Lecturer of Cybersecurity, Encryption and Networks
Moradpoor, N., Brown, M. & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In N/Adoi:10.1145/3136825.3136859. ISBN 978-1-4503-5303-8/17/10
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Yassin, A., Nasser, Y., Awad, M. & Al-Dubai, A. (2017). Simultaneous Context Inference and Mapping using mm-Wave for Indoor Scenarios. In IEEE ICC 2017, 1-6. doi:10.1109/ICC.2017.7996976
We introduce in this paper two main approaches, Triangulateration (TL) and Angle-Difference-of-Arrival (ADoA) for indoor localization and mapping using single-anchor and milli...
Pitt, J. & Hart, E. (in press). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. In tbaISBN tba
This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional ...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight into business risks ...
Oslo School Of Architecture and Design
This one year project will undertake a literature review and physical testing of Scots pine logs and boards. The aim of the project is to develop a predictive model of the knot characteristics of boar...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
20 May 2017
Professor Bill Buchanan, an international expert in Cyber Security, appeared on a wide range of media events related to the ransomware attack (WannaCry). This included a numbe...
Associate Professor of Immunology & Infection / Director of Research, School of Applied Sciences
Head of Applications
Lecturer in Human Geography
Business Development Executive
Hall, H., Cruickshank, P. & Ryan, B. (in press). Exploring information literacy through the lens of Activity Theory. In Proceedings of the European Conference on Information LiteracyISBN n/a
Activity Theory (AT) is presented as a framework for explaining Information Literacy (IL) as a technologically mediated social practice. This is achieved in the context of a s...
Binyamin, S., Rutter, M. J. & Smith, S. (2017). Factors Influencing the Students’ Use of Learning Management Systems: A Case Study of King Abdulaziz University. In n/a, 289 - 297. ISBN n/a
Abstract: The Technology Acceptance Model (TAM) has been one of the most popular models in explaining the acceptance of technologies and employed empirically in various studie...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X. & Han, W. (in press). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference ProceedingsISBN NA
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Aldhous, J., Hetherington, R. & Turner, P. (in press). The Digital Rubber Hand Illusion. In Proceedings of British HCI 2017 – Digital Make-BelieveISBN n/a
The rubber hand illusion (RHI) is a body ownership illusion whereby congruently stroking a fake rubber hand and a subject's hidden hand while observing the rubber hand produce...
Soufian, M., Borairi, M. & Yu, D. (2017). Fault detection observer of a pilot plant papermaking machine. In UnknownISBN Unknown
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Vettese, S., Thompson, P. & Allan, D. (2017). A study of the multi generational relationship with making through mediated designing in collaborative, digital environments: implications for learning and open access fabrication. In Cumulus Hong Kong 2016, Cumulus Working Papers, Open Design for E-very-thing, 23 - 30. ISBN 9789526000800
In this paper, the researchers will investigate different ways in which school age, 'generation net' children learn, through non-linear, mediated, collaborative ‘making’ envir...
Alwis, L. S. M., Bremer, K., Weigand, F., Kuhne, M., Helbig, R. & Roth, B. (2017). Textile carbon reinforcement structures with integrated optical fibre sensors designed for SHM applications. In Jin, W., Chung, Y., Lee, B., Canning, J., Nakamura, K. & Yuan, L. (Eds.). OFS-25 Proceedingsdoi:10.1117/12.2264915. ISBN n/a
An optical fibre-based strain sensor “stitched” to a functionalised carbon structure (FCS) that can be used for structural health monitoring is introduced. The aim of the desi...
Ukwandu, E., Buchanan, W. & Russell, G. (in press). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)ISBN Not Known
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Hart, E., Sim, K., Gardiner, B. & Kamimura, K. (in press). A Hybrid Method for Feature Construction and Selection to Improve Wind-Damage Prediction in the Forestry Sector. In Proceedings of GEcco 2017doi:10.1145/3071178.3071217. ISBN unknown
Catastrophic damage to forests resulting from major storms has resulted in serious timber and financial losses within the sector across Europe in the recent past. Developing r...
