Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Martí, L., Segredo, E., Sánchez-Pi, N. & Hart, E. (2016). Impact of selection methods on the diversity of many-objective Pareto set approximations. In Proceedings of the 21st International Conference on Knowledge-Based and Intelligent Information & Engineering Systems
Selection methods are a key component of all multi-objective and, consequently, many-objective optimisation evolutionary algorithms. They must perform two main tasks simultane...
Our website evaluated extremely positively among patients, family members and clinicians in NHS Lothian and our model is unquestionably of utility Scotland-wide.The underpinning research and iterative...
Optimisation – finding cost-effective or high-performing solutions - is a key economic driver for business today. However, academic literature on search-based optimisation techniques reflects an escal...
assist the development of a novel electrolysed water based application to reduce spoilage and microbial contamination of a variety of fresh produce types of importance to Indian commerce.
18 July 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences:
Alife 2016 (Cancun, Mexico) Simon Pow...
04 May 2016
04 May 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences & journals
Alife 2016 (Cancun,...
03 May 2016
Professor Hazel Hall has been nominated for election as Director-at-large for the Association for Information Science and Technology. She is one of eight candidates standing f...
Reader in Immunology & Infection / Director of Research, School of Applied Sciences
Head of Applications
0131 455 5021
Assistant Principal, Student Experience
Lecturer in Biomedical Science
Lecturer in Sport, Exercise and Health. Programme Leader: BA Business and Enterprise in Sport
Ukwandu, E., Buchanan, W. & Russell, G. (in press). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)ISBN Not Known
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Alsnousi, E., Al-Dubai, A., Romdhani, I. & Eshaftri, M. (in press). A New Weight based Rotating Clustering Scheme for WSNs. In Proceedings of ISNCC-2017 WMCN
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Urquhart, N. & Fonzone, A. (in press). Evolving solution filtering for real-world optimisation. In Proceedings of the Genetic and Evolutionary Computation Conference 2017ISBN not known
Agencies who provide social care services typically have to optimise staff allocations and the travel whilst attempting to satisfy conflicting objectives. In such cases it i...
Steyven, A., Hart, E. & Paechter, B. (in press). An Investigation of Environmental Influence on the Benefits of Adaptation Mechanisms in Evolutionary Swarm Robotics. In Proceedings of GECCO 2017doi:10.1145/3071178. 3071232. ISBN unknown
A robotic swarm that is required to operate for long periods in a potentially unknown environment can use both evolution and individual learning methods in order to adapt. How...
Hart, E., Sim, K., Gardiner, B. & Kamimura, K. (in press). A Hybrid Method for Feature Construction and Selection to Improve Wind-Damage Prediction in the Forestry Sector. In Proceedings of GEcco 2017doi:10.1145/3071178.3071217. ISBN unknown
Catastrophic damage to forests resulting from major storms has resulted in serious timber and financial losses within the sector across Europe in the recent past. Developing r...
Soufian, M. (2017). Towards self-defending control systems in cybersecurity analysis and measures in industrial automation systems. In 26th IEEE International Symposium on Industrial Electronics (ISIE17)ISBN n/a
Soufian, M. & Borairi, M. (2017). Optimal Actuator\Sensor Placement and Controller Design for Large Flexible Space Structures and Robotics. In IEEE-ISIE17ISBN n/a
Leigl, C. & Weaver, M. (in press). Guidelines for sustainable-value creation within the context of German automotive industry’s strategic carbon crisis management. In N/AISBN tbc
The continuing debate on the global environmental progress through achievement of smarter clean/green-policies, reasoned with the need for carbon-emissions’ reduction/preventi...
Segura, C., Segredo, E. & Miranda, G. (in press). The Importance of the Individual Encoding in Memetic Algorithms with Diversity Control Applied to Large Sudoku Puzzles. In Proceedings of the CEC 2017
In recent years, several memetic algorithms with explicit mechanisms to delay convergence have shown great promise when solving 9x9 Sudoku puzzles. This paper analyzes and ext...
McKeown, S., Russell, G. & Leimich, P. (in press). Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and LawISBN not yet known
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
Medboe, H., Bares, W., Webster, E., Frost Fadnes, P., Inglis, C., Kahr, M., …Heyman, M. (2017). Continental Drift: 50 years of jazz from Europe. In Moir, Z. & Atton, C. (Eds.). Continental Drift: 50 years of jazz from Europe - Conference Proceedings, v, vi. ISBN 978-1-78808-706-3
Following popular exposure in France to the proto-jazz of James Reese Europe and his 369th “Harlem Hellfighters” Infantry Regiment during the latter years of WW1, the jazz bug...
