Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness

Article


Kodagoda, N., Attfield, S., Choudhury, S., Rooney, C., Mapp, G., Nguyen, P., Slabbert, L., Wong, B., Aiash, M., Zheng, Y., Xu, K. and Lasebae, A. 2014. Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness. Information Visualization. 13 (4), pp. 346-360. https://doi.org/10.1177/1473871613490291
TypeArticle
TitleConcern level assessment: building domain knowledge into a visual system to support network-security situation awareness
AuthorsKodagoda, N., Attfield, S., Choudhury, S., Rooney, C., Mapp, G., Nguyen, P., Slabbert, L., Wong, B., Aiash, M., Zheng, Y., Xu, K. and Lasebae, A.
Abstract

Information officers and network administrators require tools to help them achieve situation awareness about potential network threats. We describe a response to mini-challenge 1 of the 2012 IEEE VAST challenge in which we developed a visual analytic solution to a network security situation awareness problem. To support conceptual design, we conducted a series of knowledge elicitation sessions with domain experts. These provided an understanding of the information they needed to make situation awareness judgements as well as a characterisation of those judgements in the form of production rules which define a parameter we called the ‘Concern Level Assessment’ (CLA). The CLA was used to provide heuristic guidance within a visual analytic system called MSIEVE. An analysis of VAST challenge assessment sessions using M-SIEVE provides some evidence that intelligent heuristics like this can provide useful guidance without unduly dominating interaction and understanding.

Research GroupSensoLab group
PublisherSAGE Publications
JournalInformation Visualization
ISSN1473-8716
Publication dates
Online27 Jun 2013
Print01 Oct 2014
Publication process dates
Deposited24 Jul 2013
Output statusPublished
Copyright Statement

Neesha Kodagoda, Simon Attfield, Tinni Choudhury, Chris Rooney, Glenford Mapp, Phong H Nguyen, Louis Slabbert, B L William Wong, Mahdi Aiash, Yongjun Zheng, Kai Xu, and Aboubaker Lasebae, Concern level assessment: Building domain knowledge into a visual system to support network-security situation awareness, Information Visualization, Vol 13, Issue 4, pp. 346 - 360.Copyright © 2013 The Author(s). Reprinted by permission of SAGE Publications.

Additional information

Published online before print June 27, 2013

Digital Object Identifier (DOI)https://doi.org/10.1177/1473871613490291
LanguageEnglish
File
Permalink -

https://repository.mdx.ac.uk/item/84216

Download files

  • 116
    total views
  • 13
    total downloads
  • 11
    views this month
  • 0
    downloads this month

Export as

Related outputs

Signature-based security analysis and detection of IoT threats in advanced message queuing protocol
Hashimyar, M.E., Aiash, M., Khoshkholghi, A. and Nalli, G. 2025. Signature-based security analysis and detection of IoT threats in advanced message queuing protocol. Network. 5 (1). https://doi.org/10.3390/network5010005
Accelerating material discovery for CdTe solar cells using knowledge intense word embeddings
Liu, X., Barth, K., Windridge, D. and Xu, K. 2024. Accelerating material discovery for CdTe solar cells using knowledge intense word embeddings. 52nd Photovoltaic Specialist Conference. Seattle, WA, USA 09 - 14 Jun 2024 IEEE. pp. 0281-0283 https://doi.org/10.1109/pvsc57443.2024.10749288
Developing a secure service ecosystem to implement the intelligent edge environment for smart cities
Karthick, G. and Mapp, G. 2024. Developing a secure service ecosystem to implement the intelligent edge environment for smart cities. Future Internet. 16 (9). https://doi.org/10.3390/fi16090317
Designing for learnability: improvement through layered interfaces
Forsey, H., Leahy, D., Fields, B., Minocha, S., Attfield, S. and Snell, T. 2024. Designing for learnability: improvement through layered interfaces. Ergonomics in Design: The Quarterly of Human Factors Applications. https://doi.org/10.1177/10648046241273291
Addressing the interoperability of electronic health records: the technical and semantic interoperability, preserving privacy and security framework
Ademola, A., George, C. and Mapp, G. 2024. Addressing the interoperability of electronic health records: the technical and semantic interoperability, preserving privacy and security framework. Applied System Innovation. 7 (6). https://doi.org/10.3390/asi7060116
Enhancing digital forensics readiness in big data wireless medical networks: A secure decentralised framework
Mpungu, C, George, C. and Mapp, G. 2024. Enhancing digital forensics readiness in big data wireless medical networks: A secure decentralised framework. International Journal of Network Security & Its Applications (IJNSA) . 16 (4), pp. 13-30. https://doi.org/10.5121/ijnsa.2024.16402
Digital forensics readiness in big data networks: a novel framework and incident response script for Linux-Hadoop environments
Mpungu, C., George, C. and Mapp, G. 2024. Digital forensics readiness in big data networks: a novel framework and incident response script for Linux-Hadoop environments. Applied System Innovation. 7 (5). https://doi.org/10.3390/asi7050090
Energy efficiency optimisation of joint computational task offloading and resource allocation using particle swarm optimisation approach in vehicular edge networks
Alam, A., Shah, P., Trestian, R., Ali, K. and Mapp, G. 2024. Energy efficiency optimisation of joint computational task offloading and resource allocation using particle swarm optimisation approach in vehicular edge networks. Sensors. 24 (10). https://doi.org/10.3390/s24103001
A novel bio-inspired bat node scheduling algorithm for dependable safety-critical wireless sensor network systems
Al-Nader, I., Lasebae, A., Raheem, R. and Ngondi, G. 2024. A novel bio-inspired bat node scheduling algorithm for dependable safety-critical wireless sensor network systems. Sensors. 24 (6). https://doi.org/10.3390/s24061928
A novel scheduling algorithm for improved performance of multi-objective safety-critical WSN using spatial self-organizing feature map
Al-Nader, I., Lasebae, A. and Raheem, R. 2024. A novel scheduling algorithm for improved performance of multi-objective safety-critical WSN using spatial self-organizing feature map. Electronics. 13 (1). https://doi.org/10.3390/electronics13010019
A new perceptron based neural-network algorithm to enhance the scheduling performance of safety-critical WSNs of increased dependability
Al-Nader, I, Lasebae, A. and Raheem, R. 2024. A new perceptron based neural-network algorithm to enhance the scheduling performance of safety-critical WSNs of increased dependability. So In, C., Londhe, N.D., Bhatt, N. and Kitsing, M. (ed.) 8th World Conference on Information Systems for Business Management. Bangkok, Thailand 07 - 08 Sep 2023 Springer. pp. 347-366 https://doi.org/10.1007/978-981-99-8612-5_28
Joint energy and spectral optimization in Heterogeneous Vehicular Network
Alam, A., Ali, K., Trestian, R., Shah, P. and Mapp, G. 2023. Joint energy and spectral optimization in Heterogeneous Vehicular Network. Computer Networks. 238. https://doi.org/10.1016/j.comnet.2023.110111
A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory
Al-Nader, I., Lasebae, A., Raheem, R. and Khoshkholghi, A. 2023. A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory. Electronics. 12 (23). https://doi.org/10.3390/electronics12234766
Building an intelligent edge environment to provide essential services in smart cities
Karthick, G., Mapp, G. and Crowcroft, J. 2023. Building an intelligent edge environment to provide essential services in smart cities. 18th Workshop on Mobility in the Evolving Internet Architecture . Madrid Spain 06 - 06 Oct 2023 New York, NY, United States Association for Computing Machinery (ACM). pp. 13-18 https://doi.org/10.1145/3615587.3615987
Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications
Chowdhury, A., Isalm, M., Kaisar, S., Naha, R., Khoshkholghi, A., Aiash, M. and Khoda, M.E. 2023. Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2216-2221
Using Hidden Markov Chain for improving the dependability of safety-critical WSNs
Al-Nader, I., Lasebae, A. and Raheem, R. 2023. Using Hidden Markov Chain for improving the dependability of safety-critical WSNs. Barolli, L. (ed.) 37th International Conference on Advanced Information Networking and Applications. Federal University of Juiz de Fora, Brazil 29 - 31 Mar 2023 Cham, Switzerland. Springer. pp. 460–472 https://doi.org/10.1007/978-3-031-29056-5_40
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things. 24. https://doi.org/10.1016/j.iot.2023.100913
IoT-based emergency vehicle services in intelligent transportation system
Chowdhury, A., Kaisar, S., Khoda, M., Naha, R., Khoshkholghi, A. and Aiash, M. 2023. IoT-based emergency vehicle services in intelligent transportation system. Sensors. 23 (11). https://doi.org/10.3390/s23115324
Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT)
Ponugumati, S., Ali, K., Lasebae, A., Zahoor, Z., Kiyani, A., Khoshkholghi, A. and Maddu, L. 2023. Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT). CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 IEEE. pp. 75-80 https://doi.org/10.1109/CCGridW59191.2023.00026
Developing a novel digital forensics readiness framework for wireless medical networks using specialised logging
Mpungu, C., George, C. and Mapp, G. 2023. Developing a novel digital forensics readiness framework for wireless medical networks using specialised logging. Jahankhani, H. (ed.) 14th ICGS3-22: International Conference on Global Security, Safety and Sustainability. Virtual Conference 07 - 08 Sep 2022 Springer. pp. 203-226 https://doi.org/10.1007/978-3-031-20160-8_12
Formalization and evaluation of EAP-AKA’ protocol for 5G network access security
Edris, E., Aiash, M. and Loo, J. 2022. Formalization and evaluation of EAP-AKA’ protocol for 5G network access security. Array. 16. https://doi.org/10.1016/j.array.2022.100254
Visual analytics of contact tracing policy simulations during an emergency response
Sondag, M., Turkay, C., Xu, K., Matthews, L., Mohr, S. and Archambault, D. 2022. Visual analytics of contact tracing policy simulations during an emergency response. Computer Graphics Forum. 41 (3), pp. 29-41. https://doi.org/10.1111/cgf.14520
An introduction of a modular framework for securing 5G networks and beyond
Edris, E., Aiash, M. and Loo, J. 2022. An introduction of a modular framework for securing 5G networks and beyond. Network. 2 (3), pp. 419-439. https://doi.org/10.3390/network2030026
Novel group handover mechanism for cooperative and coordinated mobile femtocells technology in railway environment
Raheem, R., Lasebae, A. and Raheem, A. 2022. Novel group handover mechanism for cooperative and coordinated mobile femtocells technology in railway environment. Array. 15. https://doi.org/10.1016/j.array.2022.100223
Securing future healthcare environments in a post-COVID-19 world: moving from frameworks to prototypes
Vithanwattana, N., Karthick, G., Mapp, G., George, C. and Samuels, A. 2022. Securing future healthcare environments in a post-COVID-19 world: moving from frameworks to prototypes. Journal of Reliable Intelligent Environments. 8 (3), pp. 299-315. https://doi.org/10.1007/s40860-022-00180-7
Exploring new traffic prediction models to build an intelligent transport system for Smart Cities
Mehta, V., Mapp, G. and Gandhi, V. 2022. Exploring new traffic prediction models to build an intelligent transport system for Smart Cities. NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary 25 - 29 Apr 2022 IEEE. pp. 1-6 https://doi.org/10.1109/NOMS54207.2022.9789926
RAMPVIS: Answering the challenges of building visualisation capabilities for large-scale emergency responses
Chen, M., Abdul-Rahman, A., Archambault, D., Dykes, J., Ritsos, P., Slingsby, A., Torsney-Weir, T., Turkay, C., Bach, B., Borgo, R., Brett, A., Fang, H., Jianu, R., Khan, S., Laramee, R., Matthews, L., Nguyen, P., Reeve, R., Roberts, J., Vidal, F., Wang, Q., Wood, J. and Xu, K. 2022. RAMPVIS: Answering the challenges of building visualisation capabilities for large-scale emergency responses. Epidemics. 39. https://doi.org/10.1016/j.epidem.2022.100569
A new privacy framework for the management of chronic diseases via mHealth in a post-Covid-19 world
Jusob, F., George, C. and Mapp, G. 2022. A new privacy framework for the management of chronic diseases via mHealth in a post-Covid-19 world. Journal of Public Health. 30 (1), pp. 37-47. https://doi.org/10.1007/s10389-021-01608-9
3D analytical modelling and iterative solution for high performance computing clusters
Kirsal, Y., Kirsal Ever, Y., Mapp, G. and Raza, M. 2022. 3D analytical modelling and iterative solution for high performance computing clusters. IEEE Transactions on Cloud Computing. 10 (4), pp. 2238-2251. https://doi.org/10.1109/TCC.2021.3055119
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2022. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Computational Intelligence. 38 (3), pp. 811-828. https://doi.org/10.1111/coin.12421
Exploring a new security framework for future healthcare systems
Vithanwattana, N., Karthick, G., Mapp, G. and George, C. 2021. Exploring a new security framework for future healthcare systems. IEEE Global Communications Conference: Workshop on Securing Next-Generation Connected Healthcare Systems using Futuristic Technologies. Madrid, Spain [Hybrid: In-Person and Virtual] 07 - 11 Dec 2021 IEEE. pp. 1-6 https://doi.org/10.1109/GCWkshps52748.2021.9681967
A smart sensor grid to enhance irrigation techniques in Jordan using a novel event-based routing protocol
Rantisi, M., Mapp, G. and Gemikonakli, O. 2017. A smart sensor grid to enhance irrigation techniques in Jordan using a novel event-based routing protocol. Multimodal Technologies and Interaction. 1 (2). https://doi.org/10.3390/mti1020009
Connected vehicle testbed: development & deployment of C-ITS in the UK
Mapp, G., Ghosh, A., Paranthaman, V., Dohler, M. and Sardis, F. 2018. Connected vehicle testbed: development & deployment of C-ITS in the UK. Middlesex Repository Middlesex University.
