Skip to main content

Research Repository

Advanced Search

All Outputs (526)

From requirements to operation: components for risk assessment in a pervasive system of systems. (2017)
Conference Proceeding
KI-ARIES, D., DOGAN, H., FAILY, S., WHITTINGTON, P. and WILLIAMS, C. 2017. From requirements to operation: components for risk assessment in a pervasive system of systems. In Proceedings of the 4th Workshop on evolving security and privacy requirements engineering (ESPRE 2017), part of the 25th IEEE international requirements engineering conference workshops (REW 2017), 4-8 September 2017, Lisbon, Portugal. Los Alamitos: IEEE Computer Society [online], pages 83-89. Available from: https://doi.org/10.1109/REW.2017.36

Framing Internet of Things (IoT) applications as a System of Systems (SoS) can help us make sense of complexity associated with interoperability and emergence. However, assessing the risk of SoSs is a challenge due to the independence of component sy... Read More about From requirements to operation: components for risk assessment in a pervasive system of systems..

Managing information security risk using integrated governance risk and compliance. (2017)
Conference Proceeding
NICHO, M., KHAN, S. and RAHMAN, M.S.M.K. 2017. Managing information security risk using integrated governance risk and compliance. In Proceedings of the 2017 International conference on computer and applications (ICCA 2017), 6-7 September 2017, Dubai, UAE. New York: IEEE [online], article number pages 8079741, 56-66. Available from: https://doi.org/10.1109/COMAPP.2017.8079741

This paper aims to demonstrate the building blocks of an IT Governance Risk and Compliance (IT GRC) model as well the phased stages of the optimal integration of IT GRC frameworks, standards and model through a longitudinal study. A qualitative longi... Read More about Managing information security risk using integrated governance risk and compliance..

Taxonomic corpus-based concept summary generation for document annotation. (2017)
Conference Proceeding
NKISI-ORJI, I., WIRATUNGA, N., HUI, K.-Y., HEAVEN, R. and MASSIE, S. 2017. Taxonomic corpus-based concept summary generation for document annotation. In Kampus, J., Tsakonas, G., Manolopoulos, Y., Iliadis, L. and Karydis, I. (eds.) Proceedings of the 21st International conference on theory and practice of digital libraries (TPDL 2017): research and advanced technology for digital libraries, 18-21 September 2017, Thessaloniki, Greece. Lecture notes in computer science, 10450. Cham: Springer [online], pages 49-60. Available from: https://doi.org/10.1007/978-3-319-67008-9_5

Semantic annotation is an enabling technology which links documents to concepts that unambiguously describe their content. Annotation improves access to document contents for both humans and software agents. However, the annotation process is a chall... Read More about Taxonomic corpus-based concept summary generation for document annotation..

Lexicon induction for interpretable text classification. (2017)
Conference Proceeding
CLOS, J. and WIRATUNGA, N. 2017. Lexicon induction for interpretable text classification. In Kampus, J., Tsakonas, G., Manolopoulos, Y., Iliadis, L. and Karydis, I. (eds.) Proceedings of the 21st International conference on theory and practice of digital libraries (TPDL 2017): research and advanced technology for digital libraries, 18-21 September 2017, Thessaloniki, Greece. Lecture notes in computer science, 10450. Cham: Springer [online], pages 498-510. Available from: https://doi.org/10.1007/978-3-319-67008-9_39

The automated classification of text documents is an active research challenge in document-oriented information systems, helping users browse massive amounts of data, detecting likely authors of unsigned work, or analyzing large corpora along predefi... Read More about Lexicon induction for interpretable text classification..

Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks. (2017)
Conference Proceeding
MAVROEIDIS, V. and NICHO, M. 2017. Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks. In Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V. and Szczypiorski, K. (eds.) Computer network security: Proceedings of the 7th International Mathematical methods, models and architectures for computer network security conference (MMM-ACNS 2017), 28-30 August 2017, Warsaw, Poland. Lecture notes in computer science, 10466. Cham: Springer [online], pages 313-324. Available from: https://doi.org/10.1007/978-3-319-65127-9_25

The two-dimensional quick response (QR) codes can be misleading due to the difficulty in differentiating a genuine QR code from a malicious one. Since, the vulnerability is practically part of their design, scanning a malicious QR code can direct the... Read More about Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks..

