Department of Electronics, Computing and Mathematics


Latest research outputs

Sort by Date Title
A novel context-based risk assessment approach in vehicular networks
Ahmad, F. and Adnane, Asma 2016. A novel context-based risk assessment approach in vehicular networks. IEEE. https://doi.org/10.1109/WAINA.2016.60

Conference item

Evaluation platform for trust in vehicular ad hoc networks
Ahmad, F. and Adnane, Asma 2016. Evaluation platform for trust in vehicular ad hoc networks.

Other

Introduction to special issue on risk and trust in embedded critical systems
Rossebø, Judith E. Y., Houmb, Siv H., Georg, Geri, Franqueira, Virginia N. L. and Serpanos, Dimitrios 2014. Introduction to special issue on risk and trust in embedded critical systems. ACM Transactions on Embedded Computing Systems. https://doi.org/10.1145/2659008

Journal article

Real-time optical character recognition on field programmable gate array for automatic number plate recognition system
Sotudeh, Reza, Zhai, Xiaojun and Bensaali, Faycal 2013. Real-time optical character recognition on field programmable gate array for automatic number plate recognition system. IET Circuits, Devices & Systems. https://doi.org/10.1049/iet-cds.2012.0339

Journal article

Exploring ICMetrics to detect abnormal program behaviour on embedded devices
Zhai, Xiaojun, Ehsan, Shoaib, Howells, Gareth, Gu, Dongbing, McDonald-Maier, Klaus, Appiah, Kofi and Hu, Huosheng 2015. Exploring ICMetrics to detect abnormal program behaviour on embedded devices. Journal of Systems Architecture. https://doi.org/10.1016/j.sysarc.2015.07.007

Journal article

Efficient computation of hashes
Lopes, Raul, Franqueira, Virginia N. L. and Hobson, Peter 2014. Efficient computation of hashes. Journal of Physics: Conference Series. https://doi.org/10.1088/1742-6596/513/3/032042

Journal article

Field programmable gate arrays-based number plate binarization and adjustment for automatic number plate recognition systems
Zhai, Xiaojun, Bensaali, Faycal and Sotudeh, Reza 2013. Field programmable gate arrays-based number plate binarization and adjustment for automatic number plate recognition systems. Journal of Electronic Imaging. https://doi.org/10.1117/1.JEI.22.1.013009

Journal article

Improved number plate localisation algorithm and its efficient field programmable gate arrays implementation
Zhai, Xiaojun, Ramalingam, Soodamani and Bensaali, Faycal 2013. Improved number plate localisation algorithm and its efficient field programmable gate arrays implementation. IET Circuits, Devices & Systems. https://doi.org/10.1049/iet-cds.2012.0064

Journal article

Improved number plate character segmentation algorithm and its efficient FPGA implementation
Zhai, Xiaojun and Bensaali, Faycal 2012. Improved number plate character segmentation algorithm and its efficient FPGA implementation. Journal of Real-Time Image Processing. https://doi.org/10.1007/s11554-012-0258-5

Journal article

Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks
Mutawa, Noora Al, Bryce, Joanne, Franqueira, Virginia N. L. and Marrington, Andrew 2015. Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks. IEEE Computer Society. https://doi.org/10.1109/ARES.2015.49

Conference item

Challenges of data provenance for cloud forensic investigations
Katilu, Victoria M., Franqueira, Virginia N. L. and Angelopoulou, Olga 2015. Challenges of data provenance for cloud forensic investigations. IEEE Computer Society. https://doi.org/10.1109/ARES.2015.54

Conference item

A method for detecting abnormal program behavior on embedded devices
Zhai, Xiaojun, Ehsan, Shoaib, Howells, Gareth, Dongbing, Gu, McDonald-Maier, Klaus, Appiah, Kofi and Hu, Huosheng 2015. A method for detecting abnormal program behavior on embedded devices. IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2015.2422674

Journal article

Rel
Voorhis, Dave 2004. Rel.

