Lecturer of Cybersecurity, Encryption and Networks
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017). Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),doi:10.1109/DASC.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...
Innes, M., & Winton, E. (2017). Lighting for Cities Inhabited by People, Not Cars: Community Co-Design and Creative Lighting. In Convention Proceedings - PLDC 6th Global Lighting Design Conference
Electric street lighting has developed wholly in the age of the motor car. Therefore, normal models of urban lighting are based firmly on designing for vehicle traffic. Standa...
Liu, X., & Liu, Q. (2017). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), 450-459. doi:10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...
Our website evaluated extremely positively among patients, family members and clinicians in NHS Lothian and our model is unquestionably of utility Scotland-wide.The underpinning research and iterative...
Edinburgh Napier Funded
Having relevant work experience, such as a placement or internship, is valued by employers in the technology sector and can improve employment outcomes for computing graduates. However, gaining good w...
assist the development of a novel electrolysed water based application to reduce spoilage and microbial contamination of a variety of fresh produce types of importance to Indian commerce.
18 July 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences:
Alife 2016 (Cancun, Mexico) Simon Pow...
04 May 2016
04 May 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences & journals
Alife 2016 (Cancun,...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
Associate Professor of Immunology & Infection / Director of Research, School of Applied Sciences
Head of Applications
Lecturer in Human Geography
Programme Leader, Bachelor of Music
Elaine, C., & Inglis, G. (in press). Just and Sustainable Places: Extending the Boundaries of Socio-environmental Health. In N/A
Background: Ecological public health encompasses the complex relationship between environment and health - protecting the physical environment and its inhabitants from contami...
Alsnousi, E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)doi:10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Ukwandu, E., Buchanan, W., & Russell, G. (2017). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)doi:10.1109/CyberSA.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Boix, D. M., Goh, K. & Mcwhinnie, J. (in press). Modelling and Control of Helicopter Robotic Landing Gear for Uneven Ground Conditions. In Proceedings of 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS 2017ISBN n/a
This paper proposes a method to investigate into helicopter landing on uneven terrain by means of using a scaled articulated robotic landing gear. A mathematical model of an a...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference Proceedingsdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Romdhani, I., Faiza, M., Tandjaoui, D., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Singh Jamnal, G., Liu, . X., & Fan, L. (2017). Home automation:HMM based fuzzy rule engine for Ambient intelligent smart space. In Proceedings of The 29th International Conference on Software Engineering and Knowledge Engineering
in this paper, we proposed a new type of decision making system to achieve the intelligent goal for automated smart environments. The artificial intelligence techniques, used ...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Liu, X., & Liu, Q. (2017). An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)doi:10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to...
Soufian, M. (2017). Towards self-defending control systems in cybersecurity analysis and measures in industrial automation systems. In 26th IEEE International Symposium on Industrial Electronics (ISIE17)doi:10.1109/ISIE.2017.8001538
Towards self-defending control systems in cybersecurity analysis and measures in industrial automation systems.
Soufian, M., & Borairi, M. (2017). Optimal actuator\sensor placement and controller design for large flexible space structures and robotics. In 26th IEEE International Symposium on Industrial Electronics (ISIE17)doi:10.1109/ISIE.2017.8001450
Optimal actuator\sensor placement and controller design for large flexible space structures and robotics.
Salayma, M., Al-Dubai, A., Romdhani, I. & Nasser, Y. (2017). New Dynamic, Reliable and Energy Efficient Scheduling for Wireless Body Area Networks (WBAN). In 2017 IEEE International Conference on Communications (ICC)doi:10.1109/ICC.2017.7996898. ISBN 978-1-4673-8999-0
Wireless body area networks (WBANs) facilitate
efficient and cost-effective e-health care and well-being
applications. The WBAN has unique challenges and features
compared to ...
Centre for Sensor and Imaging Systems
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
Chief Scientists Office
PThe impact of psychological trauma on physical and mental health is well known, although current models of care are failing to meet clients’ needs. A new model of care, supported and financed by the ...
Gazi Bay in southern Kenya has the potential to become a world-leading centre of excellence in the integration of ecosystem science and community development. Work there, led by scientists from Kenya ...
We have developed an intervention that aims to help pregnant women to stop smoking by sending text messages with embedded behaviour change techniques (BCTs), as part of an engaging story with pictures...
Heriot Watt University
The project will develop specialised lighting systems appropriate for lighting woven optical fibre, develop lighting capacity as an integrated component, and advance large scale commercial manufacture...
Arts & Humanities Research Council
This collaborative project with University of Edinburgh, will focus on the design and development of an interface, which will be accessible online, via mobile phones and tablets, and via large touchsc...
Development of Interventions to reduce patient delay with symptoms of Acute Coronary Syndrome: identifying optimal content and mode of delivery.
Acute Coronary Syndrome (ACS) is serious and delay to ...
To adapt our existing brief school-based psycho-educational cancer awareness intervention to focus exclusively on increasing early detection of melanoma among young people (14-15 years) and test ...
Scottish Funding Council
I-POS produce an Intelligent Point of Sale application which runs on Apple iPad hardware for use in bars and restaurants. The application generates transaction based sales data and re-ordering data fr...
Marine Alliance for Science & Technology for Scotland (Hosted by St Andrew's University)
Long-duration recorders are commercially available for week-scale terrestrial sound monitoring, but expensive and large, thus difficult to disguise in colonies. We have an active collaboration with th...
Credit risk is one of the most general risks that exist in the financial market and a major risk faced by financial institutions. Credit risk m...
The work presented in this thesis concerns the problem of timetabling at universities – particularly course-timetabling, and examines the various ways i...
The realistic simulation of pedestrian movement is a challenging problem, a large number of individual pedestrians may be included in the s...
Arguments are structures of premises and conclusions that underpin rational reasoning processes. Within complex knowledge domains, especially if they are contentious, argument st...
Explaining the origin and the evolution of cooperation ...
Mangrove forests are considered one of the most efficient natural carbon sinks and their preservation is thus im...
Hyper-heuristics (HH) have been described as methodologies that aim to offer “good enough -soon enough - cheap enough” solutions to real world...
With the growing need of the industry and due to high business demands, there have consequently been high demands of IT pro...
The study will examine the introduction of the computerisation of crime and intelligence re...
Today, data plays an important role in people’s daily activities. With the help of some database applications such as decision support systems an...