Lecturer of Cybersecurity, Encryption and Networks
Moradpoor, N., Brown, M. & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In N/Adoi:10.1145/3136825.3136859. ISBN 978-1-4503-5303-8/17/10
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Ghaleb, B., Al-Dubai, A. & Romdhani, I. (2017). Drizzle: Adaptive and Fair Route Maintenance Algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), 1-6. doi:10.1109/ICC.2017.7996819. ISBN 978-1-4673-8999-0
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
Salayma, M., Al-Dubai, A., Romdhani, I. & Nasser, Y. (2017). New Dynamic, Reliable and Energy Efficient Scheduling for Wireless Body Area Networks (WBAN). In 2017 IEEE International Conference on Communications (ICC)doi:10.1109/ICC.2017.7996898. ISBN 978-1-4673-8999-0
Wireless body area networks (WBANs) facilitate
efficient and cost-effective e-health care and well-being
applications. The WBAN has unique challenges and features
compared to ...
Scottish Funding Council
This project aims to review an assess existing remote sensing technologies in order to improve and adapt technologies currently used in other fields to civil engineering applications. The two main aim...
Heriot Watt University
The project will develop specialised lighting systems appropriate for lighting woven optical fibre, develop lighting capacity as an integrated component, and advance large scale commercial manufacture...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
Lecturer in Cybersecurity and Networks
Senior Lecturer T&R
Principal Research Fellow
Pomponi, F., Medina Campos, L., Moncaster, A. & Smith, S. (2017). Bringing pupils into building energy performance: school design, construction and operation. In PLEA Conference Proceedings Volume IIIISBN N/A
Colegio Rochester is school in Colombia with a strong vision for sustainability. This vision permeates the new school building which was the first school in Latin America to b...
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Buunk, I., Hall, H. & Smith, C. (in press). Skills in Sight: How Social Media Affordances Increase Network Awareness. In Proceedings of the 18th European Conference on Knowledge Management ECKM 2017ISBN n/a
The discussion in this paper derives from an analysis of data from twenty interviews conducted with members of an online knowledge sharing platform between October 2016 and Fe...
Colabella, S., D'Amico, B., Hoxha, E. & Fivet, C. (in press). Structural Design with Reclaimed Materials: an Elastic Gridshell out of Skis. In n/aISBN n/a
This paper presents the design and construction of a 36m2 gridshell, the rigidity of which is achieved through the bending of an initially flat grid of 210 reclaimed skis. The...
Thomson, C., Wadhaj, I., Romdhani, I. & Al-Dubai, A. (2017). Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)doi:10.1109/aiccsa.2016.7945687. ISBN 9781509043200
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...
Soufian, M. & Borairi, M. (in press). Genetic Sensor Placement in Active Control of a Robotic Arm. In naISBN na
No abstract available.
Binyamin, S., Rutter, M. J. & Smith, S. (2017). Factors Influencing the Students’ Use of Learning Management Systems: A Case Study of King Abdulaziz University. In n/a, 289 - 297. ISBN n/a
Abstract: The Technology Acceptance Model (TAM) has been one of the most popular models in explaining the acceptance of technologies and employed empirically in various studie...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X. & Han, W. (in press). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference ProceedingsISBN NA
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S. (2017). Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones. In NAISBN NA
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...
Appleton, L., Duff, A. S., Hall, H. & Raeside, R. (in press). Using a longitudinal focus group methodology to measure the value and impact of public libraries. In Conference ProceedingsISBN tbc
There is a general acceptance that public libraries contribute to ‘community’, and at least have the potential to have a very positive impact on civil society. (V...
Vettese, S., Thompson, P. & Allan, D. (2017). A study of the multi generational relationship with making through mediated designing in collaborative, digital environments: implications for learning and open access fabrication. In Cumulus Hong Kong 2016, Cumulus Working Papers, Open Design for E-very-thing, 23 - 30. ISBN 9789526000800
In this paper, the researchers will investigate different ways in which school age, 'generation net' children learn, through non-linear, mediated, collaborative ‘making’ envir...
NHS Health Scotland
The aim of this study is to analyse free text data generated via an online survey with mothers. The survey elicited opinions on the provision of a free breast pump or breast pump hire service for brea...
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight into business risks ...
Natural Environment Research Council
This research will draw on the extensive research undertaken by ESPA projects in a range of ecosystem contexts through
two main areas of work.
The first, supply-driven phase of the research will provi...
Glasgow Children's Hospital Charity
Project transfer in from Stirling University. To develop an acceptable and feasible breast pump incentive intervention for future testing in a trial. To describe NHS and voluntary sector breast pump p...
Chief Scientists Office
Psychiatric emergencies, and episodes of self-harm, accounted for over 30,000 Scottish ambulance call-outs in 2011. The overwhelming majority of these people were taken directly to Emergency Departmen...
Digital Health Institute
The focus of the project is to use the new breed of motion sensors which can fully capture the movement of hands and fingers, and use this to create an early stage product to demonstrate how precise h...
I-POS produce an Intelligent Point of Sale application which runs on Apple iPad hardware for use in bars and restaurants. The application generates transaction based sales data and re-ordering data fr...
This project aims to develop an e-policy platform augmented with a toolbox of applications and online services, which will assist national and regional authorities in the EU in elaborating or revising...
Qatar National Research Fund
Analysis of research of pedestrian movement in urban areas
Forestry Commission Scotland
Timber analysis project
Exploiting industry interconnect standards to gain visibility into devices.
Purpose: To investigate the physiological, immunological and psychological response to an intense ...
Migration is a spatial phenomenon and is the movement of the people one of state/country administrative unit to another, alo...
The academic research into the relationship between gender, ge...
The work presented in this thesis concerns the problem of timetabling at universities – particularly course-timetabling, and examines the various ways i...
Increasingly the provision of care for older p...
Resilient bars provide cheap, effective sound insulation. They are increasingly popular
in timber floor/...
The dynamic response of structural timber flooring systems can cause vibrational serviceability problems in terms of discomfort experienced by the...
The review of available literature related to pedestrian accidents indicates that the
occurrence of pedestrian acciden...
"Nanocellulose is a cellulose material that has been deconstructed into a nano-size dimension (10-9 m), equivalent to a thousand times smaller tha...
The applied aspects of my research relate to the preparation and performance of armed forces/service personnel based on fundamental scientific theory...
The role of the shaft in the golf swing has been the subject of scientific debate for many years but there is little consens...
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...
This thesis investigates the potential of using wind turbine to offset electricity
demand for dwellings or public building....
The principal objectives of the research reported in thi...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
27 June 2016
Centre for Social Informatics PhD student John Mowbray is delivering a paper entitled ‘The role of networking and social media tools during job search: an information behaviou...
08 July 2016
08 July 2016
Eye tracking offers many opportunities for the control of smart spaces and devices. It works hands-free and offers instant control, enabling users to adapt their environment o...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...
17 June 2016
17 June 2016
Professor Chandra Bhat Director of the Centre for Transportation Research, The University of Texas at Austin visited TRI at Edinburgh Napier University to discuss joint collab...