Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). An Applied Pattern-Driven Corpus to Predictive Analytics in Mitigating SQL Injection Attack. In Proceedings of the Seventh IEEE International Conference on Emerging Security TechnologiesISBN n/a
Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted w...
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y. & Oakley, I. (in press). SmoothMoves: smooth pursuits head movements for augmented reality. In Proceedings of the 30th Annual ACM Symposium on User Interface Software & TechnologyISBN n/a
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Flint, T. & Hood, B. (in press). Eidolon360 – a VR Experience. In Proceedings of BHCI 2017ISBN Tbc
Flint, T. & Dylan, T. H. (in press). Aide Memoire. In Proceedings of BHCI 2017ISBN Tbc
Thuemmler, C. (2017). Accroitre-lefficacite-de-la-prestation-des-soins. http://paperjam.lu/news/accroitre-lefficacite-de-la-prestation-des-soins
Interview on socio-economic background of digital agenda in health.
Soufian, M. & Borairi, M. (in press). Genetic Sensor Placement in Active Control of a Robotic Arm. In naISBN na
No abstract available.
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Egan, C., Benyon, D. & Thompson, R. (in press). Permaculture as a foundation for sustainable interaction design and UX. In Proceedings of British HCI 2017ISBN tbc
The main objective of this work is to gain an understanding of the relationships between UX and permaculture. This will deliver insights as to how digital media development ca...
Flint, T. (in press). Appropriating Affordances. Three Practice Based Explorations. In Proceedings of BHCI 2017ISBN tbc
Affordance and Appropriation are related. An effective way of examining these phenomena is through practice. This paper discusses practice based exploration of affordance in t...
Aldhous, J., Hetherington, R. & Turner, P. (in press). The Digital Rubber Hand Illusion. In Proceedings of British HCI 2017 – Digital Make-BelieveISBN n/a
The rubber hand illusion (RHI) is a body ownership illusion whereby congruently stroking a fake rubber hand and a subject's hidden hand while observing the rubber hand produce...
Thuemmler, C. (in press). Living on the Edge - How 5G is going to enable the Medical Internet of Things big time. In Conference ProceedingsISBN tbc
Benyon, D. & Resmini, A. (in press). User Experience in Cross-channel Ecosystems. In Proceedings of the British HCI Conference 2017ISBN tbc
Recent developments in information and communication technologies have left interaction design and human-computer interaction (HCI) with something of a conceptual gap. The dis...
Chalmers, K., Kerridge, J. & Pedersen, J. B. (2017). Communicating Connected Components: Extending Plug-and-Play to Support Skeletons. In Communicating Process Architectures 2016ISBN 978-0-9934385-1-6
For a number of years, the Communicating Process Architecture (CPA) community have developed languages and runtimes supporting message passing concurrency. For these we always...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be