Building an Intelligent Transport Information Platform for Smart Cities
Mapp, G., Ghosh, A. and Paranthaman, V. 2017. Building an Intelligent Transport Information Platform for Smart Cities. Middlesex University Research Repository Middlesex University.
Cooperative and coordinated Mobile Femtocells technology in high-speed vehicular environments: mobility and interference management
Raheem, R., Lasebae, A., Petridis, M. and Raheem, A. 2021. Cooperative and coordinated Mobile Femtocells technology in high-speed vehicular environments: mobility and interference management. Barolli, L., Woungang, I. and Enokido, T. (ed.) 35th International Conference on Advanced Information Networking and Applications (AINA-2021). Ryerson University, Toronto, Canada (Held Online) 12 - 14 May 2021 Springer. pp. 653-666 https://doi.org/10.1007/978-3-030-75100-5_56
Robust continuous user authentication system using long short term memory network for healthcare
Tanveer, A., Lasebae, A., Ali, K., Alkhayyat, A., Ur-Rehman, M., Haq, B. and Naeem, B. 2021. Robust continuous user authentication system using long short term memory network for healthcare. Ur-Rehman, M. and Zoha, A. (ed.) 16th EAI International Conference on Body Area Networks. Glasgow, UK (Online) 25 - 26 Oct 2021 Cham Springer. https://doi.org/10.1007/978-3-030-95593-9_22
Automated identification of insight seeking behaviours, strategies and rules: a preliminary study
Hepenstal, S., Zhang, L. and Wong, B. 2021. Automated identification of insight seeking behaviours, strategies and rules: a preliminary study. SAGE Publications. https://doi.org/10.1177/1071181321651348
Developing conversational agents for use in criminal investigations
Hepenstal, S., Zhang, L., Kodagoda, N. and Wong, B. 2021. Developing conversational agents for use in criminal investigations. ACM Transactions on Interactive Intelligent Systems. 11 (3-4), pp. 1-35. https://doi.org/10.1145/3444369
Developing traffic predictions from source to destination using probabilistic modelling
Mehta, V., Gandhi, V. and Mapp, G. 2021. Developing traffic predictions from source to destination using probabilistic modelling. Third UK Mobile, Wearable and Ubiquitous Systems Research Symposium. Online via Zoom 05 - 06 Jul 2021
Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif
Edris, E., Aiash, M. and Loo, J. 2021. Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif. Electronics. 10 (13). https://doi.org/10.3390/electronics10131608
Security in network services delivery for 5G enabled D2D communications: challenges and solutions
Edris, E., Aiash, M. and Loo, J. 2021. Security in network services delivery for 5G enabled D2D communications: challenges and solutions. in: Montasari, R., Jahankhani, H. and Al-Khateeb, H. (ed.) Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats Cham Springer. pp. 1-27
DCSS protocol for data caching and sharing security in a 5G network
Edris, E., Aiash, M. and Loo, J. 2021. DCSS protocol for data caching and sharing security in a 5G network. Network. 1 (2), pp. 75-94. https://doi.org/10.3390/network1020006
Heuristic edge server placement in Industrial Internet of Things and cellular networks
Kasi, S., Kasi, M., Ali, K., Raza, M., Afzal, H., Lasebae, A., Naeem, B., Islam, S. and Rodrigues, J. 2021. Heuristic edge server placement in Industrial Internet of Things and cellular networks. IEEE Internet of Things Journal. 8 (13), pp. 10308-10317. https://doi.org/10.1109/JIOT.2020.3041805
An interactive human centered data science approach towards crime pattern analysis
Qazi, N. and Wong, B. 2019. An interactive human centered data science approach towards crime pattern analysis. Information Processing and Management. 56 (6). https://doi.org/10.1016/j.ipm.2019.102066
The application of visual analytics to financial stability monitoring
Flood, M., Lemieux, V., Varga, M. and Wong, B. 2016. The application of visual analytics to financial stability monitoring. Journal of Financial Stability. 27, pp. 180-197. https://doi.org/10.1016/j.jfs.2016.01.006
Tactile reasoning: hands-on vs. hands-off - what's the difference?
Takken, S. and Wong, B. 2015. Tactile reasoning: hands-on vs. hands-off - what's the difference? Cognition, Technology and Work. 17 (3), pp. 381-390. https://doi.org/10.1007/s10111-015-0331-5
The state of the art in integrating Machine Learning into Visual Analytics
Endert, A., Ribarsky, W., Turkay, C., Wong, B., Nabney, I., Díaz, I. and Rossi, F. 2017. The state of the art in integrating Machine Learning into Visual Analytics. Computer Graphics Forum. 36 (8), pp. 458-486. https://doi.org/10.1111/cgf.13092
Provenance and logging for sense making
Fekete, J., Jankun-Kelly, T., Tory, M. and Xu, K. 2019. Provenance and logging for sense making. Dagstuhl Reports. 8 (11), pp. 35-62. https://doi.org/10.4230/DagRep.8.11.35
Provenance analysis for sensemaking. IEEE Computer Graphics and Applications, 39 (6) . pp. 27-29. ISSN 0272-1716
Fekete, J., Jankun-Kelly, T., Tory, M. and Xu, K. 2019. Provenance analysis for sensemaking. IEEE Computer Graphics and Applications, 39 (6) . pp. 27-29. ISSN 0272-1716. IEEE.
Exploring analytical models for proactive resource management in highly mobile environments
Kirsal, Y., Paranthaman, V. and Mapp, G. 2018. Exploring analytical models for proactive resource management in highly mobile environments. International Journal of Computers, Communications and Control. 13 (5), pp. 837-852. https://doi.org/10.15837/ijccc.2018.5.3349
Formal verification of secondary authentication protocol for 5G secondary authentication
Edris, E., Aiash, M., Loo, J. and Alhakeem, M. 2021. Formal verification of secondary authentication protocol for 5G secondary authentication. International Journal of Security and Networks. 16 (4), pp. 223-234. https://doi.org/10.1504/IJSN.2021.119379
Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach
Kiyani, A., Lasebae, A., Ali, K., Ur-Rehman, M. and Haq, B. 2020. Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach. IEEE Access. 8, pp. 156177-156189. https://doi.org/10.1109/ACCESS.2020.3019467
Exploring real time traffic signalling using probabilistic approach in intelligent transport system
Mehta, V., Gandhi, V. and Mapp, G. 2018. Exploring real time traffic signalling using probabilistic approach in intelligent transport system. Mobi-UK 2018. University of Cambridge, Cambridge, UK 12 - 13 Sep 2018
Exploring real time traffic signalling using probabilistic approach in intelligent transport system
Mehta, V., Gandhi, V. and Mapp, G. 2018. Exploring real time traffic signalling using probabilistic approach in intelligent transport system. 3rd CommNet2 PhD Autumn School. University of Sheffield, Sheffield, UK 17 - 19 Sep 2018
Exploring a new framework to build mobile QoS-aware applications and services for future internet
Ezenwigbo, A., Kirsal, Y., Paranthaman, V., Mapp, G. and Trestian, R. 2018. Exploring a new framework to build mobile QoS-aware applications and services for future internet. Journal of Communications. 13 (10), pp. 559-573. https://doi.org/10.12720/jcm.13.10.559-573
Towards autonomous driving: a machine learning-based pedestrian detection system using 16-layer LiDAR
Mihai, S., Shah, P., Mapp, G., Nguyen, H. and Trestian, R. 2020. Towards autonomous driving: a machine learning-based pedestrian detection system using 16-layer LiDAR. COMM 2020. Bucharest, Romania 18 - 20 Jun 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 271-276 https://doi.org/10.1109/COMM48946.2020.9142042
Exploring the provision of reliable network storage in highly mobile environments
Ezenwigbo, A., Ramirez, J., Karthick, G., Mapp, G. and Trestian, R. 2020. Exploring the provision of reliable network storage in highly mobile environments. COMM 2020. Bucharest, Romania 18 - 20 Jun 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 255-260 https://doi.org/10.1109/COMM48946.2020.9142033
ZKPVM: a zero-knowledge authentication protocol for VMs' live migration in mobile cloud computing
Edris, E. and Aiash, M. 2018. ZKPVM: a zero-knowledge authentication protocol for VMs' live migration in mobile cloud computing. ICSOFT 2018: 13th International Conference on Software Technologies. Porto, Portugal 26 - 28 Jul 2018 pp. 858-864
Investigating network services abstraction in 5G enabled device-to-device (D2D) communications
Edris, E., Aiash, M. and Loo, J. 2019. Investigating network services abstraction in 5G enabled device-to-device (D2D) communications. 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). Leicester, United Kingdom 19 - 23 Aug 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 1660-1665 https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00296
The case for federated identity management in 5G communications
Edris, E., Aiash, M. and Loo, J. 2020. The case for federated identity management in 5G communications. The Fifth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 120-127 https://doi.org/10.1109/FMEC49853.2020.9144855
Formal verification and analysis of primary authentication based on 5G-AKA protocol
Edris, E., Aiash, M. and Loo, J. 2020. Formal verification and analysis of primary authentication based on 5G-AKA protocol. Third International Symposium on 5G Emerging Technologies (5GET 2020) in conjunction with the Fourth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 256-261 https://doi.org/10.1109/SDS49854.2020.9143899
Network service federated identity (NS-FId) protocol for service authorization in 5G network
Edris, E., Aiash, M. and Loo, J. 2020. Network service federated identity (NS-FId) protocol for service authorization in 5G network. The Fifth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 128-135
TimeSets: temporal sensemaking in intelligence analysis
Xu, K., Salisu, S., Nguyen, P., Walker, R., Wong, B., Wagstaff, A., Phillips, G. and Biggs, M. 2020. TimeSets: temporal sensemaking in intelligence analysis. IEEE Computer Graphics and Applications. 40 (3), pp. 83-93. https://doi.org/10.1109/MCG.2020.2981855
Putting the "I" in Interaction: interactive interfaces personalized to the individual
Wenskovitch, J., Zhou, M., Collins, C., Chang, R., Dowling, M., Endert, A. and Xu, K. 2020. Putting the "I" in Interaction: interactive interfaces personalized to the individual. IEEE Computer Graphics and Applications. 40 (3), pp. 73-82. https://doi.org/10.1109/MCG.2020.2982465
A new service management framework for vehicular networks
Ramirez, J., Ezenwigbo, A., Karthick, G., Trestian, R. and Mapp, G. 2020. A new service management framework for vehicular networks. 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops. Paris, France 23 - 27 Feb 2020 IEEE. pp. 162-164 https://doi.org/10.1109/ICIN48450.2020.9059441
