Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Bishop, C., Esteves, A. & Mcgregor, I. (in press). Head-Mounted Displays as Opera Glasses: Using Mixed-Reality to Deliver an Equalitarian User Experience During Live Events. In Proceedings of 19th ICMI ConferenceISBN n/a
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). An Applied Pattern-Driven Corpus to Predictive Analytics in Mitigating SQL Injection Attack. In Proceedings of the Seventh IEEE International Conference on Emerging Security TechnologiesISBN n/a
Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted w...
Economic and Social Research Council
This research studentship will investigate innovation and best practice in skills development in the workplace in Scotland, drawing comparisons with the rest of the UK and other countries. It will exp...
Do-It-Yourself networking refers to a conceptual approach to the use of low-cost hardware and wireless technology in deploying local communication networks that can operate independently from the Inte...
Fragment Finder (FF) enables a new, high-speed approach to digital forensics. It is unique in that it will build a more efficient technical architecture for the creation, storage and use of hash signa...
05 February 2016
IntroductionOn the back of four nomination at the Scottish Knowledge Exchange awards [here], Gordon Stuart, director of operations at Informatics Ventures, has also predicted ...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
03 May 2016
Professor Hazel Hall has been nominated for election as Director-at-large for the Association for Information Science and Technology. She is one of eight candidates standing f...
Lecturer of Cybersecurity, Encryption and Networks
Hall, H., Cruickshank, P. & Ryan, B. (in press). Exploring information literacy through the lens of Activity Theory. In Proceedings of the European Conference on Information LiteracyISBN n/a
Activity Theory (AT) is presented as a framework for explaining Information Literacy (IL) as a technologically mediated social practice. This is achieved in the context of a s...
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y. & Oakley, I. (in press). SmoothMoves: smooth pursuits head movements for augmented reality. In Proceedings of the 30th Annual ACM Symposium on User Interface Software & TechnologyISBN n/a
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Flint, T. & Hood, B. (in press). Eidolon360 – a VR Experience. In Proceedings of BHCI 2017ISBN Tbc
Flint, T. & Dylan, T. H. (in press). Aide Memoire. In Proceedings of BHCI 2017ISBN Tbc
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Buunk, I., Hall, H. & Smith, C. (in press). Skills in Sight: How Social Media Affordances Increase Network Awareness. In Proceedings of the 18th European Conference on Knowledge Management ECKM 2017ISBN n/a
The discussion in this paper derives from an analysis of data from twenty interviews conducted with members of an online knowledge sharing platform between October 2016 and Fe...
Urquhart, N. & Hart, E. (in press). Creating optimised employee travel plans. In TBCISBN TBC
The routing of employees who provide services such as home health or social care is a complex problem. When sending an employee between two addresses , there may exist more th...
Thuemmler, C. (2017). Accroitre-lefficacite-de-la-prestation-des-soins. http://paperjam.lu/news/accroitre-lefficacite-de-la-prestation-des-soins
Interview on socio-economic background of digital agenda in health.
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X. & Han, W. (in press). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference ProceedingsISBN NA
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Egan, C., Benyon, D. & Thompson, R. (in press). Permaculture as a foundation for sustainable interaction design and UX. In Proceedings of British HCI 2017ISBN tbc
The main objective of this work is to gain an understanding of the relationships between UX and permaculture. This will deliver insights as to how digital media development ca...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
The Scottish Informatics & Computer Science Alliance
Research exchange with the Bielefeld Dialogue Systems group
Marine Alliance for Science & Technology for Scotland (Hosted by St Andrew's University)
Production of final version smartphone application and data queries for citizen science research in Brazil to improve mangrove crab fisheries management.
Scottish Funding Council
An SFC Innovation Voucher being used to fund a feasibility study examining the use of heuristics to optimize food collection and delivery.
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Forestry Commission Scotland
Maintenance and hosting of website database developed in previous project
Society for Research into Higher Education
The overarching aim of this study is to investigate how universities are preparing IT students for the global labour market. The focus of this study is entrepreneurship which is now given high priorit...
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight into business risks ...
Chartered Institute of Library and Information Professionals
The findings of this research will contribute to strategies to improve citizen engagement in the democratic process at community level.
Community Councillors are a vital link between local communities...
Plansafe Solutions Ltd
Consultancy for SafetyPro Engineer System
Peter Aaby - PhD sponsorship
Carnegie Trust for the Universities of Scotland
The Internet of Things (IoT), a network of physical objects that can communicate, sense and act in the world, is rapidly expanding and is expected to account for nine billion of inter-connected device...
Digital Health Institute
The focus of the project is to use the new breed of motion sensors which can fully capture the movement of hands and fingers, and use this to create an early stage product to demonstrate how precise h...
At present the Information Technology profession appears to be dogged by high profile project failure, high...
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. ...
This research will investigate the nature of interactions between people and experience-oriented technologies such as new-media artw...
Leo Appleton's PhD research explores the impact of libraries on citizenship. He is...
Participation Space Studies explore eParticipation ...
30 June 2016
This week the Chartered Institute of Library and Information Professionals (CILIP) and the Archives and Records Association (ARA) published a series of 24 fact sheets on the ...
15 June 2016
RBS approached Dr Oli Mival, Principal Research Fellow in the Centre fro Interaction Design, to undertake a program of review of their UX activities and methods with the aim o...
04 May 2016
The FOCAS project was rated as Excellent at its final review, after running for three years. The project coordinator was Emma Hart, with Jennifer Willies as Project Manager.
16 June 2016
Simon Powers will deliver a research seminar about his work on the evolution of institutions.
Abstract Economics, artificial life, and agent-based c...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
07 November 2016
11 November 2016
21 April 2016
Announcement of resultsEmerald and the Indian Academy of Management (IAM) are delighted to offer a research grant for an Indian project in the field of management research.
09 June 2016
Simon Powers will write an article about "defection" (as the term is used in game theory), for the forthcoming Encyclopedia of Evolutionary Psychological Science, edited by To...
18 May 2016
The June 2016 issue of Journal of Information Science (volume 42, issue 3) has just been published. This is a special issue of the journal that comprises twelve articles devel...
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
05 May 2016
Professor Hazel Hall took part in a webinar interview today hosted by Science in Australia Gender Equity (SAGE). The SAGE team asked Hall about her experience of leading Edinb...