Skip to main content

Research Repository

Advanced Search

All Outputs (130)

Ensuring cloud security: Current concerns and research challenges (2014)
Journal Article
Vesyropoulos, N., Georgiadis, C. K., & Pimenidis, E. (2014). Ensuring cloud security: Current concerns and research challenges. Communications in Computer and Information Science, 441, 3-10. https://doi.org/10.1007/978-3-319-11710-2_1

© Springer International Publishing Switzerland 2014. Over the past few years Cloud computing has been widely accepted and adopted as an alternative way for businesses to store data, communicate and operate. Consumers and enterprises regard this as a... Read More about Ensuring cloud security: Current concerns and research challenges.

Electronic government enactment in a small developing country – the Palestinian authority’s policy and practice (2014)
Journal Article
Shat, F. J. F., Shat, F. J. F., Mousavi, A., & Pimenidis, E. (2014). Electronic government enactment in a small developing country – the Palestinian authority’s policy and practice. Communications in Computer and Information Science, 441, 83-92. https://doi.org/10.1007/978-3-319-11710-2_8

© Springer International Publishing Switzerland 2014. Successful implementation and utilization of electronic government in Palestine has been challenging field for the Palestinian authority, businesses and dispersed citizens. Our research provides a... Read More about Electronic government enactment in a small developing country – the Palestinian authority’s policy and practice.

A distributed consensus algorithm for decision making in service-oriented internet of things (2014)
Journal Article
Li, S., Oikonomou, G., Tryfonas, T., Chen, T. M., & Xu, L. D. (2014). A distributed consensus algorithm for decision making in service-oriented internet of things. IEEE Transactions on Industrial Informatics, 10(2), 1461-1468. https://doi.org/10.1109/TII.2014.2306331

In a service-oriented Internet of things (IoT) deployment, it is difficult to make consensus decisions for services at different IoT edge nodes where available information might be insufficient or overloaded. Existing statistical methods attempt to r... Read More about A distributed consensus algorithm for decision making in service-oriented internet of things.

ICT enabled participatory urban planning and policy development: The UrbanAPI project (2014)
Journal Article
Khan, Z., Ludlow, D., Loibl, W., & Soomro, K. (2014). ICT enabled participatory urban planning and policy development: The UrbanAPI project. Transforming Government: People, Process and Policy, 8(2), 205-229. https://doi.org/10.1108/TG-09-2013-0030

Purpose: The aim of this paper is to present the effectiveness of participatory information and communication technology (ICT) tools for urban planning, in particular, supporting bottom-up decision-making in urban management and governance. Design/me... Read More about ICT enabled participatory urban planning and policy development: The UrbanAPI project.

Emergent spiking in non-ideal memristor networks (2014)
Journal Article
Costello, B. D. L., Gale, E., de Lacy Costello, B., & Adamatzky, A. (2014). Emergent spiking in non-ideal memristor networks. Microelectronics Journal, 45(11), 1401-1415. https://doi.org/10.1016/j.mejo.2014.06.008

© 2014 Elsevier Ltd. All rights reserved. Memristors have uses as artificial synapses and perform well in this role in simulations with artificial spiking neurons. Our experiments show that memristor networks natively spike and can exhibit emergent o... Read More about Emergent spiking in non-ideal memristor networks.

Soft systems methodology in net-centric cyber defence system development (2014)
Journal Article
Craig, R., Spyridopoulos, T., Tryfonas, T., & May, J. (2014). Soft systems methodology in net-centric cyber defence system development. IEEE International Conference on Systems Man and Cybernetics, 2014-January(January), 672-677. https://doi.org/10.1109/SMC.2014.6973986

© 2014 IEEE. Complexity is ever increasing within our information environment and organisations, as interdependent dynamic relationships within sociotechnical systems result in high variety and uncertainty from a lack of information or control. A net... Read More about Soft systems methodology in net-centric cyber defence system development.

