Programme Leader and Lecturer
Ukwandu, E., Buchanan, W., & Russell, G. (2017). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)doi:10.1109/CyberSA.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Ghaleb, B., Al-Dubai, A., Ekonomou, E. & Wadhaj, I. (2017). A New Enhanced RPL Based Routing for Internet of Things”, 2ndConvergent Internet of Things. In 2017 IEEE International Conference on Communications, 1-6. doi:10.1109/ICCW.2017.7962723. ISBN 978-1-5090-1525-2
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the ...
O'Connor, S. & Andrews, T. (2016). Using Co-Design with Nursing Students to Create Educational Apps for Clinical Training. In Sermeus, W. (Ed.). Nursing Informatics 2016, 334-338. doi:10.3233/978-1-61499-658-3-334
Mobile technology is being trialed in nursing education to support students in clinical practice, as it can provide instant access to high quality educational material at the ...
University of Aberdeen
Portrait is a software tool developed to help care staff get to know personal and social information about clients that live in residential care facilities. The Portrait system consists of a biography...
Scottish Funding Council
This research project studies the feasibility of a Cloud-based platform which is used to evaluate the performance of digital forensics tools. Along with measuring key quality metrics, such as true-pos...
This is an EU-funded research project to develop basic methodologies and principles of systemic intelligence for artefacts such as robots that will be capable of steadily growing their knowledge throu...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
21 September 2016
Talk on 'Writing the First World War: Conflict and Memory, 1914-1930' given by Andrew Frayn and chaired by Linda Dryden
21 September 2016
21 September 2016
Dr Andrew Frayn from the English Subject Group gave a talk on his research entitled 'Writing the First World War: Conflict and Memory, 1914-1930'.
Farrenkopf, T., Guckert, M., Urquhart, N. B. & Wells, S. (2016). Demo paper: AGADE - Scalability of ontology based agent simulations. In Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 256-259. doi:10.1007/978-3-319-39324-7_25. ISBN 978-3-319-39323-0, 978-3-319-39324-7,
Simulations of real world scenarios often require considerably
large numbers of agents. With increasing level of detail and resolution
in the underlying models machine limitat...
Chomsiri, T., He, X., Nanda, P. & Tan, Z. (2014). A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 122-129. doi:10.1109/trustcom.2014.20. ISBN 978-1-4799-6513-7
In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewal...
Thomson, A., Graham, M. & Kennedy, J. (2012). Pianola - visualization of multivariate time-series security event data. In Proceedings of IV2013, 123-131. doi:10.1109/IV.2013.15. ISBN 978-0-7695-5049-7
Monitoring log files for network intrusions is unwieldy. To build a mental model of the log, an analyst is required to recognise continuous timelines and attack patterns from ...
Frayn, A. (2011). Armistice Day and a mythologised, distant version of the First World War
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2009). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security, 190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...
Thompson, P. (2009). The Personalised Surface, New Approaches to Digital Printmaking. In The Personalised Surface: New Approaches to Digital PrintmakingISBN 0955862892
My work is formed through practice-based research and is placed within the context of the transferred image. I have developed my digital practice from traditional methods of p...
Cabras, I. (2008). Agglomeration of services at regional level: the case of call centres in Northern England. In Proceedings of the 1st PhD Conference in Economics in memory of Vassilis Patzatzis, Athens, 108-129
No abstract available.
Moncur, W. & LePlâtre, G. (2007). Pictures at the ATM: Exploring the usability of multiple graphical passwords. doi:10.1145/1240624.1240758. ISBN 978-1-59593-593-9
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (...
Graves, J., Buchanan, W. J., Saliou, L. & Old, L. J. (2006). Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. ISBN 1905305206
Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers ...
Webb, A., Hart, E., Ross, P. & Lawson, A. (2003). Controlling a simulated Khepera with an XCS classifier system with memory. ISBN 9783540200574
Autonomous agents commonly suffer from perceptual aliasing in which differing situations are perceived as identical by the robots sensors, yet require different courses of act...
Hart, E. & Ross, P. (2001). Exploiting the analogy between immunology and sparse distributed memory. In Timmis, J. & Bentley, P. (Eds.). 1st International Conference on Artificial Immune Systems, 59-67. ISBN 1-902671-32-5
The relationship between immunological memory and a class of associative memories known as sparse distributed memories (SDM) is well known. This paper proposes a new model for...
Davenport, E., Buckner, K. & Barr, K. (1997). Work-in-progress on a simple conversational prop for navigating social space for workshop on Personalised and Social Navigation in Information Space. In Hook, K., Munro, A. J. & Benyon, D. (Eds.). Workshop on Personalised and Social Navigation in Information Space
The authors of this paper are members of Work Package 2 of the Living Memory project, funded by the ESPRIT program under the I3 rubric. Living Memory will explore new intellig...
Infrared pedestrian detection systems struggle with real-time processing performance. Known solutions are limited to either...
The purpose of this research project is to investigate indivi...