Skip to main content

Research Repository

Advanced Search

All Outputs (135)

Protocol-specific and sensor network-inherited attack detection in IoT using machine learning (2022)
Journal Article
Zahra, F., Jhanjhi, N. Z., Khan, N. A., Brohi, S. N., Masud, M., & Aljahdali, S. (2022). Protocol-specific and sensor network-inherited attack detection in IoT using machine learning. Applied Sciences, 12(22), https://doi.org/10.3390/app122211598

For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy Networks (RPL) was developed. Additionally, a number of optimizations have been... Read More about Protocol-specific and sensor network-inherited attack detection in IoT using machine learning.

Interactive cyber-physical system hacking: Engaging students early using Scalextric (2022)
Presentation / Conference
White, J., Legg, P., & Mills, A. (2022, November). Interactive cyber-physical system hacking: Engaging students early using Scalextric. Paper presented at Colloquium on Information Systems Security Education, 2022, Online

Cyber Security as an education discipline covers a variety of topics that can be challenging and complex for students who are new to the subject domain. With this in mind, it is crucial that new students are motivated by understanding both the techni... Read More about Interactive cyber-physical system hacking: Engaging students early using Scalextric.

Teaching offensive and defensive cyber security in schools using a Raspberry Pi Cyber Range (2022)
Presentation / Conference
Legg, P., Mills, A., & Johnson, I. (2022, November). Teaching offensive and defensive cyber security in schools using a Raspberry Pi Cyber Range. Paper presented at Colloquium on Information Systems Security Education, Online

Computer Science as a subject is now appearing in more school curricula for GCSE and A level, with a growing demand for cyber security to be embedded within this teaching. Yet, teachers face challenges with limited time and resource for preparing pra... Read More about Teaching offensive and defensive cyber security in schools using a Raspberry Pi Cyber Range.

Electrical frequency discrimination by fungi Pleurotus ostreatus (2022)
Journal Article
Przyczyna, D., Szacilowski, K., Chiolerio, A., & Adamatzky, A. (2022). Electrical frequency discrimination by fungi Pleurotus ostreatus. BioSystems, 222, 104797. https://doi.org/10.1016/j.biosystems.2022.104797

We stimulate mycelian networks of oyster fungi Pleurotus ostreatus with low frequency sinusoidal electrical signals. We demonstrate that the fungal networks can discriminate between frequencies in a fuzzy or threshold based manner. Details about the... Read More about Electrical frequency discrimination by fungi Pleurotus ostreatus.

Development of a lightweight centralized authentication mechanism for the internet of things driven by fog (2022)
Journal Article
Lansky, J., Sadrishojaei, M., Rahmani, A. M., Malik, M. H., Kazemian, F., & Hosseinzadeh, M. (2022). Development of a lightweight centralized authentication mechanism for the internet of things driven by fog. Mathematics, 10(22), 4166. https://doi.org/10.3390/math10224166

The rapid development of technology has made the Internet of Things an integral element of modern society. Modern Internet of Things’ implementations often use Fog computing, an offshoot of the Cloud computing that offers localized processing power a... Read More about Development of a lightweight centralized authentication mechanism for the internet of things driven by fog.

Joint communication, computation, and control for computational task offloading in vehicle-assisted multi-access edge computing (2022)
Journal Article
Dang, T. N., Manzoor, A., Tun, Y. K., Kazmi, S. M. A., Haw, R., Hong, S. H., …Hong, C. S. (2022). Joint communication, computation, and control for computational task offloading in vehicle-assisted multi-access edge computing. IEEE Access, 10, 122513-122529. https://doi.org/10.1109/ACCESS.2022.3220251

Future generation of Electric Vehicles (EVs) equipped with modern technologies will impose a significant burden on computation and communication to the network due to the vast extension of onboard infotainment services. To overcome this challenge, mu... Read More about Joint communication, computation, and control for computational task offloading in vehicle-assisted multi-access edge computing.

“It’s important to think of Pepper as a teaching aid or resource external to the classroom”: A social robot in a school for autistic children (2022)
Journal Article
Lemaignan, S., Newbutt, N., Rice, L., & Daly, J. (in press). “It’s important to think of Pepper as a teaching aid or resource external to the classroom”: A social robot in a school for autistic children. International Journal of Social Robotics, https://doi.org/10.1007/s12369-022-00928-4

For a period of 3 weeks in June 2021, we embedded a social robot (Softbank Pepper) in a Special Educational Needs (SEN) school for autistic children. The robot’s behaviours and integration into the school were co-designed with the children and teache... Read More about “It’s important to think of Pepper as a teaching aid or resource external to the classroom”: A social robot in a school for autistic children.

Conventional non-computing and unconventional musical signal processing (2022)
Book Chapter
Baracskai, Z. (2022). Conventional non-computing and unconventional musical signal processing. In A. Adamatzky (Ed.), Unconventional Computing, Arts, Philosophy (339-365). World Scientific Publishing. https://doi.org/10.1142/9789811257155_0020

As the scepsis maintains its lead in scientific enquiry giving birth to unconventional computing, one must poke at the newborn as well. By manipulating the terms convention and computing, challenges are posed to their meaning in the contemporary cont... Read More about Conventional non-computing and unconventional musical signal processing.

