Dean of Health & Social Care
Associate Professor of audio Engineering
Perret, C., Powers, S. T., Pitt, J., & Hart, E. (2018). Can justice be fair when it is blind? How social network structures can promote or prevent the evolution of despotism. In T. Ikegami, N. Virgo, O. Witkowski, M. Oka, R. Suzuki, & H. Iizuka (Eds.), Proceedings of the 2018 Conference on Artificial Lifedoi:10.1162/isal_a_00058
Hierarchy is an efficient way for a group to organize, but often goes along with inequality that benefits leaders. To control despotic behaviour, followers can assess leaders'...
Azer, J., & Alexander, M. (2018). The Impact of Negatively-valenced Influencing Behaviour. In SERVSIG-2018-Proceedings, 845-850
Influencing behavior as a form of Customer Engagement Behavior (CEB) has the potential to affect other customers’ attitude and behavioral outcomes and likewise the value and p...
Grant, K., Mackie, R., Gadsden, S., & McLaughlin, D. (2018). Developing and managing talent in public services: Navigating the collaborative landscape. In Conference Proceedings
Against a background of significant public service reform and growing acceptance of the need for public service organizations to better co-ordinate and integrate approaches to...
Arts & Humanities Research Council
The feeling of being immersed within a live performance by an ensemble of world class musicians can be a deeply engaging and highly valued cultural experience for audiences as well as for the performe...
Technology has been heralded as a potential enabler of communication between individuals and those in their informal or
professional care network. Enabling people to effectively talk about their needs...
Biotechnology and Biological Sciences Research Council
The ImagingBioPro network seeks to develop new, high energy imaging methods to capture the dynamic biochemical and biophysical processes in biological samples.
The human body is highly structured – f...
06 June 2018
06 June 2018
Sub-file Hashing Strategies for Fast Contraband Detection
Traditional digital forensics processes do not scale well with the huge quant...
31 May 2018
This was the 4th instalment of the Big Data in Cyber Security Conference organised by The Cyber Academy.
It has been co-organised with SBL and it was part of The...
15 February 2018
Professor Hazel Hall, Peter Cruickshank, and Dr Bruce Ryan of the Centre for Social Informatics discuss the extent to which those who participated in an AHRC funded-network fo...
Lecturer in Conservation Biology
2484,0131 651 4884
PhD Student and Associate Lecturer
Lecturer in Cybersecurity
Dean of Applied Sciences
Lecturer in Cybersecurity and Networks; Program Leader for MSc Advanced Security & Cybercrime; Winner of Outstanding Woman in Cyber (Scottish Cyber Awards 2017)
Associate Professor in Counselling, Transformation & Proffesional Practice
Agyepong, E., Buchanan, W., & Jones, K. (2018). Detection of Algorithmically Generated Malicious Domain. In CS & IT-CSCP 2018, 13-32. doi:10.5121/csit.2018.80802
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persist...
Mishra, A., Tripathy, A., Obaidat, M., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (in press). A Chain Topology for Efficient Monitoring of Food Grain Storage Using Smart Sensors. In Conference Proceedings
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...
Mora, L., Deakin, M., & Reid, A. (2018). Smart City Development Paths: Insights from the First Two Decades of Research. In A. Bisello, D. Vettorato, P. Laconte, & S. Costa (Eds.), Smart and Sustainable Planning for Cities and Regions: Results of SSPCR 2017, 403-420. doi:10.1007/978-3-319-75774-2
More than 20 years have now passed since the concept of smart city first appeared in a scholarly publica-tion, marking the beginning of a new era in urban innovation. Since th...
Rivera, E. S., & Garden, C. L. P. (in press). Theory and Games: Developing a methof for gamifying Higher Education. In EDULEARN18 Proceedings
Gamification, the use of game attributes in non-game context, is used in the private sector as well as education. Research into Gamified Learning (GL) often focuses on case...
Liu, X., & Liu, Q. (in press). Appliance Recognition Based on Continuous Quadratic Programming. In Proceedings of 4th International Conference on Cloud Computing and Security (ICCCS 2018)
The detailed information of residents' electricity consumption is of great significance to the planning of the use of electrical appliances and the reduction of electrical ene...
Liu, X., Liu, Q., Zou, Y., & Wang, G. (in press). A Self-organizing LSTM-Based Approach to PM2.5 Forecast. In Proceedings of the 4th International Conference on Cloud Computing and Security (ICCCS 2018)
Nanjing has been listed as the one of the worst performers across China with respect to the high level of haze-fog, which impacts people's health greatly. For the severe condi...
