Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns
Mcneill, M., Lawson, A., Raeside, R., & Peisl, T. (2018)
Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns. In Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018)https://doi.org/10.14236/ewic/HCI2018.127
Creating a good crowdfunding campaign is difficult. By understanding why people contribute to crowdfunding campaigns we can make campaigns better and raise more money. Crowdfu...
A survey on rainfall forecasting using artificial neural network
Liu, Q., Zou, Y., Liu, X., & Linge, N. (2019)
A survey on rainfall forecasting using artificial neural network. International Journal of Embedded Systems, 11(2), 240-249. https://doi.org/10.1504/ijes.2018.10016095
Rainfall has a great impact on agriculture and people’s daily travel, so accurate prediction of precipitation is well worth studying for researchers. Traditional methods like ...
The Privacy and Security Implications of Open Data in Healthcare: A Contribution from the IMIA Open Source Working Group
Kobayashi, S., Kane, T., & Paton, C. (2018)
The Privacy and Security Implications of Open Data in Healthcare: A Contribution from the IMIA Open Source Working Group. IMIA Yearbook of Medical Informatics, https://doi.org/10.1055/s-0038-1641201
Objective: The International Medical Informatics Association (IMIA) Open Source Working Group (OSWG) initiated a group discussion to discuss current privacy and security issue...
Detection of Algorithmically Generated Malicious Domain
Agyepong, E., Buchanan, W., & Jones, K. (2018)
Detection of Algorithmically Generated Malicious Domain. In CS & IT-CSCP 2018, (13-32). https://doi.org/10.5121/csit.2018.80802
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persist...
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
Barrowclough, J. P., & Asif, R. (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...
Virtualizing the real: a virtual reality contemporary sculpture park for children
Flint, T., Hall, L., Stewart, F., & Hagan, D. (2018)
Virtualizing the real: a virtual reality contemporary sculpture park for children. Digital Creativity, 29(2/3), 191-207. https://doi.org/10.1080/14626268.2018.1511601
This paper discusses a virtual reality experience for a contemporary sculpture park, Jupiter Artland, developed in Minecraft targeting 9-11-year-old children. Issues of fideli...
Privacy Parameter Variation using RAPPOR on a Malware Dataset
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018)
Privacy Parameter Variation using RAPPOR on a Malware Dataset. In Proceedings of 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), 8. doi:10.1109/TrustCom/BigDataSE.2018.00133
Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of...
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device
Lo, O., Buchanan, W. J., & Carson, D. (2017)
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security
Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consu...
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. In CITT 2018, (91-103). https://doi.org/10.1007/978-3-030-05532-5_7
Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, s...
The impact of work placement on graduate employment in computing: outcomes from a UK-based study
Smith, S., Taylor-Smith, E., Smith, C., & Webster, G. (2018)
The impact of work placement on graduate employment in computing: outcomes from a UK-based study. International Journal of Work-Integrated Learning, 19(4), 359-369
This study followed recent computing graduates into the workplace and explored their undergraduate experiences of work placements and subsequent impact on graduate employment....