Lecturer & Senior Research Fellow
Lecturer in Civil Engineering
Lecturer in Finance, Assistant Director ICMGR
Smyth, M. & Helgason, I. (2010). Imagining urban interactions: strategies for exploring future design landscapes. In Proceedings of British HCI
For designers, attempting to respond to unknown design spaces can be a daunting task. This paper describes a series of workshops that presented rapid ethnographic design metho...
Hart, E., Davoudani, D. & McEwan, C. (2006). Immunological inspiration for building a new generation of autonomic systems. In Autonomics '07 Proceedings of the 1st international conference on Autonomic computing and communication systemsISBN 978-963-9799-09-7
Autonomic computing systems of the future will be required to exhibit a number of properties which cannot be engineered using current technologies and algorithms. The most dir...
Helgason, I., Smyth, M. & Speed, C. (2011). Aspects of lifelikeness: a framework for optional interactions with public installations
This poster presents a framework for the design and evaluation of “optional interactions” with publicly sited, non-utilitarian installations. These kinds of encounters, where ...
Economic and Social Research Council
The PhD studentship project will analyse the benefits and challenges of work-based learning (WBL) in organisations and develop a maturity model for benchmarking and a toolkit for maximising value and ...
Scottish Funding Council
Extending a containerised microservices architecture developed in the initial project to support a set of user functions required for the platform's MVP. Additionally, the project will deliver cloud A...
Language generation (LG) is a crucial technology if machines are to communicate with humans seamlessly using human natural language. A great number of different tasks within Natural Language Processin...
06 October 2019
Also in print edition
01 October 2019
Prof Al Duff appeared as an expert witness before the Scottish Parliament's Justice Committee. Testifying on behalf of privacy pressure group NO2ID Edinburgh, he answered MSP ...
17 September 2019
Recognising Scotland’s strengths – as a destination for the tech industry, excellent universities, history of innovation, resources and size – the Data Delivery Group's priori...
06 November 2019
06 November 2019
Prof. Michael Rovatsos from Edinburgh University will be giving the following seminar – all welcome to attend:
Michael is Professor of Artificial Intelligence at ...
24 October 2019
24 October 2019
Organised and Chaired by Louise Milne, ‘Cinematic Inclusions’ is a rare and exciting Lithuanian film programme co-curated by Lina Kaminskaitė - Jančorienė and Janina Sabaliaus...
04 June 2019
05 June 2019
The 5th International Conference in Big Data in Cyber Security runs over 4th and 5th June, 2019. It includes a wide range of businesses, universities, non-profit and Scottish ...
Principal Research Fellow
Lecturer in Cybersecurity and Networks; Program Leader for MSc Advanced Security & Cybercrime; Winner of Outstanding Woman in Cyber (Scottish Cyber Awards 2017)
Academic Support Adviser
Kwecka, Z., Buchanan, W. J. & Spiers, D. A. (2008). Application and analysis of private matching schemes based on commutative cryptosystems
Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These...
Buchanan, W. J., Gupta, N. K. & Arnold, J. M. (1993). Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation. In 9th International IEE Conference on Electromagnetic Compatibility, 287-291. doi:10.1049/cp:19940711. ISBN 0-85296-622-9
The authors have applied the 3D FDTD technique to simulate the propagation of electrical signals within printed circuit boards (PCBs). This relates to the work currently being...
Miehling, M. J., Buchanan, W. J., Old, L. J., Batey, A. & Rahman, A. (2009). Analysis of malicious affiliate network activity as a test case for an investigatory framework. In Proceedings of 9th European Conference on Information Warfare and Security, 209
Currently there is a great deal of literature surrounding methods that can be used to de-tect click-fraud, but there is very little published work on actual cases of click-thr...
Al-Dubai, A., Zhao, L., Zomaya, A. & Min, G. (2010). A novel multicast gateway based multi-hop routing for wireless mesh networks
Tsiros, A. (2012). A multidimensional sketching interface for corpus-based concatenative synthesis. In Proceedings of the International Conference on Auditory Display 2013
This paper presents Morpheme, a multidimensional interface that allows real-time control of concatenative synthesis through the act of sketching on a digital canvas. Morpheme ...
Buchanan, W. J., Flandrin, F., Macfarlane, R. & Graves, J. (2010). A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011
This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system...
Jaroucheh, Z., Liu, X. & Smith, S. (2009). A model-driven approach to flexible multi-level customization of SaaS applications. In Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering (SEKE'10)
Benyon, D., Mival, O., Ayan, S., O'Keefe, B. & Mokey, S. (2011). Location as interaction: designing blended spaces for digital tourism. In HCI TOCH
Smyth, M. & Helgason, I. (2015). Life at the local scale: an alternative perspective on the urban. In Hybrid Cities - data to the peopledoi:10.13140/RG.2.1.3740.2083
The study of cities has risen to the top of research agendas in the last decade, raising the question of how to study something as vast and eclectic as cities. This paper prop...
Smyth, M. (1994). Human computer co-operative systems - empowering users through partnership. In Proceedings of the International Workshop on the Design of Cooperative Systems, 37-55
Benyon, D. (2002). Human-Centred interaction design. In Cairncross, S., Varey, A. & McEwan, T. (Eds.). Proceedings of 6th HCI Educators Workshop,
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O. & Khedim, A. S. (2010). Information sharing framework: next generation e-Health cloud
This presentation outlines the novel e-Health Cloud. See:
The Scottish Informatics & Computer Science Alliance
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
The objective is to clearly demonstrate that better internet search can be achieved through the use of user-side personalisation (under the full control of the user) and with no personal data revealed...
ENU Development Trust
This project is intended to seek in-depth understanding of the new promising decentralised machine learning scheme, namely federated learning, and develop a proof-of-concept algorithm-independent unle...
Improving customer experience through intelligent workflow
This project aims to investigate the integration of a cipher policy for the protection of data, and how these can be applied into a cloud-based infrastructure. A key focus for the implementation will ...
This project will focus on the design and development of a distributed software architecture for the platform with innovative technology approaches. This includes microservices with containerisation, ...
University of London
This event is a rare opportunity to find out more about a musical instrument that was worth £100,000 in the 1980s when it was used in the making of records by Afrika Bambaataa, Kate Bush, and Frankie ...
A project to provide decentralised identity for meeting KYC & AML requirements in the property industry.
Student Placement Innovation Voucher as continuation of earlier Standard Innovation Voucher in partnership with Geo-Info Ltd.
This project aims to extend the earlier project by assessing the performan...
Royal Society of Edinburgh
The project aims to advance the autonomy of field robots with a novel approach to developing a new generation of Meteorological Drone Robots (Met-Bot) which will be context-driven, proactively auto-re...
This project will use steganography technology and shared secrets to improve the usability of the process of recovering cryptocurrency/distributed ledger wallet. It will do so by encoding parts of the...
The project will produce recommendations for the application of gamification to the training product, informed by the company context, with a design led by the latest academic research in gamification...
Despite football being deeply entrenched in Scottish culture it is under-researched from...
Participation Space Studies explore eParticipation ...
This thesis examines the meaning, origin and influence of Edgar Allan Poe’s...
This PhD is concerned with the role of online information in...
Hyper-heuristics (HH) have been described as methodologies that aim to offer “good enough -soon enough - cheap enough” solutions to real world...
This investigation examines various methods for evaluating interactivity and engagement with technology. By using a static model, namely the interactive gallery at The Public...
A town planner, faced with the task of designing attractive walking spaces, needs a tool that will allow different designs to b...
Real Time Travel Information (RTTI) systems deliver information to a wide range of travellers using different modes, with the ai...