On the development of automated forensic analysis methods for mobile devices (2014)
Journal Article
Andriotis, P., Tryfonas, T., Oikonomou, G., Li, S., Tzermias, Z., Xynos, K., …Prevelakis, V. (2014). On the development of automated forensic analysis methods for mobile devices. Lecture Notes in Artificial Intelligence, 8564 LNCS, 212-213. https://doi.org/10.1007/978-3-319-08593-7_17

We live in a connected world where mobile devices are used by humans as valuable tools. The use of mobile devices leaves traces that can be treasured assets for a forensic analyst. Our aim is to investigate methods and exercise techniques that will m... Read More about On the development of automated forensic analysis methods for mobile devices.

Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method (2014)
Journal Article
Andriotis, P., Tryfonas, T., & Oikonomou, G. (2014). Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. Lecture Notes in Artificial Intelligence, 8533 LNCS, 115-126. https://doi.org/10.1007/978-3-319-07620-1_11

One of the most popular contemporary graphical password approaches is the Pattern-Lock authentication mechanism that comes integrated with the Android mobile operating system. In this paper we investigate the impact of password strength meters on the... Read More about Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method.

Smartphone message sentiment analysis (2014)
Book Chapter
Andriotis, P., Takasu, A., & Tryfonas, T. (2014). Smartphone message sentiment analysis. In G. Peterson, & S. Shenoi (Eds.), Advances in Digital Forensics X (253-265). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-44952-3_17

Humans tend to use specific words to express their emotional states in written and oral communications. Scientists in the area of text mining and natural language processing have studied sentiment fingerprints residing in text to extract the emotiona... Read More about Smartphone message sentiment analysis.

Blueprint of a semantic business process-aware Enterprise Information Architecture: The EIAOnt ontology (2014)
Book Chapter
Ahmad, M., & Odeh, M. (2014). Blueprint of a semantic business process-aware Enterprise Information Architecture: The EIAOnt ontology. In J. Cordeiro, L. A. Maciaszek, J. Filipe, & S. Hammoudi (Eds.), Enterprise Information Systems, Revised Selected Papers (520-539). Heidelberg, Germany: Springer

A robust design of enterprise information resources and their optimal usage can significantly enhance the information management (IM) capability of an enterprise. Enterprise Information Architecture (EIA) is a critical success factor for this objecti... Read More about Blueprint of a semantic business process-aware Enterprise Information Architecture: The EIAOnt ontology.

Route 20, autobahn 7, and slime mold: Approximating the longest roads in usa and germany with slime mold on 3-d terrains (2014)
Journal Article
Adamatzky, A. I., & Adamatzky, A. (2014). Route 20, autobahn 7, and slime mold: Approximating the longest roads in usa and germany with slime mold on 3-d terrains. IEEE Transactions on Cybernetics, 44(1), 126-136. https://doi.org/10.1109/TCYB.2013.2248359

A cellular slime mould Physarum polycephalum is a monstrously large single cell visible by an unaided eye. The slime mold explores space in parallel, is guided by gradients of chemoattractants, and propagates toward sources of nutrients along nearly... Read More about Route 20, autobahn 7, and slime mold: Approximating the longest roads in usa and germany with slime mold on 3-d terrains.

A body of evidence: Avatars and the generative nature of bodily perception (2014)
Journal Article
Moss, T., Palmer, M., Turton, A., Grieve, S., Moss, T., & Lewis, J. (2014). A body of evidence: Avatars and the generative nature of bodily perception. Studies in Computational Intelligence, 536, 95-120. https://doi.org/10.1007/978-3-642-45432-5_6

Complex Regional Pain Syndrome (CRPS) causes dramatic changes in perceptions of the body that are difficult to communicate. This chapter discusses a proof of concept study, evaluating an interactive application designed to assist patients in describi... Read More about A body of evidence: Avatars and the generative nature of bodily perception.