Heuristics-based detection to improve text/graphics segmentation in complex engineering drawings. (2017)
Conference Proceeding
MORENO-GARCÍA, C.F., ELYAN, E. and JAYNE, C. 2017. Heuristics-based detection to improve text/graphics segmentation in complex engineering drawings. In Boracchi, G., Iliadis, L., Jayne, C. and Likas, A. (eds.) Engineering applications of neural networks: proceedings of the 18th International engineering applications of neural networks (EANN 2017), 25-27 August 2017, Athens, Greece. Communications in computer and information science, 744. Cham: Springer [online], pages 87-98. Available from: https://doi.org/10.1007/978-3-319-65172-9_8

The demand for digitisation of complex engineering drawings becomes increasingly important for the industry given the pressure to improve the efficiency and time effectiveness of operational processes. There have been numerous attempts to solve this... Read More about Heuristics-based detection to improve text/graphics segmentation in complex engineering drawings..

Applying contextual integrity to open data publishing. (2017)
Conference Proceeding
HENRIKSEN-BULMER, J. and FAILY, S. 2017. Applying contextual integrity to open data publishing. In Hall, L., Flint, T., O'Hara, S. and Turner, P. (eds.) Proceedings of the 31st International BCS human computer interaction conference (HCI 2017), 3-6 July 2017, Sunderland, UK. Swindon: BCS, paper number 95. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/HCI2017.95

Open data publishing by both corporate and public bodies has increased significantly in recent years and this type of data could soon be developing into a real commodity. However, not all organisations pay sufficient heed to privacy as part of the de... Read More about Applying contextual integrity to open data publishing..

Learning deep and shallow features for human activity recognition. (2017)
Conference Proceeding
SANI, S., MASSIE, S., WIRATUNGA, N. and COOPER, K. 2017. Learning deep and shallow features for human activity recognition. In Li, G., Ge, Y, Zhang, Z., Jin, Z. and Blumenstein, M. (eds.) Knowledge science, engineering and management: proceedings of the 10th International knowledge science, engineering and management conference (KSEM 2017), 19-20 August 2017, Melbourne, Australia. Lecture notes in computer science, 10412. Cham: Springer [online], pages 469-482. Available from: https://doi.org/10.1007/978-3-319-63558-3_40

selfBACK is an mHealth decision support system used by patients for the self-management of Lower Back Pain. It uses Human Activity Recognition from wearable sensors to monitor user activity in order to measure their adherence to prescribed physical a... Read More about Learning deep and shallow features for human activity recognition..

Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques. (2017)
Conference Proceeding
PIRAS, L., PAJA, E., GIORGINI, P., MYLOPOULOS, J., CUEL, R. and PONTE, D. 2017. Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques. In Assar, S., Pastor, O. and Mouratidis, H. (eds.) Proceedings of 11th Institute of Electrical and Electronic Engineers (IEEE) Research challenges in information science international conference 2017 (RCIS 2017), 10-12 May 2017, Brighton, UK. Piscataway: IEEE [online], pages 255-265. Available from: https://doi.org/10.1109/RCIS.2017.7956544

Gamificationis a powerful paradigm and a set of best practices used to motivate people carrying out a variety of ICT–mediated tasks. Designing gamification solutions and applying them to a given ICT system is a complex and expensive process (in time,... Read More about Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques..

Re-framing "the AMN": a case study eliciting and modelling a system of systems using the Afghan Mission Network. (2017)
Conference Proceeding
KI-ARIES, D., FAILY, S., DOGAN, H. and WILLIAMS, C. 2017. Re-framing "the AMN": a case study eliciting and modelling a system of systems using the Afghan Mission Network. In Assar, S., Pastor, O. and Mouratidis, H. (eds.) Proceedings of the 11th IEEE international conference on research challenges in information science (RCIS 2017), 10-12 May 2017, Brighton, UK. Piscataway: IEEE [online], pages 103-108. Available from: https://doi.org/10.1109/RCIS.2017.7956524

The term System of Systems (SoS) is often used to classify an arrangement of independent and interdependent systems delivering unique capabilities. There appear to be many examples of SoSs, but the term has become a source of confusion. While many ap... Read More about Re-framing "the AMN": a case study eliciting and modelling a system of systems using the Afghan Mission Network..

