Department of Electronics, Computing and Mathematics


Latest research outputs

Sort by Date Title
An investigation of security trends in personal wireless networks
Liu, Lu, Stimpson, Thomas, Antonopoulos, Nikolaos, Ding, Zhijun and Zhan, Yongzhao 2013. An investigation of security trends in personal wireless networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-013-1386-3

Journal article

Analysis of HEp-2 images using MD-LBP and MAD-bagging
Schaefer, Gerald, Doshi, Niraj P., Zhu, Shao Ying and Hu, Qinghua 2014. Analysis of HEp-2 images using MD-LBP and MAD-bagging. IEEE. https://doi.org/10.1109/EMBC.2014.6944562

Conference item

Analytical tools for blockchain: review, taxonomy and open challenges.
Balaskas, Anastasios and Franqueira, Virginia N. L. 2018. Analytical tools for blockchain: review, taxonomy and open challenges. IEE Explore. https://doi.org/10.1109/CyberSecPODS.2018.8560672

Journal article

Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework
Ikram, Ahsan, Anjum, Ashiq, Hill, Richard, Antonopoulos, Nikolaos, Liu, Lu and Sotiriadis, Stelios 2013. Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3131

Journal article

Are training and education mutually exclusive?
Lane, Kit and Lewis, Simon P. 2015. Are training and education mutually exclusive?

Conference Presentation

Automated analysis of security requirements through risk-based argumentation
Yu, Yijun, Franqueira, Virginia N. L., Than Tun, Thein, Wieringa, Roel J. and Nuseibeh, Bashar 2015. Automated analysis of security requirements through risk-based argumentation. Journal of Systems and Software. https://doi.org/10.1016/j.jss.2015.04.065

Journal article

Automatic emotion perception using eye movement information for E-Healthcare systems.
Yang Wang, Zhao Iv and Yongjun Zheng 2018. Automatic emotion perception using eye movement information for E-Healthcare systems. Sensors. https://doi.org/10.3390/s18092826

Journal article

Autonomic trust reasoning enables misbehavior detection in OLSR
Adnane, Asma, de Sousa Júnior, Rafael Timóteo, Bidan, Christophe and Mé, Ludovic 2008. Autonomic trust reasoning enables misbehavior detection in OLSR. ”. In Proceedings of the 2008 ACM symposium on Applied computing (SAC '08). ACM. https://doi.org/10.1145/1363686.1364173

Journal article

Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes
Al Mutawa, Noora, Bryce, Joanne, Franqueira, Virginia N.L., Marrington, Andrew and Read, Janet C. 2018. Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes. Digital Investigation. https://doi.org/10.1016/j.diin.2018.12.003

Journal article

Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks
Mutawa, Noora Al, Bryce, Joanne, Franqueira, Virginia N. L. and Marrington, Andrew 2015. Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks. IEEE Computer Society. https://doi.org/10.1109/ARES.2015.49

Conference item

Big earth data: a comprehensive analysis of visualization analytics issues
Merritt, Patrick, Bi, Haixia, Davis, Bradley, Windmill, Christopher and Xue, Yong 2019. Big earth data: a comprehensive analysis of visualization analytics issues. Big Earth Data. 2 (4), pp. 321-350. https://doi.org/10.1080/20964471.2019.1576260

Journal article

Big-Data analytics and cloud computing: Theory, algorithms and applications
Hill, Richard, Trovati, Marcello, Liu, Lu, Anjum, Ashiq and Zhu, Shao Ying 2015. Big-Data analytics and cloud computing: Theory, algorithms and applications. Springer.

Book

Blockchain-Based Distributed Marketplace.
Kabi, Oliver R. and Franqueira, Virginia N. L. 2019. Blockchain-Based Distributed Marketplace. in: Springer Nature.

Book chapter

CCLBR: Congestion control-based load balanced routing in unstructured P2P systems
Shen, Xiang-Jun, Chang, Qing, Liu, Lu, Panneerselvam, J. and Zha, Zheng-Jun 2016. CCLBR: Congestion control-based load balanced routing in unstructured P2P systems. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2016.2558515

Journal article

Challenges of data provenance for cloud forensic investigations
Katilu, Victoria M., Franqueira, Virginia N. L. and Angelopoulou, Olga 2015. Challenges of data provenance for cloud forensic investigations. IEEE Computer Society. https://doi.org/10.1109/ARES.2015.54

Conference item

Cloud BI: Future of business intelligence in the Cloud
Al-Aqrabi, Hussain, Liu, Lu, Hill, Richard and Antonopoulos, Nikolaos 2014. Cloud BI: Future of business intelligence in the Cloud. Journal of Computer and System Sciences. https://doi.org/10.1016/j.jcss.2014.06.013

Journal article

Cloud forensics and security
Franqueira, Virginia N. L., Lopes, Raul, Jones, Andrew and Storer, Tim 2017. Cloud forensics and security. SpringerOpen.

Other

CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances
Li, Bo, Li, Jianxin and Liu, Lu 2015. CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3166

Journal article

Collaborative actuation of wireless sensor and actuator networks for the agriculture industry.
Bai, Xingzhen, Liu, Lu, Cao, Maoyong, Panneerselvam, J., Sun, Qiao and Wang, Haixia 2017. Collaborative actuation of wireless sensor and actuator networks for the agriculture industry. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2725342

Journal article

Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks.
Zhong, Hong, Huang, Bo, Cui, Jie, Xu, Yan and Liu, Lu 2017. Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2782672

Journal article

Contemporary analysis and architecture for a generic cloud-based sensor data management platform.
Emeakaroha, Vincent C., Fatema, Kaniz, Healy, Philip and Morrison, John P. 2015. Contemporary analysis and architecture for a generic cloud-based sensor data management platform. Sensors & Transducers.

