Skip to main content

Research Repository

Advanced Search

All Outputs (85)

Usability and security by design: a case study in research and development. (2015)
Conference Proceeding
FAILY, S., LYLE, J., FLÉCHAIS, I. and SIMPSON, A. 2015. Usability and security by design: a case study in research and development. In Proceedings of the 2015 Workshop on useable security (USEC 2015), co-located with the 2015 Network and distributed system security symposium (NDSS 2015), 8 February 2015, San Diego, USA. Reston: Internet Society [online]. Available from: https://doi.org/10.14722/usec.2015.23012

There is ongoing interest in utilising user experiences associated with security and privacy to better inform system design and development. However, there are few studies demonstrating how, together, security and usability design techniques can help... Read More about Usability and security by design: a case study in research and development..

Digital rights management: the four perspectives of developers, distributors, users and lawyers. (2015)
Conference Proceeding
MCDONALD, N., FAILY, S., FAVALE, M. and GATZIDIS, C. 2015. Digital rights management: the four perspectives of developers, distributors, users and lawyers. In Furnell, S.M. and Clarke, N.L. (eds.) Proceedings of the 9th International symposium on human aspects of information security and assurance (HAISA 2015), 1-3 July 2015, Mytilene, Greece. Plymouth: Plymouth University, pages 276-285.

Digital Rights Management (DRM) refers to a collection of security mechanisms that are widely deployed on a number of copyright-protected digital assets. However, despite the existence of a number of studies of the technical architectures of rights m... Read More about Digital rights management: the four perspectives of developers, distributors, users and lawyers..

Ethical dilemmas and dimensions in penetration testing. (2015)
Conference Proceeding
FAILY, S., MCALANEY, J. and IACOB, C. 2015. Ethical dilemmas and dimensions in penetration testing. In Furnell, S.M. and Clarke, N.L. (eds.) Proceedings of the 9th International symposium on human aspects of information security and assurance (HAISA 2015), 1-3 July 2015, Mytilene, Greece. Plymouth: Plymouth University, pages 233-242.

Penetration testers are required to attack systems to evaluate their security, but without engaging in unethical behaviour while doing so. Despite work on hacker values and studies into security practice, there is little literature devoted to the eth... Read More about Ethical dilemmas and dimensions in penetration testing..

Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). (2015)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2015. Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). In Proceedings of the 2015 International Information Society conference 2015 (i-Society 2015), 9-11 November 2015, London, UK. Piscataway: IEEE [online], pages 59-66. Available from: https://doi.org/10.1109/i-Society.2015.7366859

One of the key concerns of implementing multitenancy (i.e., serving multiple tenants with a single instance of an application) on the cloud is how to enable the required degree of isolation between tenants, so that the required performance of one ten... Read More about Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS)..

Mitigating circumstances in cybercrime: a position paper. (2015)
Conference Proceeding
ALI, R., MCALANEY, J., FAILY, S., PHALP, K. and KATOS, V. 2015. Mitigating circumstances in cybercrime: a position paper. In Wu, Y., Min, G., Georgalas, N., Hu, J., Atzori, L., Jin, X., Jarvis, S., Liu, L. and Agüero Calvo, R. (eds.) CIT/IUCC/DASC/PICom 2015: proceedings of the 3rd International workshop on cybercrimes and emerging web environments (CEWE 2015), part of the 13th IEEE international conference on dependable, autonomic and secure computing (DASC 2015), co-located with the 15th IEEE international conference on computer and information technology (CIT 2015), the 14th IEEE international conference on ubiquitous computing and communications (IUCC 2015), and the 13th IEEE international conference on pervasive intelligence and computing (PICom 2015), 26-28 October 2015, Liverpool, UK. Los Alamitos: IEEE Computer Society [online], pages 1972-1976. Available from: https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.292

This paper argues the need for considering mitigating circumstances in cybercrime. Mitigating circumstances are conditions which moderate the culpability of an offender of a committed offence. Our argument is based on several observations. The cybers... Read More about Mitigating circumstances in cybercrime: a position paper..

