Date


School

Themes

Output Type

Download Available

23 results

Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks

Presentation / Conference
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June)
Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Paper presented at The 16th IEEE International Conference on Smart City (IEEE SmartCity-2018), Exeter, UK
In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional uneq...

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...

Mobile User Authentication System for E-commerce Applications.

Presentation / Conference
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June)
Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014, Bejaia, Algeria
E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is ...

The Risks and Opportunities of Mobile Working within Cloud Environments.

Presentation / Conference
Buchanan, W. J., & Smales, A. (2014, February)
The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working, Edinburgh
This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mo...

Building a new nation: risk, goverance and trust.

Presentation / Conference
Buchanan, W. J. (2013, January)
Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.

Towards a new health and social care information sharing architecture.

Presentation / Conference
Buchanan, W. J. (2012, May)
Towards a new health and social care information sharing architecture
This presentation outlines the integration of the safi.re information sharing architecture.

PIR sensor array for hand motion recognition

Presentation / Conference
Wojtczuk, P., Armitage, A., Binnie, D., & Chamberlain, T. (2011, August)
PIR sensor array for hand motion recognition. Paper presented at SensorDevices 2011, Nice, France
Abstract—In this paper we present our work towards a hand gesture recognition system realised with a passive thermal infrared sensor array. In contrast with the majority of re...

Intelligence information sharing between the police and their community partners.

Presentation / Conference
Scott, R., Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, June)
Intelligence information sharing between the police and their community partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University
This presentation will show a newly developed system for information, and will outline the three "R"s involved in information sharing: RISK. Identify and managing risks to ens...

FPGA implementation of hot spot detection in infrared video.

Presentation / Conference
Walczyk, R., Armitage, A., & Binnie, D. (2010, June)
FPGA implementation of hot spot detection in infrared video. Paper presented at IET Irish Systems & Signals Conference, Cork
This paper describes a Hardware Description Language (HDL) based fully customizable module for real-time infrared (IR) hot spot detection and feature extraction from a video s...

The VoIP intrusion detection through a LVQ-based neural network.

Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...