Skip to main content

Research Repository

Advanced Search

All Outputs (1084)

Barry is not the weakest link: eliciting secure system requirements with personas. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. Barry is not the weakest link: eliciting secure system requirements with personas. In Proceedings of the 24th International BCS human computer interaction conference (HCI 2010): games are a serious business, 6-10 September 2010, Dundee, UK. Swindon: BCS, pages 124-132. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/HCI2010.17

Building secure and usable systems means specifying systems for the people using it and the tasks they carry out, rather than vice-versa. User-centred design approaches encourage an early focus on users and their contexts of use, but these need to be... Read More about Barry is not the weakest link: eliciting secure system requirements with personas..

Automatic features characterization from 3d facial images. (2010)
Conference Proceeding
ELYAN, E. and UGAIL, H. 2010. Automatic features characterization from 3d facial images. In Arabnia, H.R., Deligiannidis, L. and Solo, A.M.G. (eds.) Proceedings of the 14th International computer graphics and virtual reality conference (CGVR 2010), 12-15 July 2010, Las Vegas, USA. Georgia, USA: CSREA Press, pages 67-73.

This paper presents a novel and computationally fast method for automatic identification of symmetry profile from 3D facial images. The algorithm is based on the concepts of computational geometry which yield fast and accurate results. In order to de... Read More about Automatic features characterization from 3d facial images..

Towards tool-support for usable secure requirements engineering with CAIRIS. (2010)
Journal Article
FAILY, S. and FLÉCHAIS, I. 2010. Towards tool-support for usable secure requirements engineering with CAIRIS. International journal of secure software engineering [online], 1(3), pages 56-70. Available from: https://doi.org/10.4018/jsse.2010070104

Understanding how to better elicit, specify, and manage requirements for secure and usable software systems is a key challenge in security software engineering, however, there lacks tool-support for specifying and managing the voluminous amounts of d... Read More about Towards tool-support for usable secure requirements engineering with CAIRIS..

Developing tools to encourage reflection in first year students blogs. (2010)
Conference Proceeding
MCDERMOTT, R., BRINDLEY, G. and ECCLESTON, G. 2010. Developing tools to encourage reflection in first year students blogs. In Proceedings of the 15th Innovation and technology in computer science education annual conference (ITiCSE '10), 26-30 June 2010, Ankara, Turkey. New York: ACM [online], pages 147-151. Available from: https://doi.org/10.1145/1822090.1822132

The pedagogical basis of a project aimed at encouraging students to engage in reflective activities using blogs to document their learning experiences is described. It also gives some details of the practical implementation of this work. Activities w... Read More about Developing tools to encourage reflection in first year students blogs..

A meta-model for usable secure requirements engineering. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. A meta-model for usable secure requirements engineering. In Proceedings of the 2010 ICSE workshop on software engineering for secure systems (SESS '10): co-located with the 32nd ACM/IEEE international conference on software engineering (ICSE 2010), 2-8 May 2010, Cape Town, South Africa. New York: ACM [online], pages 29-35. Available from: https://doi.org/10.1145/1809100.1809105

There is a growing recognition of the need for secure software engineering approaches addressing both technical and human factors. Existing approaches to secure software engineering focus on the need for technical security to the detriment of usabili... Read More about A meta-model for usable secure requirements engineering..

Hybrid algorithms for distributed constraint satisfaction. (2010)
Thesis
LEE, D.A.J. 2010. Hybrid algorithms for distributed constraint satisfaction.. Robert Gordon University, PhD thesis.

A Distributed Constraint Satisfaction Problem (DisCSP) is a CSP which is divided into several inter-related complex local problems, each assigned to a different agent. Thus, each agent has knowledge of the variables and corresponding domains of its l... Read More about Hybrid algorithms for distributed constraint satisfaction..

Analysing and visualising security and usability in IRIS. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. Analysing and visualising security and usability in IRIS. In Proceedings of the 5th International conference on availability, reliability and security (ARES 2010), 15-18 February 2010, Krakow, Poland. Los Alamitos: IEEE Computer Society [online], pages 543-548. Available from: https://doi.org/10.1109/ares.2010.28

Despite a long-standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a challenge. Balancing security and usability is difficult due to human biases in s... Read More about Analysing and visualising security and usability in IRIS..

