Date


People

Download Available

Dewey Decimal

864 results

Analysis and migration of location-finding methods for GSM and 3G networks.

Conference Proceeding
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004)
Analysis and migration of location-finding methods for GSM and 3G networks. https://doi.org/10.1049/cp%3A20040695
This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observ...

Finding middle ground? Multi-objective Natural Language Generation from time-series data

Conference Proceeding
Gkatzia, D., Hastie, H., & Lemon, O. (2014)
Finding middle ground? Multi-objective Natural Language Generation from time-series data. In Proceedings of the 14th Conference of the European Chapter of the Association for Computational Linguistics, volume 2: Short Papers. https://doi.org/10.3115/v1/e14-4041
A Natural Language Generation (NLG) system is able to generate text from nonlinguistic data, ideally personalising the content to a user’s specific needs. In some cases, howev...

Utilising Reduced File Representations to Facilitate Fast Contraband Detection

Thesis
McKeown, S. Utilising Reduced File Representations to Facilitate Fast Contraband Detection. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2386199
Digital forensics practitioners can be tasked with analysing digital data, in all its forms, for legal proceedings. In law enforcement, this largely involves searching for con...

Finding Fair Negotiation Algorithms to Reduce Peak Electricity Consumption in Micro Grids

Conference Proceeding
Powers, S. T., Meanwell, O., & Cai, Z. (2019)
Finding Fair Negotiation Algorithms to Reduce Peak Electricity Consumption in Micro Grids. In PAAMS 2019: Advances in Practical Applications of Survivable Agents and Multi-Agent Systems: The PAAMS Collection, 269-272. https://doi.org/10.1007/978-3-030-24209-1_28
Reducing peak electricity consumption is important to maximise use of renewable energy sources, and reduce the total amount of capacity required on a grid. Most approaches use...

Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)

Journal Article
Lo, O., Buchanan, W. J., & Carson, D. (2016)
Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology, 1(2), 88-107. https://doi.org/10.1080/23742917.2016.1231523
This article demonstrates two fundamental techniques of power analysis, differential power analysis (DPA) and correlation power analysis (CPA), against a modern piece of hardw...

RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture

Thesis
Ukwandu, E. A. RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2455031
Scaling big data infrastructure using multi-cloud environment has led to the demand for highly secure, resilient and reliable data sharing method. Several variants of secret s...

Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report

Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2002)
Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report. In Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210), 155-162. https://doi.org/10.1109/IPCCC.2001.918648
Broadcast is an important collective communication operation required by many real-world parallel applications. This paper proposes the Coded Path Routing (or CPR for short) a...

Mining malware command and control traces

Conference Proceeding
McLaren, P., Russell, G., & Buchanan, B. (2018)
Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017https://doi.org/10.1109/SAI.2017.8252185
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...

A Multi-attributes-based Trust Model of Internet of Vehicle

Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security. , (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...

Research grounded support of student learning in Higher Education: The importance of dialogue and subject embedded, contextualised language and content.

Thesis
Richards, K. Research grounded support of student learning in Higher Education: The importance of dialogue and subject embedded, contextualised language and content. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1532248
This aim of this thesis is to demonstrate how the research that has been conducted by the author, as illustrated through the publications presented, adds to the domain of acad...