System design considerations for risk perception. (2017)
Conference Proceeding
M'MANGA, A., FAILY, S., MCALANEY, J. and WILLIAMS, C. 2017. System design considerations for risk perception. In Assar, S., Pastor, O. and Mouratidis, H. (eds.) Proceedings of the 11th IEEE international conference on research challeneges in information science (RCIS 2017), 10-12 May 2017, Brighton, UK. Piscataway: IEEE [online], pages 322-327. Available from: https://doi.org/10.1109/RCIS.2017.7956554

The perception of risk is a driver for security analysts' decision making. However, security analysts may have conflicting views of a risk based on personal, system and environmental factors. This difference in perception and opinion, may impact effe... Read More about System design considerations for risk perception..

A convolutional Siamese network for developing similarity knowledge in the SelfBACK dataset. (2017)
Conference Proceeding
MARTIN, K., WIRATUNGA, N., SANI, S., MASSIE, S. and CLOS, J. 2017. A convolutional Siamese network for developing similarity knowledge in the SelfBACK dataset. In Sanchez-Ruiz, A.A. and Kofod-Petersen, A. (eds.) Workshop proceedings of the 25th International conference on case-based reasoning (ICCBR 2017), 26-29 June 2017, Trondheim, Norway. CEUR workshop proceedings, 2028. Aachen: CEUR-WS [online], session 2: case-based reasoning and deep learning workshop (CBRDL-2017), pages 85-94. Available from: https://ceur-ws.org/Vol-2028/paper8.pdf

The Siamese Neural Network (SNN) is a neural network architecture capable of learning similarity knowledge between cases in a case base by receiving pairs of cases and analysing the differences between their features to map them to a multi-dimensiona... Read More about A convolutional Siamese network for developing similarity knowledge in the SelfBACK dataset..

Learning deep features for kNN-based human activity recognition. (2017)
Conference Proceeding
SANI, S., WIRATUNGA, N. and MASSIE, S. 2017. Learning deep features for kNN-based human activity recognition. In Sanchez-Ruiz, A.A. and Kofod-Petersen, A. (eds.) Workshop proceedings of the 25th International conference on case-based reasoning (ICCBR 2017), 26-29 June 2017, Trondheim, Norway. CEUR workshop proceedings, 2028. Aachen: CEUR-WS [online], session 2: case-based reasoning and deep learning workshop (CBRDL-2017), pages 95-103. Available from: http://ceur-ws.org/Vol-2028/paper9.pdf

A CBR approach to Human Activity Recognition (HAR) uses the kNN algorithm to classify sensor data into different activity classes. Different feature representation approaches have been proposed for sensor data for the purpose of HAR. These include sh... Read More about Learning deep features for kNN-based human activity recognition..

kNN sampling for personalised human recognition. (2017)
Conference Proceeding
SANI, S., WIRATUNGA, N., MASSIE, S. and COOPER, K. 2017. kNN sampling for personalised human recognition. In Aha, D.W. and Lieber, J. (eds.) Case-based reasoning research and development: proceedings of the 25th International case-based reasoning conference (ICCBR 2017), 26-28 June 2017, Trondheim, Norway. Lecture notes in computer science, 10339. Cham: Springer [online], pages 330-344. Available from: https://doi.org/10.1007/978-3-319-61030-6_23

The need to adhere to recommended physical activity guidelines for a variety of chronic disorders calls for high precision Human Activity Recognition (HAR) systems. In the SelfBACK system, HAR is used to monitor activity types and intensities to enab... Read More about kNN sampling for personalised human recognition..

Estimation of distribution algorithms for the multi-mode resource constrained project scheduling problem. (2017)
Conference Proceeding
AYODELE, M., MCCALL, J. and REGNIER-COUDERT, O. 2017. Estimation of distribution algorithms for the multi-mode resource constrained project scheduling problem. In Proceedings of the 2017 IEEE congress on evolutionary computation (CEC 2017), 5-8 June 2017, San Sebastian, Spain. New York: IEEE [online], article number 7969491, pages 1579-1586. Available from: https://doi.org/10.1109/CEC.2017.7969491

Multi-Mode Resource Constrained Project Problem (MRCPSP) is a multi-component problem which combines two interacting sub-problems; activity scheduling and mode assignment. Multi-component problems have been of research interest to the evolutionary co... Read More about Estimation of distribution algorithms for the multi-mode resource constrained project scheduling problem..

