Items where Division is "Faculty of Computing, Engineering and the Built Environment > School of Computing and Digital Technology > Cyber Security" and Year is 2015

Up a level
Export as [feed] RSS
Group by: Creators | Item Type | No Grouping
Jump to: A | B | D | J | K | L | M | N | O | S | W | X
Number of items: 24.

A

Alcaide, Almudena and Palomar, Esther and González-Manzano, Lorena and Fuentes, José M. (2015) Privacy – aware average speed monitoring system for vehicular ad-hoc networks. IET Intelligent Transport Systems, 9 (3). pp. 293-305. ISSN 1751-956X

Amalio, Nuno and de Lara, Juan and Guerra, Esther (2015) FRAGMENTA: A Theory of Fragmentation for MDE. In: Model Driven Engineering Languages and Systems (MODELS), 2015 ACM/IEEE 18th International Conference on. IEEE, pp. 106-115. ISBN 978-1-4673-6908-4

B

Bashir, S. and Doolan, Daniel and Petrovski, Andrei (2015) ClusterNN: A hybrid classification approach to mobile activity recognition. In: Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia. ACM, pp. 263-267. ISBN 978-1-4503-3493-8

Bashir, S. and Doolan, Daniel and Petrovski, Andrei (2015) The Impact of Feature Vector Length on Activity Recognition Accuracy on Mobile Phone. In: Proceedings of the World Congress on Engineering 2015. World Congress on Engineering. ISBN 978-988-19253-4-3

Basurra, Shadi and De Vos, Marina and Padget, Julian and Ji, Yusheng and Lewis, Tim and Armour, Simon (2015) Energy efficient zone based routing protocol for MANETs. Ad Hoc Networks, 25 (A). pp. 16-37. ISSN 1570-8705

Basurra, Shadi and Huws, Halla and Jankovic, Ljubomir (2015) The use of optimisation in the calibration of building simulation models. In: Proceedings of 14th International Conference of the International Building Performance Simulation Association. IBPSA, pp. 2905-2912.

Basurra, Shadi and Jankovic, Ljubomir (2015) Bringing Building Simulation to a Wider Audience - A Web Based Simulation and Optimisation System. In: Proceedings of the 14th International Conference of the International Building Performance Simulation Association. IBPSA, pp. 83-90.

Bravo, I. and Vazquez, C. and Gardel, A. and Lazaro, J.L. and Palomar, Esther (2015) High level synthesis FPGA implementation of the Jacobi algorithm to solve the Eigen problem. Mathematical Problems in Engineering, 2015. ISSN 1024-123X

D

Doyle, Kenny and Dooly, Zeta and Kearney, Paul (2015) What’s So Unique About Cyber Security? In: 4th Cybersecurity & Privacy Innovation Forum, Brussels.

J

Jancovic, Peter and Kokuer, M. (2015) Acoustic recognition of multiple bird species based on penalised maximum likelihood. Signal Processing Letters. pp. 1585-1589.

K

Kearney, Paul (2015) Three reasons we really need innovation in cyber security. BT.

L

Leon, Marianthi and Doolan, Daniel and Laing, Richard and Malins, Julian and Salman, Huda (2015) Development of a Computational Design Application for Interactive Surfaces. In: Proceedings of the 2015 19th International Conference on Information Visualisation. ACM, Washington DC, pp. 506-511. ISBN 978-1-4673-7568-9

Li, X. and Hu, B. and Xu, T. and Shen, J. and Ratcliffe, M. (2015) A study on EEG-based brain electrical source of mild depressed subjects. Computer Methods and Programs in Biomedicine, 120 (3). pp. 135-141. ISSN 01692607 (ISSN)

Liang, Shao Fen and Taweel, A. and Miles, S. and Kovalchuk, Yevgeniya and Spiridou, Anastassia and Barratt, B. and Hoang, Uy and Crichton, Siobhan and Delaney, Brendan and Wolfe, Charles (2015) Semi Automated Transformation to OWL Formatted Files as an Approach to Data Integration: A Feasibility Study Using Environmental, Disease Register and Primary Care Clinical Data. Methods of Information in Medicine, 54 (1). pp. 32-40. ISSN 0026-1270

M

Mangut, Heman Awang and Al-Nemrat, Ameer and Benzaïd, Chafika and Tawil, Abdel-Rahman H. (2015) ARP Cache Poisoning Mitigation and Forensics Investigation. In: 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE. ISBN 978-1-4673-7952-6

Montasari, Reza and Peltola, Pekka (2015) Computer Forensic Analysis of Private Browsing Modes. In: Proceedings of International Conference on Global Security, Safety, and Sustainability. Springer, pp. 96-109. ISBN 978-3-319-23275-1

Montasari, Reza and Peltola, Pekka and Evans, David (2015) Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. In: Proceedings of International Conference on Global Security, Safety, and Sustainability. Springer, pp. 83-95. ISBN 978-3-319-23275-1

N

Naeem, Usman and Bashroush, Rabih and Anthony, Richard and Azam, Muhammad Awais and Tawil, Abdel-Rahman H. and Lee, Sin Wee and Wong, M.L. Dennis (2015) Activities of daily life recognition using process representation modelling to support intention analysis. International Journal of Pervasive Computing and Communications. ISSN 1742-7371

Newell, D. and Davies, P. and Austin, Ron and Moore, P. and Sharma, M. (2015) Models for an Intelligent Context-Aware Blended m-Learning System. In: Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops. Institute of Electrical and Electronics Engineers Inc., pp. 405-410. ISBN 9781479917747 (ISBN)

O

Okoye, Kingsley and Tawil, Abdel-Rahman H. and Naeem, Usman (2015) Semantic Process Mining Towards Discovery and Enhancement of Learning Model Analysis. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE. ISBN 978-1-4799-8937-9/15

Okoye, Kingsley and Tawil, Abdel-Rahman H. and Naeem, Usman and Lamine, Elyes (2015) A Semantic Reasoning Method Towards Ontological Model for Automated Learning Analysis. In: High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014 IEEE Intl Conf on. IEEE, pp. 49-60.

S

Suarez-Tangil, Guillermo and Palomar, Esther and Ribagorda, Arturo and Sanz, Ivan (2015) Providing SIEM systems with self-adaptation. Information Fusion, 21. pp. 145-158. ISSN 15662535

W

Ward, Dominic and Enderby, Sean and Athwal, Cham and Reiss, J.D. (2015) Real-time Excitation Based Binaural Loudness Meters. In: 18th International International Conference on Digital Audio Effects (DAFx-15), 2015, Trondheim, Norway.

X

Xiaowei, Huang (2015) Bounded Model Checking of Strategy Ability with Perfect Recall. Artificial Intelligence.

This list was generated on Thu Oct 21 18:01:36 2021 UTC.

Research

In this section...