBN 978-1-5090-0223-8
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases....
Abdmeziem, M. R., Tandjaoui, D. & Romdhani, I. (2016). A new distributed MIKEY mode to secure e-health applications. In Chang, V., Méndez Muñoz, V., Walters, R., Wills, G. & Ramachandran, M. (Eds.). Proceedings of the International Conference on Internet of Things and Big Data, 88-95. doi:10.5220/0005945300880095. ISBN 978-989-758-183-0
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G. & Lo, O. (2015). RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1, 872-879. doi:10.1109/Trustcom.2015.459. ISBN 9781467379526
This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without use...
Lalla-Ruiz, E., Segredo, E., Voss, S., Hart, E. & Paechter, B. (2015). Analysing the performance of migrating birds optimisation approaches for large scale continuous problems. In Parallel Problem Solving from Nature – PPSN XIV, 134-144. ISBN 978-3-319-45823-6; 978-3-319-45822-9
We present novel algorithmic schemes for dealing with large
scale continuous problems. They are based on the recently proposed
population-based meta-heuristics Migrating Birds...
Hou, T., Chapman, P. & Blake, A. (2015). Antipattern comprehension: an empirical evaluation. In Kuhn, W. & Ferrario, R. (Eds.). 9th International Conference on Formal Ontology in Information Systems (FOIS 2016), 211-224. doi:10.3233/978-1-61499-660-6-211. ISBN 978-1-61499-659-0, 978-1-61499-660-6,
Comprehension of justifications is known to be difficult for even experienced ontology engineers, and much more so for other stakeholders. In this paper, we present two method...
Firth, R., Stoltenberg, E. & Jennings, T. (2016). Using an Outdoor Learning Space to Teach Sustainability and Material Processes in HE product Design. International Journal of Art and Design Education. 35(3), 327-336. doi:10.1111/jade.12109. ISSN 1476-8062
The world is facing environmental changes that are increasingly affecting how we think about manufacturing, the consumption of products and use of resources. Within the HE pro...
Fraser, B. (2013). The Scottish Jutewallah: a Study of Transnational Positioning in Personal Narratives. In Sassi, C. & van Heijnsbergen, T. (Eds.). Within and Without Empire: Scotland Across the (Post)colonial Borderline,, 136-149. Cambridge Scholars Publishing. ISBN 978-1443849227
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2012). Who would you trust to identify you in accessing your health record?. Communications in computer and information science. ISSN 1865-0929
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...
The PhD project will explore the relationship between area deprivation and self-reported health in UK Nurses. I aim to assess the presence and extent of ...