Using gamification to incentivize sustainable urban mobility. (2015)
Conference Proceeding
KAZHAMIAKIN, R., MARCONI, A., PERILLO, M., PISTORE, M., VALETTO, G., PIRAS, L., AVESANI, F. and PERRI, N. 2015. Using gamification to incentivize sustainable urban mobility. In Proceedings of 1st Institute of Electrical and Electronics Engineers (IEEE) International smart cities conference 2015 (ISC2-2015), 25-28 October 2015, Guadalajara, Mexico. Piscataway: IEEE [online], article ID 7366196. Available from: https://doi.org/10.1109/ISC2.2015.7366196

Sustainable urban mobility is an important dimension in a Smart City, and one of the key issues for city sustainability. However, innovative and often costly mobility policies and solutions introduced by cities are liable to fail, if not combined wit... Read More about Using gamification to incentivize sustainable urban mobility..

Numerical analysis of a railway compartment fire. (2015)
Conference Proceeding
ENBAYA, A., ASIM, T., MISHRA, R. and RAO, R.B.K.N. 2015. Numerical analysis of a railway compartment fire. In Kumar, U., Ahmadi, A., Verma, A.K. and Varde, P. (eds.) Current trends in reliability, availability, maintainability and safety: an industry perspective; selected papers from 2015 joint International conference on reliability, safety and hazard (ICRESH) and Advances in reliability, maintenance and safety (ARMS) (ICRESH-ARMS 2015), 1-4 June 2015, Luleå, Sweden. Lecture notes in mechanical engineering, 11236. Cham: Springer [online], pages 471-484. Available from: https://doi.org/10.1007/978-3-319-23597-4_34

Trains are considered to be the safest on-land transportation means for both passengers and cargo. Train accidents have been mainly disastrous, especially in case of fire, where the consequences are extensive loss of life and goods. The fire would ge... Read More about Numerical analysis of a railway compartment fire..

ClusterNN: a hybrid classification approach to mobile activity recognition. (2015)
Conference Proceeding
BASHIR, S., DOOLAN, D. and PETROVSKI, A. 2015. ClusterNN: a hybrid classification approach to mobile activity recognition. In Chen, L.L., Steinbauer, M., Khalil, I. and Anderst-Kotsis, G. (eds.) Proceedings of the 13th International advances in mobile computing and multimedia conference (MoMM 2015), 11-13 December 2015, Brussels, Belguim. New York: ACM [online], pages 263-267. Available from: https://doi.org/10.1145/2837126.2837140

Mobile activity recognition from sensor data is based on supervised learning algorithms. Many algorithms have been proposed for this task. One of such algorithms is the K-nearest neighbour (KNN) algorithm. However, since KNN is an instance based algo... Read More about ClusterNN: a hybrid classification approach to mobile activity recognition..

Optimal vaneless diffuser design for a high-end centrifugal compressor. (2015)
Conference Proceeding
AHMED, N., ASIM, T., MISHRA, R., SIVAGNANASUNDARAM, S. and EYNON, P. 2015. Optimal vaneless diffuser design for a high-end centrifugal compressor. In Proceedings of 28th Condition monitoring and diagnostic engineering management international congress 2015 (COMADEM 2015), co-located with 10th regional Congress on non-destructive and structural testing (X CORENDE), 1-4 December 2015, Buenos Aires, Argentina. Birmingham: COMADEM International, pages 406-413.

Turbochargers are widely used in the automotive industry to reduce engine emissions and to increase the power. Centrifugal compressors are an integral part of turbochargers. Centrifugal compressors comprises primarily of inducer, impeller, diffuser a... Read More about Optimal vaneless diffuser design for a high-end centrifugal compressor..

Effect of solar heat flux and thermal loading on the flow distribution within the riser pipes of a closed-loop solar thermo-syphon hot water system. (2015)
Conference Proceeding
FREEGAH, B., ASIM, T. and MISHRA, R. 2015. Effect of solar heat flux and thermal loading on the flow distribution within the riser pipes of a closed-loop solar thermo-syphon hot water system. In Proceedings of 28th Condition monitoring and diagnostic engineering management international congress 2015 (COMADEM 2015), co-located with 10th regional Congress on non-destructive and structural testing (X CORENDE), 1-4 December 2015, Buenos Aires, Argentina. Birmingham: COMADEM International, pages 398-405.

