Senior Research Fellow
Moradpoor, N., Brown, M. & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In N/Adoi:10.1145/3136825.3136859. ISBN 978-1-4503-5303-8/17/10
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Ghaleb, B., Al-Dubai, A. & Romdhani, I. (2017). Drizzle: Adaptive and Fair Route Maintenance Algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), 1-6. doi:10.1109/ICC.2017.7996819. ISBN 978-1-4673-8999-0
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
Society for Reproduction and Fertility
Does the gut microbiome play a role in polycystic ovary syndrome?
Society for Research into Higher Education
This research project will explore and explain the role that higher education research plays in the higher education policy process. It is argued that academic research needs to reinforce its institut...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
18 November 2012
Two months into my new role as Director of the Edinburgh Institute and I wanted to thank those of you who have been in touch to wish me well and offer advice on how we can dev...
27 June 2016
Centre for Social Informatics PhD student John Mowbray is delivering a paper entitled ‘The role of networking and social media tools during job search: an information behaviou...
17 February 2017
Director of HR and Development
Lecturer in Business Information Systems
Lecturer in Law
Lecturer and Research Leader in Biomedical Sciences
Lecturer/BSc Programme leader
Business Development Executive
Senior Research Fellow
Leader of Research Information Management
Salayma, M., Al-Dubai, A., Romdhani, I. & Nasser, Y. (2017). New Dynamic, Reliable and Energy Efficient Scheduling for Wireless Body Area Networks (WBAN). In 2017 IEEE International Conference on Communications (ICC)doi:10.1109/ICC.2017.7996898. ISBN 978-1-4673-8999-0
Wireless body area networks (WBANs) facilitate
efficient and cost-effective e-health care and well-being
applications. The WBAN has unique challenges and features
compared to ...
Ghaleb, B., Al-Dubai, A., Ekonomou, E. & Wadhaj, I. (2017). A New Enhanced RPL Based Routing for Internet of Things”, 2ndConvergent Internet of Things. In 2017 IEEE International Conference on Communications, 1-6. doi:10.1109/ICCW.2017.7962723. ISBN 978-1-5090-1525-2
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the ...
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Thomson, C., Wadhaj, I., Romdhani, I. & Al-Dubai, A. (2017). Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)doi:10.1109/aiccsa.2016.7945687. ISBN 9781509043200
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...
Binyamin, S., Rutter, M. J. & Smith, S. (2017). Factors Influencing the Students’ Use of Learning Management Systems: A Case Study of King Abdulaziz University. In n/a, 289 - 297. ISBN n/a
Abstract: The Technology Acceptance Model (TAM) has been one of the most popular models in explaining the acceptance of technologies and employed empirically in various studie...
McGuire, D., MacKenzie, A. & Kissack, H. (2017). The use of gendered language in speeches made by Trump and Clinton adhered to stereotypes of the roles of male and female leaders
Speeches delivered by Donald J. Trump and Hillary Rodham Clinton during the 2016 presidential campaign contained many uses of gendered language. David McGuire, Abbi MacKenzie ...
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Appleton, L., Duff, A. S., Hall, H. & Raeside, R. (in press). Using a longitudinal focus group methodology to measure the value and impact of public libraries. In Conference ProceedingsISBN tbc
There is a general acceptance that public libraries contribute to ‘community’, and at least have the potential to have a very positive impact on civil society. (V...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Salayma, M., Al-Dubai, A. & Romdhani, I. (2017). Reliability and Energy Efficiency Enhancement in Wireless Body Area Networks for E-Health. In 2016 19th Conference of Open Innovations Association (FRUCT)doi:10.23919/FRUCT.2016.7892202. ISBN 978-952-68397-4-5, 978-1-5090-6188-4
Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features com...
Alsnousi, E., Al-Dubai, A., Romdhani, I. & Eshaftri, M. (in press). A New Weight based Rotating Clustering Scheme for WSNs. In Proceedings of ISNCC-2017 WMCN
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
The Mental Health Tribunal for Scotland became operational in 2005. It plays an integral role in guaranteeing the rights of patients with mental disorder as originally identified in the Millan Princip...
Our website evaluated extremely positively among patients, family members and clinicians in NHS Lothian and our model is unquestionably of utility Scotland-wide.The underpinning research and iterative...
Chief Scientists Office
PThe impact of psychological trauma on physical and mental health is well known, although current models of care are failing to meet clients’ needs. A new model of care, supported and financed by the ...
SUNRISE will develop, implement, assess and facilitate learning about new, collaborative ways to address common mobility challenges at the neighbourhood level. Towards this aim, 6 cities will foster c...
Teaching-focused academics in UK Life Science departments may experience anxiety about their continued ability to teach undergraduates at Honours level, and postgraduates at Masters and doctoral level...
Arts & Humanities Research Council
Sustainable landscape management in rural areas requires the creation of opportunities that treat landscapes in the context of their historical, cultural and social factors. The growing popularity of ...
Carnegie Trust for the Universities of Scotland
The proposed research project seeks to examine the ways colony-based photographers represented and celebrated the success of the colonial-based enterprises in Southeast Asian at the turn of the 20th c...
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
Chartered Institute of Library and Information Professionals
The findings of this research will contribute to strategies to improve citizen engagement in the democratic process at community level.
Community Councillors are a vital link between local communities...
The objectives of this project are as follows. The project will:
1. Produce a culture shift in terms of environment for Sustainable Urban Mobility Plans (SUMPs) in member states and in the organisatio...
This project aims to develop an e-policy platform augmented with a toolbox of applications and online services, which will assist national and regional authorities in the EU in elaborating or revising...
Do-It-Yourself networking refers to a conceptual approach to the use of low-cost hardware and wireless technology in deploying local communication networks that can operate independently from the Inte...
This thesis presents a socio-technical account of the adoption and development
of Managed Learning Environme...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
16 June 2016
TRi PhD student Moira Weir successfully completed her PhD research entitled ‘The role of taxis in the supply of transport to the night time economy and identification of the b...
23 May 2017
Centre for Social Informatics PhD student Lyndsey Jenkins, has been newly appointed to the team of copy-editors (or ‘editorial associates’) for Information Research.
28 July 2017
The Chartered Institution of Highways and Transportation (CIHT) is the foremost professional body in transportation planning and engineering, representing over 11,500 members ...
18 May 2016
The June 2016 issue of Journal of Information Science (volume 42, issue 3) has just been published. This is a special issue of the journal that comprises twelve articles devel...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
02 February 2017
A great partnership between Hutchinson Networks and The Cyber Academy at Edinburgh Napier University has been showcased within a collaboration project which has build advanced...
01 February 2017
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
24 March 2017
24 March 2017
Robert Hrelja from VTI, the Swedish national transport research organisation, will be at TRI at Napier to meet Napier researchers and present his work on collaboration in publ...
05 March 2016
05 March 2016
to Conference at the School of Communication, Manipal University, India