Carsten Maple
Orcid: 0000-0002-4715-212XAffiliations:
- University of Warwick, Cyber Security Centre (CSC)
- University of Bedfordshire, Institute for Research in Applicable Computing
- University of Luton, Department of Computing
According to our database1,
Carsten Maple
authored at least 291 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Resilient Machine Learning: Advancement, Barriers, and Opportunities in the Nuclear Industry.
ACM Comput. Surv., September, 2024
IEEE Trans. Intell. Transp. Syst., August, 2024
Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection.
Sensors, August, 2024
An optimal secure and reliable certificateless proxy signature for industrial internet of things.
Peer Peer Netw. Appl., July, 2024
Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review.
IEEE Trans. Intell. Transp. Syst., June, 2024
IET Quantum Commun., March, 2024
Latent Vector Optimization-Based Generative Image Steganography for Consumer Electronic Applications.
IEEE Trans. Consumer Electron., February, 2024
Dynamic Obstacle-Avoidance Algorithm for Multi-Robot Flocking Based on Improved Artificial Potential Field.
IEEE Trans. Consumer Electron., February, 2024
An Enhanced Block Validation Framework With Efficient Consensus for Secure Consortium Blockchains.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment.
Sensors, 2024
Pattern Recognit. Lett., 2024
SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing.
Internet Things, 2024
A Comprehensive Survey of Threats in Platooning - A Cloud-Assisted Connected and Autonomous Vehicle Application.
Inf., 2024
IACR Cryptol. ePrint Arch., 2024
IEEE Data Eng. Bull., 2024
A Novel Taxonomy for Navigating and Classifying Synthetic Data in Healthcare Applications.
CoRR, 2024
Grey wolf optimizer based deep learning mechanism for music composition with data analysis.
Appl. Soft Comput., 2024
Ransomware Attacks in Cyber-Physical Systems: Countermeasure of Attack Vectors Through Automated Web Defenses.
IEEE Access, 2024
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, 2024
Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, 2024
INSAFEDARE Project: Innovative Applications of Assessment and Assurance of Data and Synthetic Data for Regulatory Decision Support.
Proceedings of the Digital Health and Informatics Innovations for Sustainable Health Care Systems, 2024
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024
Performance Optimized Leader Selection Consensus Algorithm for Consortium Blockchain Using Trust Values of Nodes.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2024
Automated APT Defense Using Reinforcement Learning and Attack Graph Risk-based Situation Awareness.
Proceedings of the Workshop on Autonomous Cybersecurity, 2024
2023
Correction to: development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities.
J. Cloud Comput., December, 2023
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities.
J. Cloud Comput., December, 2023
Int. J. Inf. Sec., December, 2023
Analysis of outage performance in a 6G-V2X communications system utilising free-space optical quantum key distribution.
IET Quantum Commun., December, 2023
Application of Unsupervised Learning in Implementation of Joint Power and Index Modulation Access in V2X Systems.
IEEE Trans. Cogn. Commun. Netw., October, 2023
A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites.
Sensors, October, 2023
An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage.
J. King Saud Univ. Comput. Inf. Sci., October, 2023
Development of edge computing and classification using The Internet of Things with incremental learning for object detection.
Internet Things, October, 2023
AI-augmented usability evaluation framework for software requirements specification in cyber physical human systems.
Internet Things, October, 2023
PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors.
ACM Trans. Priv. Secur., August, 2023
Secured data transmissions in corporeal unmanned device to device using machine learning algorithm.
Phys. Commun., August, 2023
A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes.
Pattern Recognit., July, 2023
FedProf: Selective Federated Learning Based on Distributional Representation Profiling.
IEEE Trans. Parallel Distributed Syst., June, 2023
Simul. Model. Pract. Theory, May, 2023
Securing the Internet of Things-enabled smart city infrastructure using a hybrid framework.
Comput. Commun., May, 2023
IEEE Syst. J., March, 2023
Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey.
