Moradpoor, N., Brown, M. & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In N/Adoi:10.1145/3136825.3136859. ISBN 978-1-4503-5303-8/17/10
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Bishop, C., Esteves, A. & Mcgregor, I. (in press). Head-Mounted Displays as Opera Glasses: Using Mixed-Reality to Deliver an Equalitarian User Experience During Live Events. In Proceedings of 19th ICMI ConferenceISBN n/a
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...
Glasgow Children's Hospital Charity
Project transfer in from Stirling University. To develop an acceptable and feasible breast pump incentive intervention for future testing in a trial. To describe NHS and voluntary sector breast pump p...
Marine Alliance for Science & Technology for Scotland (Hosted by St Andrew's University)
Production of final version smartphone application and data queries for citizen science research in Brazil to improve mangrove crab fisheries management.
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight into business risks ...
06 January 2016
Neil Urquhart and Alistair Lawson have been awarded £19,000 by The Data Lab to support their ongoing research collaboration with Larder Load, an Edinburgh based food services ...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
13 February 2017
KTP Associate - Data Analytics - Standard Life
Pomponi, F., Medina Campos, L., Moncaster, A. & Smith, S. (2017). Bringing pupils into building energy performance: school design, construction and operation. In PLEA Conference Proceedings Volume IIIISBN N/A
Colegio Rochester is school in Colombia with a strong vision for sustainability. This vision permeates the new school building which was the first school in Latin America to b...
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y. & Oakley, I. (in press). SmoothMoves: smooth pursuits head movements for augmented reality. In Proceedings of the 30th Annual ACM Symposium on User Interface Software & TechnologyISBN n/a
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Buunk, I., Hall, H. & Smith, C. (in press). Skills in Sight: How Social Media Affordances Increase Network Awareness. In Proceedings of the 18th European Conference on Knowledge Management ECKM 2017ISBN n/a
The discussion in this paper derives from an analysis of data from twenty interviews conducted with members of an online knowledge sharing platform between October 2016 and Fe...
Urquhart, N. & Hart, E. (in press). Creating optimised employee travel plans. In TBCISBN TBC
The routing of employees who provide services such as home health or social care is a complex problem. When sending an employee between two addresses , there may exist more th...
Binyamin, S., Rutter, M. J. & Smith, S. (2017). Factors Influencing the Students’ Use of Learning Management Systems: A Case Study of King Abdulaziz University. In n/a, 289 - 297. ISBN n/a
Abstract: The Technology Acceptance Model (TAM) has been one of the most popular models in explaining the acceptance of technologies and employed empirically in various studie...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X. & Han, W. (in press). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference ProceedingsISBN NA
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Appleton, L., Duff, A. S., Hall, H. & Raeside, R. (in press). Using a longitudinal focus group methodology to measure the value and impact of public libraries. In Conference ProceedingsISBN tbc
There is a general acceptance that public libraries contribute to ‘community’, and at least have the potential to have a very positive impact on civil society. (V...
Martin Moral, E. & Fonzone, A. (2017). Bike share usage characterization-initial results from a cluster analysis of London santander cycles scheme data. In UnknownISBN Unknown
Malleson, C., Kosek, M., Klaudiny, M., Huerta, I., Bazin, J., Sorkine-Hornung, A., …Mitchell, K. (2017). Rapid one-shot acquisition of dynamic VR avatars. In IEEE 2017 Virtual Reality (VR)doi:10.1109/vr.2017.7892240. ISBN 978-1-5090-6647-6
We present a system for rapid acquisition of bespoke, animatable, full-body avatars including face texture and shape. A blendshape rig with a skeleton is used as a template fo...
Ukwandu, E., Buchanan, W. & Russell, G. (in press). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)ISBN Not Known
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Enenkel, J., Geyer, J., Keiner, J., Nguyen, J., Steuler, J. L. & Urquhart, N. (in press). A Unifying Software Framework for Vehicle Routing and Logistics. In Conference proceedingsISBN tbc
A wide range of open source tools and real world data are available to support those working on vehicle routing and logistics optimisation. Despite such tools being available ...
The Mental Health Tribunal for Scotland became operational in 2005. It plays an integral role in guaranteeing the rights of patients with mental disorder as originally identified in the Millan Princip...
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
Higher Education Funding Council for England
The study is led by Blackburn College. We are an identified partner. The purpose of the project is to study staff and student experiences of the design and use of interactive essays and digital disser...
Scottish Funding Council
This project aims to review an assess existing remote sensing technologies in order to improve and adapt technologies currently used in other fields to civil engineering applications. The two main aim...
The Scottish Informatics & Computer Science Alliance
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Gazi Bay in southern Kenya has the potential to become a world-leading centre of excellence in the integration of ecosystem science and community development. Work there, led by scientists from Kenya ...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
National Institute for Health Research
The impact of parental drug misuse on children and families is a major public health problem . Parental drug misuse is closely associated with poor parenting, poor child development and increased r...
NHS Health Scotland
The aim of this study is to analyse free text data generated via an online survey with mothers. The survey elicited opinions on the provision of a free breast pump or breast pump hire service for brea...
This funding is for collaborative workshops to develop data collection tools and intervention components to inform a definitive trial of a breast pump intervention. It is part of the BABI study funded...
Natural Environment Research Council
This research will draw on the extensive research undertaken by ESPA projects in a range of ecosystem contexts through
two main areas of work.
The first, supply-driven phase of the research will provi...
Chief Scientists Office
This proposed process evaluation will evaluate the implementation of ASSIST. It will be conducted over two and a half years and employ qualitative methods (in-depth interviews, paired interviews, mini...
The purpose of the current research is to explore what a programme-focused approach ...
The necessity for scientists and others to use consistent terminology has recently been regarded as fundamental to advancing ...
Affiliate advertising is changing the way that people do business online. Retailers are now offering incentives to third-party publis...
Today, data plays an important role in people’s daily activities. With the help of some database applications such as decision support systems an...
The field of coordinated and multiple views (CMVs) has been for over a decade, a promising technique for enhancing data ...
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data into public cloud e...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
30 June 2016
This week the Chartered Institute of Library and Information Professionals (CILIP) and the Archives and Records Association (ARA) published a series of 24 fact sheets on the ...
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
17 January 2017
CM2000, Edinburgh Napier University, Digital Health & care Institute (DHI) and East Dunbartonshire Health & Social Care Partnership hosted an event in the Scottish Parliament ...
02 February 2017
A great partnership between Hutchinson Networks and The Cyber Academy at Edinburgh Napier University has been showcased within a collaboration project which has build advanced...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
05 April 2017
05 April 2017
Prof Daniel Muzio, Associate Editor at the Journal of Management Studies, has kindly offered to visit Edinburgh Napier on 5th April to hold a JMS workshop. This will be a grea...
17 June 2016
17 June 2016
Professor Chandra Bhat Director of the Centre for Transportation Research, The University of Texas at Austin visited TRI at Edinburgh Napier University to discuss joint collab...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...