Date


School

Download Available

86 results

DACAR platform for eHealth services cloud.

Conference Proceeding
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011)
DACAR platform for eHealth services cloud. https://doi.org/10.1109/CLOUD.2011.31
The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services,...

Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks.

Conference Proceeding
Migas, N., Buchanan, W. J., & McArtney, K. (2003)
Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. In Proceedings. 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2003. , (200-206). https://doi.org/10.1109/ECBS.2003.1194800
Wireless networks and the usage of mobile devices are becoming popular in recent days, especially in creating ad-hoc networks. There is thus scope for developing mobile system...

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment

Journal Article
Babar, M., Khan, F., Iqbal, . W., Yahya, A., Arif, F., Tan, Z., & Chuma, J. (2018)
A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access, 6, 43088-43099
Smart societies have an increasing demand for quality-oriented services and infrastructure in an Industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numero...

A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks

Journal Article
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019)
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, https://doi.org/10.3390/s19194321
The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks p...

A topological insight into restricted Boltzmann machines

Journal Article
Mocanu, D. C., Mocanu, E., Nguyen, P. H., Gibescu, M., & Liotta, A. (2016)
A topological insight into restricted Boltzmann machines. Machine Learning, 104(2-3), 243-270. https://doi.org/10.1007/s10994-016-5570-z
Restricted Boltzmann Machines (RBMs) and models derived from them have been successfully used as basic building blocks in deep artificial neural networks for automatic feature...

Norms and standards in modular medical architectures.

Conference Proceeding
Fricker, S., Fiedler, M., Grottland, A., Jell, T., Magedanz, T., Thuemmler, C., …Paulin, A. (2014)
Norms and standards in modular medical architectures. In 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom) (IEEE Healthcom 2013), (382-387). https://doi.org/10.1109/HealthCom.2013.6720705
Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet - Private Public Partnershi...

Hybrid Tree-rule Firewall for High Speed Data Transmission

Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack

Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017)
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. In 2017 Seventh International Conference on Emerging Security Technologies (EST),https://doi.org/10.1109/est.2017.8090392
Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted w...

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...

Intelligence information sharing between the police and their community partners.

Presentation / Conference
Scott, R., Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, June)
Intelligence information sharing between the police and their community partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University
This presentation will show a newly developed system for information, and will outline the three "R"s involved in information sharing: RISK. Identify and managing risks to ens...