A random key based estimation of distribution algorithm for the permutation flowshop scheduling problem. (2017)
Conference Proceeding
AYODELE, M., MCCALL, J., REGNIER-COUDERT, O. and BOWIE, L. 2017. A random key based estimation of distribution algorithm for the permutation flowshop scheduling problem. In Proceedings of the 2017 IEEE congress on evolutionary computation (CEC 2017), 5-8 June 2017, San Sebastian, Spain. New York: IEEE [online], article number 7969591, pages 2364-2371. Available from: https://doi.org/10.1109/CEC.2017.7969591

Random Key (RK) is an alternative representation for permutation problems that enables application of techniques generally used for continuous optimisation. Although the benefit of RKs to permutation optimisation has been shown, its use within Estima... Read More about A random key based estimation of distribution algorithm for the permutation flowshop scheduling problem..

Neural induction of a lexicon for fast and interpretable stance classification. (2017)
Conference Proceeding
CLOS, J. and WIRATUNGA, N. 2017. Neural induction of a lexicon for fast and interpretable stance classification. In Gracia, J., Bond, F., McCrae, J.P., Buitelaar, P., Chiarcos, C. and Hellmann, S. (eds.) Language, data and knowledge: proceedings of the 1st International conference on language, data and knowledge (LDK 2017), 19-20 June 2017, Galway, Ireland. Lecture notes in computer science, 10318. Cham: Springer [online], pages 181-193. Available from: https://doi.org/10.1007/978-3-319-59888-8_16

Large-scale social media classification faces the following two challenges: algorithms can be hard to adapt to Web-scale data, and the predictions that they provide are difficult for humans to understand. Those two challenges are solved at the cost o... Read More about Neural induction of a lexicon for fast and interpretable stance classification..

Stokes coordinates. (2017)
Conference Proceeding
SAVOYE, Y. 2017. Stokes coordinates. In Spencer, S.N. (ed.) Proceedings of the 33rd Spring conference on computer graphics (SCCG'17), 15-17 May 2017, Mikulov, Czech Republic. New York: ACM [online], article number 5. Available from: https://doi.org/10.1145/3154353.3154354

Cage-based structures are reduced subspace deformers enabling non-isometric stretching deformations induced by clothing or muscle bulging. In this paper, we reformulate the cage-based rigging as an incompressible Stokes problem in the vorticity space... Read More about Stokes coordinates..

Deep reward shaping from demonstrations. (2017)
Conference Proceeding
HUSSEIN, A., ELYAN, E., GABER, M.M. and JAYNE, C. 2017. Deep reward shaping from demonstrations. In Proceedings of the 2017 International joint conference on neural networks (IJCNN 2017), 14-19 May 2017, Anchorage, USA. Piscataway: IEEE [online], article number 7965896, pages 510-517. Available from: https://doi.org/10.1109/IJCNN.2017.7965896

Deep reinforcement learning is rapidly gaining attention due to recent successes in a variety of problems. The combination of deep learning and reinforcement learning allows for a generic learning process that does not consider specific knowledge of... Read More about Deep reward shaping from demonstrations..

An edit distance between graph correspondences. (2017)
Conference Proceeding
MORENO-GARCIA, C.F., SERRATOSA, F. and JIANG, X. 2017. An edit distance between graph correspondences. In Foggia, P., Liu, C.-L. and Vento, M (eds.) 2017. Graph-based representations in pattern recognition: proceedings of the 11th Image analysis in patter recognition technical committee 15th (IAPR-TC-15) international workshop (GbRPR 2017), 16-18 May 2017, Anacapri, Italy. Cham: Springer [online], pages 232-241. Available from: https://doi.org/10.1007/978-3-319-58961-9_21

The Hamming Distance has been largely used to calculate the dissimilarity of a pair of correspondences (also known as labellings or matchings) between two structures (i.e. sets of points, strings or graphs). Although it has the advantage of being sim... Read More about An edit distance between graph correspondences..