Ridley-Ellis, D. (2017). TG1/201703/21rev Derivation of Goldeneye 702 grading machine settings for British Spruce. CEN TC124 WG2 TG1: MiCROTEC
Julius Durst Str. 98
IT-39042 Brixen (BZ)
United Kingdom of Great Britain and Northern Ireland + Republic of Ireland
Scottish Institute for Policing Research
This project will entail a systematic literature review of police methods in visible policing to establish the current evidence base in relation to how these affect public confidence. This review will...
World Olympians Association
The World Olympians Association (WOA), as part of the International Olympic Committee, would like to find out more about the musculoskeletal issues faced by retired athletes. What the main issues are ...
Medical Research Council
Risks of developing many adult illnesses are set down as we develop in the womb, hence the environment we experience during fetal life needs to be ‘just right’. Understanding how the fetal environmen...
SUNRISE will develop, implement, assess and facilitate learning about new, collaborative ways to address common mobility challenges at the neighbourhood level. Towards this aim, 6 cities will foster c...
NHS Health Scotland
The project will take the form of a systematic review of relevant literature to provide an update on the evidence base on the health needs of people with learning disabilities in Scotland since 2004, ...
Society for Research into Higher Education
Teaching-focused academics in UK Life Science departments may experience anxiety about their continued ability to teach undergraduates at Honours level, and postgraduates at Masters and doctoral level...
NHS Education Scotland
NES -GNC and Margaret Callum Roger Midwifery Award
To find out from people with learning disabilities and those who care and support them what skills and qualities non-learning disability trained sta...
British Council "Mobility Grant for Leadership Development Project". Funds visit by 6 persons from Ukraine to Edinburgh to seek potential collaborations in education and work based learning.
Chartered Institute of Library and Information Professionals
The findings of this research will contribute to strategies to improve citizen engagement in the democratic process at community level.
Community Councillors are a vital link between local communities...
Digital Health Institute
As a precursor to the work described under the DHI application for development of “Diabetes: Understanding Daily Events –an interactive, digital diabetes education site for Young People”, there are se...
To adapt our existing brief school-based psycho-educational cancer awareness intervention to focus exclusively on increasing early detection of melanoma among young people (14-15 years) and test ...
This project aims to develop an e-policy platform augmented with a toolbox of applications and online services, which will assist national and regional authorities in the EU in elaborating or revising...
Network models are often created to describe interactions between components in biological systems. At a molecular leve...
This thesis explores participation in adult learning and focuses upon three key areas of interest: reasons for participation, the challenges of par...
The development and fabrication injection of moulding tools is complex and
demands highly skilled personal. The research...
Infrared pedestrian detection systems struggle with real-time processing performance. Known solutions are limited to either...
The thesis describes an investigation into how people learn to cope with non-discretionary use of digital technologies. This includes...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. ...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
31 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament ...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
17 January 2017
CM2000, Edinburgh Napier University, Digital Health & care Institute (DHI) and East Dunbartonshire Health & Social Care Partnership hosted an event in the Scottish Parliament ...
05 December 2016
27 August 2017
17 June 2016
17 June 2016
Professor Chandra Bhat Director of the Centre for Transportation Research, The University of Texas at Austin visited TRI at Edinburgh Napier University to discuss joint collab...
01 November 2017
25 April 2016
TRI working in collaboration with Dutch consultancy Inno-V have been appointed by the UK’s Urban Transport Group – which represents public bodies responsible for coordinating ...
01 February 2017
18 May 2017
Professor Hazel Hall was admitted as a Fellow of the Royal Society of Edinburgh (RSE) by RSE President Dame Jocelyn Bell Burnell at a ceremony at the RSE headquarters at Georg...