Department of Electronics, Computing and Mathematics
Type | Department |
---|---|
Faculty | College of Science and Engineering |
Latest research outputs
Sort by Date Title
A novel context-based risk assessment approach in vehicular networks
Ahmad, F. and Adnane, Asma 2016. A novel context-based risk assessment approach in vehicular networks. IEEE. https://doi.org/10.1109/WAINA.2016.60Conference item
Evaluation platform for trust in vehicular ad hoc networks
Ahmad, F. and Adnane, Asma 2016. Evaluation platform for trust in vehicular ad hoc networks.Other
Introduction to special issue on risk and trust in embedded critical systems
Rossebø, Judith E. Y., Houmb, Siv H., Georg, Geri, Franqueira, Virginia N. L. and Serpanos, Dimitrios 2014. Introduction to special issue on risk and trust in embedded critical systems. ACM Transactions on Embedded Computing Systems. https://doi.org/10.1145/2659008Journal article
Real-time optical character recognition on field programmable gate array for automatic number plate recognition system
Sotudeh, Reza, Zhai, Xiaojun and Bensaali, Faycal 2013. Real-time optical character recognition on field programmable gate array for automatic number plate recognition system. IET Circuits, Devices & Systems. https://doi.org/10.1049/iet-cds.2012.0339Journal article
Exploring ICMetrics to detect abnormal program behaviour on embedded devices
Zhai, Xiaojun, Ehsan, Shoaib, Howells, Gareth, Gu, Dongbing, McDonald-Maier, Klaus, Appiah, Kofi and Hu, Huosheng 2015. Exploring ICMetrics to detect abnormal program behaviour on embedded devices. Journal of Systems Architecture. https://doi.org/10.1016/j.sysarc.2015.07.007Journal article
Efficient computation of hashes
Lopes, Raul, Franqueira, Virginia N. L. and Hobson, Peter 2014. Efficient computation of hashes. Journal of Physics: Conference Series. https://doi.org/10.1088/1742-6596/513/3/032042Journal article
Field programmable gate arrays-based number plate binarization and adjustment for automatic number plate recognition systems
Zhai, Xiaojun, Bensaali, Faycal and Sotudeh, Reza 2013. Field programmable gate arrays-based number plate binarization and adjustment for automatic number plate recognition systems. Journal of Electronic Imaging. https://doi.org/10.1117/1.JEI.22.1.013009Journal article
Improved number plate localisation algorithm and its efficient field programmable gate arrays implementation
Zhai, Xiaojun, Ramalingam, Soodamani and Bensaali, Faycal 2013. Improved number plate localisation algorithm and its efficient field programmable gate arrays implementation. IET Circuits, Devices & Systems. https://doi.org/10.1049/iet-cds.2012.0064Journal article
Improved number plate character segmentation algorithm and its efficient FPGA implementation
Zhai, Xiaojun and Bensaali, Faycal 2012. Improved number plate character segmentation algorithm and its efficient FPGA implementation. Journal of Real-Time Image Processing. https://doi.org/10.1007/s11554-012-0258-5Journal article
Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks
Mutawa, Noora Al, Bryce, Joanne, Franqueira, Virginia N. L. and Marrington, Andrew 2015. Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks. IEEE Computer Society. https://doi.org/10.1109/ARES.2015.49Conference item
Challenges of data provenance for cloud forensic investigations
Katilu, Victoria M., Franqueira, Virginia N. L. and Angelopoulou, Olga 2015. Challenges of data provenance for cloud forensic investigations. IEEE Computer Society. https://doi.org/10.1109/ARES.2015.54Conference item
A method for detecting abnormal program behavior on embedded devices
Zhai, Xiaojun, Ehsan, Shoaib, Howells, Gareth, Dongbing, Gu, McDonald-Maier, Klaus, Appiah, Kofi and Hu, Huosheng 2015. A method for detecting abnormal program behavior on embedded devices. IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2015.2422674Journal article