Improving secure systems design with security culture. (2010)
Presentation / Conference
FAILY, S. and FLÉCHAIS, I. 2010. Improving secure systems design with security culture. Presented at the Human factors in information security conference (HFIS 2010), 22-24 February 2010, London, UK.

This poster summarises how the concept of security culture can be used to improve systems security and secure systems design. It highlights: the use of personas and user-centred design; environment modeling and understanding a system's context; and t... Read More about Improving secure systems design with security culture..

DYNIQX: a novel meta-search engine for the web. (2009)
Journal Article
ZHU, J., SONG, D., EISENSTADT, M., BARLADEANU, C. and RUGER, S. 2009. DYNIQX: a novel meta-search engine for the web. International journal of information studies, 1(1), pages 2-27.

The effect of metadata in collection fusion has not been sufficiently studied. In response to this, we present a novel meta-search engine called Dyniqx for metadata based search. Dyniqx integrates search results from search services of documents, ima... Read More about DYNIQX: a novel meta-search engine for the web..

Empathetic consultancy: a reflective approach to ICTD. (2009)
Conference Proceeding
BASS, J.M. 2009. Empathetic consultancy: a reflective approach to ICTD. In Byrne, E., Nicholson, B. and Salem, F. (eds.) Assessing the contribution of ICT to development goals: proceedings of the 10th International conference on social implications of computers in developing countries (ICT4D 2009), 26-28 May 2009, Dubai, UAE. Dubai: International Federation for Information Processing, pages 315-324.

Empathetic Consulting articulates positive characteristics of long-term ICT capacity building engagements using external advisors. Consultants need to demonstrate commitment to capacity building rather than service delivery, flexibility in adaptation... Read More about Empathetic consultancy: a reflective approach to ICTD..

The evolution of genre in Wikipedia. (2009)
Journal Article
CLARK, M., RUTHVEN, I. and HOLT, P.O'B. 2009. The evolution of genre in Wikipedia. Journal for language technology and computational linguistics [online], 24(1), pages 1-22. Available from: https://jlcl.org/content/2-allissues/16-Heft1-2009/01Malcolm_Clark_and_Ian_Ruthven_and_Patrik_OBrian_Holt.pdf

This paper presents an overview of the ways in which genres, or structural forms, develop in a community of practice, in this case, Wikipedia. Firstly, we collected data by performing a small search task in the Wikipedia search engine (powered by Luc... Read More about The evolution of genre in Wikipedia..

A hybrid approach to solving coarse-grained DisCSPs. (2009)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K.-Y. 2009. A hybrid approach to solving coarse-grained DisCSPs. In Proceedings of the 8th International conference on autonomous agents and multiagent systems (AAMAS 2009), 10-15 May 2009, Budapest, Hungary. Richland, South Carolina: International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS) [online], pages 1235-1236. Available from: http://www.aamas-conference.org/Proceedings/aamas09/pdf/02_Extended_Abstract/C_SP_0555.pdf

A coarse-grained Distributed Constraint Satisfaction Problem (DisCSP) consists of several loosely connected constraint satisfaction subproblems, each assigned to an individual agent. We present Multi-Hyb, a two-phase concurrent hybrid approach for so... Read More about A hybrid approach to solving coarse-grained DisCSPs..

Multi-Hyb: a hybrid algorithm for solving DisCSPs with complex local problems. (2009)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K.-Y. 2009. Multi-Hyb: a hybrid algorithm for solving DisCSPs with complex local problems. In Baeza-Yates, R., Lang, J., Mitra, S., Parsons, S. and Pasi, G. (eds.) Proceedings of the 2009 IEEE/WIC/ACM international conference on intelligent agent technology (IAT 2009), co-located with the 2009 IEEE/WIC/ACM international conference on web intelligence (WI 2009), and the joint conference workshops (WI-IAT Workshops 2009), 15-18 September 2009, Milan, Italy. Los Alamitos: IEEE Computer Society [online], volume 2, article number 5284811, pages 379-382. Available from: https://doi.org/10.1109/WI-IAT.2009.181

A coarse-grained Distributed Constraint Satisfaction Problem (DisCSP) is a constraint problem where several agents, each responsible for solving one part (a complex local problem), cooperate to determine an overall solution. Thus, agents solve the ov... Read More about Multi-Hyb: a hybrid algorithm for solving DisCSPs with complex local problems..

