Skip to main content

Research Repository

Advanced Search

Browse


Data visualization using augmented reality for education: a systematic review. (2022)
Conference Proceeding
EKANAYAKE, I. and GAYANIKA, S. 2022. Data visualization using augmented reality for education: a systematic review. In Proceedings of the 7th International conference on business and industrial research (ICBIR 2022), 19-20 May 2022, Bangkok, Thailand. Bangkok: Thai-Nichi Institute of Technology, pages 533-537. Hosted on IEEE Xplore [online]. Available from: https://doi.org/10.1109/ICBIR54589.2022.9786403

Current education systems use data visualization to present the data in a more comprehensible format. Augmented data visualization is an extended version to present the data in a 2D or 3D form in our field of vision. This study conducted a systematic... Read More about Data visualization using augmented reality for education: a systematic review..

Replacing human input in spam email detection using deep learning. (2022)
Conference Proceeding
NICHO, M., MAJDANI, F. and MCDERMOTT, C.D. 2022. Replacing human input in spam email detection using deep learning. In Degen, H. and NTOA, S. (eds.) Artificial intelligence in HCI: proceedings of 3rd International conference on artificial intelligence in HCI (human-computer interaction) 2022 (AI-HCI 2022), co-located with the 24th International conference on human-computer interaction 2022 (HCI International 2022), 26 June - 1 July 2022, [virtual conference]. Lecture notes in artificial intelligence (LNAI), 13336. Cham: Springer [online], pages 387-404. Available from: https://doi.org/10.1007/978-3-031-05643-7_25

The Covid-19 pandemic has been a driving force for a substantial increase in online activity and transactions across the globe. As a consequence, cyber-attacks, particularly those leveraging email as the preferred attack vector, have also increased e... Read More about Replacing human input in spam email detection using deep learning..

Estimation of chlorophyll concentration for environment monitoring in Scottish marine water. (2022)
Conference Proceeding
YAN, Y., ZHANG, Y., REN, J., HADJAL, M., MCKEE, D., KAO, F.-J., and DURRANI, T. 2022. Estimation of chlorophyll concentration for environment monitoring in Scottish marine water. In Liang, Q., Wang, W., Liu, X., Na, Z. and Zhang, B. (eds.) Communications, signal processing and systems: proceedings of the 10th International conference on Communications, signal processing and systems 2021 (CSPS 2021), 21-22 August 2021, Baishishan, China. Lecture notes in electrical engineering, 878. Singapore: Springer [online], 1, pages 582-587. Available from: https://doi.org/10.1007/978-981-19-0390-8_71

Marine Scotland is tasked with reporting on the environmental status of Scottish marine waters, an enormous area of water extending from the shoreline to deep oceanic waters. As one of the most important variables, chlorophyll concentration (Chl) pla... Read More about Estimation of chlorophyll concentration for environment monitoring in Scottish marine water..

Superpixel based sea ice segmentation with high-resolution optical images: analysis and evaluation. (2022)
Conference Proceeding
CHEN, S., YAN, Y., REN, J., HWANG, B., MARSHALL, S. and DARRANI, T. 2022. Superpixel based sea ice segmentation with high-resolution optical images: analysis and evaluation. In Liang, Q., Wang, W., Liu, X., Na, Z. and Zhang, B. (eds.) Communications, signal processing and systems: proceedings of the 10th International conference on Communications, signal processing and systems 2021 (CSPS 2021), 21-22 August 2021, Baishishan, China. Lecture notes in electrical engineering, 878. Singapore: Springer [online], 1, pages 1004-1012. Available from: https://doi.org/10.1007/978-981-19-0390-8_126

By grouping pixels with visual coherence, superpixel algorithms provide an alternative representation of regular pixel grid for precise and efficient image segmentation. In this paper, a multi-stage model is used for sea ice segmentation from the hig... Read More about Superpixel based sea ice segmentation with high-resolution optical images: analysis and evaluation..

A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. (2022)
Conference Proceeding
ALKUBAISY, D., PIRAS, L., AL-OBEIDALLAH, M.G., COX, K. and MOURATIDIS, H. 2022. A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. In Ali, R., Kaindl, H. and Maciaszek, L.A. (eds.). Evaluation of novel approaches to software engineering: revised selected papers from 16th International conference on Evaluation of novel approaches to software engineering 2021 (ENASE 2021), 26-27 April 2021, [virtual conference]. Communications in computer and information science, 1556. Cham: Springer [online], pages 67-87. Available from: https://doi.org/10.1007/978-3-030-96648-5_4

Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineer... Read More about A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design..