IEEE Trans. Engineering Management, 2023
A Deep-Learning-Based Solution for Securing the Power Grid Against Load Altering Threats by IoT-Enabled Devices.
IEEE Internet Things J., 2023
Redactable and Sanitizable Signature Schemes: Applications and Limitations for use in Decentralized Digital Identity Systems.
CoRR, 2023
CoRR, 2023
Redactable Signature Schemes and Zero-knowledge Proofs: A comparative examination for applications in Decentralized Digital Identity Systems.
CoRR, 2023
CoRR, 2023
An Impact and Risk Assessment Framework for National Electronic Identity (eID) Systems.
CoRR, 2023
A Novel Computationally Efficient Group Signature for Anonymous and Secure V2X Communications.
CoRR, 2023
FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users.
CoRR, 2023
Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling.
IEEE Access, 2023
An Investigation of Cyber-Attacks and Security Mechanisms for Connected and Autonomous Vehicles.
IEEE Access, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
MedSecurance Project: Advanced Security-for-Safety Assurance for Medical Device IoT (IoMT).
Proceedings of the Caring is Sharing - Exploiting the Value in Data for Health and Innovation - Proceedings of MIE 2023, Gothenburg, Sweden, 22, 2023
Proceedings of the 11th International Workshop on Biometrics and Forensics, 2023
Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023
Proceedings of the Joint Proceedings of the Second International Workshop on Knowledge Graph Generation From Text and the First International BiKE Challenge co-located with 20th Extended Semantic Conference (ESWC 2023), 2023
Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023
2022
Developing an Unsupervised Real-Time Anomaly Detection Scheme for Time Series With Multi-Seasonality.
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Ind. Informatics, 2022
Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2022
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition.
IEEE Trans. Inf. Forensics Secur., 2022
Security Outage Probability Analysis of Cognitive Networks With Multiple Eavesdroppers for Industrial Internet of Things.
IEEE Trans. Cogn. Commun. Netw., 2022
Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store.
Sensors, 2022
J. Sens. Actuator Networks, 2022
Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks.
IEEE Internet Things J., 2022
Super-forecasting the 'technological singularity' risks from artificial intelligence.
Evol. Syst., 2022
Trans. Emerg. Telecommun. Technol., 2022
Data Min. Knowl. Discov., 2022
CoRR, 2022
Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation.
CoRR, 2022
CoRR, 2022
Threat modelling for industrial cyber physical systems in the era of smart manufacturing.
Comput. Ind., 2022
Methodology for integrating artificial intelligence in healthcare systems: learning from COVID-19 to prepare for Disease X.
AI Ethics, 2022
A Comprehensive Review of Computing Paradigms, Enabling Computation Offloading and Task Execution in Vehicular Networks.
IEEE Access, 2022
Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms.
IEEE Access, 2022
IEEE Access, 2022
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Barriers and Opportunities In Cyber Risk And Compliance Management For Data-Driven Supply Chains.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Veh. Technol., 2021
Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems.
IEEE Trans. Smart Grid, 2021
ACM Trans. Internet Techn., 2021
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.
ACM Trans. Internet Techn., 2021
IEEE Trans. Computers, 2021
Sci. Program., 2021
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
Sensors, 2021
Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs.
Sensors, 2021
Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs.
Sensors, 2021
Pattern Recognit. Lett., 2021
Smart delivery and retrieval of swab collection kit for COVID-19 test using autonomous Unmanned Aerial Vehicles.
Phys. Commun., 2021
Data-Driven Detection and Identification of IoT-Enabled Load-Altering Attacks in Power Grids.
CoRR, 2021
CoRR, 2021
Frequency Estimation under Local Differential Privacy [Experiments, Analysis and Benchmarks].
CoRR, 2021
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.
Comput. Secur., 2021
DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks.
Comput. Commun., 2021
Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data.
