Skip to main content

Research Repository

See what's under the surface


Towards a conversational agent for threat detection in the internet of things. (2019)
Conference Proceeding
MCDERMOTT, C.D., JEANNELLE, B. and ISAACS, J.P. 2019. Towards a conversational agent for threat detection in the internet of things. In Proceedings of the 2019 International Cyber science on cyber situational awareness, data analytics and assessment (Cyber SA): pioneering research and innovation in cyber situational awareness, 3-4 June 2019, Oxford, UK. Piscataway: IEEE [online], chapter 6. Available from: https://doi.org/10.1109/CyberSA.2019.8899580

A conversational agent to detect anomalous traffic in consumer IoT networks is presented. The agent accepts two inputs in the form of user speech received by Amazon Alexa enabled devices, and classified IDS logs stored in a DynamoDB Table. Aural anal... Read More about Towards a conversational agent for threat detection in the internet of things..

Borders within border: fragmentation, connection and disposition. (2019)
Conference Proceeding
CIMADOMO, G. (ed.) 2019. Borders within border: fragmentation, connection and disposition. Book of abstracts for the 2nd Urbanism at borders global conference, 23-25 October 2019, Málaga, Spain. Málaga: Universidad de Málaga.

This is the book of abstracts for the 2nd Urbanism at Borders global conference, held 23-25 October 2019 at the University of Málaga, Spain. Robert Gordon University was acknowledged as a co-organiser of this event.

Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. (2019)
Conference Proceeding
ZAKARIYYA, I., AL-KADRI, M.O., KALUTARGE, H. and PETROVSKI, A. 2019. Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. In Obaidat, M. and Samarati, P. (eds.) Proceedings of the 16th International security and cryptography conference (SECRYPT 2019), co-located with the 16th International joint conference on e-business and telecommunications (ICETE 2019), 26-28 July 2019, Prague, Czech Republic. Setúbal, Portugal: SciTePress [online], 2, pages 523-528. Available from: https://doi.org/10.5220/0008119205230528.

Using Machine Learning (ML) for Internet of Things (IoT) security monitoring is a challenge. This is due to their resource constraint nature that limits the deployment of resource-hungry monitoring algorithms. Therefore, the aim of this paper is to i... Read More about Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm..

Optimal coil design for maximum power transfer efficiency in resonantly coupled systems. (2019)
Conference Proceeding
HEIDARIAN, M., BURGESS, S.J., PRABHU, R. and FOUGH, N. 2019. Optimal coil design for maximum power transfer efficiency in resonantly coupled systems. In Proceedings of 2019 United States National Committee for the International Union for Radio Science (USNC-URSI) radio science meeting (URSI 2019), co-located with 2019 Antennas and propagation symposium (AP-S/URSI 2019), 7-12 July 2019, Atlanta, USA. Piscataway: IEEE [online], pages 73-74. Available from: https://doi.org/10.1109/USNC-URSI.2019.8861834

Maintaining maximum power transfer efficiency (PTE) is one of the main challenges in resonant inductive power transfer (IPT) systems. Maximum PTE can be achieved if the coupling between transmitter and receiver coils is strong. One way of achieving t... Read More about Optimal coil design for maximum power transfer efficiency in resonantly coupled systems..

Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus. (2019)
Conference Proceeding
KALUTARAGE, H.K., AL-KADRI, M.O., CHEAH, M. and MADZUDZO, G. 2019. Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus. In Hof, H.-J., Fritz, M., Kraub, C. and Wasenmüller, O. (eds.). Proceedings of 2019 Computer science in cars symposium (CSCS 2019), 8 October 2019, Kaiserslautern, Germany. New York: ACM [online], article number 7. Available from: https://doi.org/10.1145/3359999.3360496

Automotive electronics is rapidly expanding. An average vehicle contains million lines of software codes, running on 100 of electronic control units (ECUs), in supporting number of safety, driver assistance and infotainment functions. These ECUs are... Read More about Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus..

