Carsten Maple

Orcid: 0000-0002-4715-212X

Affiliations:
  • University of Warwick, Cyber Security Centre (CSC)
  • University of Bedfordshire, Institute for Research in Applicable Computing
  • University of Luton, Department of Computing


According to our database1, Carsten Maple authored at least 291 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Resilient Machine Learning: Advancement, Barriers, and Opportunities in the Nuclear Industry.
ACM Comput. Surv., September, 2024

A UAV-Assisted Authentication Protocol for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., August, 2024

Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection.
Sensors, August, 2024

An optimal secure and reliable certificateless proxy signature for industrial internet of things.
Peer Peer Netw. Appl., July, 2024

Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review.
IEEE Trans. Intell. Transp. Syst., June, 2024

Quantum Key Distribution for V2I communications with software-defined networking.
IET Quantum Commun., March, 2024

Latent Vector Optimization-Based Generative Image Steganography for Consumer Electronic Applications.
IEEE Trans. Consumer Electron., February, 2024

Dynamic Obstacle-Avoidance Algorithm for Multi-Robot Flocking Based on Improved Artificial Potential Field.
IEEE Trans. Consumer Electron., February, 2024

An Enhanced Block Validation Framework With Efficient Consensus for Secure Consortium Blockchains.
IEEE Trans. Serv. Comput., 2024

Security-Minded Verification of Cooperative Awareness Messages.
IEEE Trans. Dependable Secur. Comput., 2024

Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment.
Sensors, 2024

Data-agnostic Face Image Synthesis Detection using Bayesian CNNs.
Pattern Recognit. Lett., 2024

SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing.
Internet Things, 2024

A Comprehensive Survey of Threats in Platooning - A Cloud-Assisted Connected and Autonomous Vehicle Application.
Inf., 2024

Security Guidelines for Implementing Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2024

Transparent Decisions: Selective Information Disclosure To Generate Synthetic Data.
IEEE Data Eng. Bull., 2024

A Novel Taxonomy for Navigating and Classifying Synthetic Data in Healthcare Applications.
CoRR, 2024

Private and Secure Fuzzy Name Matching.
CoRR, 2024

Representation noising effectively prevents harmful fine-tuning on LLMs.
CoRR, 2024

Detecting Face Synthesis Using a Concealed Fusion Model.
CoRR, 2024

Grey wolf optimizer based deep learning mechanism for music composition with data analysis.
Appl. Soft Comput., 2024

Ransomware Attacks in Cyber-Physical Systems: Countermeasure of Attack Vectors Through Automated Web Defenses.
IEEE Access, 2024

Time-Efficient EV Energy Management Through In-Motion V2V Charging.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

A Game-Theoretic Approach for PMU Deployment Against False Data Injection Attacks.
Proceedings of the IEEE International Conference on Communications, 2024


Semi-Automated Threat Vulnerability & Risk Assessment (TVRA) for Medical Devices.
Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, 2024

INSAFEDARE Project: Innovative Applications of Assessment and Assurance of Data and Synthetic Data for Regulatory Decision Support.
Proceedings of the Digital Health and Informatics Innovations for Sustainable Health Care Systems, 2024

FLAIM: AIM-based Synthetic Data Generation in the Federated Setting.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

SaGess: A Sampling Graph Denoising Diffusion Model for Scalable Graph Generation.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

Mitigating Bias: Model Pruning for Enhanced Model Fairness and Efficiency.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

Demographic Bias Effects on Face Image Synthesis.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Towards an Evaluation Framework for Extended Reality Authentication Schemes.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024

Performance Optimized Leader Selection Consensus Algorithm for Consortium Blockchain Using Trust Values of Nodes.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2024

Automated APT Defense Using Reinforcement Learning and Attack Graph Risk-based Situation Awareness.
Proceedings of the Workshop on Autonomous Cybersecurity, 2024

2023
Correction to: development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities.
J. Cloud Comput., December, 2023

Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities.
J. Cloud Comput., December, 2023

Effective network intrusion detection using stacking-based ensemble approach.
Int. J. Inf. Sec., December, 2023

Analysis of outage performance in a 6G-V2X communications system utilising free-space optical quantum key distribution.
IET Quantum Commun., December, 2023