Integrated design framework for facilitating systems-theoretic process analysis. (2022)
Conference Proceeding
ALTAF, A., FAILY, S., DOGAN, H., THRON, E. and MYLONAS, A. 2022. Integrated design framework for facilitating systems-theoretic process analysis. In Katsikas, S., Lambrinoudakis, C., Cuppens, N. et al (eds.) Computer security: 26th European symposium on research in computer security (ESORICS 2021) international workshops: selected papers from 7th workshop on the security of industrial control systems of cyber-physical systems (CyberICPS 2021), co-located with SECPRE, ADIoT, SPOSE, CPS4CIP, CDT and SECOMANE, 4-8 October 2021, Darmstadt, Germany. Lecture notes in computer science (LNCS), 13106. Cham: Springer [online], pages 58-73. Available from: https://doi.org/10.1007/978-3-030-95484-0_4

Systems-Theoretic Process Analysis (STPA) helps mitigate identified safety hazards leading to unfortunate situations. Usually, a systematic step-by-step approach is followed by safety experts irrespective of any software based tool-support, but ident... Read More about Integrated design framework for facilitating systems-theoretic process analysis..

Cybersecurity user requirements analysis: the ECHO approach. (2022)
Conference Proceeding
KATOS, V., KI-ARIES, D., FAILY, S., GENCHEV, A., BOZHILOVA, M. and STOIANOV, N. 2022. Cybersecurity user requirements analysis: the ECHO approach. In: Shkarlet, S., Morozov, A., Palagin, A., Vinnikov, D., Stoianov, N., Zhelezniak, M. and Kazymyr, V. (eds.) Mathematical modeling and simulation of systems: selected papers from the proceedings of the 16th International scientific-practical conference on mathematical modeling and simulation of systems (MODS 2021), 28 June - 1 July 2021, Chernihiv, Ukraine. Lecture notes in networks and systems, 344. Cham: Springer [online], pages 405-421. Available from: https://link.springer.com/book/9783030899011

Cyber defense requires research and investment in advanced technological solution as well as in the development of effective methods and tools for identifying cyber threats and risks. This implies a need for a well-defined process for user requiremen... Read More about Cybersecurity user requirements analysis: the ECHO approach..

Use-case informed task analysis for secure and usable design solutions in rail. (2021)
Conference Proceeding
ALTAF, A., FAILY, S., DOGAN, H., MYLONAS, A. and THRON, E. 2021. Use-case informed task analysis for secure and usable design solutions in rail. In Percia, D.D., Mermoud, A. and Maillart, T. (eds.). Critical information infrastructures security: revised selected papers of 16th international conference on Critical information infrastructures security 2021 (CRITIS 2021), 27-29 September 2021, Lausanne, Switzerland. Lecture notes in computer science, 13139. Cham: Springer [online], pages 168-185. Available from: https://doi.org/10.1007/978-3-030-93200-8_10

Meeting secure and usable design goals needs the combined effort of safety, security and human factors experts. Human factors experts rely on a combination of cognitive and hierarchical task analysis techniques to support their work. We present an ap... Read More about Use-case informed task analysis for secure and usable design solutions in rail..

Teaching through a global pandemic: educational landscapes before, during and after COVID-19. (2021)
Conference Proceeding
SIEGEL, A.A., ZARB, M., ALSHAIGY, B., BLANCHARD, J., CRICK, T., GLASSEY, R., HOTT, J.R., LATULIPE, C., RIEDESEL, C., SENAPATHI, M., SIMON and WILLIAMS, D. 2021. Teaching through a global pandemic: educational landscapes before, during and after COVID-19. In ITiCSE-WGR '21: proceedings of the 26th ACM (Association for Computing Machinery) conference Working group reports on Innovation and technology in computer science education 2021, June 26 - July 1 2021, [virtual conference]. New York: ACM [online], pages 1-25. Available from: https://doi.org/10.1145/3502870.3506565

The coronavirus (COVID-19) pandemic has forced an unprecedented global shift within higher education in how instructors communicate with and educate students. This necessary paradigm shift has compelled educators to take a critical look at their teac... Read More about Teaching through a global pandemic: educational landscapes before, during and after COVID-19..