Rel
Voorhis, Dave 2004. Rel.Software
Planning in the Cloud: Massively Parallel Planning
Voorhis, Dave and Thompson, Tommy 2014. Planning in the Cloud: Massively Parallel Planning. IEEE Computer Society. https://doi.org/10.1109/UCC.2014.67Conference item
Designing Big Data Analytics Undergraduate and Postgraduate Programmes for Employability
Self, Richard and Voorhis, Dave 2014. Designing Big Data Analytics Undergraduate and Postgraduate Programmes for Employability.Conference item
Novel Approaches to Learning and Teaching SAS-based Analytics
Self, Richard and Voorhis, Dave 2013. Novel Approaches to Learning and Teaching SAS-based Analytics. BDA EdCon.Conference item
Feature Selection in the Corrected KDD-dataset
Zargari, Shahrzad A. and Voorhis, Dave 2012. Feature Selection in the Corrected KDD-dataset. IEEE Computer Society.Conference item
Automated analysis of security requirements through risk-based argumentation
Yu, Yijun, Franqueira, Virginia N. L., Than Tun, Thein, Wieringa, Roel J. and Nuseibeh, Bashar 2015. Automated analysis of security requirements through risk-based argumentation. Journal of Systems and Software. https://doi.org/10.1016/j.jss.2015.04.065Journal article
Evaluation criterias for trust management in Vehicular Ad-hoc Networks (VANETs)
Alriyami, Qasim, Adnane, Asma and Smith, Anthony 2014. Evaluation criterias for trust management in Vehicular Ad-hoc Networks (VANETs). IEEE.Conference item
Vehicular cloud networks: Architecture, applications and security issues
Ahmad, F., Kazim, M., Adnane, Asma and Abir, Awad 2015. Vehicular cloud networks: Architecture, applications and security issues. IEEE. https://doi.org/10.1109/UCC.2015.101Conference item
A survey on top security threats in cloud computing
Kazim, M. and Zhu, Shao Ying 2015. A survey on top security threats in cloud computing. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060316#sthash.hDOJaK6L.dpufJournal article
Vehicular cloud networks: Architecture and security
Ahmad, F., Kazim, M. and Adnane, Asma 2015. Vehicular cloud networks: Architecture and security. in: Springer.Book chapter
Design of trust based context aware routing protocol in vehicular networks
Ahmad, F. and Adnane, Asma 2015. Design of trust based context aware routing protocol in vehicular networks.Conference item
A critical review of the routing protocols in opportunistic networks
Panneerselvam, J., Atojoko, Anthony, Smith, K., Liu, Lu and Antonopoulos, Nikolaos 2014. A critical review of the routing protocols in opportunistic networks. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. https://doi.org/10.4108/inis.1.1.e6Journal article
iMIG: Toward an adaptive live migration method for KVM virtual machines
Li, Jianxin, Zhao, Jieyu Zhao, Li, Yi, Cui, Lei, Li, Bo, Liu, Lu and Panneerselvam, J. 2014. iMIG: Toward an adaptive live migration method for KVM virtual machines. The Computer Journal. https://doi.org/10.1093/comjnl/bxu065Journal article
Achieving dynamic load balancing through mobile agents in small world P2P networks
Shen, Xiang-Jun, Liu, Lu, Zha, Zheng-Jun, Gu, Pei-Ying, Jiang, Zhong-Qiu, Chen, Ji-Ming and Panneerselvam, J. 2014. Achieving dynamic load balancing through mobile agents in small world P2P networks. Computer Networks. https://doi.org/10.1016/j.comnet.2014.05.003Journal article
Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework
Ikram, Ahsan, Anjum, Ashiq, Hill, Richard, Antonopoulos, Nikolaos, Liu, Lu and Sotiriadis, Stelios 2013. Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3131Journal article
Trust-Based countermeasures for securing OLSR protocol