Comput. Electr. Eng., 2021
Ad Hoc Networks, 2021
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the Science and Technologies for Smart Cities, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021
Proceedings of the The British International Conference on Databases 2021, 2021
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021
2020
Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks.
IEEE Trans. Veh. Technol., 2020
A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks.
ACM Trans. Internet Things, 2020
Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security.
IEEE Trans. Engineering Management, 2020
Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security".
IEEE Trans. Engineering Management, 2020
IEEE Netw., 2020
Secrecy Outage Analysis for Alamouti Space-Time Block Coded Non-Orthogonal Multiple Access.
IEEE Commun. Lett., 2020
A Meta-Learning Approach to the Optimal Power Flow Problem Under Topology Reconfigurations.
CoRR, 2020
CyRes - Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract).
CoRR, 2020
Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics.
CoRR, 2020
Fogbanks: Future Dynamic Vehicular Fog Banks for Processing, Sensing and Storage in 6G.
CoRR, 2020
Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles.
IEEE Access, 2020
IEEE Access, 2020
A Novel Fog-Based Multi-Level Energy-Efficient Framework for IoT-Enabled Smart Environments.
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the Advanced, Contemporary Control - Proceedings of KKA 2020, 2020
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations.
Proceedings of the 16th European Dependable Computing Conference, 2020
2019
A Novel Internet of Things-Enabled Accident Detection and Reporting System for Smart City Environments.
Sensors, 2019
Internet Technol. Lett., 2019
Int. J. High Perform. Comput. Netw., 2019
Deterrence and prevention-based model to mitigate information security insider threats in organisations.
Future Gener. Comput. Syst., 2019
A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape.
CoRR, 2019
An opportunistic resource management model to overcome resource-constraint in the Internet of Things.
Concurr. Comput. Pract. Exp., 2019
A Novel Bio-Inspired Hybrid Algorithm (NBIHA) for Efficient Resource Management in Fog Computing.
IEEE Access, 2019
IEEE Access, 2019
Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities.
IEEE Access, 2019
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Shadows Don't Lie: n-Sequence Trajectory Inspection for Misbehaviour Detection and Classification in VANETs.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages.
Proceedings of the Software Engineering and Formal Methods - 17th International Conference, 2019
The impact of decreasing transmit power levels on FlockLab to achieve a sparse network.
Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, 2019
2018
Low Latency Parallel Turbo Decoding Implementation for Future Terrestrial Broadcasting Systems.
IEEE Trans. Broadcast., 2018
Motivation and opportunity based model to reduce information security insider threats in organisations.
J. Inf. Secur. Appl., 2018
A Longitudinal Analysis of the Public Perception of the Opportunities and Challenges of the Internet of Things.
CoRR, 2018
Dynamic Route Selection for Vehicular Store-Carry-Forward Networks and Misbehaviour Vehicles Analysis.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
Developing Offloading-Enabled Application Development Frameworks for Android Mobile Devices.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018
2017
Secur. Commun. Networks, 2017
Interactions, 2017
IEEE Access, 2017
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
A threat based approach to computational offloading for collaborative cruise control.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detection.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
2016
Proceedings of the 2016 International Conference on Cyber Conflict, 2016
Incremental information gain analysis of input attribute impact on RBF-kernel SVM spam detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016
The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016
2015
Self-IQ-Demodulation Based Compensation Scheme of Frequency-Dependent IQ Imbalance for Wideband Direct-Conversion Transmitters.
IEEE Trans. Broadcast., 2015
Proceedings of the LWA 2015 Workshops: KDML, 2015
Proceedings of the LWA 2015 Workshops: KDML, 2015
Proceedings of the Fourth International Conference on Future Generation Communication Technology (FGCT 2015), 2015
Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks.
Proceedings of the Fourth International Conference on Cyber Security, 2015
2014
J. Intell. Robotic Syst., 2014
Int. J. Comput. Appl. Technol., 2014
Erratum to: An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks.
Int. J. Autom. Comput., 2014
Dynamic user equipment-based hysteresis-adjusting algorithm in LTE femtocell networks.