A generalised dropout mechanism for distributed systems (2022)
Journal Article
Bull, L., & Liu, H. (2023). A generalised dropout mechanism for distributed systems. Artificial Life, 29(2), 146-152. https://doi.org/10.1162/artl_a_00393

This letter uses a modified form of the NK model introduced to explore aspects of distributed control. In particular, a previous result suggesting the use of dynamically formed subgroups within the overall system can be more effective than global con... Read More about A generalised dropout mechanism for distributed systems.

Multiple adversarial domains adaptation approach for mitigating adversarial attacks effects (2022)
Journal Article
Rasheed, B., Khan, A., Ahmad, M., Mazzara, M., & Kazmi, S. M. (2022). Multiple adversarial domains adaptation approach for mitigating adversarial attacks effects. International Transactions on Electrical Energy Systems, 2022, 1-11. https://doi.org/10.1155/2022/2890761

Although neural networks are near achieving performance similar to humans in many tasks, they are susceptible to adversarial attacks in the form of a small, intentionally designed perturbation, which could lead to misclassifications. The best defense... Read More about Multiple adversarial domains adaptation approach for mitigating adversarial attacks effects.

Chimera states in neuro-inspired area-efficient asynchronous cellular automata networks (2022)
Journal Article
Tsakalos, K., Dragkola, P., Karamani, R., Tsompanas, M., Provata, A., Dimitrakis, P., …Sirakoulis, G. C. (2022). Chimera states in neuro-inspired area-efficient asynchronous cellular automata networks. IEEE Transactions on Circuits and Systems I: Regular Papers, 69(10), 4128-4140. https://doi.org/10.1109/TCSI.2022.3187376

Synchronization transition in neuromorphic networks has attracted much attention recently as a fundamental property of biological neural networks, which relies on network connectivity along with different synaptic features. In this work, an area-opti... Read More about Chimera states in neuro-inspired area-efficient asynchronous cellular automata networks.

A wide spectral range sky radiance model (2022)
Journal Article
Vévoda, P., Bashford-Rogers, T., Kolářová, M., & Wilkie, A. (2022). A wide spectral range sky radiance model. Computer Graphics Forum, 41(7), 291-298. https://doi.org/10.1111/cgf.14677

Pre-computed models of sky radiance are a tool to rapidly determine incident solar irradiance in applications as diverse as movie VFX, lighting simulation for architecture, experimental biology, and flight simulators. Several such models exist, but m... Read More about A wide spectral range sky radiance model.

Ego-graph replay based continual learning for misinformation engagement prediction (2022)
Conference Proceeding
Bo, H., McConville, R., Hong, J., & Liu, W. (2022). Ego-graph replay based continual learning for misinformation engagement prediction. In 2022 International Joint Conference on Neural Networks (IJCNN) (01-08). https://doi.org/10.1109/IJCNN55064.2022.9892557

Online social network platforms have a problem with misinformation. One popular way of addressing this problem is via the use of machine learning based automated misinformation detection systems to classify if a post is misinformation. Instead of pos... Read More about Ego-graph replay based continual learning for misinformation engagement prediction.

Maintenance strategies for networked assets* (2022)
Conference Proceeding
Perez Hernandez, M., Puchkova, A., & Kumar Parlikad, A. K. (2022). Maintenance strategies for networked assets*. . https://doi.org/10.1016/j.ifacol.2022.09.199

The purpose of this paper is to analyse the effect of different maintenance strategies for a network of assets whose condition deteriorates progressively along the time. We propose both an agent-based model that considers the dynamics of data traffic... Read More about Maintenance strategies for networked assets*.

Mining logical circuits in fungi (2022)
Journal Article
Roberts, N., & Adamatzky, A. (2022). Mining logical circuits in fungi. Scientific Reports, 12(1), 15930. https://doi.org/10.1038/s41598-022-20080-3

Living substrates are capable for nontrivial mappings of electrical signals due to the substrate nonlinear electrical characteristics. This property can be used to realise Boolean functions. Input logical values are represented by amplitude or freque... Read More about Mining logical circuits in fungi.

Risk of disclosure when reporting commonly used univariate statistics (2022)
Conference Proceeding
Derrick, B., Green, E., Ritchie, F., & White, P. (2022). Risk of disclosure when reporting commonly used univariate statistics. In Lecture Notes in Computer Science (119-129). https://doi.org/10.1007/978-3-031-13945-1_9

When basic or descriptive summary statistics are reported, it may be possible that the entire sample of observations is inadvertently disclosed, or that members within a sample will be able to work out responses of others. Three sets of univariate su... Read More about Risk of disclosure when reporting commonly used univariate statistics.

NTFS 2022: Authenticity in teaching and assessment (2022)
Report
Arabo, A. (2022). NTFS 2022: Authenticity in teaching and assessment. https://www.advance-he.ac.uk: AdvanceHE Blog

The world of education is constantly evolving and so it needs to provide context to what is being delivered at each session. This is more so for complex topics within the cyber science domain that evolves and changes every second.