Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017). Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),doi:10.1109/DASC.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...
Liu, X., & Liu, Q. (2017). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), 450-459. doi:10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...
Liu, X., & Liu, Q. (2017). Power Consuming Activity Recognition in Home Environment. In X. Sun, H. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security. ICCCS 2017, 361-372. doi:10.1007/978-3-319-68505-2_31
This work proposed an activity recognition model which focus on the power con-suming activity in home environment, to help residents modify their behavior. We set the IoT syst...
To create the ability in Payfont to research and deliver, using Universal Design principles and processes based on BS8878, the optimal secure user experience (UX) in secure transactions
Fragment Finder (FF) enables a new, high-speed approach to digital forensics. It is unique in that it will build a more efficient technical architecture for the creation, storage and use of hash signa...
The DISTRO network brings together leading laboratories in Visual Computing and 3D Computer Graphics research across Europe with the aim of training a new generation of scientists, technologists, and ...
05 February 2016
IntroductionOn the back of four nomination at the Scottish Knowledge Exchange awards [here], Gordon Stuart, director of operations at Informatics Ventures, has also predicted ...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
03 May 2016
Professor Hazel Hall has been nominated for election as Director-at-large for the Association for Information Science and Technology. She is one of eight candidates standing f...
Dean of Computing
Senior Research Fellow
Senior Content Producer & Research Fellow
Senior Computing Support Technician
Part Time Demonstrator
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y., & Oakley, I. (2017). SmoothMoves: smooth pursuits head movements for augmented reality. In UIST '17 Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, 167-178. doi:10.1145/3126594.3126616
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Alsnousi, E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)doi:10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Ukwandu, E., Buchanan, W., & Russell, G. (2017). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)doi:10.1109/CyberSA.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Pitt, J., & Hart, E. (2017). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W),doi:10.1109/FAS-W.2017.119
This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional ...
Romdhani, I., Faiza, M., Tandjaoui, D., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference Proceedingsdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)doi:10.1109/compsac.2017.120
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the jo...
Singh Jamnal, G., Liu, . X., & Fan, L. (2017). Home automation:HMM based fuzzy rule engine for Ambient intelligent smart space. In Proceedings of The 29th International Conference on Software Engineering and Knowledge Engineering
in this paper, we proposed a new type of decision making system to achieve the intelligent goal for automated smart environments. The artificial intelligence techniques, used ...
Moradpoor, N., Brown, M., & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In 10th International Conference on Security of Information and Networks (SIN 2017)doi:10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Liu, X., & Liu, Q. (2017). An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)doi:10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to...
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Centre for Sensor and Imaging Systems
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
Digital Health Institute
This project aims to extend the existing work with the e-Frail project, and integrate a range of NHS-sourced assessors with care giver and open source gathered assessors, in order to define a weighted...
Scottish Funding Council
Develop a prototype for an interactive data-driven website to address the unique challenges of managing numerous archaeological services projects across diverse sites in Scotland.
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
The Scottish Informatics & Computer Science Alliance
Research exchange with the Bielefeld Dialogue Systems group
Marine Alliance for Science & Technology for Scotland (Hosted by St Andrew's University)
Production of final version smartphone application and data queries for citizen science research in Brazil to improve mangrove crab fisheries management.
An SFC Innovation Voucher being used to fund a feasibility study examining the use of heuristics to optimize food collection and delivery.
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Forestry Commission Scotland
Maintenance and hosting of website database developed in previous project
Society for Research into Higher Education
The overarching aim of this study is to investigate how universities are preparing IT students for the global labour market. The focus of this study is entrepreneurship which is now given high priorit...
Edinburgh Napier Funded
Having relevant work experience, such as a placement or internship, is valued by employers in the technology sector and can improve employment outcomes for computing graduates. However, gaining good w...
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight into business risks ...
With the vision of ubiquitous computing becoming increasingly realized, a new technological layer in the form of sensors, urban screens, smartp...
This research explores the role, use and value of social media and t...
At present the Information Technology profession appears to be dogged by high profile project failure, high...
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. ...
This research will investigate the nature of interactions between people and experience-oriented technologies such as new-media artw...
Leo Appleton's PhD research explores the impact of libraries on citizenship. He is...
30 June 2016
This week the Chartered Institute of Library and Information Professionals (CILIP) and the Archives and Records Association (ARA) published a series of 24 fact sheets on the ...
15 June 2016
RBS approached Dr Oli Mival, Principal Research Fellow in the Centre fro Interaction Design, to undertake a program of review of their UX activities and methods with the aim o...
04 May 2016
The FOCAS project was rated as Excellent at its final review, after running for three years. The project coordinator was Emma Hart, with Jennifer Willies as Project Manager.
16 June 2016
Simon Powers will deliver a research seminar about his work on the evolution of institutions.
Abstract Economics, artificial life, and agent-based c...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
07 November 2016
11 November 2016
21 April 2016
Announcement of resultsEmerald and the Indian Academy of Management (IAM) are delighted to offer a research grant for an Indian project in the field of management research.
09 June 2016
Simon Powers will write an article about "defection" (as the term is used in game theory), for the forthcoming Encyclopedia of Evolutionary Psychological Science, edited by To...
18 May 2016
The June 2016 issue of Journal of Information Science (volume 42, issue 3) has just been published. This is a special issue of the journal that comprises twelve articles devel...
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
05 May 2016
Professor Hazel Hall took part in a webinar interview today hosted by Science in Australia Gender Equity (SAGE). The SAGE team asked Hall about her experience of leading Edinb...