Skip to main content

Research Repository

Advanced Search

Outputs (50)

Visualizing the insider threat: Challenges and tools for identifying malicious user activity (2015)
Presentation / Conference Contribution

One of the greatest challenges for managing organisational cyber security is the threat that comes from those who operate within the organisation. With entitled access and knowledge of organisational processes, insiders who choose to attack have the... Read More about Visualizing the insider threat: Challenges and tools for identifying malicious user activity.

Energy harvesting aware relay node addition for power-efficient coverage in wireless sensor networks (2015)
Presentation / Conference Contribution

© 2015 IEEE. This paper deals with power-efficient coverage in wireless sensor networks (WSN) by taking advantage of energy-harvesting capabilities. A general scenario is considered for deployed networks with two types of sensor nodes, harvesting ena... Read More about Energy harvesting aware relay node addition for power-efficient coverage in wireless sensor networks.