Application of Unsupervised Learning in Implementation of Joint Power and Index Modulation Access in V2X Systems.
IEEE Trans. Cogn. Commun. Netw., October, 2023

A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites.
Sensors, October, 2023

An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage.
J. King Saud Univ. Comput. Inf. Sci., October, 2023

Development of edge computing and classification using The Internet of Things with incremental learning for object detection.
Internet Things, October, 2023

AI-augmented usability evaluation framework for software requirements specification in cyber physical human systems.
Internet Things, October, 2023

PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors.
ACM Trans. Priv. Secur., August, 2023

Secured data transmissions in corporeal unmanned device to device using machine learning algorithm.
Phys. Commun., August, 2023

A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes.
Pattern Recognit., July, 2023

FedProf: Selective Federated Learning Based on Distributional Representation Profiling.
IEEE Trans. Parallel Distributed Syst., June, 2023

Digital twins in cyber effects modelling of IoT/CPS points of low resilience.
Simul. Model. Pract. Theory, May, 2023

Securing the Internet of Things-enabled smart city infrastructure using a hybrid framework.
Comput. Commun., May, 2023

Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks.
IEEE Syst. J., March, 2023

Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey.
IEEE Trans. Engineering Management, 2023

A Deep-Learning-Based Solution for Securing the Power Grid Against Load Altering Threats by IoT-Enabled Devices.
IEEE Internet Things J., 2023

Demand-Side Threats to Power Grid Operations from IoT-Enabled Edge.
CoRR, 2023

Redactable and Sanitizable Signature Schemes: Applications and Limitations for use in Decentralized Digital Identity Systems.
CoRR, 2023

Trustworthy Cross-Border Interoperable Identity System for Developing Countries.
CoRR, 2023

Redactable Signature Schemes and Zero-knowledge Proofs: A comparative examination for applications in Decentralized Digital Identity Systems.
CoRR, 2023

Exploring the Risks and Challenges of National Electronic Identity (NeID) System.
CoRR, 2023

An Impact and Risk Assessment Framework for National Electronic Identity (eID) Systems.
CoRR, 2023

The AI Revolution: Opportunities and Challenges for the Finance Sector.
CoRR, 2023

A Novel Computationally Efficient Group Signature for Anonymous and Secure V2X Communications.
CoRR, 2023

FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users.
CoRR, 2023

Science and Technology Ontology: A Taxonomy of Emerging Topics.
CoRR, 2023

Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling.
IEEE Access, 2023

An Investigation of Cyber-Attacks and Security Mechanisms for Connected and Autonomous Vehicles.
IEEE Access, 2023

On the Adoption of Homomorphic Encryption by Financial Institutions<sup>*</sup>.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

MedSecurance Project: Advanced Security-for-Safety Assurance for Medical Device IoT (IoMT).
Proceedings of the Caring is Sharing - Exploiting the Value in Data for Health and Innovation - Proceedings of MIE 2023, Gothenburg, Sweden, 22, 2023

Unsupervised Face Synthesis Based on Human Traits.
Proceedings of the 11th International Workshop on Biometrics and Forensics, 2023

Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

Science Technology Ontology: A Taxonomy of Emerging Topics.
Proceedings of the Joint Proceedings of the Second International Workshop on Knowledge Graph Generation From Text and the First International BiKE Challenge co-located with 20th Extended Semantic Conference (ESWC 2023), 2023

Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

A BERT-based Empirical Study of Privacy Policies' Compliance with GDPR.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

Analysing Cyber Attacks and Risks in V2X-Assisted Autonomous Highway Merging.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
Developing an Unsupervised Real-Time Anomaly Detection Scheme for Time Series With Multi-Seasonality.
IEEE Trans. Knowl. Data Eng., 2022

Privacy and Trust in the Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

Toward Smart Manufacturing Using Spiral Digital Twin Framework and Twinchain.
IEEE Trans. Ind. Informatics, 2022

Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2022

APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition.
IEEE Trans. Inf. Forensics Secur., 2022

Security Outage Probability Analysis of Cognitive Networks With Multiple Eavesdroppers for Industrial Internet of Things.
IEEE Trans. Cogn. Commun. Netw., 2022

