Enhancing Big Data Security with Collaborative Intrusion Detection
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014)
Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. https://doi.org/10.1109/mcc.2014.53
Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a d...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017)
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), 1-38. https://doi.org/10.1145/3041956
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, inclu...
Case Study: moving towards an e-health platform to store NHS patient Information in the cloud.
Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., & Thuemmler, C. (2012, February)
Case Study: moving towards an e-health platform to store NHS patient Information in the cloud. Paper presented at Cloud Computing in the Public Sector: The Way Forward, London
Case Study: Moving Towards an e-health Platform to Store NHS Patient Information in the Cloud The NHS pilot scheme to store patient information in the Cloud How can the health...
Technical evaluation of an e-health platform.
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012)
Technical evaluation of an e-health platform. In M. Macedo (Ed.), Proceedings of the IADIS International Conference e-Health 2012
Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation...
Norms and standards in modular medical architectures.
Fricker, S., Fiedler, M., Grottland, A., Jell, T., Magedanz, T., Thuemmler, C., …Paulin, A. (2014)
Norms and standards in modular medical architectures. In 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom) (IEEE Healthcom 2013), (382-387). https://doi.org/10.1109/HealthCom.2013.6720705
Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet - Private Public Partnershi...
Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust
Buchanan, B., Imran, M., Pagliari, C., Pell, J., & Rimpiläinen, S. (2020)
Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust. Glasgow: Digital Health and Care Institute, University of Strathclyde
On December 31st, 2019, the World Health Organisation received a report from the Chinese government detailing a cluster of cases of ‘pneumonia of unknown origin’, later identi...
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing
Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., …Papadopoulos, P. (in press)
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. Frontiers in Communications and Networks, https://doi.org/10.3389/frcmn.2020.583376
The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tr...
BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond
Xu, H., Zhang, L., Onireti, O., Fang, Y., Buchanan, W. J., & Imran, M. A. (in press)
BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond. IEEE Internet of Things, https://doi.org/10.1109/jiot.2020.3025953
The outbreak of COVID-19 pandemic has exposed an urgent need for effective contact tracing solutions through mobile phone applications to prevent the infection from spreading ...
A social-technological alignment matrix.
Thuemmler, C., Mival, O., Lim, A. K., Holanec, I., & Fricker, S. (2015)
A social-technological alignment matrix. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 200-205. https://doi.org/10.1109/healthcom.2014.7001841
This paper refers to the term " implementation " as the Especially in health care this has proven to be a very critical phase Although strategies such as requirements engineer...