Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Hall, H., Cruickshank, P. & Ryan, B. (in press). Exploring information literacy through the lens of Activity Theory. In Proceedings of the European Conference on Information LiteracyISBN n/a
Activity Theory (AT) is presented as a framework for explaining Information Literacy (IL) as a technologically mediated social practice. This is achieved in the context of a s...
Economic and Social Research Council
This research studentship will investigate innovation and best practice in skills development in the workplace in Scotland, drawing comparisons with the rest of the UK and other countries. It will exp...
To develop the prototype for a next-generation security platform with advanced detection capabilities.
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
29 July 2017
Tom Flint will be accompanying weavers from Dovecot Tapestry Studio at a workshop held at the National Gallery London.
The workshop Weave/Weft is in tandem with t...
21 October 2017
The Dutch Design Week is one of the most prominent Design events internationally and the Mind the Step exhibition one of its highlights. It features design driven by technolog...
05 July 2017
The 31st British Human Computer Interaction Conference was held between the 3rd and 6th July 2017 at the University of Sunderland.
The conference was organised by...
Lecturer of Cybersecurity, Encryption and Networks
Bishop, C., Esteves, A. & Mcgregor, I. (in press). Head-Mounted Displays as Opera Glasses: Using Mixed-Reality to Deliver an Equalitarian User Experience During Live Events. In Proceedings of 19th ICMI ConferenceISBN n/a
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y. & Oakley, I. (in press). SmoothMoves: smooth pursuits head movements for augmented reality. In Proceedings of the 30th Annual ACM Symposium on User Interface Software & TechnologyISBN n/a
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Flint, T. & Hood, B. (in press). Eidolon360 – a VR Experience. In Proceedings of BHCI 2017ISBN Tbc
Flint, T. & Dylan, T. H. (in press). Aide Memoire. In Proceedings of BHCI 2017ISBN Tbc
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Buunk, I., Hall, H. & Smith, C. (in press). Skills in Sight: How Social Media Affordances Increase Network Awareness. In Proceedings of the 18th European Conference on Knowledge Management ECKM 2017ISBN n/a
The discussion in this paper derives from an analysis of data from twenty interviews conducted with members of an online knowledge sharing platform between October 2016 and Fe...
Urquhart, N. & Hart, E. (in press). Creating optimised employee travel plans. In TBCISBN TBC
The routing of employees who provide services such as home health or social care is a complex problem. When sending an employee between two addresses , there may exist more th...
Thuemmler, C. (2017). Accroitre-lefficacite-de-la-prestation-des-soins. http://paperjam.lu/news/accroitre-lefficacite-de-la-prestation-des-soins
Interview on socio-economic background of digital agenda in health.
Ennis, L. (2017). The Digital Library. Teaching fellows journal. ISSN 2050-9987
The meteoric rise of the internet has meant that we have access to more information than ever. Our informational lives, and those of our students are complex – fraught with is...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X. & Han, W. (in press). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference ProceedingsISBN NA
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Carnegie Trust for the Universities of Scotland
Derek Hoy was a Scottish nurse based predominantly in Glasgow who died in 2012. He worked for many years in the National Health Service (NHS) in a variety of clinical roles, where he began to experime...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
The Scottish Informatics & Computer Science Alliance
Research exchange with the Bielefeld Dialogue Systems group
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
The Scottish Centre for Telehealth and Telecare
In this project, we will spread the use of an innovative website, designed to support patients and family members in and after Intensive Care. We have already implemented the website at the Royal Infi...
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight into business risks ...
Chartered Institute of Library and Information Professionals
The findings of this research will contribute to strategies to improve citizen engagement in the democratic process at community level.
Community Councillors are a vital link between local communities...
Plansafe Solutions Ltd
Consultancy for SafetyPro Engineer System
The Internet of Things (IoT), a network of physical objects that can communicate, sense and act in the world, is rapidly expanding and is expected to account for nine billion of inter-connected device...
Forestry Commission Scotland
Timber analysis project
At present the Information Technology profession appears to be dogged by high profile project failure, high...
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. ...
This critical appraisal demonstrates three particular themes that are domin...
Despite football being deeply entrenched in Scottish culture it is under-researched from...
18 May 2017
Professor Hazel Hall was admitted as a Fellow of the Royal Society of Edinburgh (RSE) by RSE President Dame Jocelyn Bell Burnell at a ceremony at the RSE headquarters at Georg...
20 May 2017
Professor Bill Buchanan, an international expert in Cyber Security, appeared on a wide range of media events related to the ransomware attack (WannaCry). This included a numbe...
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
16 November 2016
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
31 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament ...
23 May 2017
Centre for Social Informatics PhD student Lyndsey Jenkins, has been newly appointed to the team of copy-editors (or ‘editorial associates’) for Information Research.
16 February 2017
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
30 June 2016
This week the Chartered Institute of Library and Information Professionals (CILIP) and the Archives and Records Association (ARA) published a series of 24 fact sheets on the ...
15 June 2016
RBS approached Dr Oli Mival, Principal Research Fellow in the Centre fro Interaction Design, to undertake a program of review of their UX activities and methods with the aim o...
04 May 2016
The FOCAS project was rated as Excellent at its final review, after running for three years. The project coordinator was Emma Hart, with Jennifer Willies as Project Manager.