Lecturer in Cybersecurity and Networks; Program Leader for MSc Advanced Security & Cybercrime; Winner of Outstanding Woman in Cyber (Scottish Cyber Awards 2017)
Qasem, M., Al-Dubai, A., Romdhani, I., & Ghaleb, B. (2018). Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01. USA: IETF
This document proposes an extended Objective Function(OF) that balances the number of children nodes of the parent nodes to avoid the overloading problem and ensure node lif...
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., Hou, J., & Jadhav, R. A. (2017). Load Balancing Objective Function in RPL (Draft 2). USA: IETF
This document proposes an extended Objective Function(OF) that balances the number of child nodes of the parent nodes to avoid the overloading problem and ensure node li...
Sébastien Bedo, J., Eddine El Ayoubi, S., Filippou, M., Gavras, A., Giustiniano, D., Iovanna, P., …Tjelta, T. (2017). 5G innovations for new business opportunities. Brussels: European Commission / 5G PPP
5G is the next generation mobile network that enables
innovation and supports progressive change across all
vertical industries and across our society1. Through its
Arts & Humanities Research Council
The feeling of being immersed within a live performance by an ensemble of world class musicians can be a deeply engaging and highly valued cultural experience for audiences as well as for the performe...
Scottish Funding Council
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
27 September 2017
27 September 2017
A well studied subtask of Natural Language Generation (NLG) is Referring Expression Generation (REG) that studies the automatic generation of a description of an entity in a w...
Lecturer in Cybersecurity
Associate Professor of audio Engineering
Lecturer of Cybersecurity, Encryption and Networks
Thuemmler, C., Jumelle, A. K. L., Paulin, A., Sadique, A., Schneider, A., Fedell, C., …Covaci, S. (2015). 5G-PPP White Paper on eHealth Vertical Sector. Brussels: EU Commission
Gaston Crommenlaan 1 PO box: 101 9050 Gent Belgium www.5g-ppp.eu 5G and e-Health 1 Socioeconomic drivers of e-Health in Horizon 2020 Although socioeconomically the sector addr...
Hart, E., Jansen, T. & Timmis, J. (2010). Artificial Immune Systems (Dagstuhl Seminar 11172)
This report documents the program and the outcomes of the Dagstuhl Seminar 11172 ``Artificial Immune Systems''. The purpose of the seminar was to bring together researchers fr...
Chalmers, K. (2008). Investigating communicating sequential processes for Java to support ubiquitous computing. (Thesis)
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via computational elements. These elements are designed to augment and su...
Golam, H. (2003). Component-based network test tools platform for network design and maintenance. (Thesis)
Tools development for testing real time systems rely heavily on frameworks that are capable of delivering the advantages of precise control, the availability of a range of fun...
Pallis, G. (2009). A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments. (Thesis)
For more than a century the classic circuit-switched telephony in the form of PSTN (Public Service Telephone Network) has dominated the world of phone communications (Varshney...
Molla, R., Romdhani, I., & Buchanan, B. (2016, November). 3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016, Agadir, Morocco
The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determini...
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June). Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014, Bejaia, Algeria
E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is ...
Ambusaidi, M., Lu, L. F., He, X., Tan, Z., Jamdagni, A., & Nanda, P. (2012, November). A nonlinear correlation measure for Intrusion Detection. Paper presented at The 7th International Conference on Frontier of Computer Science and Technology (FCST-12)
The popularity of using internet contains some risks of network attacks. It has attracted the attention of many researchers to overcome this problem. One of the effective ways...
Buchanan, W. J., & Llamas, D. (2004, June). Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC), London
Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls...
Rudman, H. Co-opetition: facilitating peer learning for knowledge exchange via The AmbITion Approach.. Paper presented at Beyond The Campus: Higher Education and the Creative Economy, CREATe Centre, University of Glasgow. (Unpublished)
Barrowclough, J. P., & Asif, R. (2018). Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, (1-20). ISSN 1939-0114
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., …Tripathi, S. S. (2018). Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, (30162-30173). doi:10.1109/ACCESS.2018.2842760
Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to ...
Digital Health Institute
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
Core 44, Room C44, Merchiston Campus
26 September 2017