Distance Measurement Methods for Improved Insider Threat Detection
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...
Home appliances classification based on multi-feature using ELM
Wu, Z., Liu, Q., Chen, F., Chen, F., Liu, X., & Linge, N. (2018)
Home appliances classification based on multi-feature using ELM. International Journal of Sensor Networks, 28(1), 34. https://doi.org/10.1504/ijsnet.2018.094710
With the development of science and technology, the application in artificial intelligence has been more and more popular, as well as smart home has become a hot topic. And pa...
Special issue on intelligent interface technology: editor's introduction
Benyon, D., & Murray, D. (2000)
Special issue on intelligent interface technology: editor's introduction. Interacting with Computers, 12(4), 315-322. https://doi.org/10.1016/S0953-5438%2899%2900024-7
The term ‘Intelligent Interface Technology’ (IIT) is intended to capture the wide range of issues and methods in which some form of ‘intelligence’ is applied to both user inte...
An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules
Habibullah, S., Liu, X., & Tan, Z. (2018)
An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules. International Journal of Computer Theory and Engineering, 10(5), 164-169. https://doi.org/10.7763/ijcte.2018.v10.1219
Evolving legacy enterprise systems into a lean system architecture has been on the agendas of many enterprises. Recent advance in legacy system evaluation is in favour of micr...
On the performance of the hybridisation between migrating birds optimisation variants and differential evolution for large scale continuous problems
Voß, S., Segredo, E., Lalla-Ruiz, E., Hart, E., & Voss, S. (2018)
On the performance of the hybridisation between migrating birds optimisation variants and differential evolution for large scale continuous problems. Expert Systems with Applications, 102, 126-142. https://doi.org/10.1016/j.eswa.2018.02.024
Migrating Birds Optimisation (mbo) is a nature-inspired approach which has been shown to be very effective when solving a variety of combinatorial optimisation problems. More ...
Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBAN)
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2018)
Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBAN). IEEE Transactions on Green Communications and Networking, 1-1. https://doi.org/10.1109/tgcn.2018.2813060
Medium Access Control (MAC) protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, traditional static TDMA techni...
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait
Khan, F., ur Rehman, A., Usman, M., Tan, Z., & Puthal, D. (2018)
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait. Mobile Networks and Applications, https://doi.org/10.1007/s11036-018-1020-4
The enormous developments in the field of wireless communication technologies have made the unlicensed spectrum bands crowded, resulting uncontrolled interference to the tradi...
Lightweight cryptography methods
Buchanan, W. J., Li, S., & Asif, R. (2018)
Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processi...
Machine learning and semantic analysis of in-game chat for cyber bullying
Murnion, S., Buchanan, W. J., Smales, A., & Russell, G. (2018)
Machine learning and semantic analysis of in-game chat for cyber bullying. Computers and Security, 76, 197-213. https://doi.org/10.1016/j.cose.2018.02.016
One major problem with cyberbullying research is the lack of data, since researchers are traditionally forced to rely on survey data where victims and perpetrators self-report...