A Novel Privacy Paradigm for Improving Serial Data Privacy.
Sensors, 2022

Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store.
Sensors, 2022

Safety, Security and Privacy in Machine Learning Based Internet of Things.
J. Sens. Actuator Networks, 2022

Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks.
IEEE Internet Things J., 2022

Super-forecasting the 'technological singularity' risks from artificial intelligence.
Evol. Syst., 2022

Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities.
Trans. Emerg. Telecommun. Technol., 2022

Dynamic cyber risk estimation with competitive quantile autoregression.
Data Min. Knowl. Discov., 2022

Localizing Load-Altering Attacks Against Power Grids Using Deep Capsule Nets.
CoRR, 2022

Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation.
CoRR, 2022

A privacy preserving querying mechanism with high utility for electric vehicles.
CoRR, 2022

Impact of Sampling on Locally Differentially Private Data Collection.
CoRR, 2022

Synthetic Data - what, why and how?
CoRR, 2022

Threat modelling for industrial cyber physical systems in the era of smart manufacturing.
Comput. Ind., 2022

Methodology for integrating artificial intelligence in healthcare systems: learning from COVID-19 to prepare for Disease X.
AI Ethics, 2022

A Comprehensive Review of Computing Paradigms, Enabling Computation Offloading and Task Execution in Vehicular Networks.
IEEE Access, 2022

Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms.
IEEE Access, 2022

Deep GRU-CNN Model for COVID-19 Detection From Chest X-Rays Data.
IEEE Access, 2022

Forecasts on Future Evolution of Artificial Intelligence and Intelligent Systems.
IEEE Access, 2022

A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol.
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022

Lagrange Coded Federated Learning (L-CoFL) Model for Internet of Vehicles.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Barriers and Opportunities In Cyber Risk And Compliance Management For Data-Driven Supply Chains.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Federated Boosted Decision Trees with Differential Privacy.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications.
IEEE Trans. Veh. Technol., 2021

Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems.
IEEE Trans. Smart Grid, 2021

Machine Learning-based Mist Computing Enabled Internet of Battlefield Things.
ACM Trans. Internet Techn., 2021

A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.
ACM Trans. Internet Techn., 2021

SAFA: A Semi-Asynchronous Protocol for Fast Federated Learning With Low Overhead.
IEEE Trans. Computers, 2021

EEG Based Aptitude Detection System for Stress Regulation in Health Care Workers.
Sci. Program., 2021

MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
Sensors, 2021

Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs.
Sensors, 2021

Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs.
Sensors, 2021

Frequency Estimation under Local Differential Privacy.
Proc. VLDB Endow., 2021

On the detection-to-track association for online multi-object tracking.
Pattern Recognit. Lett., 2021

Smart delivery and retrieval of swab collection kit for COVID-19 test using autonomous Unmanned Aerial Vehicles.
Phys. Commun., 2021

Governing AI safety through independent audits.
Nat. Mach. Intell., 2021

Data-Driven Detection and Identification of IoT-Enabled Load-Altering Attacks in Power Grids.
CoRR, 2021

A Comparison of Data-Driven Techniques for Power Grid Parameter Estimation.
CoRR, 2021

Securing the Electric Vehicle Charging Infrastructure.
CoRR, 2021

Frequency Estimation under Local Differential Privacy [Experiments, Analysis and Benchmarks].
CoRR, 2021

Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.
Comput. Secur., 2021

DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks.
Comput. Commun., 2021

Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data.
Comput. Electr. Eng., 2021

A privacy-preserving route planning scheme for the Internet of Vehicles.
Ad Hoc Networks, 2021

Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles.
IEEE Access, 2021

Offensive Security: Towards Proactive Threat Hunting via Adversary Emulation.
IEEE Access, 2021

Prevention of IoT-Enabled Crime Using Home Routers (PITCHR).
Proceedings of the Science and Technologies for Smart Cities, 2021

MGGAN: Improving sample generations of Generative Adversarial Networks.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Throughput-Efficient Blockchain for Internet-of-Vehicles.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

Applying the Shuffle Model of Differential Privacy to Vector Aggregation.
Proceedings of the The British International Conference on Databases 2021, 2021

Fast and Secure Consortium Blockchains with Lightweight Block Verifiers.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

2020
Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks.
IEEE Trans. Veh. Technol., 2020

A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks.
ACM Trans. Internet Things, 2020

Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security.
IEEE Trans. Engineering Management, 2020

Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security".
IEEE Trans. Engineering Management, 2020

Volunteer Computing in Connected Vehicles: Opportunities and Challenges.
IEEE Netw., 2020

Secrecy Outage Analysis for Alamouti Space-Time Block Coded Non-Orthogonal Multiple Access.
IEEE Commun. Lett., 2020

A Meta-Learning Approach to the Optimal Power Flow Problem Under Topology Reconfigurations.
CoRR, 2020

Real-time anomaly detection with superexperts.
CoRR, 2020

CyRes - Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract).
CoRR, 2020

Differentially Private Health Tokens for Estimating COVID-19 Risk.
CoRR, 2020

Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics.
CoRR, 2020

SecureABC: Secure AntiBody Certificates for COVID-19.
CoRR, 2020

Fogbanks: Future Dynamic Vehicular Fog Banks for Processing, Sensing and Storage in 6G.
CoRR, 2020

Fuzzy Logic-Based Novel Hybrid Fuel Framework for Modern Vehicles.
IEEE Access, 2020

Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles.
IEEE Access, 2020

Privacy Challenges With Protecting Live Vehicular Location Context.
IEEE Access, 2020

A Novel Fog-Based Multi-Level Energy-Efficient Framework for IoT-Enabled Smart Environments.
IEEE Access, 2020

Towards Energy Efficient Smart Grids Using Bio-Inspired Scheduling Techniques.
IEEE Access, 2020

An Effective Mechanism to Mitigate Real-Time DDoS Attack.
IEEE Access, 2020

Design and Development of Industrial Cyber-Physical System Testbed.
Proceedings of the Advanced, Contemporary Control - Proceedings of KKA 2020, 2020

Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations.
Proceedings of the 16th European Dependable Computing Conference, 2020

2019
A Novel Internet of Things-Enabled Accident Detection and Reporting System for Smart City Environments.
Sensors, 2019

Peer-assisted location authentication and access control for wireless networks.
Internet Technol. Lett., 2019

Hybrid feature selection technique for intrusion detection system.
Int. J. High Perform. Comput. Netw., 2019

Deterrence and prevention-based model to mitigate information security insider threats in organisations.
Future Gener. Comput. Syst., 2019

A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape.
CoRR, 2019

An opportunistic resource management model to overcome resource-constraint in the Internet of Things.
Concurr. Comput. Pract. Exp., 2019

A Novel Bio-Inspired Hybrid Algorithm (NBIHA) for Efficient Resource Management in Fog Computing.
IEEE Access, 2019

Emotion Classification and Crowd Source Sensing; A Lexicon Based Approach.
IEEE Access, 2019

Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities.
IEEE Access, 2019

Intrusion Detection Systems for Intra-Vehicle Networks: A Review.
IEEE Access, 2019

Throughput Aware Authentication Prioritisation for Vehicular Communication Networks.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Shadows Don't Lie: n-Sequence Trajectory Inspection for Misbehaviour Detection and Classification in VANETs.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages.
Proceedings of the Software Engineering and Formal Methods - 17th International Conference, 2019

The impact of decreasing transmit power levels on FlockLab to achieve a sparse network.
Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, 2019

2018
Low Latency Parallel Turbo Decoding Implementation for Future Terrestrial Broadcasting Systems.
IEEE Trans. Broadcast., 2018

Motivation and opportunity based model to reduce information security insider threats in organisations.
J. Inf. Secur. Appl., 2018

Information security collaboration formation in organisations.
IET Inf. Secur., 2018

A Longitudinal Analysis of the Public Perception of the Opportunities and Challenges of the Internet of Things.
CoRR, 2018

Dynamic Route Selection for Vehicular Store-Carry-Forward Networks and Misbehaviour Vehicles Analysis.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Developing Offloading-Enabled Application Development Frameworks for Android Mobile Devices.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Selecting Effective Blockchain Solutions.
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018

2017
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks.
Secur. Commun. Networks, 2017

The internet of things: interaction challenges to meaningful consent at scale.
Interactions, 2017

A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks.
IEEE Access, 2017

CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Data fidelity: Security's soft underbelly.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

A threat based approach to computational offloading for collaborative cruise control.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detection.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

