Lecturer of Cybersecurity, Encryption and Networks
Mishra, A., Tripathy, A., Obaidat, M., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (in press). A Chain Topology for Efficient Monitoring of Food Grain Storage Using Smart Sensors. In Conference Proceedings
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017). Security, privacy and safety evaluation of dynamic and static fleets of drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),doi:10.1109/dasc.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Arts & Humanities Research Council
The feeling of being immersed within a live performance by an ensemble of world class musicians can be a deeply engaging and highly valued cultural experience for audiences as well as for the performe...
22 November 2017
Lecturer in Cybersecurity
Associate Professor of audio Engineering
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017). Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)doi:10.1109/aiccsa.2016.7945687
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...
Vones, K. (2017). Crafted Evolution - The creation of the HyperHive Series. In Conference Proceedingsdoi:10.6084/m9.figshare.4746934. ISBN N/A
The following paper describes the conception and creation of the HyperHive Series of interactive pendants. This practice-led research analyses how the recent emergence of term...
Clarke, C., Bellino, A., Esteves, A., Velloso, E. & Gellersen, H. (2016). TraceMatch: a computer vision technique for user input by tracing of animated controls. In UbiComp '16 Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 298-303. doi:10.1145/2971648.2971714. ISBN 9781450344616
Recent works have explored the concept of movement correlation interfaces, in which moving objects can be selected by matching the movement of the input device to that of the ...
(CAICT), C. A. O. I. A. C. T. & DG Connect, E. C. (2016). EU-China joint white paper on the Internet of Things
This paper reflects the outcome of several years of the IoT international cooperation between the EU and China and documents the state-of-the-art on IoT development in both re...
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015). A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 1109-1117. doi:10.1109/cit/iucc/dasc/picom.2015.166
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and...
Vones, K. (2014). Towards the Posthuman: Materiality and process in the creation of stimulus-responsive jewellery objects. In All Makers Now?ISBN 978-0-9544187-9-3
The idea of creating a jewellery organism that comes alive on the
body has fascinated and inspired my research ever since learning
about the potential inherent in smart materi...
Thuemmler, C., Mival, O., Benyon, D., Buchanan, W., Paulin, A., Fricker, S., …Petrakis, E. (2014). Norms and standards in modular medical architectures. In 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013), 382-387. doi:10.1109/HealthCom.2013.6720705. ISBN 9781467358019
Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet – Private Public Partnershi...
Sotiriadis, S., Petrakis,, E. G. M., Covaci, . S., Zampognaro, P., Georga, E. & Thuemmler, C. (2014). An architecture for designing future internet (fi) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology. In 13th IEEE International Conference on BioInformatics and BioEngineering, 1-6. doi:10.1109/BIBE.2013.6701578. ISBN 9781479931637
The emergency of cloud computing and Generic Enablers (GEs) as the building blocks of Future Internet (FI) applications highlights new requirements in the area of cloud servic...
Thuemmler, C., Mueller, J., Covaci, S., Magedanz, T., de Panfilis, S., Jell, T., …Gavras, A. (2013). Applying the software-to-data paradigm in next generation e-health hybrid clouds. In 2013 Tenth International Conference on Information Technology: New Generations (ITNG),, 459-463. doi:10.1109/itng.2013.77. ISBN 9780769549675
Health care providers have over years continuously rejected Public Cloud technology for understandable concerns regarding privacy and confidentiality. The pick up rate on clou...
Baillie, L., & Benyon, D. (1999). Designing and evaluating a user interface for a home convergence technology. In A. Sloan, & F. V. Rijn (Eds.), Home Informatics and Telematics - Information, Technology and Society, HOIT 2000 Proceedings, Volume 2, 101-110
McCall, R., & Benyon, D. (1998). EniSpace: Evaluating Navigation in Information Space. In P. De Bra, & J. J. Leggett (Eds.), Proceedings of WebNet World Conference on the WWW and Internet 1999, 1344-1345
Traditional methods of evaluating usability such as heuristic evaluation and cognitive walkthrough do not address all issues relating to navigation. This is despite the fact t...
(1998). i3 proceedings : community of the future. In M. Caenepeel, D. Benyon, & D. Smith (Eds.), i3 proceedings : community of the future
No abstract available.
This research will investigate the nature of interactions between people and experience-oriented technologies such as new-media artw...
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...