Skip to main content

Research Repository

Advanced Search

Outputs (17)

Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project. (2014)
Book Chapter
ATZENI, A., LYLE, J. and FAILY, S. 2014. Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project. In Ruiz-Martinez, A., Marin-Lopez, R. and Pereniguez-Garcia, F. (eds.) Architectures and protocols for secure information technology infrastructures. Hershey: IGI Global [online], chapter 12, pages 310-333. Available from: https://doi.org/10.4018/978-1-4666-4514-1.ch012

The need for integrated cross-platform systems is growing. Such systems can enrich the user experience, but also lead to greater security and privacy concerns than the sum of their existing components. To provide practical insights and suggest viable... Read More about Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project..

Evaluating the implications of attack and security patterns with premortems. (2014)
Book Chapter
FAILY, S., PARKIN, S. and LYLE, J. 2014. Evaluating the implications of attack and security patterns with premortems. In Blackwell, C. and Zhu, H. (eds.) Cyberpatterns: unifying design patterns with security and attack patterns. Cham: Springer [online], chapter 16, pages 199-209. Available from: https://doi.org/10.1007/978-3-319-04447-7_16

Security patterns are a useful way of describing, packaging and applying security knowledge which might otherwise be unavailable. However, because patterns represent partial knowledge of a problem and solution space, there is little certainty that ad... Read More about Evaluating the implications of attack and security patterns with premortems..

The asset replacement problem state of the art. (2013)
Book Chapter
ANSARIPOOR, A.H., OLIVEIRA, F.S. and LIRET, A. 2013. The asset replacement problem state of the art. In Owusu, G., O'Brien, P., McCall, J. and Doherty, N.F. (eds.) Transforming field and service operations: methodologies for successful technology-driven business transformation. Berlin: Springer [online], chapter 14, pages 213-233. Available from: https://doi.org/10.1007/978-3-642-44970-3_14

This book chapter outlines the different modelling approaches for realising sustainable operations of asset replacement and studying the impact of the economic life, the repair-cost limit and comprehensive cost minimisation models. In particular it a... Read More about The asset replacement problem state of the art..

Intercultural competence in global collaboration courses in computer engineering. (2012)
Book Chapter
BERNALD, H., CAJANDER, A., DANIELS, M., KULTUR, C., LOFSTROM, A., MCDERMOTT, R. and RUSSELL-DAG, L. 2012. Intercultural competence in global collaboration courses in computer engineering. In Schmorrow, D.D. and Nicholson, D.M. (eds.) Advances in design for cross-cultural activies: Part I. Boca Raton: CRC Press [online], chapter 35, pages 351-361. Available from: https://doi.org/10.1201/b12316-42

With the rapid and ever expanding globalization of the workforce, international collaborations are becoming part of everyday life for people of many professions. Intercultural competence has therefore become one of the central professional competenci... Read More about Intercultural competence in global collaboration courses in computer engineering..

Privacy through security: policy and practice in a small-medium enterprise. (2008)
Book Chapter
ALLISON, I. and STRANGWICK, C., 2008. Privacy through security: policy and practice in a small-medium enterprise. In Subramanian, R. (ed.) Computer security, privacy, and politics: current issues, challenges, and solutions. Hershey, PA: IGI Global [online], chapter 8, pages 157-179. Available from: https://doi.org/10.4018/978-1-59904-804-8.ch008

The chapter discusses how one small business planned for, and implemented, the security of its data in a new enterprise-wide system. The companys data was perceived as sensitive, and any breach of privacy as commercially critical. From this perspecti... Read More about Privacy through security: policy and practice in a small-medium enterprise..

Concept induction via fuzzy C-means clustering in a high dimensional semantic space. (2007)
Book Chapter
SONG, D., CAO, G., BRUZA, P.D. and LAU, R.Y.K. 2007. Concept induction via fuzzy C-means clustering in a high dimensional semantic space. In Valente de Oliveira, J. and Pedrycz, W. (eds.) Advances in fuzzy clustering and its applications. Chichester: Wiley [online], chapter 19, pages 393-403. Available from: https://www.wiley.com/en-gb/Advances+in+Fuzzy+Clustering+and+its+Applications-p-9780470061183

Lexical semantic space models have recently been investigated to automatically derive the meaning (semantics) of information based on natural language usage. In a semantic space, a term can be considered as a concept represented geometrically as a ve... Read More about Concept induction via fuzzy C-means clustering in a high dimensional semantic space..

Commonsense aboutness for information retrieval. (2000)
Book Chapter
BRUZA, P.D., SONG, D., WONG, K.-F. and CHENG, C.-H. 2000. Commonsense aboutness for information retrieval. In Mohammadian, M. (ed.) Advances in intelligent systems: theory and applications. Amsterdam: IOS Press, pages 288-295.

Information retrieval (IR) is driven by a process which decides whether a document is about a query. Recent attempts have been made to formalize properties of aboutness, but no consensus has been reached. The properties being proposed are largely bei... Read More about Commonsense aboutness for information retrieval..