IET Commun., 2014
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2014
2013
Integrated Sensing Techniques for Assistive Chairs: A Survey towards Sit-to-Stand Problems.
Int. J. Intell. Mechatronics Robotics, 2013
Int. J. Autom. Comput., 2013
Int. J. Autom. Comput., 2013
Appl. Soft Comput., 2013
Human interaction based Robot Self-Learning approach for generic skill learning in domestic environment.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013
Control channel etiquettes: Implementation and evaluation of a hybrid approach for cognitive radio networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013
Proceedings of the 8th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2013
A novel symmetric key cryptographic authentication for cooperative communication in cognitive radio networks.
Proceedings of the 2013 19th International Conference on Automation and Computing, 2013
Cognitive radio networks for Internet of Things: Applications, challenges and future.
Proceedings of the 2013 19th International Conference on Automation and Computing, 2013
Challenges in mobile localisation in wireless sensor networks for disaster scenarios.
Proceedings of the 2013 19th International Conference on Automation and Computing, 2013
Three-dimensional localisation for wireless sensor networks using probabilistic fuzzy logic.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2013
2012
Implementation and Co-Simulation of Hybrid Pilot-Aided Channel Estimation With Decision Feedback Equalizer for OFDM Systems.
IEEE Trans. Broadcast., 2012
Int. J. Distributed Syst. Technol., 2012
Int. J. Distributed Syst. Technol., 2012
Int. J. Distributed Syst. Technol., 2012
Int. J. Distributed Sens. Networks, 2012
Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls.
IET Inf. Secur., 2012
A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem.
Decis. Support Syst., 2012
Bayesian Assessment of Newborn Brain Maturity from Two-Channel Sleep Electroencephalograms.
Comput. Math. Methods Medicine, 2012
Proceedings of the 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2012
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012
Classification of multi-channels SEMG signals using wavelet and neural networks on assistive robot.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012
2011
Int. J. Space Based Situated Comput., 2011
Towards a corporate governance trust agent scoring model for collaborative virtual organisations.
Int. J. Grid Util. Comput., 2011
Defining Minimum Requirements of Inter-Collaborated Nodes by Measuring the Weight of Node Interactions.
Int. J. Distributed Syst. Technol., 2011
Int. J. Comput. Appl. Technol., 2011
Guaranteeing the timely transmission of periodic messages with arbitrary deadline constraints using the timed token media access control protocol.
IET Commun., 2011
A Theoretical Framework for Addressing Trust in Open Pervasive Networks.
Proceedings of the PECCS 2011, 2011
Proceedings of the Sixth International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2011), 2011
Proceedings of the Sixth International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2011), 2011
Optimal Placement of Wind Generators in Medium Voltage Power Grids - Investigations of Genetic Algorithm.
Proceedings of the Sixth International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2011), 2011
Proceedings of the 17th International Conference on Automation and Computing, 2011
Proceedings of the 17th International Conference on Automation and Computing, 2011
Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET.
Proceedings of the 2011 Frontiers of Information Technology, 2011
2010
Modelling Self-Led Trust Value Management in Grid and Service Oriented Infrastructures: A Graph Theoretic Social Network Mediated Approach.
Int. J. Syst. Serv. Oriented Eng., 2010
A novel lifecycle model for Web-based application development in small and medium enterprises.
Int. J. Autom. Comput., 2010
CoRR, 2010
An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes.
Proceedings of the SIGMAP 2010, 2010
Infinite Alphabet Passwords - A Unified Model for a Class of Authentication Systems.
Proceedings of the SECRYPT 2010, 2010
A Visualisation Technique for the Identification of Security Threats in Networked Systems.
Proceedings of the 14th International Conference on Information Visualisation, 2010
The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Towards decentralized grid agent models for continuous resource discovery of interoperable grid Virtual Organisations.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010
An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
A High-Level Semiotic Trust Agent Scoring Model for Collaborative Virtual Organsations.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss.
