Thuemmler, C., Jumelle, A. K. L., Paulin, A., Sadique, A., Schneider, A., Fedell, C., …Covaci, S. (2015). 5G-PPP White Paper on eHealth Vertical Sector. Brussels: EU Commission
Gaston Crommenlaan 1 PO box: 101 9050 Gent Belgium www.5g-ppp.eu 5G and e-Health 1 Socioeconomic drivers of e-Health in Horizon 2020 Although socioeconomically the sector addr...
Golam, H. (2003). Component-based network test tools platform for network design and maintenance. (Thesis)
Tools development for testing real time systems rely heavily on frameworks that are capable of delivering the advantages of precise control, the availability of a range of fun...
Pallis, G. (2009). A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments. (Thesis)
For more than a century the classic circuit-switched telephony in the form of PSTN (Public Service Telephone Network) has dominated the world of phone communications (Varshney...
Scottish Funding Council
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
The development of interesting use cases for IPv6.
Associate Professor of audio Engineering
Zero Hour Lecturer
Senior Research Fellow
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June). Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Paper presented at The 16th IEEE International Conference on Smart City (IEEE SmartCity-2018), Exeter, UK
In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional uneq...
Molla, R., Romdhani, I., & Buchanan, B. (2016, November). 3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016, Agadir, Morocco
The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determini...
Lawson, A. & Macfarlane, R. Embedding programming skills to support the student journey in networking, security and digital forensics.. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey, University of Edinburgh, Edinburgh. (Unpublished)
The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in acade...
Tweneboah-Koduah, S., & Buchanan, W. J. (2018). Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, doi:10.1093/comjnl/bxy002. ISSN 0010-4620
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2017). Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, (1-18). doi:10.1155/2018/5906368. ISSN 1939-0114
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...
Al-Dubai, A. Y., Zomaya, A. Y., Alsarhan, A., Itradat, A., Al-Dubai, A., Zomaya, A., & Min, G. (2017). Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments. IEEE Transactions on Parallel and Distributed Systems, 29(1), (31-42). doi:10.1109/tpds.2017.2748578. ISSN 1045-9219
In the current cloud business environment, the cloud provider (CP) can provide a means for offering the required quality of service (QoS) for multiple classes of clients. We c...
Ballantyne, G., Baldock, K. C. R., Rendell, L., & Willmer, P. (2017). Pollinator importance networks illustrate the crucial value of bees in a highly speciose plant community. Scientific Reports, 7(1), doi:10.1038/s41598-017-08798-x. ISSN 2045-2322
Accurate predictions of pollination service delivery require a comprehensive understanding of the interactions between plants and flower visitors. To improve measurements of p...
Zhao, L., Al-Dubai, A., Li, X., Chen, G. & Min, G. (2016). A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks. Computers and Electrical Engineering. 61, 361-372. doi:10.1016/j.compeleceng.2016.12.031. ISSN 0045-7906
Current networking technologies are not perfectly equipped to support Quality of Service (QoS), which is vital for real-time multimedia applications in Wireless Community Mesh...
Ballantyne, G., Baldock, K. C. R. & Willmer, P. G. (2015). Constructing more informative plant–pollinator networks: visitation and pollen deposition networks in a heathland plant community. Proceedings of the Royal Society B: Biological Sciences. 282(1814), 20151130. doi:10.1098/rspb.2015.1130. ISSN 0962-8452
Interaction networks are widely used as tools to understand plant–pollinator communities, and to examine potential threats to plant diversity and food security if the ecosyste...
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F. & Jamdagni, A. (2013). Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology. 8(2/3), 77. doi:10.1504/ijipt.2014.066377. ISSN 1743-8209
Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services,...
He, X., Chomsiri, T., Nanda, P. & Tan, Z. (2013). Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems. 30, 116-126. doi:10.1016/j.future.2013.06.024. ISSN 0167-739X
This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The r...
Wu, Y., Min, G. & Al-Dubai, A. (2011). A new analytical model for multi-hop cognitive radio networks. IEEE Transactions on Wireless Communications. 11, 1643-1648. doi:10.1109/TWC.2012.030812.111106. ISSN 1536-1276
The cognitive radio (CR) is an emerging technique
for increasing the utilisation of communication resources by
allowing the unlicensed users to employ the under-utilised
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...