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (in press). Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC)
Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure i...
McKeown, S., Russell, G., & Leimich, P. (in press). Sub-file Hashing Strategies for Fast Contraband Detection. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)
Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for man...
McKeown, S., Russell, G., & Leimich, P. (in press). Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)
Cloud based storage is increasing in popularity, with
large volumes of data being stored remotely. Digital forensics
investigators examining such systems remotely are limited ...
Hoffman, B., Chalmers, K., Urquhart, N., Farrenkopf, T., & Guckert, M. (in press). Towards reducing complexity of multi-agent simulations by applying model-driven techniques. In PAAMS 2018 Proceedings
Creating multi-agent simulations is a challenging task often requiring programming skills at the professional software developer level. Model driven methods of software develo...
Givaki, K. (in press). Different Options for Multi-Rotor Wind Turbine Grid Connection. In Proceedings of 9th International Conference on Power Electronics, Machines and Drives
In this paper, different options for integration of the multi-rotor wind turbine concept is investigated. The intra-turbine collection network of the multi-rotor wind turbine ...
McLaren, P., Russell, G., & Buchanan, B. (2018). Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017doi:10.1109/SAI.2017.8252185
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...
Parking management should be an important part of sustainable urban mobility planning (SUMP) but unfortunately, it is one
the most underdeveloped segments. Most EU member states lack national level po...
Rutherford Fellows, will work in project areas related to food safety (Pathogen detection, AMR etc) and food spoilage.
Engineering and Physical Sciences Research Council
Robotics is changing the landscape of innovation. But traditional design approaches are not suited to novel or unknown habitats and contexts, for instance: robot colonies for ore mining, exploring or ...
Royal Academy of Engineering
Africa is the continent with the highest number of displaced people due to wars, humanitarian crises, resource scarcity, and extreme climate events. Emergency sheltering always sets out with the best ...
Carnegie Trust for the Universities of Scotland
The objective of this research study is to develop a prototype model for gathering and reusing ocean plastic in-situ. The proposal is to visit a number of beachside locations along the Scottish West C...
Edinburgh Innovations Ltd
The textile industry is based largely on the use of cotton, leather and oil derived polymers and these industries are resource intensive and not sustainable. For example, cotton production requires va...
The population in Africa is growing rapidly, and thus the urbanization is accelerated. The need for detailed information on the performance of materials is a crucial part of the decision-making proces...
Scottish Funding Council
Descent Master is a novel upper body training tool concept, initially created with the mountain bike market in mind, as this activity requires a stable and robust upper body musculature in order to pi...
Royal Society of Edinburgh
The first BSL National Plan (due 22 October 2017) and its mandate for the inclusion of Deaf Culture in Scottish public life provide the context and rationale for the proposed collaborative networking ...
Digital Health Institute
Secondary detection of atrial fibrillation post stroke.
The proposed research is a direct response to the European Commission's Active and Healthy Ageing initiative, with an
overarching goal to improve the quality of life of older people. By pursuing 15 di...
Development of a reliable methodology for better risk management of engineered biomaterials in Advanced Therapy Medicinal Products and/or Medical Devices.
BIORIMA stands for Biomaterial Risk Manageme...
The explosive growth of data tr...
The role of the shaft in the golf swing has been the subject of scientific debate for many years but there is little consens...
The aim of this research is to identify and quantify the changes to driver behaviour, with a specific emphasis on safety, that result f...
The aim of this thesis is to understand the current practice in death knocks among print journalists and the ethical implications...
Cement production requires intensive use of natural raw materials and energy. It also
results in emissions to the atmosphere, the most...
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
27 June 2017
Information: interactions and impact (i3) 2017 took place at Robert Gordon University from Tuesday June 27th until Friday June 30th 2017, with a packed programme for delegates...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
20 April 2018
Funded by the Royal Society of Edinburgh the Deaf Heritage Collective is a project that brings design and critical heritage into practice. Running until November 2019 a serie...
28 November 2017
04 November 2016
This paper explores the potential impact of BREXIT on the Scottish financial services sector. For the purpose of this discussion the assumption is that Scotland remains part o...
08 September 2017
Centre for Social Informatics PhD student Iris Buunk presented a co-authored paper ‘Skills in sight: how social media affordances increase network awareness’ at the 18th Europ...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
14 July 2018
04 May 2016
The FOCAS project was rated as Excellent at its final review, after running for three years. The project coordinator was Emma Hart, with Jennifer Willies as Project Manager.