Solar energy is one of the main sources of renewable energy that is abundantly available throughout the world. Solar energy can be used for useful purposes through a number of mechanical artefacts. One such artefact is known as Thermo-syphon, which t... Read More about Effect of solar heat flux and thermal loading on the flow distribution within the riser pipes of a closed-loop solar thermo-syphon hot water system..

Music recommendation: audio neighbourhoods to discover music in the long tail. (2015)
Conference Proceeding
CRAW, S., HORSBURGH, B. and MASSIE, S. 2015. Music recommendation: audio neighbourhoods to discover music in the long tail. In Hüllermeier, E. and Minor, M. (eds.) Proceedings of the 23rd international conference on case-based reasoning research and development (ICCBR 2015), 28-30 September 2015, Frankfurt am Main, Germany. Lecture notes in computer science, 9343. Cham: Springer [online], pages 73-87. Available from: https://doi.org/10.1007/978-3-319-24586-7_6

Millions of people use online music services every day and recommender systems are essential to browse these music collections. Users are looking for high quality recommendations, but also want to discover tracks and artists that they do not already... Read More about Music recommendation: audio neighbourhoods to discover music in the long tail..

Use of social media in construction industry: a case study. (2015)
Conference Proceeding
PERERA, S., VICTORIA, M.F. and BRAND, S. 2015. Use of social media in construction industry: a case study. In Egbu, C. (ed.) Proceedings of the 2015 CIB international conference (CIB2015): going north for sustainability: leveraging knowledge and innovation for sustainable construction and development, 23-25 November 2015, London, UK. London: IBEA Publications [online], pages 462-473. Available from: http://www.irbnet.de/daten/iconda/CIB_DC28892.pdf

Social media evolved in the early 2000's with the birth of Facebook and Flickr in 2004. It is hard to ignore the current influence of social media upon modern lifestyle with the continuous development of many social media platforms over the past deca... Read More about Use of social media in construction industry: a case study..

Development of the 'Water-specific P3 risk model': risks identified. (2015)
Conference Proceeding
KORAYEM, M.I., OGUNLANA, O.S. and BOATENG, P. 2015. Development of the 'Water-specific P3 risk model': risks identified. Proceedings of CIB2015: 'going north for sustainability': leveraging knowledge and innovation for sustainable and development, 23-25 November 2015, London, UK. London: IBEA Publications [online], pages 92-103. Available from: http://www.irbnet.de/daten/iconda/CIB_DC28858.pdf

Risk assessment is one of the key success factors of public-private partnerships (PPP) water projects. Factors such as utility condition problems, unsustained increase in water supply requirements, socio-technical issues and changes in government pol... Read More about Development of the 'Water-specific P3 risk model': risks identified..

DC fault isolation study of bidirectional dual active bridge DC/DC converter for DC transmission grid application. (2015)
Conference Proceeding
HARRYE, Y.A., AHMED, K.H. and ABOUSHADY, A.A. 2015. DC fault isolation study of bidirectional dual active bridge DC/DC converter for DC transmission grid application. In Proceedings of the 41st IEEE Industrial Electronics Society annual conference (IECON 2015), 9-12 November 2015, Yokohama, Japan. Piscataway: IEEE [online], pages 3193-3198. Available from: https://doi.org/10.1109/IECON.2015.7392592

Fast isolation and detection of DC faults is currently a limiting factor in high power DC transmission grid development. Recent research has shown that the role of DC/DC converters is becoming increasingly important in solving various DC grid challen... Read More about DC fault isolation study of bidirectional dual active bridge DC/DC converter for DC transmission grid application..

Second skin iterations: programmes and prototypes. (2015)
Conference Proceeding
STEED, J. and FAIRBURN, S. 2015. Second skin iterations: programmes and prototypes. In Britt, H., Morgan, L. and Walton, K. (eds.) Proceedings of Futurescan 3: intersecting identities, 11-12 November 2015, Glasgow, UK. Loughborough: FTC [online], pages 231-239. Available from: http://www.ftc-online.org.uk/publications/conference/

As an emerging area of research, blending science, technology, design: product, textiles and fashion, this paper speculates on ways to use 3D realisation and embedded technologies to address and enhance our ability to live well. There is clearly a si... Read More about Second skin iterations: programmes and prototypes..