A novel approach to task abstraction to make better sense of provenance data
Bors, C., Attfield, S., Battle, L., Dowling, M., Endert, A., Koch, S., Kulyk, O., Laramee, R., Troy, M. and Wenskovitch, J. 2019. A novel approach to task abstraction to make better sense of provenance data. Fekete, J., T. J., J., Tory, M. and Xu, K. (ed.) Provenance and Logging for Sense Making (Dagstuhl Seminar 18462). Dagstuhl, Germany 11 - 16 Nov 2018 Schloss Dagstuhl - Leibniz-Zentrum für Informatik [Society Publisher]. pp. 46-50 https://doi.org/10.4230/DagRep.8.11.35
Patterns of life visualisations for intelligence analysis: exploring animation with POLAR
Attfield, S., Selvaraj, N., Kodagoda, N., Passmore, P. and Duncker-Gassen, E. 2019. Patterns of life visualisations for intelligence analysis: exploring animation with POLAR. 2019 International Carnahan Conference on Security Technology (ICCST). Chennai, India 01 - 03 Oct 2019 IEEE. pp. 1-6 https://doi.org/10.1109/CCST.2019.8888410
A provenance task abstraction framework
Bors, C., Wenskovitch, J., Dowling, M., Attfield, S., Battle, L., Endert, A., Kulyk, O. and Laramee, R. 2019. A provenance task abstraction framework. IEEE Computer Graphics and Applications. 39 (6), pp. 46-60. https://doi.org/10.1109/MCG.2019.2945720
Providing a foundation for interpretable autonomous agents through elicitation and modeling of criminal investigation pathways
Hepenstal, S., Zhang, L., Kodagoda, N. and Wong, B. 2020. Providing a foundation for interpretable autonomous agents through elicitation and modeling of criminal investigation pathways. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 64 (1), pp. 239-243. https://doi.org/10.1177/1071181320641057
Survey on the analysis of user interactions and visualization provenance
Xu, K., Ottley, A., Walchshofer, C., Streit, M., Chang, R. and Wenskovitch, J. 2020. Survey on the analysis of user interactions and visualization provenance. Computer Graphics Forum. 39 (3), pp. 757-783. https://doi.org/10.1111/cgf.14035
Pan: conversational agent for criminal investigations
Hepenstal, S., Zhang, L., Kodagoda, N. and Wong, B. 2020. Pan: conversational agent for criminal investigations. IUI '20: 25th International Conference on Intelligent User Interfaces. Cagliari, Italy 17 - 20 Mar 2020 Association for Computing Machinery (ACM). pp. 134-135 https://doi.org/10.1145/3379336.3381463
Intrusion detection and classification with autoencoded deep neural network
Rezvy, S., Petridis, M., Lasebae, A. and Zebin, T. 2019. Intrusion detection and classification with autoencoded deep neural network. Lanet, J. and Toma, C. (ed.) SecITC 2018: International Conference on Security for Information Technology and Communications. Bucharest, Romania 08 - 09 Nov 2018 Switzerland Springer Nature. https://doi.org/10.1007/978-3-030-12942-2_12
An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks
Rezvy, S., Luo, Y., Petridis, M., Lasebae, A. and Zebin, T. 2019. An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. 2019 53rd Annual Conference on Information Sciences and Systems (CISS). Baltimore, MD, USA, USA 20 - 22 Mar 2019 IEEE. pp. 1-6 https://doi.org/10.1109/CISS.2019.8693059
The impacts of internal threats towards routing protocol for low power and lossy network performance
Le, A., Loo, J., Luo, Y. and Lasebae, A. 2013. The impacts of internal threats towards routing protocol for low power and lossy network performance. 2013 IEEE Symposium on Computers and Communications (ISCC). https://doi.org/10.1109/ISCC.2013.6755045
Developing traffic prediction and congestion algorithms for a C-ITS network
Mehta, V., Gandhi, V. and Mapp, G. 2019. Developing traffic prediction and congestion algorithms for a C-ITS network. Second UK Mobile, Wearable and Ubiquitous Systems Research Symposium. Dept of Computer Science, University of Oxford, UK 01 Jul 2019
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. ICC’17. Cambridge University, Cambridge 22 Mar 2019 ICC’17, Cambridge, United Kingdom © 2017 ACM.. pp. 1-6 https://doi.org/10.1145/3018896.3056795
Using advanced handover and localization techniques for maintaining quality-of-service of mobile users in heterogeneous cloud-based environment
Kirsal, Y., Mapp, G. and Sardis, F. 2019. Using advanced handover and localization techniques for maintaining quality-of-service of mobile users in heterogeneous cloud-based environment. Journal of Network and Systems Management. 27 (4), pp. 927-997. https://doi.org/10.1007/s10922-019-09494-z
Exploring intelligent service migration in vehicular networks
Ezenwigbo, A., Paranthaman, V., Mapp, G. and Trestian, R. 2019. Exploring intelligent service migration in vehicular networks. Gao, H., Yin, Y., Yang, X. and Miao, H. (ed.) TridentCom 2018: International Conference on Testbeds and Research Infrastructures. Shanghai, China 16 - 18 Nov 2018 Springer. pp. 41-61 https://doi.org/10.1007/978-3-030-12971-2_3
An approach to human-machine teaming in legal investigations using anchored narrative visualisation and machine learning
Attfield, S., Fields, B., Windridge, D. and Xu, K. 2019. An approach to human-machine teaming in legal investigations using anchored narrative visualisation and machine learning. Conrad, J., Pickens, J., Jones, A., Baron, J. and Henseler, H. (ed.) First International Workshop on AI and Intelligent Assistance for Legal Professionals in the Digital Workplace (LegalAIIA 2019).. Montreal, Canada 17 Jun 2019 CEUR Workshop Proceedings. pp. 7-11
How analysts think: a preliminary study of human needs and demands for AI-based conversational agents
Hepenstal, S., Wong, B., Zhang, L. and Kodagoda, N. 2019. How analysts think: a preliminary study of human needs and demands for AI-based conversational agents. SAGE Publications. https://doi.org/10.1177/1071181319631333
Algorithmic transparency of conversational agents
Hepenstal, S., Kodagoda, N., Zhang, L., Paudyal, P. and Wong, B. 2019. Algorithmic transparency of conversational agents. Trattner, C., Parra, D. and Riche, N. (ed.) IUI 2019 Workshop on Intelligent User Interfaces for Algorithmic Transparency in Emerging Technologies. Los Angeles, CA, USA 17 - 20 Mar 2019 CEUR Workshop Proceedings.
Exploiting resource contention in highly mobile environments and its application to vehicular ad-hoc networks
Paranthaman, V., Kirsal, Y., Mapp, G., Shah, P. and Nguyen, H. 2019. Exploiting resource contention in highly mobile environments and its application to vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology. 68 (4), pp. 3805-3819. https://doi.org/10.1109/tvt.2019.2902245
A QoS-based flow assignment for traffic engineering in software-defined networks
Thiruvasakan, L., Vien, Q., Loo, J. and Mapp, G. 2019. A QoS-based flow assignment for traffic engineering in software-defined networks. Barolli, L., Takizawa, M., Xhafa, F. and Enokido, T. (ed.) 33rd International Conference on Advanced Information Networking and Applications (AINA-2019). Matsue, Japan 27 - 29 Mar 2019 Springer. pp. 762-774 https://doi.org/10.1007/978-3-030-15032-7_64
Exploring the need for a suitable privacy framework for mHealth when managing chronic diseases
Jusob, F., George, C. and Mapp, G. 2017. Exploring the need for a suitable privacy framework for mHealth when managing chronic diseases. Journal of Reliable Intelligent Environments. 3 (4), pp. 243-256. https://doi.org/10.1007/s40860-017-0049-7
Algorithmic opacity: making algorithmic processes transparent through abstraction hierarchy
Paudyal, P. and Wong, B. 2018. Algorithmic opacity: making algorithmic processes transparent through abstraction hierarchy. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 62 (1), pp. 192-196. https://doi.org/10.1177/1541931218621046
Sense-making strategies in explorative intelligence analysis of network evolutions
Doppler Haider, J., Gastecker, B., Pohl, M., Seidler, P., Kodagoda, N. and Wong, B. 2019. Sense-making strategies in explorative intelligence analysis of network evolutions. Behaviour and Information Technology. 38 (2), pp. 198-215. https://doi.org/10.1080/0144929x.2018.1519036
Criminal pattern identification based on modified K-means clustering
Aljrees, T., Shi, D., Windridge, D. and Wong, B. 2016. Criminal pattern identification based on modified K-means clustering. 2016 International Conference on Machine Learning and Cybernetics (ICMLC). 2, pp. 799-806. https://doi.org/10.1109/ICMLC.2016.7872990
Uncertainty of visualizations for SenseMaking in criminal intelligence analysis
Islam, J., Xu, K. and Wong, B. 2018. Uncertainty of visualizations for SenseMaking in criminal intelligence analysis. EuroRV3: EuroVis Workshop on Reproducibility, Verification, and Validation in Visualization (2018). Brno, Czech Republic 04 - 08 Jun 2018 Eurographics Association. pp. 25-29 https://doi.org/10.2312/eurorv3.20181145
Analytic provenance as constructs of behavioural markers for externalizing thinking processes in criminal intelligence analysis
Islam, J., Wong, B. and Xu, K. 2018. Analytic provenance as constructs of behavioural markers for externalizing thinking processes in criminal intelligence analysis. in: Leventakis, G. and Haberfeld, M. (ed.) Community-Oriented Policing and Technological Innovations Springer. pp. 95-105
Analytic provenance for criminal intelligence analysis
Islam, J., Xu, K. and Wong, B. 2018. Analytic provenance for criminal intelligence analysis. Chinese Journal of Network and Information Security. 4 (2), pp. 18-33. https://doi.org/10.11959/j.issn.2096-109x.2018016
Project-based cooperative learning to enhance competence while teaching engineering modules
Gandhi, V., Yang, Z. and Aiash, M. 2017. Project-based cooperative learning to enhance competence while teaching engineering modules. International Journal of Continuing Engineering Education and Life-Long Learning. 27 (3), pp. 198-208. https://doi.org/10.1504/IJCEELL.2017.10003462
How can we design tactile interactive software for argument construction in criminal intelligence analysis?
Groenewald, C., Wong, B., Attfield, S., Passmore, P. and Kodagoda, N. 2017. How can we design tactile interactive software for argument construction in criminal intelligence analysis? Gore, J. and Ward, P. (ed.) 13th Bi-annual International Conference on Naturalistic Decision Making (NDM13). University of Bath, Bath, United Kingdom 20 - 23 Jun 2017 The University of Bath. pp. 322-328
How analysts think: how do criminal intelligence analysts recognise and manage significant information?
