Explore our research

Date


School

Output Type

Download Available

30 results

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset

Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...

A fuzzy logic controller applied to a diversity-based multi-objective evolutionary algorithm for single-objective optimisation

Journal Article
Segredo, E., Seguro, C., Coromoto, L., & Hart, E. (2014)
A fuzzy logic controller applied to a diversity-based multi-objective evolutionary algorithm for single-objective optimisation. Soft Computing, 19(10), 2927-2945. https://doi.org/10.1007/s00500-014-1454-y
In recent years, Multi-Objective Evolutionary Algorithms (MOEAS) that consider diversity as an objective have been used to tackle single-objective optimisation prob- lems. The...

Culture & biometrics: regional differences in the perception of biometric authentication technologies

Journal Article
Riley, C. W., Buckner, K., Johnson, G., & Benyon, D. (2009)
Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society, 24, 295-306. https://doi.org/10.1007/s00146-009-0218-1
Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of...

Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory

Journal Article
Hall, H., Widen, G., & Paterson, L. (2010)
Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory. Libri, 60(2), 117-128. https://doi.org/10.1515/libr.2010.011
This paper focuses on the extent to which online information sharing practice is socially motivated. A key interest is how knowledge of the existing social connections between...

Research directions in data wrangling: Visualizations and transformations for usable and credible data

Journal Article
Kandel, S., Heer, J., Plaisant, C., Kennedy, J., Ham, F. V., Riche, N. H., …Buono, P. (2011)
Research directions in data wrangling: Visualizations and transformations for usable and credible data. Information Visualization, Octobe, 271-288. https://doi.org/10.1177/1473871611415994
In spite of advances in technologies for working with data, analysts still spend an inordinate amount of time diagnosing data quality issues and manipulating data into a usabl...

Recognize contextual situation in pervasive environments using process mining techniques

Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2011)
Recognize contextual situation in pervasive environments using process mining techniques. Journal of Ambient Intelligence and Humanized Computing, 2(1), 53-69. https://doi.org/10.1007/s12652-010-0038-7
Research in pervasive computing and ambience intelligence aims to enable users to interact with the environment in a context-aware way. To achieve this, a complex set of featu...

How Was Your Day? evaluating a conversational companion

Journal Article
Benyon, D., Gambäck, B., Hansen, P., Mival, O., & Webb, N. (2012)
How Was Your Day? evaluating a conversational companion. IEEE transactions on affective computing, 4, 299-311. https://doi.org/10.1109/T-AFFC.2013.15
The “How Was Your Day” (HWYD) Companion is an embodied conversational agent that can discuss work-related issues, entering free-form dialogues that lack any clearly defined ta...

A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks

Journal Article
Moradpoor Sheykhkanloo, N. (2015)
A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(6), 1443-1453
Thousands of organisations store important and confidential information related to them, their customers, and their business partners in databases all across the world. The st...

Visualising errors in animal pedigree genotype data

Journal Article
Graham, M., Kennedy, J., Paterson, T., & Law, A. (2011)
Visualising errors in animal pedigree genotype data. Computer Graphics Forum, 30, 1011-1020. https://doi.org/10.1111/j.1467-8659.2011.01950.x
Genetic analysis of a breeding animal population involves determining the inheritance pattern of genotypes for multiple genetic markers across the individuals in the populatio...

On artificial immune systems and swarm intelligence

Journal Article
Timmis, J., Andrews, P., & Hart, E. (2010)
On artificial immune systems and swarm intelligence. Swarm Intelligence, 4(4), 247-273. https://doi.org/10.1007/s11721-010-0045-5
This position paper explores the nature and role of two bio-inspired paradigms, namely Artificial Immune Systems (AIS) and Swarm Intelligence (SI). We argue that there are man...