Research explorer tool

Date


School

Output Type

Download Available

93 results

Embedding programming skills to support the student journey in networking, security and digital forensics.

Presentation / Conference
Lawson, A., & Macfarlane, R. (2014, April)
Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey, University of Edinburgh, Edinburgh
The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in acade...

Intelligence information sharing between the police and their community partners.

Presentation / Conference
Scott, R., Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, June)
Intelligence information sharing between the police and their community partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University
This presentation will show a newly developed system for information, and will outline the three "R"s involved in information sharing: RISK. Identify and managing risks to ens...

Implementing an ICE: A methodology for the design, development and installation of Interactive Collaborative Environments in real world industrial settings.

Presentation / Conference
Mival, O., & Benyon, D. (2013, April)
Implementing an ICE: A methodology for the design, development and installation of Interactive Collaborative Environments in real world industrial settings. Paper presented at CHI2013 workshop on Blended Interaction Spaces., Paris, France
In this paper, we present a methodology for the design, development and implementation of ICEs (Interactive Collaborative Environments) in real world industrial settings. The ...

Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis.

Presentation / Conference
Lawson, A., Attridge, A., & Lapok, P. (2014, September)
Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis. Paper presented at Eurocall 2014, University of Groningen
This project aims to address pronunciation problems of English language learners. Current pronunciation software tools mainly address phonemic difficulties and give little or ...

A next generation Cloud-based health care platform.

Presentation / Conference
Buchanan, W. J. (2011, May)
A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare, London
This presentation outlines a novel Cloud-based e-Health Platform which integrates security within every single transaction. It involves a TSB/EPSRC funded project with Edinbur...

A research agenda for metaheuristic standardization.

Presentation / Conference
Hart, E., & Sim, K. (2015, June)
A research agenda for metaheuristic standardization. Paper presented at 11th Metaheuristics International Conference, Agadir, Morocco
We propose that the development of standardized, explicit, machine-readable descriptions of metaheuris- tics will greatly advance scientific progress in the field. In particul...

A social technological alignment matrix.

Presentation / Conference
Thuemmler, C., Mival, O., Lim Jumelle, A. K., Holanec, I., & Fricker, S. (2014, January)
A social technological alignment matrix. Paper presented at IEEE Healthcom 2014, Natal, Brazil
This paper refers to the term “implementation” as the process of integrating a new technology into established workflows. Especially in health care this has proven to be a ver...

Cyber security challenges for cloud based services.

Presentation / Conference
Buchanan, W. J. (2015, June)
Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud

Covert channel analysis and detection using reverse proxy servers.

Presentation / Conference
Buchanan, W. J., & Llamas, D. (2004, June)
Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC), London
Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls...

Building a new nation: risk, goverance and trust.

Presentation / Conference
Buchanan, W. J. (2013, January)
Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.