Insourcing a government information system an analysis using institutions and the capability approach. (2015)
Conference Proceeding
OMAR, A., BASS, J.M. and LOWIT, P. 2015. Insourcing a government information system an analysis using institutions and the capability approach. In Proceedings of the 2015 International conference on information society (i-Society 2015), 9-11 November 2015, London, UK. PiscatawayJ: IEEE [online], pages 91-96. Available from: https://doi.org/10.1109/i-Society.2015.7366866

This study explores the effectiveness of insourcing in the Malaysian Government. The research discusses the factors and issues of insourcing in a Malaysian government agency in the context of post contract termination of an outsourcing agreement. A q... Read More about Insourcing a government information system an analysis using institutions and the capability approach..

Multiple source localization for partial discharge monitoring in electrical substation. (2015)
Conference Proceeding
ZHANG, Y., UPTON, D., JABER, A., AHMED, H., KHAN, U., SAEED, B., MATHER, P., LAZARIDIS, P., ATKINSON, R., VIEIRA, M.F.Q. and GLOVER, I.A. 2015. Multiple source localization for partial discharge monitoring in electrical substation. In Proceedings of 2015 Loughborough antennas and propagation conference (LAPC 2015), 2-3 November 2015, Loughbrough, UK. Piscataway: IEEE [online], article ID 7366001. Available from: https://doi.org/10.1109/LAPC.2015.7366001

This paper studies novel localization methods of multiple partial discharge sources in electrical substations. The three compressive sensing algorithms of Orthogonal Matching Pursuit (OMP), Homotopy technique, and Dichotomous coordinate descent (DCD)... Read More about Multiple source localization for partial discharge monitoring in electrical substation..

Online news videos: the UX of subtitle position. (2015)
Conference Proceeding
CRABB, M., JONES, R., ARMSTRONG, M. and HUGHES, C.J. 2015. Online news videos: the UX of subtitle position. In Proceedings of the 17th International Association for Computing Machinery (ACM) SIGACCESS conference on computers and accessibility (ASSETS '15), 26-28 October 2015, Lisbon, Portugal. New York: ACM [online], pages 215-222. Available from: http://doi.acm.org/10.1145/2700648.2809866

Millions of people rely on subtitles when watching video content. The current change in media viewing behaviour involving computers has resulted in a large proportion of people turning to online sources as opposed to regular television for news infor... Read More about Online news videos: the UX of subtitle position..

The development of a framework for understanding the UX of subtitles. (2015)
Conference Proceeding
CRABB, M., JONES, R. and ARMSTRONG, M. 2015. The development of a framework for understanding the UX of subtitles. In Proceedings of the 17th International Association for Computing Machinery (ACM) SIGACCESS conference on computers and accessibility (ASSETS '15), 26-28 October 2015, Lisbon, Portugal. New York: ACM [online], pages 347-348. Available from: http://doi.acm.org/10.1145/2700648.2811372

Approximately 10% of the television audience use subtitles (captioning) to support their viewing experience. Subtitles enable viewers to participate in an experience that is often taken for granted by the general audience. However, when reviewing sub... Read More about The development of a framework for understanding the UX of subtitles..

The transport disruption ontology. (2015)
Conference Proceeding
CORSAR, D., MARKOVIC, M., EDWARDS, P. and NELSON, J.D. 2015. The transport disruption ontology. In Arenas, M., Corcho, O., Simperl, E., Strohmaier, M., d'Aquin, M., Srinivas, K., Groth, P., Dumontier, M., Heflin, J., Thirunarayan, K. and Staab, S. (eds.). The sematic web - ISWC 2015: proceedings of the 14th International semantic web conference 2015 (ISWC 2015), 11-15 October 2015, Bethleham, PA, USA, 9367. Lecture notes in computer science. Cham: Springer [online], pages 329-336. Available from: https://doi.org/10.1007/978-3-319-25010-6_22

This paper presents the Transport Disruption ontology, a formal framework for modelling travel and transport related events that have a disruptive impact on traveller's journeys. We discuss related models , describe how transport events and their imp... Read More about The transport disruption ontology..