Skip to main content

Research Repository

Advanced Search

Outputs (13)

Towards a smart learning environment for smart city governance (2016)
Conference Proceeding
Hammad, R., & Ludlow, D. (2016). Towards a smart learning environment for smart city governance. In UCC '16 Proceedings of the 9th International Conference on Utility and Cloud Computing (185-190). https://doi.org/10.1145/2996890.3007859

Copyright © 2016 ACM. Educational services provided to various stakeholders need to be actively developed to accommodate the diversity of learning models and to get the advantages of available resources (e.g. data) in smart cities governance. Despite... Read More about Towards a smart learning environment for smart city governance.

Towards a software framework for the autonomous Internet of Things (2016)
Conference Proceeding
Hernandez, M. E., Perez Hernandez, M., & Reiff-Marganiec, S. (2016). Towards a software framework for the autonomous Internet of Things. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (220-227). https://doi.org/10.1109/FiCloud.2016.39

IoT promises a world where Smart Objects (SO) are able to autonomously communicate and work together to make the (human) user's life easier. Popular approaches for development of IoT applications take for granted that on-object resources are evenly c... Read More about Towards a software framework for the autonomous Internet of Things.

Mobile App Collusions and Its Cyber Security Implications (2016)
Conference Proceeding
Arabo, A. (2016). Mobile App Collusions and Its Cyber Security Implications. In M. Qiu, L. Tao, & J. Niu (Eds.), 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (178-183). https://doi.org/10.1109/CSCloud.2016.9

© 2016 IEEE. The key focus in securing mobile software systems is substantiality intended in detecting and mitigating vulnerabilities in a single app or apps developed by the same individual. It fails to identify vulnerabilities that arise as a resul... Read More about Mobile App Collusions and Its Cyber Security Implications.

Foundations of fully dynamic group signatures (2016)
Conference Proceeding
Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., & Groth, J. (2016). Foundations of fully dynamic group signatures. In Applied Cryptography and Network Security (117-136). https://doi.org/10.1007/978-3-319-39555-5_7

Group signatures are a central cryptographic primitive that has received a considerable amount of attention from the cryptographic community. They allow members of a group to anonymously sign on behalf of the group. Membership is overseen by a design... Read More about Foundations of fully dynamic group signatures.

The ‘E’ in QWERTY: Musical expression with old computer interfaces (2016)
Conference Proceeding
Nash, C. (2016). The ‘E’ in QWERTY: Musical expression with old computer interfaces. In Proceedings of the International Conference on New Interfaces for Musical Expression (224-229). https://doi.org/10.5281/zenodo.1176088

This paper presents a development of the ubiquitous computer keyboard to capture velocity and other continuous musical properties, in order to support more expressive interaction with music software. Building on existing ‘virtual piano’ utilities, th... Read More about The ‘E’ in QWERTY: Musical expression with old computer interfaces.

Parallel BSO algorithm for association rules mining using master/worker paradigm (2016)
Conference Proceeding
Djenouri, Y., Bendjoudi, A., Djenouri, D., & Habbas, Z. (2016). Parallel BSO algorithm for association rules mining using master/worker paradigm. https://doi.org/10.1007/978-3-319-32149-3_25

© Springer International Publishing Switzerland 2016. The extraction of association rules from large transactional databases is considered in the paper using cluster architecture parallel computing. Motivated by both the successful sequential BSO-ARM... Read More about Parallel BSO algorithm for association rules mining using master/worker paradigm.

Short accountable ring signatures based on DDH (2016)
Conference Proceeding
Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J., & Petit, C. (2016). Short accountable ring signatures based on DDH. In Computer Security -- ESORICS 2015 (243-265). https://doi.org/10.1007/978-3-319-24174-6_13

Ring signatures and group signatures are prominent cryptographic primitives offering a combination of privacy and authentication. They enable individual users to anonymously sign messages on behalf of a group of users. In ring signatures, the group,... Read More about Short accountable ring signatures based on DDH.

Detection of malware and kernel-level rootkits in cloud computing environments (2016)
Conference Proceeding
Win, T. Y., Tianfield, H., & Mair, Q. (in press). Detection of malware and kernel-level rootkits in cloud computing environments. In 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (295-300). https://doi.org/10.1109/CSCloud.2015.54

Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has become increasingly sophisticated. This paper presents a novel malware and rookit detection system which protects the guests against different attacks. It... Read More about Detection of malware and kernel-level rootkits in cloud computing environments.

A repeatable framework for best fit cloud solution (2016)
Conference Proceeding
Ogunshile, E. K. A. (2016). A repeatable framework for best fit cloud solution. In D. Ferguson, V. M. Munoz, M. Helfert, & J. Cardoso (Eds.), Proceedings of the 6th International Conference on Cloud Computing and Services Science. , (194-205). https://doi.org/10.5220/0005808401940205

To respond to business challenges with agility, modern businesses have to evolve quickly to stay competitive. Unfortunately, in many situations, proliferation of heterogeneous Information Technology shifts act as a barrier to innovations instead of a... Read More about A repeatable framework for best fit cloud solution.

A big data analysis system for use in vehicular outdoor advertising (2016)
Conference Proceeding
Ogunshile, E. K. A. (2016). A big data analysis system for use in vehicular outdoor advertising. In J. Cardoso, D. Ferguson, V. M. Munoz, & M. Helfert (Eds.), Proceedings of the 6th International Conference on Cloud Computing and Services Science (319-328). https://doi.org/10.5220/0005900303190328

Outdoor advertising is an old industry and the only reliably growing advertising sector other than online advertising. However, for it to sustain this growth, media providers must supply a comparable means of tracking an advertisement’s effectiveness... Read More about A big data analysis system for use in vehicular outdoor advertising.