Software

Planning in the Cloud: Massively Parallel Planning
Voorhis, Dave and Thompson, Tommy 2014. Planning in the Cloud: Massively Parallel Planning. IEEE Computer Society. https://doi.org/10.1109/UCC.2014.67

Conference item

Designing Big Data Analytics Undergraduate and Postgraduate Programmes for Employability
Self, Richard and Voorhis, Dave 2014. Designing Big Data Analytics Undergraduate and Postgraduate Programmes for Employability.

Conference item

Novel Approaches to Learning and Teaching SAS-based Analytics
Self, Richard and Voorhis, Dave 2013. Novel Approaches to Learning and Teaching SAS-based Analytics. BDA EdCon.

Conference item

Feature Selection in the Corrected KDD-dataset
Zargari, Shahrzad A. and Voorhis, Dave 2012. Feature Selection in the Corrected KDD-dataset. IEEE Computer Society.

Conference item

Automated analysis of security requirements through risk-based argumentation
Yu, Yijun, Franqueira, Virginia N. L., Than Tun, Thein, Wieringa, Roel J. and Nuseibeh, Bashar 2015. Automated analysis of security requirements through risk-based argumentation. Journal of Systems and Software. https://doi.org/10.1016/j.jss.2015.04.065

Journal article

Evaluation criterias for trust management in Vehicular Ad-hoc Networks (VANETs)
Alriyami, Qasim, Adnane, Asma and Smith, Anthony 2014. Evaluation criterias for trust management in Vehicular Ad-hoc Networks (VANETs). IEEE.

Conference item

Vehicular cloud networks: Architecture, applications and security issues
Ahmad, F., Kazim, M., Adnane, Asma and Abir, Awad 2015. Vehicular cloud networks: Architecture, applications and security issues. IEEE. https://doi.org/10.1109/UCC.2015.101

Conference item

A survey on top security threats in cloud computing
Kazim, M. and Zhu, Shao Ying 2015. A survey on top security threats in cloud computing. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060316#sthash.hDOJaK6L.dpuf

Journal article

Vehicular cloud networks: Architecture and security
Ahmad, F., Kazim, M. and Adnane, Asma 2015. Vehicular cloud networks: Architecture and security. in: Springer.

Book chapter

Design of trust based context aware routing protocol in vehicular networks
Ahmad, F. and Adnane, Asma 2015. Design of trust based context aware routing protocol in vehicular networks.

Conference item

A critical review of the routing protocols in opportunistic networks
Panneerselvam, J., Atojoko, Anthony, Smith, K., Liu, Lu and Antonopoulos, Nikolaos 2014. A critical review of the routing protocols in opportunistic networks. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. https://doi.org/10.4108/inis.1.1.e6

Journal article

iMIG: Toward an adaptive live migration method for KVM virtual machines
Li, Jianxin, Zhao, Jieyu Zhao, Li, Yi, Cui, Lei, Li, Bo, Liu, Lu and Panneerselvam, J. 2014. iMIG: Toward an adaptive live migration method for KVM virtual machines. The Computer Journal. https://doi.org/10.1093/comjnl/bxu065

Journal article

Achieving dynamic load balancing through mobile agents in small world P2P networks
Shen, Xiang-Jun, Liu, Lu, Zha, Zheng-Jun, Gu, Pei-Ying, Jiang, Zhong-Qiu, Chen, Ji-Ming and Panneerselvam, J. 2014. Achieving dynamic load balancing through mobile agents in small world P2P networks. Computer Networks. https://doi.org/10.1016/j.comnet.2014.05.003

Journal article

Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework
Ikram, Ahsan, Anjum, Ashiq, Hill, Richard, Antonopoulos, Nikolaos, Liu, Lu and Sotiriadis, Stelios 2013. Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3131