Groenewald, C., Wong, B., Attfield, S., Passmore, P. and Kodagoda, N. 2017. How analysts think: how do criminal intelligence analysts recognise and manage significant information? 2017 European Intelligence and Security Informatics Conference (EISIC 2017). Athens, Greece 11 - 13 Sep 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 47-53 https://doi.org/10.1109/EISIC.2017.15
How analysts think: navigating uncertainty – aspirations, considerations and strategies
Groenewald, C., Wong, B., Attfield, S., Passmore, P. and Kodagoda, N. 2017. How analysts think: navigating uncertainty – aspirations, considerations and strategies. Gore, J. and Ward, P. (ed.) 13th Bi-annual International Conference on Naturalistic Decision Making (NDM13). University of Bath, Bath, United Kingdom 20 - 23 Jun 2017 The University of Bath. pp. 56-64
Using machine learning to infer reasoning provenance from user interaction log data: based on the data/frame theory of sensemaking
Kodagoda, N., Pontis, S., Simmie, D., Attfield, S., Wong, B., Blandford, A. and Hankin, C. 2017. Using machine learning to infer reasoning provenance from user interaction log data: based on the data/frame theory of sensemaking. Journal of Cognitive Engineering and Decision Making. 11 (1), pp. 23-41. https://doi.org/10.1177/1555343416672782
How analysts think: think-steps as a tool for structuring sensemaking in criminal intelligence analysis
Selvaraj, N., Attfield, S., Passmore, P. and Wong, B. 2016. How analysts think: think-steps as a tool for structuring sensemaking in criminal intelligence analysis. 2016 European Intelligence and Security Informatics Conference (EISIC). Uppsala, Sweden 17 - 19 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 68-75 https://doi.org/10.1109/EISIC.2016.019
Towards an approach for analysing external representations created during sensemaking using generative grammar
Okoro, E. and Attfield, S. 2016. Towards an approach for analysing external representations created during sensemaking using generative grammar. 30th International BCS Human Computer Interaction Conference (HCI 2016). Bournemouth University, Poole, UK 11 - 15 Jul 2016 BCS Learning and Development. pp. 1-9 https://doi.org/10.14236/ewic/HCI2016.31
Investigating the impact of live migration on the network infrastructure in enterprise environments
Sinti, J., Jiffry, F. and Aiash, M. 2014. Investigating the impact of live migration on the network infrastructure in enterprise environments. Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. Victoria, Canada 13 - 16 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 154-159 https://doi.org/10.1109/WAINA.2014.34
A progressive approach to design authentication protocols for mobile heterogeneous networks
Kenaza, T., Aiash, M., Loo, J., Lasebae, A. and Whitney, G. 2016. A progressive approach to design authentication protocols for mobile heterogeneous networks. IEEE Trustcom/BigDataSE/I​SPA, 2016. Tianjin, China 23 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1776-1781 https://doi.org/10.1109/trustcom.2016.0273
A security framework for node-to-node communications based on the LISP architecture
Kallash, M., Loo, J., Lasebae, A. and Aiash, M. 2018. A security framework for node-to-node communications based on the LISP architecture. International Journal of Electronic Security and Digital Forensics. 10 (3), pp. 276-291. https://doi.org/10.1504/IJESDF.2018.093024
Behavioural markers: bridging the gap between art of analysis and science of analytics in criminal intelligence
Islam, J. and Wong, B. 2017. Behavioural markers: bridging the gap between art of analysis and science of analytics in criminal intelligence. 2017 European Intelligence and Security Informatics Conference. Dekelia Air Base, Attica, Greece 11 - 13 Sep 2017 IEEE. pp. 147-150 https://doi.org/10.1109/EISIC.2017.30
An international survey of practitioner's views on personas: benefits, resource demands and pitfalls
Bashir, E. and Attfield, S. 2018. An international survey of practitioner's views on personas: benefits, resource demands and pitfalls. International Journal on Advances in Software. 11 (3&4), pp. 299-310.
Formalization and analysis of a resource allocation security protocol for secure service migration
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2018. Formalization and analysis of a resource allocation security protocol for secure service migration. IEEE/ACM International Conference on Utility and Cloud Computing (UCC2018). Zurich, Switzerland 17 - 20 Dec 2018 IEEE. pp. 207-212 https://doi.org/10.1109/UCC-Companion.2018.00058
Exploring a new transport protocol for vehicular networks
Ezenwigbo, A., Paranthaman, V., Trestian, R., Mapp, G. and Sardis, F. 2018. Exploring a new transport protocol for vehicular networks. 5th International Conference on Internet of Things: Systems, Management and Security (IoTSMS). Valencia, Spain 15 - 18 Oct 2018 IEEE. pp. 287-294 https://doi.org/10.1109/IoTSMS.2018.8554836
A resources model for distributed sensemaking
Attfield, S., Fields, B. and Baber, C. 2018. A resources model for distributed sensemaking. Cognition, Technology and Work. 20 (4), pp. 651-664. https://doi.org/10.1007/s10111-018-0529-4
Towards an instrument for measuring sensemaking and an assessment of its theoretical features
Alsufiani, K., Attfield, S. and Zhang, L. 2018. Towards an instrument for measuring sensemaking and an assessment of its theoretical features. 4th International Conference on Emerging Research Paradigms in Business and Social Sciences. Dubai, UAE 16 - 18 Jan 2018
Enhancing curricular with state-of-practice research: interaction design and user experience
Bashir, E. and Attfield, S. 2018. Enhancing curricular with state-of-practice research: interaction design and user experience. 4th International Conference on Emerging Research Paradigms in Business and Social Sciences. Dubai, UAE 16 - 18 Jan 2018
How analysts think: sense-making strategies in the analysis of temporal evolution and criminal network structures and activities
Haider, J., Seidler, P., Pohl, M., Kodagoda, N., Adderley, R. and Wong, B. 2017. How analysts think: sense-making strategies in the analysis of temporal evolution and criminal network structures and activities. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 61 (1), pp. 193-197. https://doi.org/10.1177/1541931213601532
Risk map as a library management information dashboard: a case study in adapting a configural display
Wong, B. and Gulden, J. 2017. Risk map as a library management information dashboard: a case study in adapting a configural display. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 61 (1), pp. 287-291. https://doi.org/10.1177/1541931213601553
Understanding 3D mid-air hand gestures with interactive surfaces and displays: a systematic literature review
Groenewald, C., Anslow, C., Islam, J., Rooney, C., Passmore, P. and Wong, B. 2016. Understanding 3D mid-air hand gestures with interactive surfaces and displays: a systematic literature review. HCI 2016 - Fusion! 30th International BCS Human Computer Interaction Conference (HCI 2016). Bournemouth University, Poole, United Kingdom 11 - 15 Jul 2016 British Computer Society. pp. 1-13 https://doi.org/10.14236/ewic/HCI2016.43
TimeSets for uncertainty visualisation
Salisu, S., Xu, K., Wagstaff, A., Biggs, M. and Phillips, G. 2016. TimeSets for uncertainty visualisation. EG UK Computer Graphics & Visual Computing 2016. Bournemouth, United Kingdom 15 - 16 Sep 2016 The Eurographics Association. https://doi.org/10.2312/cgvc.20161291
Addressing VAST 2016 mini challenge 2 with POLAR kermode, classifier, excel on a power wall and data timelines
Attfield, S., Hewitt, D., Xu, K., Passmore, P., Wagstaff, A., Phillips, G., Windridge, D., Dash, G., Chapman, R. and Mason, L. 2016. Addressing VAST 2016 mini challenge 2 with POLAR kermode, classifier, excel on a power wall and data timelines. IEEE VAST Challenge 2016. Baltimore, MD, USA 23 Oct 2016
Interaction log and provenance for sensemaking
Nguyen, P., Xu, K. and Wong, B. 2016. Interaction log and provenance for sensemaking. LIVVIL: Logging Interactive Visualizations & Visualizing Interaction Logs. Baltimore, MD, USA 23 Oct 2016 pp. 5-8
Elaborating the frames of data-frame theory
Attfield, S. and Baber, C. 2017. Elaborating the frames of data-frame theory. Gore, J. and Ward, P. (ed.) 13th Bi-annual International Conference on Naturalistic Decision Making (NDM13). University of Bath, Bath, United Kingdom 20 - 23 Jun 2017 The University of Bath. pp. 25-32
Developing an implementation framework for the future internet using the Y-Comm architecture, SDN and NFV
Mapp, G., Sardis, F. and Crowcroft, J. 2016. Developing an implementation framework for the future internet using the Y-Comm architecture, SDN and NFV. 2nd International Conference on Network Softwarization, IEEE NetSoft 2016. Seoul, South Korea 06 - 10 Jun 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 43-47 https://doi.org/10.1109/NETSOFT.2016.7502440
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017). Churchill College, University of Cambridge, United Kingdom 22 - 23 Mar 2017 Association for Computing Machinery (ACM). https://doi.org/10.1145/3018896.3056795
Exploring a new security framework for cloud storage using capabilities
Mapp, G., Aiash, M., Ondiege, B. and Clarke, M. 2014. Exploring a new security framework for cloud storage using capabilities. 1st International Workshop on Cyber Security and Cloud Computing, a workshop of SOSE. Oxford, United Kingdom 07 - 11 Apr 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 484-489 https://doi.org/10.1109/SOSE.2014.69
Supporting the externalisation of thinking in criminal intelligence analysis
Passmore, P., Attfield, S., Kodagoda, N., Groenewald, C. and Wong, B. 2015. Supporting the externalisation of thinking in criminal intelligence analysis. European Intelligence and Security Informatics Conference (EISIC) 2015. Manchester, United Kingdom 07 - 09 Sep 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 16-23 https://doi.org/10.1109/EISIC.2015.35
Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility
Sardis, F., Mapp, G., Loo, J. and Aiash, M. 2014. Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility. 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC),. London, UK 08 - 11 Dec 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-306 https://doi.org/10.1109/UCC.2014.39
Developing a comprehensive information security framework for mHealth: a detailed analysis
Vithanwattana, N., Mapp, G. and George, C. 2017. Developing a comprehensive information security framework for mHealth: a detailed analysis. Journal of Reliable Intelligent Environments. 3 (1), pp. 21-39. https://doi.org/10.1007/s40860-017-0038-x
Admission control and buffer management of wireless communication systems with mobile stations and integrated voice and data services
Gemikonakli, E., Ever, E., Mapp, G. and Gemikonakli, O. 2017. Admission control and buffer management of wireless communication systems with mobile stations and integrated voice and data services. Telecommunication Systems. 65 (4), pp. 663-675. https://doi.org/10.1007/s11235-016-0259-y
SenseMap: supporting browser-based online sensemaking through analytic provenance
Nguyen, P., Xu, K., Bardill, A., Salman, B., Herd, K. and Wong, B. 2016. SenseMap: supporting browser-based online sensemaking through analytic provenance. VIS 2016: IEEE Visualization Conference. Baltimore, Maryland, USA 23 - 28 Oct 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 91-100 https://doi.org/10.1109/vast.2016.7883515
Machine learning based botnet identification traffic
Azab, A., Alazab, M. and Aiash, M. 2016. Machine learning based botnet identification traffic. 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2016). Tianjin, China 23 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1788-1794 https://doi.org/10.1109/TrustCom.2016.0275
Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids
Kenaza, T., Bennaceur, K., Labed, A. and Aiash, M. 2016. Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids. 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Tianjin, China 23 - 25 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1765-1770 https://doi.org/10.1109/TrustCom.2016.0271
Toward an efficient ontology-based event correlation in SIEM
Kenazag, T. and Aiash, M. 2016. Toward an efficient ontology-based event correlation in SIEM. 7th International Conference on Ambient Systems, Networks and Technologies (ANT2016). Madrid, Spain 23 - 26 May 2016 Elsevier. pp. 139-146 https://doi.org/10.1016/j.procs.2016.04.109
Software defined networking for wireless sensor networks: a survey
Hassan, M., Vien, Q. and Aiash, M. 2017. Software defined networking for wireless sensor networks: a survey. Advances in Wireless Communications and Networks. 3 (2), pp. 10-22. https://doi.org/10.11648/j.awcn.20170302.11
Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement
Raheem, R., Lasebae, A., Aiash, M., Loo, J. and Colson, R. 2017. Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement. Vehicular Communications. 9 (12), pp. 31-42. https://doi.org/10.1016/j.vehcom.2017.02.003
Associative search through formal concept analysis in criminal intelligence analysis
Qazi, N., Wong, B., Kodagoda, N. and Rick, A. 2016. Associative search through formal concept analysis in criminal intelligence analysis. IEEE SMC 2016: International Conference on Systems, Man, and Cybernetics. Budapest, Hungry 09 - 12 Oct 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1917-1922 https://doi.org/10.1109/SMC.2016.7844519
Exploring a new proactive algorithm for resource management and its application to wireless mobile environments
Paranthaman, V., Kirsal, Y., Mapp, G., Shah, P. and Nguyen, H. 2017. Exploring a new proactive algorithm for resource management and its application to wireless mobile environments. 42nd Conference on Local Computer Networks (LCN). Singapore 09 - 12 Oct 2017 IEEE. pp. 539-542 https://doi.org/10.1109/LCN.2017.86
A practical, hybrid argumentation model to assist with the formulation of defensible assessments in uncertain sense-making environments
Groenewald, C., Attfield, S., Passmore, P., Wong, B. and Kodagoda, N. 2017. A practical, hybrid argumentation model to assist with the formulation of defensible assessments in uncertain sense-making environments. 2017 International Conference Next Generation Community Policing. Heraklion, Crete, Greece 25 - 27 Oct 2017
Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks
Raheem, R., Lasebae, A., Aiash, M., Loo, J., Colson, R. and Raheem, A. 2017. Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks. in: Yurish, S. (ed.) Advances in Networks, Security and Communications: Reviews - Volume 1 International Frequency Sensor Association Publishing.
