Embedded document security using sticky policies and identity based encryption
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090564
Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perim...
A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications
Almalkawi, I. T., Halloush, . R., Alsarhan, A., Al-Dubai, A., & Al-karaki, J. N. (2019)
A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications. Journal of Information Security and Applications, 49, https://doi.org/10.1016/j.jisa.2019.102384
Due to limited processing capabilities and other constraints of most wireless networks, many existing security algorithms do not consider the network efficiency. This is becau...
Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach
Di Mauro, M., & Liotta, A. (2019)
Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach. IEEE Transactions on Network and Service Management, 16(4), 1493-1506. https://doi.org/10.1109/tnsm.2019.2943776
The Next Generation 5G Networks can greatly benefit from the synergy between virtualization paradigms, such as the Network Function Virtualization (NFV), and service provision...
An AI approach to Collecting and Analyzing Human Interactions with Urban Environments
Ferrara, E., Fragale, L., Fortino, G., Song, W., Perra, C., di Mauro, M., & Liotta, A. (2019)
An AI approach to Collecting and Analyzing Human Interactions with Urban Environments. IEEE Access, 7, 141476-141486. https://doi.org/10.1109/access.2019.2943845
Thanks to advances in Internet of Things and crowd-sensing, it is possible to collect vast amounts of urban data, to better understand how citizens interact with cities and, i...
Higher-order statistics-based nonlinear speech analysis
Soraghan, J. J., Hussain, A., Alkulabi, A., & Durrani, T. (2002)
Higher-order statistics-based nonlinear speech analysis. Control and Intelligent Systems, 30, 11-18
A fast and robust three-level binary higher order statistics (HOS) based algorithm for simultaneous voiced/unvoiced detection and pitch estimation of speech signals in coloure...
Double-Arc Parallel Coordinates and its Axes re-Ordering Methods
Lu, L., Wang, W., & Tan, Z. (in press)
Double-Arc Parallel Coordinates and its Axes re-Ordering Methods. Mobile Networks and Applications, https://doi.org/10.1007/s11036-019-01455-9
The Parallel Coordinates Plot (PCP) is a popular technique for the exploration of high-dimensional data. In many cases, researchers apply it as an effective method to analyze ...
Machine Learning for Health and Social Care Demographics in Scotland
Presentation / Conference
Buchanan, W. J., Smales, A., Lawson, A., & Chute, C. (2019, November)
Machine Learning for Health and Social Care Demographics in Scotland. Paper presented at HEALTHINFO 2019, Valencia, Spain
This paper outlines an extensive study of applying machine learning to the analysis of publicly available health and social care data within Scotland, with a focus on learning...
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019)
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, https://doi.org/10.3390/s19194321
The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks p...
A Multi-attributes-based Trust Model of Internet of Vehicle
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security, (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...
IoT Forensics: Amazon Echo as a Use Case
Li, S., Li, S., Choo, K. R., Sun, Q., Buchanan, W. J., & Cao, J. (2019)
IoT Forensics: Amazon Echo as a Use Case. IEEE Internet of Things, 1-11. https://doi.org/10.1109/jiot.2019.2906946
Internet of Things (IoT) are increasingly common in our society, and can be found in civilian settings as well as sensitive applications such as battlefields and national secu...