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention. In Proceedings
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...
Chief Scientists Office
PThe impact of psychological trauma on physical and mental health is well known, although current models of care are failing to meet clients’ needs. A new model of care, supported and financed by the ...
Gazi Bay in southern Kenya has the potential to become a world-leading centre of excellence in the integration of ecosystem science and community development. Work there, led by scientists from Kenya ...
Heriot Watt University
The project will develop specialised lighting systems appropriate for lighting woven optical fibre, develop lighting capacity as an integrated component, and advance large scale commercial manufacture...
Arts & Humanities Research Council
This collaborative project with University of Edinburgh, will focus on the design and development of an interface, which will be accessible online, via mobile phones and tablets, and via large touchsc...
To adapt our existing brief school-based psycho-educational cancer awareness intervention to focus exclusively on increasing early detection of melanoma among young people (14-15 years) and test ...
Scottish Funding Council
I-POS produce an Intelligent Point of Sale application which runs on Apple iPad hardware for use in bars and restaurants. The application generates transaction based sales data and re-ordering data fr...
Marine Alliance for Science & Technology for Scotland (Hosted by St Andrew's University)
Long-duration recorders are commercially available for week-scale terrestrial sound monitoring, but expensive and large, thus difficult to disguise in colonies. We have an active collaboration with th...
The project objectives and scope are (i) to establish a knowledge base of current practice in starter culture use and possible bacteriophage-related issues in the artisanal cheese-making sector in Sco...
When purchasing business insurance, a customer often completes forms each year to fulfil legal disclosure requirements and receive a ‘quote’. Internet services, such as comparison sites, have enabled ...
University of Aberdeen
Portrait is a software tool developed to help care staff get to know personal and social information about clients that live in residential care facilities. The Portrait system consists of a biography...
Edinburgh & Lothians Health Foundation
Many people need to instil eye drops to treat conditions such as Dry Eye Syndrome (DES) and Glaucoma (30% of the population have DES and 70 million people worldwide have glaucoma). DES is relieved wit...
Engineering and Physical Sciences Research Council
Ontologies are a way of reasoning about data in an efficient manner. Ontologies are increasingly prevalent in a range of applications, including the Semantic Web, medicine and law. The development and...
Credit risk is one of the most general risks that exist in the financial market and a major risk faced by financial institutions. Credit risk m...
The work presented in this thesis concerns the problem of timetabling at universities – particularly course-timetabling, and examines the various ways i...
The realistic simulation of pedestrian movement is a challenging problem, a large number of individual pedestrians may be included in the s...
Arguments are structures of premises and conclusions that underpin rational reasoning processes. Within complex knowledge domains, especially if they are contentious, argument st...
Mangrove forests are considered one of the most efficient natural carbon sinks and their preservation is thus im...
Explaining the origin and the evolution of cooperation has been a major challenge i...
Hyper-heuristics (HH) have been described as methodologies that aim to offer “good enough -soon enough - cheap enough” solutions to real world...
With the growing need of the industry and due to high business demands, there have consequently been high demands of IT pro...
The study will examine the introduction of the computerisation of crime and intelligence re...
Today, data plays an important role in people’s daily activities. With the help of some database applications such as decision support systems an...
There is evidence to suggest that psychological therapie...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
Prime numbers are used extensively in public key encryption key, typically where we take two prime numbers and multiply them together to give a modulus (N). This modulus is ...
08 August 2016
Sir, Jim Brunsden and Alex Barker, in “City of London eyes ‘equivalence’ as post-Brexit link with EU” (July 26), make the point that relating to the EU on the basis of “equiva...
04 May 2016
The FOCAS project was rated as Excellent at its final review, after running for three years. The project coordinator was Emma Hart, with Jennifer Willies as Project Manager.
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
18 May 2016
The June 2016 issue of Journal of Information Science (volume 42, issue 3) has just been published. This is a special issue of the journal that comprises twelve articles devel...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...
10 June 2016
10 June 2016
Tackling inequality and enhancing opportunities for all groups in the labour market continues to be a priority for government. However, research highlights the persistent ineq...