Interactive surface design and manipulation using PDE-method through Autodesk Maya plug-in. (2009)
Conference Proceeding
ELYAN, E. and UGAIL, H. 2009. Interactive surface design and manipulation using PDE-method through Autodesk Maya plug-in. In Ugail, H., Qahwaji, R.S.R, Earnshaw, R.A. and Willis, P.J. (eds.) Proceedings of the 2009 International conference on Cyberworlds (CYBERWORLDS 2009), 7-11 September 2009, Bradford, UK. Los Alamitos: IEEE Computer Society [online], article number 5279653, pages 119-125. Available from: https://doi.org/10.1109/CW.2009.49

This paper aims to propose a method for geometric design, modelling and shape manipulation using minimum input design parameters. Here, we address the method for the construction of 3D geometry based on the use of Elliptic Partial Differential Equati... Read More about Interactive surface design and manipulation using PDE-method through Autodesk Maya plug-in..

Automatic 3D face recognition using Fourier descriptors. (2009)
Conference Proceeding
ELYAN, E. and UGAIL, H. 2009. Automatic 3D face recognition using Fourier descriptors. In Ugail, H., Qahwaji, R.S.R, Earnshaw, R.A. and Willis, P.J. (eds.) Proceedings of the 2009 International conference on Cyberworlds (CYBERWORLDS 2009), 7-11 September 2009, Bradford, UK. Los Alamitos: IEEE Computer Society [online], article number 5279600, pages 246-252. Available from: https://doi.org/10.1109/CW.2009.48

3D face recognition is attracting more attention due to the recent development in 3D facial data acquisition techniques. It is strongly believed that 3D Face recognition systems could overcome the inherent problems of 2D face recognition such as faci... Read More about Automatic 3D face recognition using Fourier descriptors..

Context-sensitive requirements and risk analysis. (2009)
Presentation / Conference
FAILY, S. 2009. Context-sensitive requirements and risk analysis. Presented at the Doctoral symposium of the 17th IEEE international requirements engineering conference (RE2009), 1 September 2009, Atlanta, USA.

When a system's context of use changes, the security impact may be felt in other contexts. Risks mitigated for one operational context may continue to pose a danger in others due to contextual differences in assets, threats and vulnerabilities. The r... Read More about Context-sensitive requirements and risk analysis..

Context-sensitive requirements and risk management with IRIS. (2009)
Presentation / Conference
FAILY, S. and FLÉCHAIS, I. 2009. Context-sensitive requirements and risk management with IRIS. Presented at the 17th IEEE international requirements engineering conference (RE2009), 31 August - 4 September 2009, Atlanta, USA.

Many systems are not designed for their contexts of operation. Subtle changes to context may lead to an increase in severity and likelihood of vulnerabilities and threats. The IRIS framework integrates the notion of context into requirements and risk... Read More about Context-sensitive requirements and risk management with IRIS..

Multivariate Markov networks for fitness modelling in an estimation of distribution algorithm. (2009)
Thesis
BROWNLEE, A.E.I. 2009. Multivariate Markov networks for fitness modelling in an estimation of distribution algorithm. Robert Gordon University, PhD thesis.

A well-known paradigm for optimisation is the evolutionary algorithm (EA). An EA maintains a population of possible solutions to a problem which converges on a global optimum using biologically-inspired selection and reproduction operators. These alg... Read More about Multivariate Markov networks for fitness modelling in an estimation of distribution algorithm..

Characterizing pure high-order entanglements in lexical semantic spaces via information geometry. (2009)
Conference Proceeding
HOU, Y. and SONG, D. 2009. Characterizing pure high-order entanglements in lexical semantic spaces via information geometry. In Bruza, P., Sofge, D., Lawless, W., Van Rijsbergen, K. and Klusch, M. (eds.) Proceedings of the 3rd International symposium on quantum interaction (QI 2009), 25-27 March 2009, Saarbrücken, Germany. Lecture notes in computer science, 5494. Berlin: Springer [online], pages 237-250. Available from: https://doi.org/10.1007/978-3-642-00834-4_20

An emerging topic in Quantuam Interaction is the use of lexical semantic spaces, as Hilbert spaces, to capture the meaning of words. There has been some initial evidence that the phenomenon of quantum entanglement exists in a semantic space and can p... Read More about Characterizing pure high-order entanglements in lexical semantic spaces via information geometry..