Adnane, Asma, Bidan, Christophe and de Sousa Júnior, Rafael Timóteo 2009. Trust-Based countermeasures for securing OLSR protocol. ," IEEE International Conference on Computational Science and Engineering. https://doi.org/10.1109/CSE.2009.130Journal article
Autonomic trust reasoning enables misbehavior detection in OLSR
Adnane, Asma, de Sousa Júnior, Rafael Timóteo, Bidan, Christophe and Mé, Ludovic 2008. Autonomic trust reasoning enables misbehavior detection in OLSR. ”. In Proceedings of the 2008 ACM symposium on Applied computing (SAC '08). ACM. https://doi.org/10.1145/1363686.1364173Journal article
Multipath optimized link state routing for mobile ad hoc networks
Yi, Jiazi, Adnane, Asma, David, Sylvain and Parrein, Benoît 2011. Multipath optimized link state routing for mobile ad hoc networks. ad hoc networks. https://doi.org/10.1016/j.adhoc.2010.04.007Journal article
Trust-based security for the OLSR routing protocol
Adnane, Asma, Bidan, Christophe and de Sousa Júnior, Rafael Timóteo 2013. Trust-based security for the OLSR routing protocol. Computer Communications. https://doi.org/10.1016/j.comcom.2013.04.003Journal article
Towards a generalized theory of low-frequency sound source localization
Hill, Adam J., Lewis, Simon P. and Hawksford, Malcolm O. J. 2012. Towards a generalized theory of low-frequency sound source localization.Journal article
Energy performance assessment of virtualization technologies using small environmental monitoring sensors
Liu, Lu, Masfary, Osama and Antonopoulos, Nikolaos 2012. Energy performance assessment of virtualization technologies using small environmental monitoring sensors. Sensors. https://doi.org/10.3390/s120506610Journal article
Adaptive service discovery on service-oriented and spontaneous sensor systems
Liu, Lu, Xu, Jie, Antonopoulos, Nikolaos, Li, Jianxin and Wu, Kaigu 2012. Adaptive service discovery on service-oriented and spontaneous sensor systems. Adhoc & Sensor Wireless Networks.Journal article
Dynamic service integration for reliable and sustainable capability provision
Liu, Lu, Xu, Jie, Russell, Duncan, Davies, John K., Webster, David, Luo, Zongyang and Venters, Colin 2010. Dynamic service integration for reliable and sustainable capability provision. International Journal of Systems Science. https://doi.org/10.1080/00207721003774736Journal article
Fault-tolerant peer-to-peer search on small-world networks
Liu, Lu, Antonopoulos, Nikolaos and Mackin, Stephen 2007. Fault-tolerant peer-to-peer search on small-world networks. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2007.03.002Journal article
Managing peer-to-peer networks with human tactics in social interactions
Liu, Lu, Antonopoulos, Nikolaos and Mackin, Stephen 2007. Managing peer-to-peer networks with human tactics in social interactions. The Journal of Supercomputing. https://doi.org/10.1007/s11227-007-0156-yJournal article
Distributed service integration for disaster monitoring sensor systems
Liu, Lu, Antonopoulos, Nikolaos, Xu, Jie, Webster, David and Wu, Kaigu 2011. Distributed service integration for disaster monitoring sensor systems. IET Communications. https://doi.org/10.1049/iet-com.2010.0630Journal article
CyberGuarder: a virtualization security assurance architecture for green cloud computing
Li, Jianxin, Li, Bo, Wo, Tianyu, Hu, Chunming, Huai, Jinpeng, Liu, Lu and Lam, K.P. 2012. CyberGuarder: a virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2011.04.012Journal article
Editorial: Special issue on dependable peer-to-peer systems
Liu, Lu and Xu, Jie 1931. Editorial: Special issue on dependable peer-to-peer systems. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-009-0065-3Journal article
11320
total views3571
total downloads457
views this month168
downloads this month