Journal article

Trust-Based countermeasures for securing OLSR protocol
Adnane, Asma, Bidan, Christophe and de Sousa Júnior, Rafael Timóteo 2009. Trust-Based countermeasures for securing OLSR protocol. ," IEEE International Conference on Computational Science and Engineering. https://doi.org/10.1109/CSE.2009.130

Journal article

Autonomic trust reasoning enables misbehavior detection in OLSR
Adnane, Asma, de Sousa Júnior, Rafael Timóteo, Bidan, Christophe and Mé, Ludovic 2008. Autonomic trust reasoning enables misbehavior detection in OLSR. ”. In Proceedings of the 2008 ACM symposium on Applied computing (SAC '08). ACM. https://doi.org/10.1145/1363686.1364173

Journal article

Multipath optimized link state routing for mobile ad hoc networks
Yi, Jiazi, Adnane, Asma, David, Sylvain and Parrein, Benoît 2011. Multipath optimized link state routing for mobile ad hoc networks. ad hoc networks. https://doi.org/10.1016/j.adhoc.2010.04.007

Journal article

Trust-based security for the OLSR routing protocol
Adnane, Asma, Bidan, Christophe and de Sousa Júnior, Rafael Timóteo 2013. Trust-based security for the OLSR routing protocol. Computer Communications. https://doi.org/10.1016/j.comcom.2013.04.003

Journal article

Towards a generalized theory of low-frequency sound source localization
Hill, Adam J., Lewis, Simon P. and Hawksford, Malcolm O. J. 2012. Towards a generalized theory of low-frequency sound source localization.

Journal article

Energy performance assessment of virtualization technologies using small environmental monitoring sensors
Liu, Lu, Masfary, Osama and Antonopoulos, Nikolaos 2012. Energy performance assessment of virtualization technologies using small environmental monitoring sensors. Sensors. https://doi.org/10.3390/s120506610

Journal article

Adaptive service discovery on service-oriented and spontaneous sensor systems
Liu, Lu, Xu, Jie, Antonopoulos, Nikolaos, Li, Jianxin and Wu, Kaigu 2012. Adaptive service discovery on service-oriented and spontaneous sensor systems. Adhoc & Sensor Wireless Networks.

Journal article

Dynamic service integration for reliable and sustainable capability provision
Liu, Lu, Xu, Jie, Russell, Duncan, Davies, John K., Webster, David, Luo, Zongyang and Venters, Colin 2010. Dynamic service integration for reliable and sustainable capability provision. International Journal of Systems Science. https://doi.org/10.1080/00207721003774736

Journal article

Fault-tolerant peer-to-peer search on small-world networks
Liu, Lu, Antonopoulos, Nikolaos and Mackin, Stephen 2007. Fault-tolerant peer-to-peer search on small-world networks. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2007.03.002

Journal article

Managing peer-to-peer networks with human tactics in social interactions
Liu, Lu, Antonopoulos, Nikolaos and Mackin, Stephen 2007. Managing peer-to-peer networks with human tactics in social interactions. The Journal of Supercomputing. https://doi.org/10.1007/s11227-007-0156-y

Journal article

Distributed service integration for disaster monitoring sensor systems
Liu, Lu, Antonopoulos, Nikolaos, Xu, Jie, Webster, David and Wu, Kaigu 2011. Distributed service integration for disaster monitoring sensor systems. IET Communications. https://doi.org/10.1049/iet-com.2010.0630

Journal article

CyberGuarder: a virtualization security assurance architecture for green cloud computing
Li, Jianxin, Li, Bo, Wo, Tianyu, Hu, Chunming, Huai, Jinpeng, Liu, Lu and Lam, K.P. 2012. CyberGuarder: a virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2011.04.012

Journal article

Editorial: Special issue on dependable peer-to-peer systems
Liu, Lu and Xu, Jie 1931. Editorial: Special issue on dependable peer-to-peer systems. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-009-0065-3

Journal article