Streaming multi-layer ensemble selection using dynamic genetic algorithm. (2021)
Conference Proceeding
LUONG, A.V., NGUYEN, T.T. and LIEW, A.W.-C. 2021. Streaming multi-layer ensemble selection using dynamic genetic algorithm. In Zhou, J., Salvado, O., Sohel, F., Borges, P. and Wang, S. (eds.). Proceedings of 2021 Digital image computing: techniques and applications (DICTA 2021), 29 November - 1 December 2021, Gold Coast, Australia. Piscataway: IEEE [online], article 9647220. Available from: https://doi.org/10.1109/dicta52665.2021.9647220

In this study, we introduce a novel framework for non-stationary data stream classification problems by modifying the Genetic Algorithm to search for the optimal configuration of a streaming multi-layer ensemble. We aim to connect the two sub-fields... Read More about Streaming multi-layer ensemble selection using dynamic genetic algorithm..

DisCERN: discovering counterfactual explanations using relevance features from neighbourhoods. (2021)
Conference Proceeding
WIRATUNGA, N., WIJEKOON, A., NKISI-ORJI, I., MARTIN, K., PALIHAWADANA, C. and CORSAR, D. 2021. DisCERN: discovering counterfactual explanations using relevance features from neighbourhoods. In Proceedings of 33rd IEEE (Institute of Electrical and Electronics Engineers) International conference on tools with artificial intelligence 2021 (ICTAI 2021), 1-3 November 2021, Washington, USA [virtual conference]. Piscataway: IEEE [online], pages 1466-1473. Available from: https://doi.org/10.1109/ICTAI52525.2021.00233

Counterfactual explanations focus on 'actionable knowledge' to help end-users understand how a machine learning outcome could be changed to a more desirable outcome. For this purpose a counterfactual explainer needs to discover input dependencies tha... Read More about DisCERN: discovering counterfactual explanations using relevance features from neighbourhoods..

Why don't you tell me what I need to know? Self-flipped classroom and students' personal epistemology. (2021)
Conference Proceeding
DANIELS, M., CAJANDER, A., MCDERMOTT, R., VASILCHEKO, A. and GOLAY, D. 2021. Why don't you tell me what I need to know? Self-flipped classroom and students' personal epistemology. In Proceedings of 2021 IEEE (Institute of Electrical and Electronics Engineers) Frontiers in education conference (FIE 2021), 13-16 October 2021, Lincoln, USA [virtual conference]. Piscataway: IEEE [online], article 9637355. Available from: https://doi.org/10.1109/FIE49875.2021.9637355

This is a full research paper addressing the crucial element of understanding students when creating learning environments. It is for instance important to be aware of how students appreciate our way of teaching and to consider consequences of studen... Read More about Why don't you tell me what I need to know? Self-flipped classroom and students' personal epistemology..

Context, competency and authenticity in STEM education. (2021)
Conference Proceeding
MCDERMOTT, R. and DANIELS, M. 2021. Context, competency and authenticity in STEM education. In Proceedings of 2021 IEEE (Institute of Electrical and Electronics Engineers) Frontiers in education conference (FIE 2021), 13-16 October 2021, Lincoln, USA [virtual conference]. Piscataway: IEEE [online], article 9637197. Available from: https://doi.org/10.1109/FIE49875.2021.9637197

This Research Full Paper presents work which links a consideration of the concept of context with that of learning competency and that of educational authenticity in STEM subjects. The word 'context' is very familiar in both everyday language and in... Read More about Context, competency and authenticity in STEM education..

Comparative study of malware detection techniques for industrial control systems. (2021)
Conference Proceeding
REID, D., HARRIS, I. and PETROVSKI, A. 2021. Comparative study of malware detection techniques for industrial control systems. In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 19. Available from: https://doi.org/10.1109/SIN54109.2021.9699167

Industrial Control Systems are essential to managing national critical infrastructure, yet the security of these systems historically relies on isolation. The adoption of modern software solutions, and the unique challenges presented by legacy system... Read More about Comparative study of malware detection techniques for industrial control systems..

Improving intrusion detection through training data augmentation. (2021)
Conference Proceeding
OTOKWALA, U., PETROVSKI, A. and KALUTARAGE, H. 2021. Improving intrusion detection through training data augmentation. In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 17. Available from: https://doi.org/10.1109/SIN54109.2021.9699293

Imbalanced classes in datasets are common problems often found in security data. Therefore, several strategies like class resampling and cost-sensitive training have been proposed to address it. In this paper, we propose a data augmentation strategy... Read More about Improving intrusion detection through training data augmentation..

Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIoT). (2021)
Conference Proceeding
ARIFEEN, M., PETROVSKI, A. and PETROVSKI, S. 2021. Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIot). In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 28. Available from: https://doi.org/10.1109/SIN54109.2021.9699232

The integration of the IoT network with the Operational Technology (OT) network is increasing rapidly. However, this incorporation of IoT devices into the OT network makes the industrial control system vulnerable to various cyber threats. Hacking an... Read More about Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIoT)..