2016
Re-thinking threat intelligence.
Proceedings of the 2016 International Conference on Cyber Conflict, 2016

Incremental information gain analysis of input attribute impact on RBF-kernel SVM spam detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

2015
Self-IQ-Demodulation Based Compensation Scheme of Frequency-Dependent IQ Imbalance for Wideband Direct-Conversion Transmitters.
IEEE Trans. Broadcast., 2015

Can a Mobile Game Teach Computer Users to Thwart Phishing Attacks?
CoRR, 2015

A New Approach for Selecting Informative Features For Text Classification.
Proceedings of the LWA 2015 Workshops: KDML, 2015

A Machine Learning Framework to Detect and Document Text-Based Cyberstalking.
Proceedings of the LWA 2015 Workshops: KDML, 2015

A hybrid approach to combat email-based cyberstalking.
Proceedings of the Fourth International Conference on Future Generation Communication Technology (FGCT 2015), 2015

Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks.
Proceedings of the Fourth International Conference on Cyber Security, 2015

2014
K-Order Surrounding Roadmaps Path Planner for Robot Path Planning.
J. Intell. Robotic Syst., 2014

Taxonomy of optimisation techniques and applications.
Int. J. Comput. Appl. Technol., 2014

Erratum to: An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks.
Int. J. Autom. Comput., 2014

Dynamic user equipment-based hysteresis-adjusting algorithm in LTE femtocell networks.
IET Commun., 2014

Low cost estimation of IQ imbalance for direct conversion transmitters.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2014

2013
Integrated Sensing Techniques for Assistive Chairs: A Survey towards Sit-to-Stand Problems.
Int. J. Intell. Mechatronics Robotics, 2013

Localization in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013

An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks.
Int. J. Autom. Comput., 2013

Real-time compliance control of an assistive joint using QNX operating system.
Int. J. Autom. Comput., 2013

A hybrid swarm intelligence algorithm for multiuser scheduling in HSDPA.
Appl. Soft Comput., 2013

Human interaction based Robot Self-Learning approach for generic skill learning in domestic environment.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Control channel etiquettes: Implementation and evaluation of a hybrid approach for cognitive radio networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Silicon wafer modification by laser interference.
Proceedings of the 8th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2013

A novel symmetric key cryptographic authentication for cooperative communication in cognitive radio networks.
Proceedings of the 2013 19th International Conference on Automation and Computing, 2013

Cognitive radio networks for Internet of Things: Applications, challenges and future.
Proceedings of the 2013 19th International Conference on Automation and Computing, 2013

Challenges in mobile localisation in wireless sensor networks for disaster scenarios.
Proceedings of the 2013 19th International Conference on Automation and Computing, 2013

Three-dimensional localisation for wireless sensor networks using probabilistic fuzzy logic.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

Subspace-based SNR estimator for OFDM system under different channel conditions.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2013

2012
Implementation and Co-Simulation of Hybrid Pilot-Aided Channel Estimation With Decision Feedback Equalizer for OFDM Systems.
IEEE Trans. Broadcast., 2012

Cyberstalking in the UK: Analysis and Recommendations.
Int. J. Distributed Syst. Technol., 2012

Optimal Placement of the Wind Generators in the Medium Voltage Power Grid.
Int. J. Distributed Syst. Technol., 2012

Trust Issues on Crowd-Sourcing Methods for Urban Environmental Monitoring.
Int. J. Distributed Syst. Technol., 2012

A Survey of Localization in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2012

Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls.
IET Inf. Secur., 2012

A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem.
Decis. Support Syst., 2012

Bayesian Assessment of Newborn Brain Maturity from Two-Channel Sleep Electroencephalograms.
Comput. Math. Methods Medicine, 2012

Fuzzy optimisation based symbolic grounding for service robots.
Proceedings of the 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2012

Fuzzy logic based symbolic grounding for best grasp pose for homecare robotics.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

Classification of multi-channels SEMG signals using wavelet and neural networks on assistive robot.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

Case study: Laser nanoscale manufacturing (LaserNaMi).
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

A multi-objective genetic algorithm for minimising network security risk and cost.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

Case study: Multi-role shadow robotic system for independent living.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

Bid writing: Is project management different? What is appropriate?
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