Multiple fake classes GAN for data augmentation in face image dataset. (2019)
Conference Proceeding
ALI-GOMBE, A., ELYAN, E. and JAYNE, C. 2019. Multiple fake classes GAN for data augmentation in face image dataset. In Proceedings of the 2019 International joint conference on neural networks (IJCNN 2019), 14-19 July 2019, Budapest, Hungary. Piscataway: IEEE [online], article ID 8851953. Available from: https://doi.org/10.1109/IJCNN.2019.8851953

Class-imbalanced datasets often contain one or more class that are under-represented in a dataset. In such a situation, learning algorithms are often biased toward the majority class instances. Therefore, some modification to the learning algorithm o... Read More about Multiple fake classes GAN for data augmentation in face image dataset..

Digitisation of assets from the oil and gas industry: challenges and opportunities. (2019)
Conference Proceeding
MORENO-GARCIA, C.F. and ELYAN, E. 2019. Digitisation of assets from the oil and gas industry: challenges and opportunities. In Proceedings of 2019 International conference on document analysis and recognition workshops (ICDARW), 22-25 September 2019, Sydney, Australia. Piscataway: IEEE [online], 7, pages 2-5. Available from: https://doi.org/10.1109/ICDARW.2019.60122

Automated processing and analysis of legacies of printed documents across the Oil & Gas industry provide a unique opportunity and at the same time pose a significant challenge. One particular example is the case of Piping and Instrumentation Diagrams... Read More about Digitisation of assets from the oil and gas industry: challenges and opportunities..

Dimensions of ‘socio’ vulnerabilities of advanced persistent threats. (2019)
Conference Proceeding
NICHO, M. and MCDERMOTT, C.D. 2019. Dimensions of ‘socio’ vulnerabilities of advanced persistent threats. In Begušić, D., Rožić, N., Radić, J. and Šarić, M. (eds.) Proceedings of the 27th International software, telecommunications and computer networks conference 2019 (SoftCOM 2019), 19-21 September 2019, Split, Croatia. Piscataway: IEEE [online], article ID 8903788. Available from: https://doi.org/10.23919/SOFTCOM.2019.8903788

Advanced Persistent Threats (APT) are highly targeted and sophisticated multi-stage attacks, utilizing zero day or near zero-day malware. Directed at internetworked computer users in the workplace, their growth and prevalence can be attributed to bot... Read More about Dimensions of ‘socio’ vulnerabilities of advanced persistent threats..

Minimum aperture transit in healthy adults of different size to predict egress capability. (2019)
Conference Proceeding
STEWART, A., NEVILL, A. and JOHNSON, C. 2019. Minimum aperture transit in healthy adults of different size to predict egress capability. In Charles, R. and Golightly, D. (eds) Contemporary ergonomics and human factors 2019: proceedings of the Ergonomics and human factors 2019 (EHF 2019), 29 April - 1 May 2019, Stratford-upon-Avon, UK. Birmingham : CIEHF [online]. Available from: https://publications.er...-egress-capability.html

Minimum aperture dimensions have traditionally been considered from an industrial perspective for facilitating safe confined-space working or emergency exit from transportation. However, secular trends for increased typical body size resulting from g... Read More about Minimum aperture transit in healthy adults of different size to predict egress capability..

An ergonomic assessment of small boat lobster fishing. (2019)
Conference Proceeding
DUGUID, A. and VOSPER, H. 2019. An ergonomic assessment of small boat lobster fishing. In Charles, R. and Golightly, D. (eds) Contemporary ergonomics and human factors 2019: proceedings of the Ergonomics and human factors 2019 (EHF 2019), 29 April - 1 May 2019, Stratford-upon-Avon, UK. Birmingham : CIEHF [online]. Available from: https://publications.er...at-lobster-fishing.html

Fishing is a high-risk occupation: among these risks is the high frequency of work-related musculoskeletal injury. While the industry is regulated world-wide, the safety focus is on larger vessels, which is significant given that the vast majority of... Read More about An ergonomic assessment of small boat lobster fishing..

Developing a catalogue of explainability methods to support expert and non-expert users. (2019)
Conference Proceeding
MARTIN, K., LIRET, A., WIRATUNGA, N., OWUSU, G. and KERN, M. [2019]. Developing a catalogue of explainability methods to support expert and non-expert users. To be presented at the 39th British Computer Society's Specialist Group on Artificial Intelligence (SGAI) International annual conference (SGAI 2019), 17-19 December 2019, Cambridge, UK.

