Skip to main content

Research Repository

Advanced Search

Outputs (59)

Threats on the horizon: Understanding security threats in the era of cyber-physical systems (2019)
Journal Article
Walker-Roberts, S., Hammoudeh, M., Aldabbas, O., Aydin, M., & Dehghantanha, A. (2020). Threats on the horizon: Understanding security threats in the era of cyber-physical systems. Journal of Supercomputing, https://doi.org/10.1007/s11227-019-03028-9

Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were made possible by higher integration of physical and digital elements. In today's pervasive cyber-physical systems, connecting more devices introduces new vuln... Read More about Threats on the horizon: Understanding security threats in the era of cyber-physical systems.

Identifying the origins of extreme rainfall using storm track classification (2019)
Journal Article
Barnes, A. P., Santos, M. S., Garijo, C., Mediero, L., Prosdocimi, I., McCullen, N., & Kjeldsen, T. R. (2020). Identifying the origins of extreme rainfall using storm track classification. Journal of Hydroinformatics, 22(2), 296-309. https://doi.org/10.2166/hydro.2019.164

Identifying patterns in data relating to extreme rainfall is important for classifying and estimating rainfall and flood frequency distributions routinely used in civil engineering design and flood management. This study demonstrates the novel use of s... Read More about Identifying the origins of extreme rainfall using storm track classification.

Anomaly detection using pattern-of-life visual metaphors (2019)
Journal Article
Happa, J., Bashford-Rogers, T., Agrafiotis, I., Goldsmith, M., & Creese, S. (2019). Anomaly detection using pattern-of-life visual metaphors. IEEE Access, 7, 154018-154034. https://doi.org/10.1109/ACCESS.2019.2948490

Complex dependencies exist across the technology estate, users and purposes of machines. This can make it difficult to efficiently detect attacks. Visualization to date is mainly used to communicate patterns of raw logs, or to visualize the output of... Read More about Anomaly detection using pattern-of-life visual metaphors.

A honeybees-inspired heuristic algorithm for numerical optimisation (2019)
Journal Article
Dugenci, M., & Aydin, M. E. (2020). A honeybees-inspired heuristic algorithm for numerical optimisation. Neural Computing and Applications, 32, 12311–12325. https://doi.org/10.1007/s00521-019-04533-x

© 2019, The Author(s). Swarm intelligence is all about developing collective behaviours to solve complex, ill-structured and large-scale problems. Efficiency in collective behaviours depends on how to harmonise the individual contributors so that a c... Read More about A honeybees-inspired heuristic algorithm for numerical optimisation.

A comparison of reinforcement learning algorithms in fairness-oriented OFDMA schedulers (2019)
Journal Article
Comşa, I., Zhang, S., Aydin, M., Kuonen, P., Trestian, R., & Ghinea, G. (2019). A comparison of reinforcement learning algorithms in fairness-oriented OFDMA schedulers. Information, 10(10), 315. https://doi.org/10.3390/info10100315

Due to large-scale control problems in 5G access networks, the complexity of radio resource management is expected to increase significantly. Reinforcement learning is seen as a promising solution that can enable intelligent decision-making and reduc... Read More about A comparison of reinforcement learning algorithms in fairness-oriented OFDMA schedulers.

Electrical Properties of Solvated Tectomers: Toward Zettascale Computing (2019)
Journal Article
Chiolerio, A., Draper, T. C., Jost, C., & Adamatzky, A. (2019). Electrical Properties of Solvated Tectomers: Toward Zettascale Computing. Advanced Electronic Materials, 5(12), Article 1900202. https://doi.org/10.1002/aelm.201900202

© 2019 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim Liquid cybernetic systems with embodied intelligence solutions mimicking biologic systems, in response to future increasingly distributed sensing and the resulting data to be managed, has been propo... Read More about Electrical Properties of Solvated Tectomers: Toward Zettascale Computing.

Neuromorphic liquid marbles with aqueous carbon nanotube cores (2019)
Journal Article
Mayne, R., Draper, T. C., Phillips, N., Whiting, J. G. H., Weerasekera, R., Fullarton, C., …Adamatzky, A. (2019). Neuromorphic liquid marbles with aqueous carbon nanotube cores. Langmuir, 35, 13182-13188. https://doi.org/10.1021/acs.langmuir.9b02552

Neuromorphic computing devices attempt to emulate features of biological nervous systems through mimicking the properties of synapses, towards implementing the emergent properties of their counterparts, such as learning. Inspired by recent advances i... Read More about Neuromorphic liquid marbles with aqueous carbon nanotube cores.

Marimo machines: Oscillators, biosensors and actuators (2019)
Journal Article
Phillips, N., Draper, T. C., Mayne, R., & Adamatzky, A. (2019). Marimo machines: Oscillators, biosensors and actuators. Journal of Biological Engineering, 13(1), Article 72. https://doi.org/10.1186/s13036-019-0200-5

Background The green algae balls (Aegagropila linnaei), known as Marimo, are large spherical colonies of live photosynthetic filaments, formed by rolling water currents in freshwater lakes. Photosynthesis therein produces gas bubbles that can attach... Read More about Marimo machines: Oscillators, biosensors and actuators.

Symmetry degree measurement and its applications to anomaly detection (2019)
Journal Article
Qin, T., Liu, Z., Wang, P., Li, S., Guan, X., & Gao, L. (2019). Symmetry degree measurement and its applications to anomaly detection. IEEE Transactions on Information Forensics and Security, 15, 1040-1055. https://doi.org/10.1109/TIFS.2019.2933731

IEEE Anomaly detection is an important technique used to identify patterns of unusual network behavior and keep the network under control. Today, network attacks are increasing in terms of both their number and sophistication. To avoid causing signif... Read More about Symmetry degree measurement and its applications to anomaly detection.