Programme Leader Sport, Exercise and Health Science
Moradpoor, N., Brown, M. & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In N/Adoi:10.1145/3136825.3136859. ISBN 978-1-4503-5303-8/17/10
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Pomponi, F., Medina Campos, L., Moncaster, A. & Smith, S. (2017). Bringing pupils into building energy performance: school design, construction and operation. In PLEA Conference Proceedings Volume IIIISBN N/A
Colegio Rochester is school in Colombia with a strong vision for sustainability. This vision permeates the new school building which was the first school in Latin America to b...
Buunk, I., Hall, H. & Smith, C. (in press). Skills in Sight: How Social Media Affordances Increase Network Awareness. In Proceedings of the 18th European Conference on Knowledge Management ECKM 2017ISBN n/a
The discussion in this paper derives from an analysis of data from twenty interviews conducted with members of an online knowledge sharing platform between October 2016 and Fe...
Exploiting industry interconnect standards to gain visibility into devices.
Scottish Funding Council
With the emerging growth of this new industry sector, this project will seek to research and compile information pertinent to craft distilling in relation to energy use. Its main aim is to identify so...
NHS Health Scotland
The aim of this study is to analyse free text data generated via an online survey with mothers. The survey elicited opinions on the provision of a free breast pump or breast pump hire service for brea...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
27 June 2016
Centre for Social Informatics PhD student John Mowbray is delivering a paper entitled ‘The role of networking and social media tools during job search: an information behaviou...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
Zero Hour Lecturer
Senior Research Fellow
Colabella, S., D'Amico, B., Hoxha, E. & Fivet, C. (in press). Structural Design with Reclaimed Materials: an Elastic Gridshell out of Skis. In n/aISBN n/a
This paper presents the design and construction of a 36m2 gridshell, the rigidity of which is achieved through the bending of an initially flat grid of 210 reclaimed skis. The...
Binyamin, S., Rutter, M. J. & Smith, S. (2017). Factors Influencing the Students’ Use of Learning Management Systems: A Case Study of King Abdulaziz University. In n/a, 289 - 297. ISBN n/a
Abstract: The Technology Acceptance Model (TAM) has been one of the most popular models in explaining the acceptance of technologies and employed empirically in various studie...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X. & Han, W. (in press). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference ProceedingsISBN NA
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Appleton, L., Duff, A. S., Hall, H. & Raeside, R. (in press). Using a longitudinal focus group methodology to measure the value and impact of public libraries. In Conference ProceedingsISBN tbc
There is a general acceptance that public libraries contribute to ‘community’, and at least have the potential to have a very positive impact on civil society. (V...
Vettese, S., Thompson, P. & Allan, D. (2017). A study of the multi generational relationship with making through mediated designing in collaborative, digital environments: implications for learning and open access fabrication. In Cumulus Hong Kong 2016, Cumulus Working Papers, Open Design for E-very-thing, 23 - 30. ISBN 9789526000800
In this paper, the researchers will investigate different ways in which school age, 'generation net' children learn, through non-linear, mediated, collaborative ‘making’ envir...
Martí, L., Segredo, E., Sánchez-Pi, N. & Hart, E. (2016). Impact of selection methods on the diversity of many-objective Pareto set approximations. In Proceedings of the 21st International Conference on Knowledge-Based and Intelligent Information & Engineering Systems
Selection methods are a key component of all multi-objective and, consequently, many-objective optimisation evolutionary algorithms. They must perform two main tasks simultane...
Martin Moral, E. & Fonzone, A. (2017). Bike share usage characterization-initial results from a cluster analysis of London santander cycles scheme data. In UnknownISBN Unknown
Soufian, M. (2017). Towards self-defending control systems in cybersecurity analysis and measures in industrial automation systems. In 26th IEEE International Symposium on Industrial Electronics (ISIE17)ISBN n/a
Rutter, M. J., Smith, S. & Binyamin, S. (2017). The students acceptance of learning management systems in Saudi Arabia: a case study of King Abdulaziz University. In INTED2017 Proceedings, 9324-9333. doi:10.21125/inted.2017.2205. ISBN 978-84-617-8491-2
The Technology Acceptance Model (TAM) has become one of the most widely-used models in understanding user acceptance of technologies and has been employed in many empirical st...
McKeown, S., Russell, G. & Leimich, P. (in press). Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and LawISBN not yet known
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). Numerical Encoding to Tame SQL Injection Attacks
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases....
Xie, Y. H., Yang, Z. X. & Barreto, D. (2016). The Influence of Particles’ Aspect Ratio on the Shear Behaviour of Granular Materials. In Springer Proceedings in Physics; Proceedings of the 7th International Conference on Discrete Element Methods, 253-264. doi:10.1007/978-981-10-1926-5_29. ISBN 978-981-10-1925-8; 978-981-10-1926-5
The mechanical response of granular material depends both on the material properties (e.g. stiffness, anisotropy, permeability, etc.) and particle geometry (shape, roughness, ...
This project aims to review an assess existing remote sensing technologies in order to improve and adapt technologies currently used in other fields to civil engineering applications. The two main aim...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight into business risks ...
Natural Environment Research Council
This research will draw on the extensive research undertaken by ESPA projects in a range of ecosystem contexts through
two main areas of work.
The first, supply-driven phase of the research will provi...
Glasgow Children's Hospital Charity
Project transfer in from Stirling University. To develop an acceptable and feasible breast pump incentive intervention for future testing in a trial. To describe NHS and voluntary sector breast pump p...
Chief Scientists Office
Psychiatric emergencies, and episodes of self-harm, accounted for over 30,000 Scottish ambulance call-outs in 2011. The overwhelming majority of these people were taken directly to Emergency Departmen...
I-POS produce an Intelligent Point of Sale application which runs on Apple iPad hardware for use in bars and restaurants. The application generates transaction based sales data and re-ordering data fr...
This project aims to develop an e-policy platform augmented with a toolbox of applications and online services, which will assist national and regional authorities in the EU in elaborating or revising...
Qatar National Research Fund
Analysis of research of pedestrian movement in urban areas
Forestry Commission Scotland
Timber analysis project
Analysis of transactional data provided by real time cloud based ordering systems linked within the food supply chain which targets Foodservice sector
Studies of wild callitrichids reveal limited data about their complex diets. As
insectivorous primates it is likely that they can digest chitin. Using the
Fossil fuels are a finite resource, which are subject to erratic price fluctuations and are c...
Motorcyclists that have no protective structures while motorcycling as other
Triage of large capacity digital devices
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...