MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features
Saha, R., Geetha, G., Kumar, G., Kim, T., & Buchanan, W. J. (2019)
MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weigh...
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019)
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, https://doi.org/10.3390/s19194321
The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks p...
PIR sensor array for hand motion recognition
Presentation / Conference
Wojtczuk, P., Armitage, A., Binnie, D., & Chamberlain, T. (2011, August)
PIR sensor array for hand motion recognition. Paper presented at SensorDevices 2011, Nice, France
Abstract—In this paper we present our work towards a hand gesture recognition system realised with a passive thermal infrared sensor array. In contrast with the majority of re...
Inside the Palimpsest: A Study of Newsroom Information
Macaulay, C. Gathering. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7241
The methodologies of systems design, rooted in engineering and in cognitivist conceptions
of human action, have been stretched to the limit by the complexity of uses to which
The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts
Ullah, Z., Arshad, & Ahmad, J. (2022)
The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts. Energies, 15(21), Article 8171. https://doi.org/10.3390/en15218171
By coordinating the operation of regionally interconnected virtual power plants (VPPs), the growing penetration problem of renewable energy sources (RESs) into the power syste...
Persuasive dialogue understanding: The baselines and negative results
Chen, H., Ghosal, D., Majumder, N., Hussain, A., & Poria, S. (2021)
Persuasive dialogue understanding: The baselines and negative results. Neurocomputing, 431, 47-56. https://doi.org/10.1016/j.neucom.2020.11.040
Persuasion aims at forming one’s opinion and action via a series of persuasive messages containing persuader’s strategies. Due to its potential application in persuasive dialo...
A novel visual attention method for target detection from SAR images
Gao, F., Liu, A., Liu, K., Yang, E., & Hussain, A. (2019)
A novel visual attention method for target detection from SAR images. Chinese Journal of Aeronautics, 32(8), 1946-1958. https://doi.org/10.1016/j.cja.2019.03.021
Synthetic Aperture Radar (SAR) imaging systems have been widely used in civil and military fields due to their all-weather and all-day abilities and various other advantages. ...
Privacy-Preserving Passive DNS
Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020)
Privacy-Preserving Passive DNS. Computers, 9(3), https://doi.org/10.3390/computers9030064
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern...
Understanding Public Perceptions of COVID-19 Contact Tracing Apps: Artificial Intelligence–Enabled Social Media Analysis
Cresswell, K., Tahir, A., Sheikh, Z., Hussain, Z., Domínguez Hernández, A., Harrison, E., …Hussain, A. (2021)
Understanding Public Perceptions of COVID-19 Contact Tracing Apps: Artificial Intelligence–Enabled Social Media Analysis. Journal of Medical Internet Research, 23(5), https://doi.org/10.2196/26618
Background: The emergence of SARS-CoV-2 in late 2019 and its subsequent spread worldwide continues to be a global health crisis. Many governments consider contact tracing of c...
Investigations into Decrypting Live Secure Traffic in Virtual Environments
McLaren, P. W. L. Investigations into Decrypting Live Secure Traffic in Virtual Environments. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2386517
Malicious agents increasingly use encrypted tunnels to communicate with external servers. Communications may contain ransomware keys, stolen banking details, or other confiden...