Journal article

CyberGuarder: a virtualization security assurance architecture for green cloud computing
Li, Jianxin, Li, Bo, Wo, Tianyu, Hu, Chunming, Huai, Jinpeng, Liu, Lu and Lam, K.P. 2012. CyberGuarder: a virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2011.04.012

Journal article

CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment
Li, Jianxin, Jia, Yu, Liu, Lu and Wo, Tianyu 2011. CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2011.08.001

Journal article

Data aggregation in wireless sensor networks for lunar exploration
Zhai, Xiaojun and Vladimirova, Tanya 2015. Data aggregation in wireless sensor networks for lunar exploration. IEEE. https://doi.org/10.1109/EST.2015.9

Conference item

Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks.
Cui, Jie, Shao, Lili, Zhong, Hong, Xu, Yan and Liu, Lu 2017. Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-017-0581-5

Journal article

Data classification using the Dempster–Shafer method.
Chen, Qi, Whitbrook, Amanda, Aickelin, Uwe and Roadknight, Chris 2014. Data classification using the Dempster–Shafer method. Journal of Experimental & Theoretical Artificial Intelligence. https://doi.org/10.1080/0952813X.2014.886301

Journal article

Deep labeller: automatic bounding box generation for synthetic violence detection datasets
Nadeem, M., Kurugollu, F., Saravi, S., Atlam, H. and Franqueira, V. 2023. Deep labeller: automatic bounding box generation for synthetic violence detection datasets. Multimedia Tools and Applications. pp. 1-18. https://doi.org/10.1007/s11042-023-15621-5

Journal article

Design of trust based context aware routing protocol in vehicular networks
Ahmad, F. and Adnane, Asma 2015. Design of trust based context aware routing protocol in vehicular networks.

Conference item

Designing Big Data Analytics Undergraduate and Postgraduate Programmes for Employability
Self, Richard and Voorhis, Dave 2014. Designing Big Data Analytics Undergraduate and Postgraduate Programmes for Employability.

Conference item

Detecting compromised programs for embedded system applications
Zhai, Xiaojun, Appiah, Kofi, Ehsan, Shoaib, Cheung, Wah M, Howells, Gareth, Hu, Huosheng, Gu, Dongbing and McDonald-Maier, Klaus 2014. Detecting compromised programs for embedded system applications. in: Springer.

Book chapter

Distributed service integration for disaster monitoring sensor systems
Liu, Lu, Antonopoulos, Nikolaos, Xu, Jie, Webster, David and Wu, Kaigu 2011. Distributed service integration for disaster monitoring sensor systems. IET Communications. https://doi.org/10.1049/iet-com.2010.0630

Journal article

Distributed task rescheduling with time constraints for the optimization of total task allocations in a multirobot system
Turner, Joanna, Meng, Qinggang, Schaefer, Gerald, Whitbrook, Amanda and Soltoggio, Andrea 2017. Distributed task rescheduling with time constraints for the optimization of total task allocations in a multirobot system. IEEE Transactions on Cybernetics. https://doi.org/10.1109/TCYB.2017.2743164

Journal article

Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing
Liu, Zhenxing, Liu, Lu, Hardy, J., Anjum, Ashiq, Hill, Richard and Antonopoulos, Nikolaos 2012. Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications. https://doi.org/10.1186/2192-113X-1-3

Journal article

Dynamic authentication for cross-realm SOA-based business processes
Xu, Jie, Zhang, Dacheng, Li, Xianxian and Liu, Lu 2010. Dynamic authentication for cross-realm SOA-based business processes. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2010.33

Journal article

Dynamic resource discovery based on preference and movement pattern similarity for large-scale social internet of things
Li, Zhiyuan, Chen, Rulong, Liu, Lu and Min, Geyong 2015. Dynamic resource discovery based on preference and movement pattern similarity for large-scale social internet of things. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2015.2451138

Journal article

Dynamic service integration for reliable and sustainable capability provision
Liu, Lu, Xu, Jie, Russell, Duncan, Davies, John K., Webster, David, Luo, Zongyang and Venters, Colin 2010. Dynamic service integration for reliable and sustainable capability provision. International Journal of Systems Science. https://doi.org/10.1080/00207721003774736

Journal article

ECG encryption and identification based security solution on the Zynq SoC for connected health systems
Zhai, Xiaojun, Ait Si Ali, Amine, Amira, Abbes and Bensaali, Faycal 2017. ECG encryption and identification based security solution on the Zynq SoC for connected health systems. Journal of Parallel and Distributed Computing. https://doi.org/10.1016/j.jpdc.2016.12.016

Journal article

ECG security identification system on the Zynq SoC Platform
Zhai, Xiaojun, Amira, Abbes and Bensaali, Faycal 2015. ECG security identification system on the Zynq SoC Platform. IEEE. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.174

Conference item

Editorial: Special issue on dependable peer-to-peer systems
Liu, Lu and Xu, Jie 1931. Editorial: Special issue on dependable peer-to-peer systems. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-009-0065-3

Journal article

Efficient and scalable search on scale-free P2P networks
Liu, Lu, Xu, Jie, Russell, Duncan, Townend, Paul and Webster, David 2009. Efficient and scalable search on scale-free P2P networks. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-008-0023-5

Journal article