Explore our research

Date


People

Download Available

Library Of Congress

Dewey Decimal

1079 results

Talking to imagined citizens? Information sharing practices and proxies for e-participation in hyperlocal democratic settings

Journal Article
Cruickshank, P., & Hall, H. (2020)
Talking to imagined citizens? Information sharing practices and proxies for e-participation in hyperlocal democratic settings. Information Research, 25(4), https://doi.org/10.47989/irpaper880
Introduction. Prior research in Information Science often uses constructs from Social Exchange Theory to explain online information sharing. Exchange theories have a strong fo...

Understanding Personal Online Risk To Individuals Via Ontology Development

Conference Proceeding
Haynes, D. (2020)
Understanding Personal Online Risk To Individuals Via Ontology Development. In Knowledge Organization at the Interface: Proceedings of the Sixteenth International ISKO Conference, 2020, Aalborg, Denmark. , (171-180). https://doi.org/10.5771/9783956507762-171
The concept of risk is widely misunderstood because of the different contexts in which it is used. This paper describes the development of an ontology of risk as a way of bett...

Athos: An Extensible DSL for Model Driven Traffic and Transport Simulation

Conference Proceeding
Hoffmann, B., Urquhart, N., Chalmers, K., & Guckert, M. (2020)
Athos: An Extensible DSL for Model Driven Traffic and Transport Simulation
Multi-agent systems may be considered appropriate tools for simulating complex systems such as those based around traffic and transportation networks. Modelling traffic partic...

Privacy-preserving Surveillance Methods using Homomorphic Encryption

Conference Proceeding
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020)
Privacy-preserving Surveillance Methods using Homomorphic Encryption. In ICISSP: Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (240-248). https://doi.org/10.5220/0008864902400248
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encrypt...

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach

Conference Proceeding
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020)
Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. In Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (289-298). https://doi.org/10.5220/0008902202890298
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high ...

Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms

Journal Article
Ghanami, A., Li, . J., Hawbani, A., & Al-Dubai, A. (in press)
Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms. Expert Systems with Applications, https://doi.org/10.1016/j.eswa.2020.114525
Initialization is the first and a major step in the implementation of evolutionary algorithms (EAs). Although there are many common general methods to initialize EAs such as t...

Novel Online Sequential Learning-based Adaptive Routing for Edge Software-Defined Vehicular Networks

Journal Article
Zhao, L., Zhao, W., Hawbani, A., Al-Dubai, A., Min, G., Zomaya, A., & Gong, C. (in press)
Novel Online Sequential Learning-based Adaptive Routing for Edge Software-Defined Vehicular Networks. IEEE Transactions on Wireless Communications,
To provide efficient networking services at the edge of Internet-of-Vehicles (IoV), Software-Defined Vehicular Network (SDVN) has been a promising technology to enable intelli...

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing

Journal Article
Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., …Papadopoulos, P. (2020)
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. Frontiers in Communications and Networks, https://doi.org/10.3389/frcmn.2020.583376
The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tr...

Computing degree apprenticeships: An opportunity to address gender imbalance in the IT sector?

Conference Proceeding
Smith, S., Taylor-Smith, E., Fabian, K., Barr, M., Berg, T., Cutting, D., …Zarb, M. (2020)
Computing degree apprenticeships: An opportunity to address gender imbalance in the IT sector?. In 2020 IEEE Frontiers in Education Conference (FIE). https://doi.org/10.1109/FIE44824.2020.9274144
This paper explores the potential for new work-based apprenticeship degrees to encourage more women into computing degrees and the IT sector. In the UK, women are currently un...

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

Journal Article
Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., & Buchanan, .. J. (2020)
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors, 20(22), https://doi.org/10.3390/s20226587
Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches ofte...