Bid writing: EU project impact.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

2011
Managing threats by the use of visualisation techniques.
Int. J. Space Based Situated Comput., 2011

Towards a corporate governance trust agent scoring model for collaborative virtual organisations.
Int. J. Grid Util. Comput., 2011

Defining Minimum Requirements of Inter-Collaborated Nodes by Measuring the Weight of Node Interactions.
Int. J. Distributed Syst. Technol., 2011

Genetic algorithm based solution to dead-end problems in robot navigation.
Int. J. Comput. Appl. Technol., 2011

Guaranteeing the timely transmission of periodic messages with arbitrary deadline constraints using the timed token media access control protocol.
IET Commun., 2011

A novel hybrid tabu search approach to container loading.
Comput. Oper. Res., 2011

A Theoretical Framework for Addressing Trust in Open Pervasive Networks.
Proceedings of the PECCS 2011, 2011

An On-line Distributed Induction Motor Monitoring System Based-on ARM and CAN Bus.
Proceedings of the Sixth International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2011), 2011

Optimal Placement of the Wind Generators in the Medium Voltage Power Grid.
Proceedings of the Sixth International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2011), 2011

Optimal Placement of Wind Generators in Medium Voltage Power Grids - Investigations of Genetic Algorithm.
Proceedings of the Sixth International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2011), 2011

Toward optimal multi-objective models of network security: Survey.
Proceedings of the 17th International Conference on Automation and Computing, 2011

Localisation algorithm in wireless sensor networks.
Proceedings of the 17th International Conference on Automation and Computing, 2011

Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET.
Proceedings of the 2011 Frontiers of Information Technology, 2011

2010
Modelling Self-Led Trust Value Management in Grid and Service Oriented Infrastructures: A Graph Theoretic Social Network Mediated Approach.
Int. J. Syst. Serv. Oriented Eng., 2010

A novel lifecycle model for Web-based application development in small and medium enterprises.
Int. J. Autom. Comput., 2010

Feature Importance in Bayesian Assessment of Newborn Brain Maturity from EEG
CoRR, 2010

An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes.
Proceedings of the SIGMAP 2010, 2010

Infinite Alphabet Passwords - A Unified Model for a Class of Authentication Systems.
Proceedings of the SECRYPT 2010, 2010

A Visualisation Technique for the Identification of Security Threats in Networked Systems.
Proceedings of the 14th International Conference on Information Visualisation, 2010

The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Towards decentralized grid agent models for continuous resource discovery of interoperable grid Virtual Organisations.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

A High-Level Semiotic Trust Agent Scoring Model for Collaborative Virtual Organsations.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss.
Proceedings of the ARES 2010, 2010

A Resource Discovery Architecture of Loosely Coupled Grid Inter-cooperated Virtual Organisations Using Mobile Agents and Neural Networks.
Proceedings of the 3PGCIC 2010, 2010

2009
Guaranteeing hard real-time traffic with legitimately short deadlines with the timed token protocol.
Comput. Stand. Interfaces, 2009

Musipass: authenticating me softly with "my" song.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

A dynamically adaptive, dimensionalised, experience feedback mechanism within second life.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009

2008
Comparing Robustness of Pairwise and Multiclass Neural-Network Systems for Face Recognition.
EURASIP J. Adv. Signal Process., 2008

Web Application Development Lifecycle for Small Medium-Sized Enterprises (SMEs) (Short Paper).
Proceedings of the Eighth International Conference on Quality Software, 2008

An Evolutionary-Based Approach to Learning Multiple Decision Models from Underrepresented Data.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Active Robot Learning for Building Up High-Order Beliefs.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Reliability, Availability and Security of Wireless Networks in the Community.
Informatica (Slovenia), 2007

UMTS base station location planning: a mathematical model and heuristic optimisation algorithms.
IET Commun., 2007

Comparing Robustness of Pairwise and Multiclass Neural-Network Systems for Face Recognition
CoRR, 2007

A Bayesian Model Averaging Methodology for Detecting EEG Artifacts.
Proceedings of the 15th International Conference on Digital Signal Processing, 2007

The Bayesian Decision Tree Technique Using an Adaptive Sampling Scheme.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

A New Scheme for Deniable/Repudiable Authentication.
Proceedings of the Computer Algebra in Scientific Computing, 10th International Workshop, 2007