Organisations face growing legal requirements and ethical responsibilities to ensure that decisions made by their intelligent systems are explainable. However, provisioning of an explanation is often application dependent, causing an extended design... Read More about Developing a catalogue of explainability methods to support expert and non-expert users..

Learning to self-manage by intelligent monitoring, prediction and intervention. (2019)
Conference Proceeding
WIRATUNGA, N., CORSAR, D., MARTIN, K., WIJEKOON, A., ELYAN, E., COOPER, K., IBRAHIM, Z., CELIKTUTAN, O., DOBSON, R.J., MCKENNA, S., MORRIS, J., WALLER, A., ABD-ALHAMMED, R., QAHWAJI, R. and CHAUDHURI, R. 2019. Learning to self-manage by intelligent monitoring, prediction and intervention. In Wiratunga, N., Coenen, F. and Sani, S. (eds.) Proceedings of the 4th International workshop on knowledge discovery in healthcare data (KDH 2019), co-located with the 28th International joint conference on artificial intelligence (IJCAI-19), 10-11 August 2019, Macao, China. CEUR workshop proceedings, 2429. Aachen: CEUR-WS [online], pages 60-67. Available from: http://ceur-ws.org/Vol-2429/paper10.pdf

Despite the growing prevalence of multimorbidities, current digital self-management approaches still prioritise single conditions. The future of out-of-hospital care requires researchers to expand their horizons; integrated assistive technologies sho... Read More about Learning to self-manage by intelligent monitoring, prediction and intervention..

Macro-BIM adoption study: establishing Nigeria's BIM maturity. (2019)
Conference Proceeding
HAMMA-ADAMA, M. and KOUIDER, T. 2019. Macro-BIM adoption study: establishing Nigeria’s BIM maturity. In Aigbavboa, C. and Thwala, W. (eds.) The construction industry in the fourth industrial revolution: proceedings of the 11th Construction Industry Development Board (CIDB) postgraduate research conference (CIDB 2019): positioning the construction industry in the fourth industrial revolution, 28-30 July 2019, Johannesburg, South Africa. Cham: Springer [online], pages 401-411. Available from: https://doi.org/10.1007/978-3-030-26528-1_40

Construction Industry in Nigeria has since required a disruptive technology to change its construction business and improve its capabilities and productivity. As an on-going research (PhD work) to developing a strategy for an effective Building Infor... Read More about Macro-BIM adoption study: establishing Nigeria's BIM maturity..

The use of machine learning algorithms for detecting advanced persistent threats. (2019)
Conference Proceeding
EKE, H.N., PETROVSKI, A. and AHRIZ, H. 2019. The use of machine learning algorithms for detecting advanced persistent threats. Presented at the 12th International on security of information and networks conference 2019 (SINCONF 2019), 12-15 September 2019, Sochi, Russia. New York: ACM [online], (accepted). Availalbe from: https://doi.org/10.1145/3357613.3357618

Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. Due to their capability to navigates around defenses and to evade detection for a prolonged period of... Read More about The use of machine learning algorithms for detecting advanced persistent threats..

Human activity recognition with deep metric learners. (2019)
Conference Proceeding
MARTIN, K., WIJEKOON, A. and WIRATUNGA, N. [2019]. Human activity recognition with deep metric learners. In Workshop proceedings of the 27th International conference on case-based reasoning (ICCBR 2019), 8-12 September 2019, Otzenhausen, Germany. CEUR workshop proceedings: CEUR-WS [online], (accepted).

Establishing a strong foundation for similarity-based return is a top priority in Case-Based Reasoning (CBR) systems. Deep Metric Learners (DMLs) are a group of neural network architectures which learn to optimise case representations for similarity-... Read More about Human activity recognition with deep metric learners..