Mobility management for vehicular user equipment in LTE/mobile femtocell networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2017. Mobility management for vehicular user equipment in LTE/mobile femtocell networks. International Journal of Information Systems in the Service Sector. 9 (4), pp. 60-87. https://doi.org/10.4018/IJISSS.2017100105
UEFA-M: Utility-based energy efficient adaptive multimedia mechanism over LTE HetNet small cells
Trestian, R., Vien, Q., Shah, P. and Mapp, G. 2017. UEFA-M: Utility-based energy efficient adaptive multimedia mechanism over LTE HetNet small cells. 14th International Symposium on Wireless Communication Systems. Bologna, Italy​ 28 - 31 Aug 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 408-413 https://doi.org/10.1109/ISWCS.2017.8108149
Evaluating interactive visualization of multidimensional data projection with feature transformation
Xu, K., Zhang, L., Pérez, D., Nguyen, P. and Ogilvie-Smith, A. 2017. Evaluating interactive visualization of multidimensional data projection with feature transformation. Multimodal Technologies and Interaction. 1 (3). https://doi.org/10.3390/mti1030013
Towards an instrument for measuring sensemaking and an assessment of its theoretical features
Alsufiani, K., Attfield, S. and Zhang, L. 2017. Towards an instrument for measuring sensemaking and an assessment of its theoretical features. 31st International BCS Human Computer Interaction Conference (HCI 2017) - Digital Make-Believe. Sunderland, Tyne and Wear, UK. 03 - 06 Jul 2017 British Computer Society. pp. 1-5 https://doi.org/10.14236/ewic/HCI2017.86
Exploring a new security framework for remote patient monitoring devices
Ondiege, B., Clarke, M. and Mapp, G. 2017. Exploring a new security framework for remote patient monitoring devices. Computers. 6 (1), pp. 1-12. https://doi.org/10.3390/computers6010011
A comparative experimental design and performance analysis of Snort-based Intrusion Detection System in practical computer networks
Karim, I., Vien, Q., Le, T. and Mapp, G. 2017. A comparative experimental design and performance analysis of Snort-based Intrusion Detection System in practical computer networks. Computers. 6 (1), pp. 1-15. https://doi.org/10.3390/computers6010006
Building a prototype VANET testbed to explore communication dynamics in highly mobile environments
Paranthaman, V., Ghosh, A., Mapp, G., Iniovosa, V., Shah, P., Nguyen, H., Gemikonakli, O. and Rahman, S. 2017. Building a prototype VANET testbed to explore communication dynamics in highly mobile environments. Guo, S., Wei, G., Xiang, Y., Lin, X. and Lorenz, P. (ed.) International Conference on Testbeds and Research Infrastructures (TridentCom 2016). Hangzhou, china 14 - 15 Jun 2016 Springer, Cham. pp. 81-90 https://doi.org/10.1007/978-3-319-49580-4_8
Semantic based image retrieval through combined classifiers of deep neural network and wavelet decomposition of image signal
Qazi, N. and Wong, B. 2016. Semantic based image retrieval through combined classifiers of deep neural network and wavelet decomposition of image signal. 9th IEEE EUROSIM Congress on Modelling and Simulation (EUROSIM). Oulu, Finland 12 - 16 Sep 2016 pp. 1-6 https://doi.org/10.1109/EUROSIM.2016.141
The role of expertise in dynamic risk assessment: a reflection of the problem-solving strategies used by experienced fireground commanders
Okoli, J., Watt, J., Weller, G. and Wong, B. 2016. The role of expertise in dynamic risk assessment: a reflection of the problem-solving strategies used by experienced fireground commanders. Risk Management. 18 (1), pp. 4-25. https://doi.org/10.1057/rm.2015.20
Exploring seamless connectivity and proactive handover techniques in VANET systems
Mapp, G., Ghosh, A., Paranthaman, V., Iniovosa, V., Loo, J. and Vinel, A. 2016. Exploring seamless connectivity and proactive handover techniques in VANET systems. in: Intelligent Transportation Systems: Dependable Vehicular Communications for Improved Road Safety Switzerland Springer International Publishing.
A specification-based IDS for detecting attacks on RPL-based network topology
Le, A., Loo, J., Chai, K. and Aiash, M. 2016. A specification-based IDS for detecting attacks on RPL-based network topology. Information. 7 (2). https://doi.org/10.3390/info7020025
Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks. Journal of Networking Technology. 7 (1), pp. 16-33.
Interference management for co-channel mobile femtocells technology in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Interference management for co-channel mobile femtocells technology in LTE networks. 2016 12th International Conference on Intelligent Environments (IE). London, United Kingdom 14 - 16 Sep 2016 IEEE. pp. 80-87 https://doi.org/10.1109/IE.2016.21
Criminal pattern identification based on modified K-means clustering
Aljrees, T., Shi, D., Windridge, D. and Wong, B. 2016. Criminal pattern identification based on modified K-means clustering. 2016 International Conference on Machine Learning and Cybernetics. Jeju, South Korea 10 - 13 Jul 2016 IEEE. pp. 799-806 https://doi.org/10.1109/ICMLC.2016.7872990
Spherical similarity explorer for comparative case analysis
Zhang, L., Rooney, C., Nachmanson, L., Wong, B., Kwon, B., Stoffel, F., Hund, M. and Qazi, N. 2016. Spherical similarity explorer for comparative case analysis. IS&T Electronic Imaging 2016 Conference on Visualization and Data Analysis 2016. San Francisco, CA, USA 16 - 18 Feb 2016 Society for Imaging Science and Technology. pp. 1-10 https://doi.org/10.2352/ISSN.2470-1173.2016.1.VDA-496
Towards analytical provenance visualization for criminal intelligence analysis
Islam, J., Anslow, C., Xu, K., Wong, B. and Zhang, L. 2016. Towards analytical provenance visualization for criminal intelligence analysis. Computer Graphics & Visual Computing (CGVC) 2016. Bournemouth University, United Kingdom 15 - 16 Sep 2016 The Eurographics Association. pp. 17-24 https://doi.org/10.2312/cgvc.20161290
Developing a model of distributed sensemaking: a case study of military analysis
Wheat, A., Attfield, S. and Fields, B. 2016. Developing a model of distributed sensemaking: a case study of military analysis. Informatics. 3 (1). https://doi.org/10.3390/informatics3010001
SensePath: understanding the sensemaking process through analytic provenance
Nguyen, P., Xu, K., Wheat, A., Wong, B., Attfield, S. and Fields, B. 2016. SensePath: understanding the sensemaking process through analytic provenance. IEEE Transactions on Visualization and Computer Graphics. 22 (1), pp. 41-50. https://doi.org/10.1109/TVCG.2015.2467611
Common ground in collaborative intelligence analysis: an empirical study
Laurence, S., Fields, B. and Attfield, S. 2016. Common ground in collaborative intelligence analysis: an empirical study. 30th International BCS Human Computer Interaction Conference (HCI 2016). Bournemouth University, Poole, UK 11 - 15 Jul 2016 British Computer Society (BCS) Learning and Development Ltd.. pp. 1-11 https://doi.org/10.14236/ewic/HCI2016.30
TimeSets: timeline visualization with set relations
Nguyen, P., Xu, K., Walker, R. and Wong, B. 2016. TimeSets: timeline visualization with set relations. Information Visualization. 15 (3), pp. 253-269. https://doi.org/10.1177/1473871615605347
Collaborative sense-making during simulated intelligence analysis exercises
Baber, C., Attfield, S., Conway, G., Rooney, C. and Kodagoda, N. 2016. Collaborative sense-making during simulated intelligence analysis exercises. International Journal of Human-Computer Studies. 86, pp. 94-108. https://doi.org/10.1016/j.ijhcs.2015.10.001
Performance evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network
Ghosh, A., Lasebae, A. and Ever, E. 2009. Performance evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network. 3rd IT Student Conference for the Next Generation. University of East London, London, UK 21 - 22 Nov 2009
Providing ubiquitous communication using handover techniques in VANET systems
Ghosh, A., Paranthaman, V., Mapp, G. and Gemikonakli, O. 2014. Providing ubiquitous communication using handover techniques in VANET systems. 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET). Piran, Slovenia 02 - 04 Jun 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 195-202 https://doi.org/10.1109/MedHocNet.2014.6849124
Providing ubiquitous communication using road-side units in VANET systems: unveiling the challenges
Ghosh, A., Vardhan, V., Mapp, G., Gemikonakli, O. and Loo, J. 2013. Providing ubiquitous communication using road-side units in VANET systems: unveiling the challenges. 13th International Conference on ITS Telecommunications (ITST) 2013. Finland, Tampere 05 - 07 Nov 2013 pp. 74-79 https://doi.org/10.1109/ITST.2013.6685524
A formally verified access control mechanism for information centric networks
Aiash, M. and Loo, J. 2015. A formally verified access control mechanism for information centric networks. The 12th International Conference on Security and Cryptography (SECRYPT 2015). Colmar, Alsace, France 20 - 22 Jul 2015 SCITEPRESS - Science and Technology Publications. pp. 377-383 https://doi.org/10.5220/0005566303770383
A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP)
Raheem, A., Lasebae, A. and Loo, J. 2014. A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP). 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Beijing, China Institute of Electrical and Electronics Engineers (IEEE). pp. 840-845 https://doi.org/10.1109/TrustCom.2014.135
Supporting communications in the IOTs using the location/ID split protocol: a security analysis
Lasebae, A., Loo, J., Aiash, M. and Raheem, A. 2013. Supporting communications in the IOTs using the location/ID split protocol: a security analysis. Future Generation Communication Technology (FGCT) 4- date of conference in full: 12-14 Nov. 2013. London, UK 12 - 14 Nov 2013 pp. 1-5
System capacity Improvement by on request channel allocation in LTE cellular network
Lasebae, A., Rahman, S. and Rezvy, S. 2014. System capacity Improvement by on request channel allocation in LTE cellular network. The 15th IEEE International Conference on a World of Wireless, Mobile and Multimedia Networks. Sydney, Australia 16 - 19 Jun 2014
Instant channel allocation technique to improve system throughput in joint LTE network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. Instant channel allocation technique to improve system throughput in joint LTE network. The 28th IEEE International Conference on Advanced Information Networking and Applications. Victoria, BC, Canada 03 - 16 May 2014 IEEE. pp. 900-904 https://doi.org/10.1109/WAINA.2014.198
System capacity improvement by on request channel allocation in LTE cellular network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. System capacity improvement by on request channel allocation in LTE cellular network. 48th Annual Conference on Information Sciences and Systems (CISS-2014). Princeton, New Jersey, USA 19 - 21 Mar 2014 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/CISS.2014.6814105
On demand based frequency allocation to mitigate interference in femto-macro LTE cellular network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2013. On demand based frequency allocation to mitigate interference in femto-macro LTE cellular network. Second International Conference on Future Generation Communication Technologies (FGCT- 2013). London, UK 12 - 14 Nov 2013 Institute of Electrical and Electronics Engineers (IEEE). pp. 213-218
