Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
Conference Proceeding
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022)
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP (551-561). https://doi.org/10.5220/0010903000003120
Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on ...
Digital options: an assessment of audience engagement with a digitised archive set transformed from online text and images to audio format
Presentation / Conference
Ryan, B., Hall, H., & McGregor, I. (2022, August)
Digital options: an assessment of audience engagement with a digitised archive set transformed from online text and images to audio format. Paper presented at Archives and Records Association Annual Conference 2022, Chester, UK
We report the findings of a research project funded by the AHRC, with support of the BBC, British Library, and a community museum. This exploits, augments, and exhibits a set ...
Multi3Generation: Multi-task, Multilingual, Multi-Modal Language Generation
Presentation / Conference
Barreiro, A., de Souza, J. G., Gatt, A., Bhatt, M., Lloret, E., Erdem, A., …Alhasani, M. (2022, June)
Multi3Generation: Multi-task, Multilingual, Multi-Modal Language Generation. Poster presented at 23rd Annual Conference of the European Association for Machine Translation (EAMT 2022), Ghent, Belgium
This paper presents the Multitask, Multilingual, Multimodal Language Generation COST Action – Multi3Generation (CA18231), an interdisciplinary network of research groups worki...
Blended Experience Narratives
Conference Proceeding
Flint, T., O'Keefe, B., Mastermaker, M., Sturdee, M., & Benyon, D. (in press)
Blended Experience Narratives. In BCS HCI 2022 conference
Capturing career information use in everyday life: introducing the CIEL conceptual framework
Journal Article
Milosheva, M., Hall, H., Robertson, P., & Cruickshank, P. (in press)
Capturing career information use in everyday life: introducing the CIEL conceptual framework. Information Research,
Introduction. Everyday career information use is not fully addressed by extant theories, models, and frameworks. In this paper, a conceptual framework of career information be...
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering
Journal Article
Ullah, S., Ahmad, J., Khan, M. A., Alkhammash, E. H., Hadjouni, M., Ghadi, Y. Y., …Pitropakis, N. (2022)
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors, 22(10), Article 3607. https://doi.org/10.3390/s22103607
The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent ye...
Public library as public sphere: a longitudinal analysis
Journal Article
Appleton, L., & Hall, H. (in press)
Public library as public sphere: a longitudinal analysis. Journal of Documentation, https://doi.org/10.1108/JD-02-2022-0031
The research was undertaken to explore the role of the UK public library as a public sphere, and the ways in which this role relates to the epistemic, community, and political...
Sign in Human-Sound Interaction
Book Chapter
Di Donato, B. (in press)
Sign in Human-Sound Interaction. In J. Drever, & A. Hugill (Eds.), Aural Diversity. Routledge
A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks
Journal Article
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2022)
A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks. Future Generation Computer Systems, 134, 287-302. https://doi.org/10.1016/j.future.2022.04.003
Long Range (LoRa) networks provide long range, cost-effective and energy-efficient communications by utilising the free unlicensed ISM band, which makes them appealing for Int...
Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain
Conference Proceeding
Moradpoor, N., Barati, M., Robles-Durazno, A., Abah, E., & McWhinnie, J. (in press)
Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain.
The protection of critical national Infrastructures such as drinking water, gas, and electricity is extremely important as nations are dependent on their operation and steadin...