Anomaly detection in network traffic using dynamic graph mining with a sparse autoencoder. (2019)
Conference Proceeding
JIA, G., MILLER, P., HONG, X., KALUTARAGE, H. and BAN, T. 2019. Anomaly detection in network traffic using dynamic graph mining with a sparse autoencoder. In Proceedings of 18th Institution of Electrical and Electronics Engineers (IEEE) International trust, security and privacy in computing and communications conference, co-located with 13th Institution of Electrical and Electronics Engineers (IEEE) International big data science and engineering conference (TrustCom/BigDataSE), 5-8 August 2019, Rotorua, New Zealand. Piscataway: IEEE [online], pages 458-465. Available from: https://doi.org/10.1109...om/BigDataSE.2019.00068

Network based attacks on ecommerce websites can have serious economic consequences. Hence, anomaly detection in dynamic network traffic has become an increasingly important research topic in recent years. This paper proposes a novel dynamic Graph and... Read More about Anomaly detection in network traffic using dynamic graph mining with a sparse autoencoder..

Introducing the dynamic customer location-allocation problem. (2019)
Conference Proceeding
ANKRAH, R., LACROIX, B., MCCALL, J., HARDWICK, A. and CONWAY, A. 2019. Introducing the dynamic customer location-allocation problem. In Proceedings of the 2019 Institute of Electrical and Electronics Engineers (IEEE) Congress on evolutionary computation (IEEE CEC 2019), 10-13 June 2019, Wellington, NZ. Piscataway: IEEE [online], pages 3157-3164. Available from: https://doi.org/10.1109/CEC.2019.8790150.

In this paper, we introduce a new stochastic Location-Allocation Problem which assumes the movement of customers over time. We call this new problem Dynamic Customer Location-Allocation Problem (DC-LAP). The problem is based on the idea that customer... Read More about Introducing the dynamic customer location-allocation problem..

Comparative analysis of two asynchronous parallelization variants for a multi-objective coevolutionary solver. (2019)
Conference Proceeding
ZAVOIANU, A.-C., SAMINGER-PLATZ, S. and AMRHEIN, W. 2019. Comparative analysis of two asynchronous parallelization variants for a multi-objective coevolutionary solver. In Proceedings of the 2019 Institute of Electrical and Electronics Engineers (IEEE) congress on evolutionary computation (IEEE CEC 2019), 10-13 June 2019, Wellington, New Zealand. Piscataway: IEEE [online], article number 8790133, pages 3078-3085. Available from: https://doi.org/10.1109/CEC.2019.8790133

We describe and compare two steady state asynchronous parallelization variants for DECMO2++, a recently proposed multi-objective coevolutionary solver that generally displays a robust run-time convergence behavior. The two asynchronous variants were... Read More about Comparative analysis of two asynchronous parallelization variants for a multi-objective coevolutionary solver..

What are the barriers and drivers toward BIM adoption in Nigeria? (2019)
Conference Proceeding
HAMMA-ADAMA, M. and KOUIDER, T. 2019. What are the barriers and drivers towards BIM adoption in Nigeria? In Skibniewski, M.J. and Hajdu, M. (eds.) Proceedings of the 2019 Creative construction conference (CCC 2019), 29 June – 2 July 2019, Budapest, Hungary. Budapest: Diamond Congress Ltd [online], pages 529-539. Available from:https://2019.creative-c...nference.com/downloads/

The ‘digitalization and collaboration’ or Building Information Modelling (BIM) in the construction industry has been gaining momentum in the recent academic engagements. Despite its existence in many industries (i.e. publishing, retailing, financial... Read More about What are the barriers and drivers toward BIM adoption in Nigeria?.

An online variational inference and ensemble based multi-label classifier for data streams. (2019)
Conference Proceeding
NGUYEN, T.T.T., NGUYEN, T.T., LIEW, A.W.-C., WANG, S.-L., LIANG, T. and HU, Y. 2019. An online variational inference and ensemble based multi-label classifier for data streams. In Proceedings of 11th International conference on advanced computational intelligence (ICACI 2019), 7-9 June 2019, Guilin, China. Piscataway: IEEE [online], pages 302-307. Available from: https://doi.org/10.1109/icaci.2019.8778594

Recently, multi-label classification algorithms have been increasingly required by a diversity of applications, such as text categorization, web, and social media mining. In particular, these applications often have streams of data coming continuousl... Read More about An online variational inference and ensemble based multi-label classifier for data streams..