Downlink femto-macro ICI cancellation by on request channel allocation in LTE network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. Downlink femto-macro ICI cancellation by on request channel allocation in LTE network. 48th Annual Conference on Information Sciences and Systems (CISS-2014). Princeton University, New Jersey, USA 19 - 21 Mar 2014
Keeping up with the law: investigating lawyers’ monitoring behaviour
Ellis, S., Makri, S. and Attfield, S. 2014. Keeping up with the law: investigating lawyers’ monitoring behaviour. New Library World. 115 (7/8), pp. 292-313. https://doi.org/10.1108/NLW-03-2014-0023
How military intelligence personnel collaborate on a sense-making exercise
Baber, C., Conway, G., Attfield, S., Rooney, C., Kodagoda, N. and Walker, R. 2015. How military intelligence personnel collaborate on a sense-making exercise. 12th International Conference on Naturalistic Decision Making. McLean, Virginia, USA 09 - 12 Jun 2015
Distributed sensemaking: a case study of military analysis
Attfield, S., Fields, B., Wheat, A., Hutton, R., Nixon, J., Leggatt, A. and Blackford, H. 2015. Distributed sensemaking: a case study of military analysis. 12th International Conference on Naturalistic Decision Making. McLean, Virginia, USA 09 - 12 Jun 2015
How analysts think: inference making strategies
Wong, B. and Kodagoda, N. 2015. How analysts think: inference making strategies. Human Factors and Ergonomics Society 59th International Annual Meeting, 2015. Los Angeles, California, USA 26 - 30 Oct 2015 pp. 269-273 https://doi.org/10.1177/1541931215591055
Exploring the challenges of implementing guidelines for the design of visual analytics systems
Haider, J., Pohl, M., Hillemann, E., Nussbaumer, A., Attfield, S., Passmore, P. and Wong, B. 2015. Exploring the challenges of implementing guidelines for the design of visual analytics systems. Human Factors and Ergonomics Society 2015 ​59th International Annual Meeting. Los Angeles, California, USA 26 - 30 Oct 2015 Human Factors and Ergonomics Society. pp. 259-263 https://doi.org/10.1177/1541931215591053
Scalability considerations for multivariate graph visualization
Jankun-Kelly, T., Dwyer, T., Holten, D., Hurter, C., Nollenburg, M., Weaver, C. and Xu, K. 2014. Scalability considerations for multivariate graph visualization. in: Kerren, A., Purchase, H. and Ward, M. (ed.) Multivariate Network Visualization: Dagstuhl Seminar # 13201, Dagstuhl Castle, Germany, May 12-17, 2013, Revised Discussions Springer International Publishing.
SchemaLine: timeline visualization for sensemaking
Nguyen, P., Xu, K., Walker, R. and Wong, B. 2014. SchemaLine: timeline visualization for sensemaking. 18th International Conference on Information Visualisation (IV). pp. 225-233
Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing
Carnielli, A. and Aiash, M. 2015. Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, Korea 24 - 27 Mar 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 135-140
Supporting communication in information centric networks using the location/ID split protocol and time released caching
Aiash, M., Mapp, G. and Kallash, M. 2015. Supporting communication in information centric networks using the location/ID split protocol and time released caching. 2015 International Conference on Cloud Computing (ICCC). Riyadh, Saudi Arabia 26 - 29 Apr 2015 Institute of Electrical and Electronics Engineers. pp. 233-238 https://doi.org/10.1109/CLOUDCOMP.2015.7149657
Virtualization and cyber security: arming future security practitioners
Tharayanil, M., Whitney, G., Aiash, M. and Benzaid, C. 2015. Virtualization and cyber security: arming future security practitioners. IEEE Trustcom/BigDataSE/ISPA: EFINS 2015 The 2nd IEEE International Workshop on the Emerging Future Internet and Network Security. Helsinki, Finland 20 - 22 Aug 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 1398-1402 https://doi.org/10.1109/trustcom.2015.537
Mobility management in LTE/mobile femtocell networks: outage probability and drop/block calls probability
Raheem, R., Lasebae, A. and Loo, J. 2015. Mobility management in LTE/mobile femtocell networks: outage probability and drop/block calls probability. 3rd International Conference on Emerging Research Paradigms in Business and Social Sciences. Dubai, UAE 24 - 26 Nov 2015
Enabling seamless V2I communications towards developing cooperative automotive applications in VANET systems
Ghosh, A., Paranthaman, V., Mapp, G., Gemikonakli, O. and Loo, J. 2015. Enabling seamless V2I communications towards developing cooperative automotive applications in VANET systems. IEEE Communications Magazine. 53 (12), pp. 80-86. https://doi.org/10.1109/MCOM.2015.7355570
Exploring energy consumption issues for multimedia streaming in LTE HetNet small cells
Trestian, R., Vien, Q., Shah, P. and Mapp, G. 2015. Exploring energy consumption issues for multimedia streaming in LTE HetNet small cells. 2015 IEEE 40th Conference on Local Computer Networks (LCN 2015). Clearwater Beach, Florida, USA 26 - 29 Oct 2015 IEEE. pp. 498-501 https://doi.org/10.1109/LCN.2015.7366362
Business process models for visually navigating process execution data
Gulden, J. and Attfield, S. 2015. Business process models for visually navigating process execution data. 4th International Workshop on Theory and Application of Visualizations and Human-centric Aspects in Processes (TAProViz2015). Innsbruck, Austria 31 Aug 2015
U-sphere: strengthening scalable flat-name routing for decentralized networks
Kos, J., Aiash, M., Loo, J. and Trček, D. 2015. U-sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks. 89, pp. 14-31. https://doi.org/10.1016/j.comnet.2015.07.006
HiReD: a high-resolution multi-window visualisation environment for cluster-driven displays
Rooney, C. and Ruddle, R. 2015. HiReD: a high-resolution multi-window visualisation environment for cluster-driven displays. 7th ACM SIGCHI Symposium on Engineering Interactive Computing Systems. Duisburg, Germany 23 - 26 Jun 2015 Association for Computing Machinery (ACM).
Analytic provenance for sensemaking: a research agenda
Xu, K., Attfield, S., Jankun-Kelly, T., Wheat, A., Nguyen, P. and Selvaraj, N. 2015. Analytic provenance for sensemaking: a research agenda. IEEE Computer Graphics and Applications. 35 (3), pp. 56-64. https://doi.org/10.1109/MCG.2015.50
Introducing a hybrid infrastructure and information-centric approach for secure cloud computing
Aiash, M., Colson, R. and Kallash, M. 2015. Introducing a hybrid infrastructure and information-centric approach for secure cloud computing. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, Korea 24 - 27 Mar 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 154-159 https://doi.org/10.1109/WAINA.2015.80
A formal analysis of authentication protocols for mobile devices in next generation networks
Aiash, M. 2015. A formal analysis of authentication protocols for mobile devices in next generation networks. Concurrency and Computation: Practice and Experience. 27 (12), pp. 2938-2953. https://doi.org/10.1002/cpe.3260
An integrated authentication and authorization approach for the network of information architecture
Aiash, M. and Loo, J. 2015. An integrated authentication and authorization approach for the network of information architecture. Journal of Network and Computer Applications. 50, pp. 73-79. https://doi.org/10.1016/j.jnca.2014.06.004
Challenges and solutions for secure information centric networks: a case study of the NetInf architecture
Loo, J. and Aiash, M. 2015. Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. Journal of Network and Computer Applications. 50, pp. 64-72. https://doi.org/10.1016/j.jnca.2014.06.003
A secure framework for communications in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A. and Loo, J. 2014. A secure framework for communications in heterogeneous networks. WAINA 2014 28th International Conference on Advanced Information Networking and Applications Workshops. Victoria, BC 13 - 16 May 2014 pp. 841-846
External representation of provenance in intelligence analysis
Wheat, A., Attfield, S. and Fields, B. 2014. External representation of provenance in intelligence analysis. Provenance for Sensemaking IEEE VIS 2014 Workshop. Paris, France 10 Nov 2014
Secure live virtual machines migration: issues and solutions
Aiash, M., Mapp, G. and Gemikonakli, O. 2014. Secure live virtual machines migration: issues and solutions. IEEE AINA 2014. Victoria, BC, Canada 13 - 16 May 2014
Comparison between resource reservation protocol and next steps in signalling in mobile IP networks
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. Comparison between resource reservation protocol and next steps in signalling in mobile IP networks. IET Networks. https://doi.org/10.1049/iet-net.2013.0028
SLA based MT-routing for future internet
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. SLA based MT-routing for future internet. Wireless World Research Forum Meeting 32. Marrakech, Morocco 18 - 22 May 2014
An efficient traffic engineering based on multi-topology routing for future internet
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. An efficient traffic engineering based on multi-topology routing for future internet. Computer Networks. https://doi.org/10.1016/j.comnet.2014.05.008
Cloud-based service delivery architecture with service-populating and mobility-aware mechanisms
Sardis, F., Mapp, G. and Loo, J. 2013. Cloud-based service delivery architecture with service-populating and mobility-aware mechanisms. in: Rodrigues, J., Lin, K. and Lloret, J. (ed.) Mobile Networks And Cloud Computing Convergence for Progressive Services and Applications IGI Global. pp. 183-199
Information seeking, gathering and review: journalism as a case study for the design of search and authoring systems
Attfield, S. 2005. Information seeking, gathering and review: journalism as a case study for the design of search and authoring systems. PhD thesis University of London Computing
TimeSets: timeline visualization for sensemaking
Nguyen, P., Xu, K., Walker, R. and Wong, B. 2014. TimeSets: timeline visualization for sensemaking. IEEE VIS Workshop on Provenance for Sensemaking. Paris, France 10 Nov 2014
POLAR - an interactive patterns of life visualisation tool for intelligence analysis
Kodagoda, N., Attfield, S., Nguyen, P., Zhang, L., Xu, K., Wong, B., Wagstaff, A., Phillips, G., Bulloch, J., Marshall, J. and Bertram, S. 2014. POLAR - an interactive patterns of life visualisation tool for intelligence analysis. IEEE Joint Conference on Intelligence and Security Informatics Conference. The Hague, Netherlands Institute of Electrical and Electronics Engineers. pp. 327
LOC algorithm: location-aware opportunistic forwarding by using node's approximate location
Khan, S., Loo, J., Lasebae, A., Azam, M., Adeel, M., Kausar, R. and Sardar, H. 2014. LOC algorithm: location-aware opportunistic forwarding by using node's approximate location. International Journal of Pervasive Computing and Communications. 10 (4), pp. 481-496. https://doi.org/10.1108/IJPCC-02-2014-0017
Performance evaluation of LTE network via using fixed/mobile femtocells
