Skip to main content

Research Repository

Advanced Search

All Outputs (7)

Privacy based triage of suspicious activity reports using offline large language models (2024)
Book Chapter
Legg, P., Ryder, N., Bourton, S., Johnson, D., & Walker, R. (in press). Privacy based triage of suspicious activity reports using offline large language models. In Advancements in Cyber Crime Investigations and Modern Data Analytics. CRC Press / Taylor and Francis

Suspicious Activity Reports (SAR) form a vital part of incident response and case management for the investigation of known or suspected money laundering. However, those submitting SARs, and those tasked with analysing SARs, often find the task overw... Read More about Privacy based triage of suspicious activity reports using offline large language models.

Towards freezing global warming (2023)
Book Chapter
Phillips, N., Ayling, S. M., Ratcliffe, N. M., de Lacy Costello, B., Foord, W., Draper, T. C., …Razzaque, J. (in press). Towards freezing global warming. In Climate Change Mitigation and Adaptation in Practice. Springer (part of Springer Nature)

Numerous policies have been proposed to mitigate the problem of climate change as reducing emissions alone will not be sufficient. Carbon Capture and Storage (CCS), which captures carbon at the source, and Negative Emissions Technologies (NETs), whic... Read More about Towards freezing global warming.

Smooth change: Moving from monolithic to microservices with flexible methods (2023)
Book Chapter
Aljawawdeh, H., Abuezhayeh, S., Qaddoumi, E., & Maghrabi, L. (2023). Smooth change: Moving from monolithic to microservices with flexible methods. In A. Mahmood, & A. Hannoon (Eds.), Artificial Intelligence, Internet of Things, and Society 5.0 (559-572). Springer. https://doi.org/10.1007/978-3-031-43300-9_46

This paper presents a comprehensive approach for migrating legacy monolithic systems to microservices architectures, focusing on adaptive synchronization techniques to streamline the process. Our proposed methodology enhances software systems’ scalab... Read More about Smooth change: Moving from monolithic to microservices with flexible methods.

Simplifying microservices migration with advanced genetic algorithms (2023)
Book Chapter
Aljawawdeh, H., Abuezhayeh, S., Qaddoumi, E., & Maghrabi, L. (2023). Simplifying microservices migration with advanced genetic algorithms. In A. Hannoon, & A. Mahmood (Eds.), Artificial Intelligence, Internet of Things, and Society 5.0 (441-452). Springer Verlag. https://doi.org/10.1007/978-3-031-43300-9_36

The increasing complexity and size of software systems have revealed the limitations of monolithic architectures, leading to the adoption of microservices as a more flexible, scalable, and maintainable alternative. This paper introduces an innovative... Read More about Simplifying microservices migration with advanced genetic algorithms.

Navigating serverless and microservices: Concise guide (2023)
Book Chapter
Aljawawdeh, H., Abuezhayeh, S., Alnatsheh, A., Qaddoumi, E., & Maghrabi, L. (2023). Navigating serverless and microservices: Concise guide. In Artificial Intelligence, Internet of Things, and Society 5.0 (585-597). Springer. https://doi.org/10.1007/978-3-031-43300-9_48

The rapid evolution of software development practices has led to the emergence of serverless and microservices architectures. These modern approaches offer various benefits, such as improved scalability, flexibility, and cost efficiency. This paper c... Read More about Navigating serverless and microservices: Concise guide.

Security threats in the internet of things: RPL's attacks and countermeasures (2018)
Book Chapter
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2018). Security threats in the internet of things: RPL's attacks and countermeasures. In Security and Privacy in Smart Sensor Networks (147-178). IGI Global. https://doi.org/10.4018/978-1-5225-5736-4.ch008

In the internet of things (IoT) vision, people, systems, and objects with sensing and/or actuating capabilities communicate to monitor and control the physical world. Nowadays, the IoT concept has attracted significant attention from different applic... Read More about Security threats in the internet of things: RPL's attacks and countermeasures.