2006
Enriching the Object-Oriented Paradigm via Shadows in the Context of Mathematics.
J. Object Technol., 2006

Preparing computing students for culturally diverse e-mediated IT projects.
Interact. Technol. Smart Educ., 2006

Creating a Forest of Binary Search Trees for a Multiprocessor System.
Proceedings of the Fifth International Conference on Parallel Computing in Electrical Engineering (PARELEC 2006), 2006

Maintaining a Random Binary Search Tree Dynamically.
Proceedings of the 10th International Conference on Information Visualisation, 2006

A Graph Theoretic Framework for Trust - From Local to Global.
Proceedings of the 10th International Conference on Information Visualisation, 2006

Using A Bayesian Averaging Model for Estimating the Reliability of Decisions in Multimodal Biometrics.
Proceedings of the The First International Conference on Availability, 2006

The Usability and Practicality of Biometric Authentication in the Workplace.
Proceedings of the The First International Conference on Availability, 2006

Choosing the Right Wireless LAN Security Protocol for the Home and Business User.
Proceedings of the The First International Conference on Availability, 2006

A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter?.
Proceedings of the The First International Conference on Availability, 2006

2005
A Novel Efficient Algorithm for Determining Maximum Common Subgraphs.
Proceedings of the 9th International Conference on Information Visualisation, 2005

A Novel Scalable Parallel Algorithm for Finding Optimal Paths over Heterogeneous Terrain.
Proceedings of the 9th International Conference on Information Visualisation, 2005

Sitecam: A Multimedia Tool for the Exploration of Construction Environments.
Proceedings of the 9th International Conference on Information Visualisation, 2005

2004
Parallel Genetic Algorithms for Third Generation Mobile Network Planning.
Proceedings of the 2004 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2004), 2004

A Three-dimensional Object Similarity Test Using Graph Matching Techniques.
Proceedings of the 8th International Conference on Information Visualisation, 2004

The Use of Multiple Co-ordinated Views in Three-dimensional Virtual Environments.
Proceedings of the 8th International Conference on Information Visualisation, 2004

2003
Prediction of Malignant Melanoma Incidence.
Proceedings of the IASTED International Conference on Modelling and Simulation (MS 2003), 2003

A Visual Formalism for Graphical User Interfaces based on State Transition Diagrams.
Proceedings of the Seventh International Conference on Information Visualization, 2003

A Generic Visualisation and Editing Tool for Hierarchical and Object-Oriented Systems.
Proceedings of the Seventh International Conference on Information Visualization, 2003

Determining Candidate Binding Site Locations Using Conserved Features.
Proceedings of the Seventh International Conference on Information Visualization, 2003

Planarity Testing for Graphs Represented by A Rotation Scheme.
Proceedings of the Seventh International Conference on Information Visualization, 2003

A Graph Drawing Algorithm for Spherical Pictures.
Proceedings of the Seventh International Conference on Information Visualization, 2003

Geometric Desing and Space Planning Using the Marching Squares and Marching Cube Algorithms.
Proceedings of the 2003 International Conference on Geometric Modeling and Graphics, 2003

Task Scheduling for Jobs of a Non-constant Workload over a Heterogeneous Network.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

2002
Parallel Solutions of Large Dense Linear Systems Using MPI.
Proceedings of the 2002 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2002), 2002

A Framework for and Implementation of Intelligent Task Distribution.
Proceedings of the 2002 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2002), 2002

Determining Roots of Real-Valued Functions of a Single Variable over a Distributed Network.
Proceedings of the 2002 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2002), 2002

A Boundary Representation and Comparison Technique for Two-Dimensional Objects.
Proceedings of the International Conference on Information Visualisation, 2002

2001
A Boundary Representation Technique for Three-Dimensional Objects.
Proceedings of the International Conference on Information Visualisation, 2001

Finding and Characterising Candidate Binding Sites.
Proceedings of the International Conference on Information Visualisation, 2001

2000
Co-Planar Shape-Fitting Using the Rotating Squares Algorithm.
Proceedings of the International Conference on Information Visualisation, 2000

1999
Solving Hamiltonian systems arising from ODE eigenproblems.
Numer. Algorithms, 1999


  Loading...