Raheem, R., Lasebae, A. and Loo, J. 2014. Performance evaluation of LTE network via using fixed/mobile femtocells. Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference. Victoria, BC, Canada 13 - 16 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 255-260 https://doi.org/10.1109/WAINA.2014.51
VALCRI: addressing European needs for information exploitation of large complex data in criminal intelligence analysis
Wong, B., Zhang, L. and Shepherd, I. 2014. VALCRI: addressing European needs for information exploitation of large complex data in criminal intelligence analysis. European Data Forum 2014. Athens, Greece 19 - 20 Mar 2014
Visual analysis of streaming data with SAVI and SenseMAP
Xu, K., Nguyen, P. and Fields, B. 2014. Visual analysis of streaming data with SAVI and SenseMAP. 2014 IEEE Conference on Visual Analytics Science and Technology (VAST). Paris, France 25 - 31 Oct 2014 pp. 389-390 https://doi.org/https://doi.org/10.1109/vast.2014.7042580
Instant channel allocation technique to improve system throughput in joint LTE cellular network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. Instant channel allocation technique to improve system throughput in joint LTE cellular network. Advanced Information Networking and Applications Workshops (WAINA 2014). Victoria, Canada 13 - 16 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 900-904 https://doi.org/10.1109/WAINA.2014.198
Exploring efficient seamless handover in VANET systems using network dwell time
Ghosh, A., Parathaman, V., Mapp, G. and Gemikonakli, O. 2014. Exploring efficient seamless handover in VANET systems using network dwell time. EURASIP Journal on Wireless Communications and Networking. 2014 (1), pp. 1-19. https://doi.org/10.1186/1687-1499-2014-227
LOC algorithm: location-aware opportunistic forwarding by using node's approximate location
Kashif Ashraf Khan, S., Loo, J., Lasebae, A., Awais Azam, M., Adeel, M., Kausar, R. and Sardar, H. 2014. LOC algorithm: location-aware opportunistic forwarding by using node's approximate location. International Journal of Pervasive Computing and Communications. 10 (4), pp. 481-496. https://doi.org/10.1108/IJPCC-02-2014-0017
INVISQUE as a tool for intelligence analysis: the construction of explanatory narratives
Rooney, C., Attfield, S., Wong, B. and Choudhury, S. 2014. INVISQUE as a tool for intelligence analysis: the construction of explanatory narratives. International Journal of Human-Computer Interaction. 30 (9), pp. 703-717. https://doi.org/10.1080/10447318.2014.905422
Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR
Aiash, M. and Loo, J. 2014. Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. International Journal of Communication Systems. 27 (12), pp. 3600-3618. https://doi.org/10.1002/dac.2561
User behaviour: searching for scholarly material using electronic resource discovery systems
Stelmaszewska, H., Wong, B., Bhimani, N. and Barn, B. 2010. User behaviour: searching for scholarly material using electronic resource discovery systems. in: BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference British Computer Society. pp. 17-26
Information seeking and use by newspaper journalists
Attfield, S. and Dowell, J. 2003. Information seeking and use by newspaper journalists. Journal of Documentation. 59 (2), pp. 187-204. https://doi.org/10.1108/00220410310463860
Information seeking in the context of writing: a design psychology interpretation of the ‘problematic situation’
Attfield, S., Blandford, A. and Dowell, J. 2003. Information seeking in the context of writing: a design psychology interpretation of the ‘problematic situation’. Journal of Documentation. 59 (4), pp. 430-453. https://doi.org/10.1108/00220410310485712
Task embedded visualisation: the design for an Interactive IR results display for journalists
Attfield, S., Blandford, A. and Craft, B. 2004. Task embedded visualisation: the design for an Interactive IR results display for journalists. in: Proceedings of eighth international conference on information visualisation, 2004 Los Alamitos, USA IEEE Computer Society. pp. 650-655
Have digital resources taken a wrong turn on the health ‘information journey’?
Adams, A., Attfield, S. and Blandford, A. 2004. Have digital resources taken a wrong turn on the health ‘information journey’? in: Proceedings of the 2nd healthcare digital libraries workshop ECDL.
Patient information needs: before and after doctor consultations
Attfield, S. and Adams, A. 2005. Patient information needs: before and after doctor consultations. in: Proceedings of the healthcare digital libraries workshop ECDL.
Exploring the effects of introducing real-time simulation on collaborative urban design in augmented reality
Attfield, S., Mottram, C., Fatah gen. Schieck, A., Blandford, A. and Penn, A. 2005. Exploring the effects of introducing real-time simulation on collaborative urban design in augmented reality. in: Gero, J. and Bonnardel, L. (ed.) Studying designers '05 Sydney, Australia Key Centre of Design Computing and Cognition, University of Sydney. pp. 369-374
Implementing digital resources for clinicians' and patients' varying needs
Adams, A., Blandford, A. and Attfield, S. 2005. Implementing digital resources for clinicians' and patients' varying needs. Informatics for Health and Social Care. 30 (2), pp. 107-122. https://doi.org/10.1080/14639230500298875
Interactive space generation through play: exploring the role of simulation on the design table
Fatah gen. Schieck, A., Penn, A., Mottram, C., Strothmann, A., Ohlenburg, J., Broll, W., Aish, F. and Attfield, S. 2005. Interactive space generation through play: exploring the role of simulation on the design table. International Journal of Architectural Computing. 3 (1), pp. 3-26. https://doi.org/10.1260/1478077053739612
Patient information needs: pre- and post-consultation
Attfield, S., Adams, A. and Blandford, A. 2006. Patient information needs: pre- and post-consultation. Health Informatics Journal. 12 (2), pp. 165-177. https://doi.org/10.1177/1460458206063811
Sensemaking in a large-scale corporate fraud investigation: some problems of communication
Attfield, S. and Blandford, A. 2007. Sensemaking in a large-scale corporate fraud investigation: some problems of communication. 24th Annual HCIL Symposium. Maryland, MD, USA 31 May - 01 Jun 2007
Sensemaking in a large-scale corporate fraud investigation: the challenge of communication
Attfield, S. and Blandford, A. 2007. Sensemaking in a large-scale corporate fraud investigation: the challenge of communication. DESI Workshop. Palo Alto, CA, USA 04 Jun 2007
Investigations within investigations: a recursive framework for scalable sensemaking support
Attfield, S., Blandford, A. and De Gabrielle, S. 2008. Investigations within investigations: a recursive framework for scalable sensemaking support. CHI 2008. Florence, Italy 05 - 10 Apr 2008
E-disclosure viewed as ‘Sensemaking’ with computers: the challenge of ‘frames’
Attfield, S. and Blandford, A. 2008. E-disclosure viewed as ‘Sensemaking’ with computers: the challenge of ‘frames’. in: Digital evidence and electronic signature law review Bedfordshire, UK Pario Communicaitons Limited.
The PRET A Rapporter framework: evaluating digital libraries from the perspective of information work
Blandford, A., Adams, A., Attfield, S., Buchanan, G., Gow, J., Makri, S., Rimmer, J. and Warwick, C. 2008. The PRET A Rapporter framework: evaluating digital libraries from the perspective of information work. Information Processing and Management. 44 (1), pp. 4-21. https://doi.org/10.1016/j.ipm.2007.01.021
Exploring the importance of reflection in the control room
Back, J., Furniss, D., Attfield, S., Hassard, S. and Blandford, A. 2009. Exploring the importance of reflection in the control room. CHI 2009 Workshop on Designing for Reflection on Experience. Boston, MA, USA 04 Apr 2009
A classification of sensemaking representations
Faisal, S., Attfield, S. and Blandford, A. 2009. A classification of sensemaking representations. CHI 2009 Workshop on Sensemaking. Boston, MA, USA 04 - 05 Apr 2009
Where light in darkness lies: preservation, access and sensemaking strategies for the modern digital archive
Baron, J. and Attfield, S. Where light in darkness lies: preservation, access and sensemaking strategies for the modern digital archive. The Memory of the World in the Digital Age: Digitization and Preservation. Vancouver, BC, Canada 26 - 28 Sep 2012
Using digital technology to enhance and enrich visitor experience in exhibition spaces
Wheat, A., Attfield, S., Loureiro, R. and Fusco-Fagg, I. Using digital technology to enhance and enrich visitor experience in exhibition spaces. CHArt 28th Annual Conference. London, UK 15 - 16 Nov 2012
The loneliness of the long-distance document reviewer: e-discovery and cognitive ergonomics
Attfield, S., De Gabrielle, S. and Blandford, A. The loneliness of the long-distance document reviewer: e-discovery and cognitive ergonomics. DESI III Global E-Discovery/E-Disclosure Workshop: A Pre- Conference Workshop at the 12th International Conference on Artificial Intelligence and Law (ICAIL 2009). Barcelona, Spain 08 Jun 2009
Idea generation and material consolidation: tool use and intermediate artefacts in journalistic writing
Attfield, S., Fegan, S. and Blandford, A. 2009. Idea generation and material consolidation: tool use and intermediate artefacts in journalistic writing. Cognition, Technology and Work. 11 (3), pp. 227-239. https://doi.org/10.1007/s10111-008-0111-6
The centrality of user modeling to high recall with high precision search
Brassil, D., Hogan, C. and Attfield, S. 2009. The centrality of user modeling to high recall with high precision search. in: IEEE International Conference on Systems, Man and Cybernetics, 2009 IEEE. pp. 91-96
Exploring sensemaking through an Intelligence Analysis exercise
Baber, C., Attfield, S., Wong, B. and Rooney, C. 2013. Exploring sensemaking through an Intelligence Analysis exercise. in: Chaudet, H., Pellegrin, L. and Bonnardel, N. (ed.) Proceedings of the 11th International Conference on Naturalistic Decision Making Paris Arpege Science Publishing. pp. 125-131
Conceptual design for sensemaking
Blandford, A., Faisal, S. and Attfield, S. 2014. Conceptual design for sensemaking. in: Huang, W. (ed.) Handbook of human centric visualization New York Springer. pp. 253-283
Predictive coding, storytelling and god: narrative understanding in e-discovery
Chapin, L., Attfield, S. and Okoro, E. Predictive coding, storytelling and god: narrative understanding in e-discovery. DESI V Workshop. Rome, Italy 14 Jun 2013 WileyBlackwell.
An extensible framework for provenance in human terrain visual analytics
Walker, R., Slingsby, A., Dykes, J., Xu, K., Wood, J., Nguyen, P., Stephens, D., Wong, B. and Zheng, Y. 2013. An extensible framework for provenance in human terrain visual analytics. IEEE Transactions on Visualization and Computer Graphics. 19 (12), pp. 2139-2148. https://doi.org/10.1109/TVCG.2013.132
Effects of low & high literacy on user performance in information search and retrieval
Kodagoda, N. and Wong, B. 2008. Effects of low & high literacy on user performance in information search and retrieval. in: Beale, R. and England, D. (ed.) Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction British Computer Society (BCS) Learning and Development Ltd..