Memory efficient federated deep learning for intrusion detection in IoT networks. (2021)
Conference Proceeding
ZAKARIYYA, A. KALUTARAGE, H. and AL-KADRI, M.O. 2021. Memory efficient federated deep learning for intrusion detection in IoT networks. In Sani, S. and Kalutarage, H. (eds.) AI and cybersecurity 2021 (AI-Cybersec 2021): proceedings of the Workshop on AI and Cybersecurity (AI-Cybersec 2021) co-located with 41st (British Computer Society's Specialist Group on Artificial Intelligence) SGAI international conference on artificial intelligence (SGAI 2021): [virtual conference]. Aachen: CEUR Workshop Proceedings [online], 3125, pages 85-99. Available from: http://ceur-ws.org/Vol-3125/paper7.pdf

Deep Neural Networks (DNNs) methods are widely proposed for cyber security monitoring. However, training DNNs requires a lot of computational resources. This restricts direct deployment of DNNs to resource-constrained environments like the Internet o... Read More about Memory efficient federated deep learning for intrusion detection in IoT networks..

Reasoning with counterfactual explanations for code vulnerability detection and correction. (2021)
Conference Proceeding
WIJEKOON, A. and WIRATUNGA, N. 2021. Reasoning with counterfactual explanations for code vulnerability detection and correction. In Sani, S. and Kalutarage, H. (eds.) AI and cybersecurity 2021 (AI-Cybersec 2021): proceedings of the workshop on AI and cybersecurity (AI-Cybersec 2021) co-located with 41st (British Computer Society's Specialist Group on Artificial Intelligence) SGAI international conference on artificial intelligence (SGAI 2021), 14 December 2021, Cambridge, UK: [virtual conference]. Aachen: CEUR Workshop Proceedings [online], 3125, pages 1-13. Available from: http://ceur-ws.org/Vol-3125/paper1.pdf 14 December 2021, Cambridge, UK: [virtual event]. Aachen: CEUR Workshop Proceedings [online], 3125, pages 1-13. Available from: http://ceur-ws.org/Vol-3125/paper1.pdf

Counterfactual explanations highlight "actionable knowledge" which helps the end-users to understand how a machine learning outcome could be changed to a more desirable outcome. In code vulnerability detection, understanding these "actionable" correc... Read More about Reasoning with counterfactual explanations for code vulnerability detection and correction..

Towards explainable metaheuristics: PCA for trajectory mining in evolutionary algorithms. (2021)
Conference Proceeding
FYVIE, M., MCCALL, J.A.W. and CHRISTIE, L.A. 2021. Towards explainable metaheuristics: PCA for trajectory mining in evolutionary algorithms. In Bramer, M. and Ellis, R (eds.) Artificial intelligence XXXVIII: proceedings of 41st British Computer Society's Specialist Group on Artificial Intelligence (SGAI) Artificial intelligence international conference 2021 (AI-2021) (SGAI-AI 2021), 14-16 December 2021, [virtual conference]. Lecture notes in computer science, 13101. Cham: Springer [online], pages 89-102. Available from: https://doi.org/10.1007/978-3-030-91100-3_7

The generation of explanations regarding decisions made by population-based meta-heuristics is often a difficult task due to the nature of the mechanisms employed by these approaches. With the increase in use of these methods for optimisation in indu... Read More about Towards explainable metaheuristics: PCA for trajectory mining in evolutionary algorithms..

TrustMod: a trust management module for NS-3 simulator. (2021)
Conference Proceeding
HAJAR, M.S., KALUTARAGE, H. and AL-KADRI, M.O. 2021. TrustMod: a trust management module for NS-3 simulator. In Zhao, L., Kumar, N., Hsu, R.C. and Zou, D. (eds.) Proceedings of 20th IEEE (Institute of Electrical and Electronics Engineers) international conference on Trust, security and privacy in computing and communications 2021 (IEEE TrustCom 2021), 20-21 October 2021, Shenyang, China: [virtual event]. Piscataway: IEEE [online], pages 51-60. Available from: https://doi.org/10.1109/TrustCom53373.2021.00025

Trust management offers a further level of defense against internal attacks in ad hoc networks. Deploying an effective trust management scheme can reinforce the overall network security. Regardless of limitations, however, security researchers often... Read More about TrustMod: a trust management module for NS-3 simulator..