Zero Hour Lecturer
Moradpoor, N., Brown, M. & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In N/Adoi:10.1145/3136825.3136859. ISBN 978-1-4503-5303-8/17/10
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Salayma, M., Al-Dubai, A., Romdhani, I. & Nasser, Y. (2017). New Dynamic, Reliable and Energy Efficient Scheduling for Wireless Body Area Networks (WBAN). In 2017 IEEE International Conference on Communications (ICC)doi:10.1109/ICC.2017.7996898. ISBN 978-1-4673-8999-0
Wireless body area networks (WBANs) facilitate
efficient and cost-effective e-health care and well-being
applications. The WBAN has unique challenges and features
compared to ...
O 'Dowd, A. (2017). SKiN Designing pseudo-physiology into personal technology devices to create enhanced interactions through visceral signifiers and behaviours
The majority of technology is now personal. Humans, in turn, are expected to and have personal relationships with their devices. The issue is that humans are biological beings...
To adapt our existing brief school-based psycho-educational cancer awareness intervention to focus exclusively on increasing early detection of melanoma among young people (14-15 years) and test ...
NHS Health Scotland
The aim of this study is to analyse free text data generated via an online survey with mothers. The survey elicited opinions on the provision of a free breast pump or breast pump hire service for brea...
Chief Scientists Office
Psychiatric emergencies, and episodes of self-harm, accounted for over 30,000 Scottish ambulance call-outs in 2011. The overwhelming majority of these people were taken directly to Emergency Departmen...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
27 June 2016
Centre for Social Informatics PhD student John Mowbray is delivering a paper entitled ‘The role of networking and social media tools during job search: an information behaviou...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
Programme Leader Sport, Exercise and Health Science
Senior Research Fellow
Pomponi, L., Sablone, E., Rusconi Clerici, L., Consalez, L. & Pomponi, F. (2017). Transforming challenges into opportunities in social housing: a case study from Italy. In Brotas, L., Roaf, S. & Nicol, F. (Eds.). PLEA Conference Proceedings Volume IIIISBN N/A
Social housing often aims to provide sheltering for people on low incomes or with particular needs. This results in a constraints-dominated context where environmental and soc...
Pomponi, F., Medina Campos, L., Moncaster, A. & Smith, S. (2017). Bringing pupils into building energy performance: school design, construction and operation. In PLEA Conference Proceedings Volume IIIISBN N/A
Colegio Rochester is school in Colombia with a strong vision for sustainability. This vision permeates the new school building which was the first school in Latin America to b...
Pomponi, F. & Inzitari, G. (2017). Zooming in on biomimicry: the potential of tensegrity structures. In PLEA Conference ProceedingsISBN N/A
The foundations of biomimicry lie with the idea that Nature can inspire solutions to complex human problems. Biomimicry in Architecture is a rapidly growing field which also e...
Bros Williamson, J., Stinson, J., Garnier, C. & Currie, J. (2017). Discrepancies between theoretical and actual heating demand in Scottish modern dwellings. In PLEA 2017 Proceedings - Design to Thrive, 361 to 368. ISBN 978-0-9928957-5-4
The study reports on the differences between the actual heat consumption profiles of twelve dwellings monitored for four years and their predicted heat demand profiles as calc...
Buunk, I., Hall, H. & Smith, C. (in press). Skills in Sight: How Social Media Affordances Increase Network Awareness. In Proceedings of the 18th European Conference on Knowledge Management ECKM 2017ISBN n/a
The discussion in this paper derives from an analysis of data from twenty interviews conducted with members of an online knowledge sharing platform between October 2016 and Fe...
Colabella, S., D'Amico, B., Hoxha, E. & Fivet, C. (in press). Structural Design with Reclaimed Materials: an Elastic Gridshell out of Skis. In n/aISBN n/a
This paper presents the design and construction of a 36m2 gridshell, the rigidity of which is achieved through the bending of an initially flat grid of 210 reclaimed skis. The...
Thomson, C., Wadhaj, I., Romdhani, I. & Al-Dubai, A. (2017). Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)doi:10.1109/aiccsa.2016.7945687. ISBN 9781509043200
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...
Binyamin, S., Rutter, M. J. & Smith, S. (2017). Factors Influencing the Students’ Use of Learning Management Systems: A Case Study of King Abdulaziz University. In n/a, 289 - 297. ISBN n/a
Abstract: The Technology Acceptance Model (TAM) has been one of the most popular models in explaining the acceptance of technologies and employed empirically in various studie...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X. & Han, W. (in press). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference ProceedingsISBN NA
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Appleton, L., Duff, A. S., Hall, H. & Raeside, R. (in press). Using a longitudinal focus group methodology to measure the value and impact of public libraries. In Conference ProceedingsISBN tbc
There is a general acceptance that public libraries contribute to ‘community’, and at least have the potential to have a very positive impact on civil society. (V...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Marine Alliance for Science & Technology for Scotland (Hosted by St Andrew's University)
Exposure of early life stage marine invertebrates to playbacks of marine renewable energy device vibration
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
Scottish Funding Council
This project aims to review an assess existing remote sensing technologies in order to improve and adapt technologies currently used in other fields to civil engineering applications. The two main aim...
Construction Scotland Innovation Centre
Buildings , energy and acoustics project through CSIC
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight into business risks ...
Innovative Offsite manufacturing project on an energy efficient wall structure
Natural Environment Research Council
This research will draw on the extensive research undertaken by ESPA projects in a range of ecosystem contexts through
two main areas of work.
The first, supply-driven phase of the research will provi...
Traditionally energy balance in distilling has focused around process function or building. The intention of this project, focussing on Strathearn Distillery, is to develop a holistic approach which i...
Glasgow Children's Hospital Charity
Project transfer in from Stirling University. To develop an acceptable and feasible breast pump incentive intervention for future testing in a trial. To describe NHS and voluntary sector breast pump p...
I-POS produce an Intelligent Point of Sale application which runs on Apple iPad hardware for use in bars and restaurants. The application generates transaction based sales data and re-ordering data fr...
The current thesis aimed to explore the novice driver problem from a psychological perspective. The ultimate aim was to e...
This thesis examines the meaning, origin and influence of Edgar Allan Poe’s...
Traffic congestion today is a major problem in almost all of the metropolitan areas of
the world. ...
Wind is an important source of renewable energy and is widely available, despite the changing condition. In recent years a...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
05 February 2016
IntroductionOn the back of four nomination at the Scottish Knowledge Exchange awards [here], Gordon Stuart, director of operations at Informatics Ventures, has also predicted ...
13 February 2017
20 September 2016
20 September 2016
Timber is a versatile, natural, material with a wide range of properties. When properly understood, responsibly sourced, and produced through modern forestry and manufacturin...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...