Lecturer in Cybersecurity and Networks; Winner of Outstanding Woman in Cyber (Scottish Cyber Awards 2017)
Lalla-Ruiz, E., Segredo, E., & Voß, S. (in press). A Cooperative Learning Approach for the Quadratic Knapsack Problem. In Learning and Intelligent Optimization Conference (LION12)
The Quadratic Knapsack Problem (QKP) is a well-known optimization problem aimed to maximize a quadratic objective function subject to linear capacity constraints. It has sever...
Hall, H., Cruickshank, P., & Ryan, B. (2018). Exploring information literacy through the lens of Activity Theory. In Proceedings of the European Conference on Information Literacydoi:10.1007/978-3-319-74334-9_81
Activity Theory (AT) is presented as a framework for explaining Information Literacy (IL) as a technologically mediated social practice. This is achieved in the context of a s...
Romdhani, I., Mirza, N., King, P., Abdelshafy, M., & A. Alghamdi, A. (2017). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Wireless and Mobile Computing, Networking and Communications (WiMob)doi:10.1109/WiMOB.2017.8115854
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Edinburgh Napier Funded
Having relevant work experience, such as a placement or internship, is valued by employers in the technology sector and can improve employment outcomes for computing graduates. However, gaining good w...
Skills Development Scotland
Graduate Apprenticeships (GAs) are undergraduate degrees in which the students are in full-time employment, studying on campus one day per week. In September 2017, Edinburgh Napier’s first cohort of a...
NHS Health Scotland
The project will take the form of a systematic review of relevant literature to provide an update on the evidence base on the health needs of people with learning disabilities in Scotland since 2004, ...
01 February 2017
20 February 2017
The Royal Society of Edinburgh (RSE) brings together distinguished individuals from the arts, business, science and technology and academia worlds to advance learning and know...
19 October 2017
Adaptive Behavior is an indexed, international peer reviewed journal that publishes original research and review articles on adaptive behavior in biological systems and autono...
Lecturer in Cybersecurity and Digital Forensics
Vice Principal & Deputy Vice Chancellor
Senior Research Fellow
Senior Computing Support Technician
Bishop, C., Esteves, A., & Mcgregor, I. (2017). Head-Mounted Displays as Opera Glasses: Using Mixed-Reality to Deliver an Equalitarian User Experience During Live Events. In ICMI 2017 Proceedings of the 19th ACM International Conference on Multimodal Interactiondoi:10.1145/3136755.3136781
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...
Liu, X., & Liu, Q. (2017). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), 450-459. doi:10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...
Liu, X., & Liu, Q. (2017). Power Consuming Activity Recognition in Home Environment. In X. Sun, H. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security. ICCCS 2017, 361-372. doi:10.1007/978-3-319-68505-2_31
This work proposed an activity recognition model which focus on the power con-suming activity in home environment, to help residents modify their behavior. We set the IoT syst...
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y., & Oakley, I. (2017). SmoothMoves: smooth pursuits head movements for augmented reality. In UIST '17 Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, 167-178. doi:10.1145/3126594.3126616
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Moradpoor, N., Brown, M., & Russell, G. (2017). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In 10th International Conference on Security of Information and Networks (SIN 2017)doi:10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7. doi:10.1145/3136825.3136905
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Pitt, J., & Hart, E. (2017). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W),doi:10.1109/FAS-W.2017.119
This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional ...
Romdhani, I., Faiza, M., Tandjaoui, D., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)doi:10.1109/compsac.2017.120
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the jo...
Liu, X., & Liu, Q. (2017). An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)doi:10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to...
Ghaleb, B., Al-Dubai, A. & Romdhani, I. (2017). Drizzle: Adaptive and Fair Route Maintenance Algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), 1-6. doi:10.1109/ICC.2017.7996819. ISBN 978-1-4673-8999-0
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017). Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM),doi:10.23919/INM.2017.7987433
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...
Technology has been heralded as a potential enabler of communication between individuals and those in their informal or
professional care network. Enabling people to effectively talk about their needs...
SUNRISE will develop, implement, assess and facilitate learning about new, collaborative ways to address common mobility challenges at the neighbourhood level. Towards this aim, 6 cities will foster c...
Society for Research into Higher Education
Teaching-focused academics in UK Life Science departments may experience anxiety about their continued ability to teach undergraduates at Honours level, and postgraduates at Masters and doctoral level...
NHS Education Scotland
NES -GNC and Margaret Callum Roger Midwifery Award
To find out from people with learning disabilities and those who care and support them what skills and qualities non-learning disability trained sta...
British Council "Mobility Grant for Leadership Development Project". Funds visit by 6 persons from Ukraine to Edinburgh to seek potential collaborations in education and work based learning.
Chartered Institute of Library and Information Professionals
The findings of this research will contribute to strategies to improve citizen engagement in the democratic process at community level.
Community Councillors are a vital link between local communities...
Digital Health Institute
As a precursor to the work described under the DHI application for development of “Diabetes: Understanding Daily Events –an interactive, digital diabetes education site for Young People”, there are se...
The Scottish Informatics & Computer Science Alliance
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Scottish Funding Council
The company is looking for an innovative means of creating a permanently installed communication system that visually enhances the building, can adaptively communicate and that is sensitive to the sit...
To deliver ABI training to the following Nursing cohorts: Mental Health; Midwifery: Adult: Learning Disabilities: Child (Students will be 2nd/3rd year students prior to practice placements).
Optimisation – finding cost-effective or high-performing solutions - is a key economic driver for business today. However, academic literature on search-based optimisation techniques reflects an escal...
Burdett Trust for Nursing
The project focuses on person centred care for people with learning disabilities at the point of transition from child to adult health services. The project will include multiple nursing perspectives ...
The PhD is to investigate the ecological implications of invasive bullhead in...
The concept of context-awareness is widely used in mobile and pervasive computing t...
23 June 2016
Dr Brian Detlor has been appointed Visiting Professor to the School of Computing at Edinburgh Napier University. This appointment formalises Brian’s long-standing relationship...
11 April 2016
11 April 2016
Dr Petros Kostagiolas and Dr Christina Banou, both from the Ionian University of Corfu took part in an Erasmus exchange with the School of Computing in the week beginning 11th...
07 March 2018
07 March 2018
The presentation will discuss concepts, tips and common issues of time management, focussing on tackling long-term projects, maintaining motivation and achieving a good work/l...
12 January 2018
12 January 2018
Stephen Cranefield (University of Otago)
This talk will cover several topics related to the computational realisation of personal and social human concepts to pro...
05 December 2016
27 August 2017
22 August 2017
Zonefox, a spin-out of The Cyber Academy within the School of Computing at Edinburgh Napier University, officially launched their move into new offices in Edinburgh. They have...
For further details please see https://hazelhall.org/2016/06/23/dr-brian-detlor-appointed-visiting-professor-at-edinburgh-napier-university/#more-6879
21 February 2018
21 February 2018
Prof. Helen Hastie of Heriot-Watt University will deliver a seminar entitled "Techniques and Interfaces for Trustworthy Robotics".
In the near future, we will see a rap...
15 July 2017
16 June 2016
Simon Powers will deliver a research seminar about his work on the evolution of institutions.
Abstract Economics, artificial life, and agent-based c...
01 November 2017