Proceedings of the ARES 2010, 2010
A Resource Discovery Architecture of Loosely Coupled Grid Inter-cooperated Virtual Organisations Using Mobile Agents and Neural Networks.
Proceedings of the 3PGCIC 2010, 2010
2009
Guaranteeing hard real-time traffic with legitimately short deadlines with the timed token protocol.
Comput. Stand. Interfaces, 2009
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
A dynamically adaptive, dimensionalised, experience feedback mechanism within second life.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009
2008
Comparing Robustness of Pairwise and Multiclass Neural-Network Systems for Face Recognition.
EURASIP J. Adv. Signal Process., 2008
Web Application Development Lifecycle for Small Medium-Sized Enterprises (SMEs) (Short Paper).
Proceedings of the Eighth International Conference on Quality Software, 2008
An Evolutionary-Based Approach to Learning Multiple Decision Models from Underrepresented Data.
Proceedings of the Fourth International Conference on Natural Computation, 2008
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008
2007
Informatica (Slovenia), 2007
UMTS base station location planning: a mathematical model and heuristic optimisation algorithms.
IET Commun., 2007
Comparing Robustness of Pairwise and Multiclass Neural-Network Systems for Face Recognition
CoRR, 2007
Proceedings of the 15th International Conference on Digital Signal Processing, 2007
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007
Proceedings of the Computer Algebra in Scientific Computing, 10th International Workshop, 2007
2006
J. Object Technol., 2006
Interact. Technol. Smart Educ., 2006
Proceedings of the Fifth International Conference on Parallel Computing in Electrical Engineering (PARELEC 2006), 2006
Proceedings of the 10th International Conference on Information Visualisation, 2006
Proceedings of the 10th International Conference on Information Visualisation, 2006
Using A Bayesian Averaging Model for Estimating the Reliability of Decisions in Multimodal Biometrics.
Proceedings of the The First International Conference on Availability, 2006
Proceedings of the The First International Conference on Availability, 2006
Proceedings of the The First International Conference on Availability, 2006
A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter?.
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the 9th International Conference on Information Visualisation, 2005
A Novel Scalable Parallel Algorithm for Finding Optimal Paths over Heterogeneous Terrain.
Proceedings of the 9th International Conference on Information Visualisation, 2005
Proceedings of the 9th International Conference on Information Visualisation, 2005
2004
Proceedings of the 2004 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2004), 2004
Proceedings of the 8th International Conference on Information Visualisation, 2004
Proceedings of the 8th International Conference on Information Visualisation, 2004
2003
Prediction of Malignant Melanoma Incidence.
Proceedings of the IASTED International Conference on Modelling and Simulation (MS 2003), 2003
Proceedings of the Seventh International Conference on Information Visualization, 2003
A Generic Visualisation and Editing Tool for Hierarchical and Object-Oriented Systems.
Proceedings of the Seventh International Conference on Information Visualization, 2003
Proceedings of the Seventh International Conference on Information Visualization, 2003
Proceedings of the Seventh International Conference on Information Visualization, 2003
Proceedings of the Seventh International Conference on Information Visualization, 2003
Geometric Desing and Space Planning Using the Marching Squares and Marching Cube Algorithms.
Proceedings of the 2003 International Conference on Geometric Modeling and Graphics, 2003
Task Scheduling for Jobs of a Non-constant Workload over a Heterogeneous Network.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003
2002
Proceedings of the 2002 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2002), 2002
Proceedings of the 2002 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2002), 2002
Determining Roots of Real-Valued Functions of a Single Variable over a Distributed Network.
Proceedings of the 2002 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2002), 2002
Proceedings of the International Conference on Information Visualisation, 2002
2001
Proceedings of the International Conference on Information Visualisation, 2001
Proceedings of the International Conference on Information Visualisation, 2001
2000
Proceedings of the International Conference on Information Visualisation, 2000
1999