QoS-Aware scheduling of services-oriented internet of things (2014)
Journal Article
Li, L., Li, S., & Zhao, S. (2014). QoS-Aware scheduling of services-oriented internet of things. IEEE Transactions on Industrial Informatics, 10(2), 1497-1507. https://doi.org/10.1109/TII.2014.2306782

The Internet of Things (IoT) contains a large number of different devices and heterogeneous networks, which make it difficult to satisfy different quality of service (QoS) requirements and achieve rapid services composition and deployment. In additio... Read More about QoS-Aware scheduling of services-oriented internet of things.

Decentralized traceable attribute-based signatures (2014)
Journal Article
El Kaafarani, A., Ghadafi, E., & Khader, D. (2014). Decentralized traceable attribute-based signatures. Lecture Notes in Artificial Intelligence, 8366 LNCS, 327-348. https://doi.org/10.1007/978-3-319-04852-9_17

We provide a formal security model for traceable attribute-based signatures. Our focus is on the more practical case where attribute management is distributed among different authorities rather than relying on a single central authority. By specializ... Read More about Decentralized traceable attribute-based signatures.

A temporal description logic for resource-bounded rule-based context-aware agents (2014)
Journal Article
Rakib, A., Haque, H. M. U., & Faruqui, R. U. (2014). A temporal description logic for resource-bounded rule-based context-aware agents. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 128, 3-14. https://doi.org/10.1007/978-3-319-05939-6_1

© Springer International Publishing Switzerland 2014. We propose a logical framework for modelling and verifying context-aware multi-agent systems. We extend CTL* with belief and communication modalities, and the resulting logic LOCRS allows us to de... Read More about A temporal description logic for resource-bounded rule-based context-aware agents.

Sensory fusion in Physarum polycephalum and implementing multi-sensory functional computation (2014)
Journal Article
Whiting, J., de Lacy Costello, B., & Adamatzky, A. (2014). Sensory fusion in Physarum polycephalum and implementing multi-sensory functional computation. BioSystems, 119(1), 45-52. https://doi.org/10.1016/j.biosystems.2014.03.003

Surface electrical potential and observational growth recordings were made of a protoplasmic tube of the slime mould Physarum polycephalum in response to a multitude of stimuli with regards to sensory fusion or multisensory integration. Each stimulus... Read More about Sensory fusion in Physarum polycephalum and implementing multi-sensory functional computation.

Surface flattening of the human left atrium and proof-of-concept clinical applications (2014)
Journal Article
Karim, R., Ma, Y. L., Jang, M., Housden, R. J., Williams, S. E., Chen, Z., …Rhode, K. S. (2014). Surface flattening of the human left atrium and proof-of-concept clinical applications. Computerized Medical Imaging and Graphics, 38(4), 251-266. https://doi.org/10.1016/j.compmedimag.2014.01.004

Surface flattening in medical imaging has seen widespread use in neurology and more recently in cardiology to describe the left ventricle using the bull's-eye plot. The method is particularly useful to standardize the display of functional informatio... Read More about Surface flattening of the human left atrium and proof-of-concept clinical applications.

A Biologically Inspired Optimization Algorithm for Solving Fuzzy Shortest Path Problems with Mixed Fuzzy Arc Lengths (2014)
Journal Article
Zhang, X., Wang, Q., Adamatzky, A., Chan, F. T., Mahadevan, S., & Deng, Y. (2014). A Biologically Inspired Optimization Algorithm for Solving Fuzzy Shortest Path Problems with Mixed Fuzzy Arc Lengths. Journal of Optimization Theory and Applications, 163(3), 1049-1056. https://doi.org/10.1007/s10957-014-0542-6

© 2014, Springer Science+Business Media New York. The shortest path problem is among fundamental problems of network optimization. Majority of the optimization algorithms assume that weights of data graph’s edges are pre-determined real numbers. Howe... Read More about A Biologically Inspired Optimization Algorithm for Solving Fuzzy Shortest Path Problems with Mixed Fuzzy Arc Lengths.