Date


People

Download Available

119 results

Advanced security and network forensics: Introduction.

Other
Buchanan, W. J. (2011)
Advanced security and network forensics: Introduction. Edinburgh Napier University
1.1 Objectives 1.2 Introduction 1.3 Security Taxonomy 1.4 Threats Hardware misuse Environmental risks External misuse Pests Active misuse Passive misuse Masquerading...

Introduction

Journal Article
Hussain, A. (2002)
Introduction. Control and Intelligent Systems, 30,
Introduction to Special Issue Number 1 of the international journal: Control and intelligent systems, nonlinear speech processing.

Introduction to the Special Issue on Intelligent Models for Security and Resilience in Cyber Physical Systems

Journal Article
Liu, Q., Liu, X., Grosu, R., & Yang, C. (2022)
Introduction to the Special Issue on Intelligent Models for Security and Resilience in Cyber Physical Systems. Computer Modeling in Engineering and Sciences, 131(1), 23-26. https://doi.org/10.32604/cmes.2022.020646
This article has no abstract.

Cognitive Computation: An introduction

Journal Article
Hussain, A. (2009)
Cognitive Computation: An introduction. Cognitive Computation, 1(1), 1-3. https://doi.org/10.1007/s12559-009-9013-z

Introduction to security and network forensics.

Book
Buchanan, W. J. (2011)
Introduction to security and network forensics. Auerbach Publications
Starting with an overview of general security concepts, it addresses hashing, digital certificates, enhanced software security, and network security. The text introduces the c...

Introduction: Managing Parliaments in the 21st Century

Book
Falconer, P., Smith, C. F., & Webster, W. (2000)
Introduction: Managing Parliaments in the 21st Century. In P. Falconer, C. Smith, & W. Webster (Eds.), Managing Parliaments in the 21st Century, 1-6. IOS Press

Introduction to the special section on pervasive adaptation

Journal Article
Zambonelli, F., & Paechter, B. (2012)
Introduction to the special section on pervasive adaptation. ACM transactions on autonomous and adaptive systems, 7(1), 1-2. https://doi.org/10.1145/2168260.2168269

Implementation of the Prometheus Taxonomic Model: a comparison of database models and query languages and an introduction to the Prometheus Object-Oriented Model.

Journal Article
Raguenaud, C., Pullan, M. R., Watson, M. F., Kennedy, J., Newman, M. F., & Barclay, P. J. (2002)
Implementation of the Prometheus Taxonomic Model: a comparison of database models and query languages and an introduction to the Prometheus Object-Oriented Model. Taxon, 51(1), 131-142. https://doi.org/10.2307/1554970
Types of databases commonly used for handling taxonomic data are compared. It is shown that none of the existing types of databases fully support the requirements of taxonomic...

Security and forensic computing: introduction to computer security.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: introduction to computer security
1 INTRODUCTION 14 1.1 The Industrial and the Information Age 14 1.2 CIA and AAA 15 1.3 Protecting against intruders 16 1.4 Users, systems and data 17 1.5 Security and Forensic...

Introduction: Dealing with Big Data-Lessons from Cognitive Computing

Journal Article
Abdullah, A., Hussain, A., & Khan, I. H. (2015)
Introduction: Dealing with Big Data-Lessons from Cognitive Computing. Cognitive Computation, 7(6), 635-636. https://doi.org/10.1007/s12559-015-9364-6
No abstract available
5 results

The Sound Beneath Our Feet

2022 - 2022
This project will develop an immersive audio installation in which to experience sonified seismic data from volcanic activity. The environment will foster new ways of experiencing data from both scien...
Funder: Arts & Humanities Research Council | Value: £4,915

How are we positioning apprenticeships? A critical analysis of job adverts for degree apprentices

2020 - 2021
The introduction of the degree apprenticeship presents opportunities for students to pursue a degree while working in paid positions relevant to their studies. Within this model, employers take an act...
Funder: Society for Research into Higher Education | Value: £4,999

IIDI & Jupiter Artland Foundation

2011 - 2011
This project involved developing audio guides for Jupiter Artland.  A traditional audio guide was developed, including introductions of the work and discussions from the artists.  Alongside this was a...
Funder: Scottish Funding Council | Value: £4,992

Developing Research Excellence and Methods (DREaM)

2011 - 2012
This AHRC-funded project aimed to develop a formal UK-wide network of Library and Information Science (LIS) researchers. A key goal of the project was to build capacity and capability in the develop...
Funder: Arts & Humanities Research Council | Value: £33,466

e-Representative: A virtual desktop to support the mobile elected Representative

2006 - 2008
The eRepresentative package is a virtual desktop for elected representatives. It enables them to continue their legislative and policy work anytime and from anywhere with secure access to relevant and...
Funder: European Commission | Value: £135,000

Date