Radio dispatchers' interruption recovery strategies
Mancero, G., Wong, B. and Loomes, M. 2009. Radio dispatchers' interruption recovery strategies. in: Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group on Design: Open 24/7 - OZCHI '09 New York Association for Computing Machinery (ACM). pp. 113-120
Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2009. Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents. Trilling, L., Perkins, D., Dionysios, D., Perlovsky, L., Davey, K., Landgrebe, D., Marino, M., Russell, D., Collicott, S., Ceccarelli, M. and Lund, J. (ed.) The 8th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications (EHAC '09). Cambridge, UK 21 - 23 Feb 2009 WSEAS Press. pp. 51-56
A multi-resolution surface distance model for k-NN query processing
Deng, K., Zhou, X., Shen, H., Liu, Q., Xu, K. and Lin, X. 2008. A multi-resolution surface distance model for k-NN query processing. VLDB Journal. 17 (5), pp. 1101-1119. https://doi.org/10.1007/s00778-007-0053-2
Visualization and analysis of the complexome network of saccharomyces cerevisiae
Li, S., Xu, K. and Wilkins, M. 2011. Visualization and analysis of the complexome network of saccharomyces cerevisiae. Journal of Proteome Research. 10 (10), pp. 4744-4756. https://doi.org/10.1021/pr200548c
Variable uncertainty: scenario design for training adaptive and flexible skills
Field, J., Rankin, A., Van der Pal, J., Eriksson, H. and Wong, B. 2011. Variable uncertainty: scenario design for training adaptive and flexible skills. in: Proceedings of the 29th Annual European Conference on Cognitive Ergonomics - ECCE '11 New York Association for Computing Machinery (ACM). pp. 27-34
Uncertainty-tolerant design: evaluating task performance and drag-and-link information gathering for a news-writing task
Attfield, S., Blandford, A., Dowell, J. and Cairns, P. 2008. Uncertainty-tolerant design: evaluating task performance and drag-and-link information gathering for a news-writing task. International Journal of Human-Computer Studies. 66 (6), pp. 410-424. https://doi.org/10.1016/j.ijhcs.2007.12.001
Specification-based IDS for securing RPL from topology attacks
Le, A., Loo, J., Luo, Y. and Lasebae, A. 2011. Specification-based IDS for securing RPL from topology attacks. Wireless Days (WD), 2011 IFIP. https://doi.org/10.1109/WD.2011.6098218
Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2008. Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6. International Journal of Communications. 2 (3), pp. 185-194.
Semi-bipartite graph visualization for gene ontology networks
Xu, K., Williams, R., Hong, S., Liu, Q. and Zhang, J. 2010. Semi-bipartite graph visualization for gene ontology networks. in: Graph drawing : 17th International Symposium (GD 2009) Revised Papers Springer.
Modelling mixed access-patterns in network-based systems
Thakker, D., Mapp, G. and Gemikonakli, O. 2009. Modelling mixed access-patterns in network-based systems. in: 11th International Conference on Computer Modelling and Simulation (UKSIM '09) IEEE. pp. 514-519
Integrating mobility, quality-of-service and security in future mobile networks
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2013. Integrating mobility, quality-of-service and security in future mobile networks. in: Ao, S. and Gelman, L. (ed.) Electrical Engineering and Intelligent Systems New York Springer.
Gene specific co-regulation discovery: an improved approach
Zhang, J., Liu, Q. and Xu, K. 2009. Gene specific co-regulation discovery: an improved approach. in: Allen, G., Nabrzyski, J., Seidel, E. and Albada, G. (ed.) Computational Science – ICCS 2009 : 9th International Conference Baton Rouge, LA, USA, May 25-27, 2009 Proceedings, Part I Berlin Springer.
Trialling the SMART approach: identifying and assessing sense-making
Wong, B., Kodagoda, N., Rooney, C., Attfield, S. and Choudhury, S. 2013. Trialling the SMART approach: identifying and assessing sense-making. 2013 International Annual Meeting of the Human Factors and Ergonomics Society. San Diego, CA, USA 30 Sep - 04 Oct 2013
A novel security protocol for resolving addresses in the location/ID split architecture
Aiash, M. 2013. A novel security protocol for resolving addresses in the location/ID split architecture. The 7th International Conference on Network and System Security (NSS 2013). Spain 03 - 04 Jun 2013
Securing address registration in location/ID split protocol using ID-based cryptography
Aiash, M., Al-Nemrat, A. and Preston, D. 2013. Securing address registration in location/ID split protocol using ID-based cryptography. Tsaoussidis, V., Kassler, A., Koucheryavy, Y. and Mellouk, A. (ed.) In proceeding of: The 11th International Conference on Wired/Wireless Internet Communications WWIC 2013. Russia 05 - 07 Jun 2013 Springer. https://doi.org/10.1007/978-3-642-38401-1_10
Exploring service and buffer management issues to provide integrated voice and data services in single and multi channel wireless networks
Gemikonakli, E., Mapp, G., Gemikonakli, O. and Ever, E. 2013. Exploring service and buffer management issues to provide integrated voice and data services in single and multi channel wireless networks. The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013
Enhancing the modelling of vertical handover in integrated cellular/WLAN environments
Kirsal, Y., Ever, E., Mapp, G. and Gemikonakli, O. 2013. Enhancing the modelling of vertical handover in integrated cellular/WLAN environments. The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013
An efficient resource reservation for domain based mobile IP networks: analytical approach
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2013. An efficient resource reservation for domain based mobile IP networks: analytical approach. IEEE 77th Vehicular Technology Conference (VTC2013-Spring). Dresden, Germany 02 - 05 Jun 2013
An integrated approach to QoS and security in future mobile networks using the Y-Comm framework
Aiash, M. 2012. An integrated approach to QoS and security in future mobile networks using the Y-Comm framework. PhD thesis Middlesex University School of Engineering and Information Sciences
From fixed to mobile femtocells in LTE systems: issues and challenges
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2013. From fixed to mobile femtocells in LTE systems: issues and challenges. 2013 Second International Conference on Future Generation Communication Technology (FGCT). London, United Kingdom 12 - 14 Nov 2013 Institute of Electrical and Electronics Engineers (IEEE). pp. 207-212 https://doi.org/10.1109/FGCT.2013.6767218
Exploring service and buffer management issues to provide integrated voice and data services in single and multi-channel wireless networks
Gemikonakli, E., Mapp, G., Gemikonakli, O. and Ever, E. 2013. Exploring service and buffer management issues to provide integrated voice and data services in single and multi-channel wireless networks. in: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA) IEEE. pp. 1056-1063
Efficient NSIS mobility support for mobile networks
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2013. Efficient NSIS mobility support for mobile networks. IEEE 24th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). London, UK 08 - 11 Sep 2013 IEEE. pp. 3354-3359 https://doi.org/10.1109/PIMRC.2013.6666727
Relative position vectors: an alternative approach to conflict detection in air traffic control
Vuckovic, A., Sanderson, P., Neal, A., Gaukrodger, S. and Wong, B. 2013. Relative position vectors: an alternative approach to conflict detection in air traffic control. Human Factors: The Journal of the Human Factors and Ergonomics Society. 55 (5), pp. 946-964. https://doi.org/10.1177/0018720813481803
On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms
Sardis, F., Mapp, G., Loo, J., Aiash, M. and Vinel, A. 2013. On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms. IEEE Transactions on Multimedia. 15 (4), pp. 769-777. https://doi.org/10.1109/TMM.2013.2240286
Using aggregated RSVP in nested HMIPv6
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2012. Using aggregated RSVP in nested HMIPv6. Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International. IEEE. pp. 716 -721 https://doi.org/10.1109/IWCMC.2012.6314292
Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments
Mapp, G., Katsriku, F., Aiash, M., Chinnam, N., Lopes, R., Moreira, E., Vanni, R., Augusto, M., Middlesex University and University of Sao Paulo 2012. Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments. Journal of Computer Networks and Communications. https://doi.org/10.1155/2012/748163
Interactive visualization for low literacy users: from lessons learnt to design
Kodagoda, N., Wong, B., Rooney, C. and Khan, N. 2012. Interactive visualization for low literacy users: from lessons learnt to design. CHI '12 Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems. New York, NY, USA Association for Computing Machinery (ACM). pp. 1159-1168 https://doi.org/10.1145/2207676.2208565
Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol.
Kammueller, F., Mapp, G., Patel, S. and Sani, A. 2012. Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol. International Conference on Internet Monitoring and Protection (ICIMP 2012). Stuttgart, Germany 27 May - 01 Jun 2012 Xpert Publishing Service.
A formally verified device authentication protocol using Casper/FDR
Aiash, M., Mapp, G., Phan, R., Lasebae, A. and Loo, J. 2012. A formally verified device authentication protocol using Casper/FDR. Min, G., Wu, Y., Liu, L., Jin, X., Jarvis, S. and Al-Dubai, A. (ed.) 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012). Liverpool, UK 25 - 27 Jun 2012 IEEE. pp. 1293-1298 https://doi.org/10.1109/TrustCom.2012.27
A survey of potential architectures for communication in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A., Loo, J., Sardis, F., Phan, R., Augusto, M., Moreira, E. and Vanni, R. 2012. A survey of potential architectures for communication in heterogeneous networks. IEEE Wireless Telecommunications Symposium (WTS 2012). London 18 - 20 Apr 2012 IEEE. pp. 1-6 https://doi.org/10.1109/WTS.2012.6266121
Interacting with Information.
Blandford, A. and Attfield, S. 2010. Interacting with Information. Synthesis Lectures on Human-Centered Informatics. 3 (1), pp. 1-99. https://doi.org/10.2200/S00227ED1V01Y200911HCI006
Towards a science of user engagement.
Attfield, S., Kazai, G., Lalmas, M. and Piwowarski, B. 2011. Towards a science of user engagement. UMWA 2011: Workshop on User Modelling for Web Applications. Hong Kong, China 09 - 12 Feb 2011
Evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network
Ghosh, A., Lasebae, A. and Ever, E. 2009. Evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network. Kaspersky IT Security Conference for the Next Generation.
Critical review of analytical modelling approaches for performability evaluation of the handover phenomena in mobile communication systems
Kirsal, Y., Ever, E., Gemikonakli, O. and Mapp, G. 2011. Critical review of analytical modelling approaches for performability evaluation of the handover phenomena in mobile communication systems. IEEE International Conference on Computer and Information Technology (CIT 2011). pp. 132-137 https://doi.org/10.1109/CIT.2011.45
Biological network visualisation.
Xu, K. 2012. Biological network visualisation. 3rd Annual Visualizing Biological Data Conference (VizBi2012). Heidelberg, Germany 06 - 08 Mar 2012
Information seeking behaviour model as a theoretical lens: high and low literate users behaviour process analysed.
Kodagoda, N., Wong, B. and Khan, N. 2010. Information seeking behaviour model as a theoretical lens: high and low literate users behaviour process analysed. in: ECCE '10: Proceedings of the 28th Annual European Conference on Cognitive Ergonomics. Association for Computing Machinery (ACM). pp. 117-124
Open-­card sort to explain why low-literate users abandon their web searches early.
Kodagoda, N., Wong, B. and Khan, N. 2010. Open-­card sort to explain why low-literate users abandon their web searches early. in: BCS'10: Proceedings of the 24th BCS Interaction Specialist Group Conference. British Computer Society. pp. 433-442
Modelling and performability analysis of WLANs as a queuing model with channel/access point failures and reconfiguration
Kirsal, Y., Ever, E., Gemikonakli, O. and Mapp, G. 2011. Modelling and performability analysis of WLANs as a queuing model with channel/access point failures and reconfiguration. EMS. Los Alamitos, CA IEEE Computer Society. pp. 440-445 https://doi.org/10.1109/EMS.2011.33
Security and QoS integration for protecting service providers in hterogeneous environments
Aiash, M., Mapp, G. and Lasebae, A. 2011. Security and QoS integration for protecting service providers in hterogeneous environments. International Journal of Computer Science. 38 (4), pp. 384-393.
When enough is enough: time-restricted sensemaking in underground railway control
Attfield, S., Pagnacco, F. and Benedyk, R. 2011. When enough is enough: time-restricted sensemaking in underground railway control. 10th International Conference on Naturalistic Decision Making. Orlando, FL, USA 31 May - 03 Jun 2011
Evaluating the information behaviour methods: formative evaluations of two methods for assessing the functionality and usability of electronic information resources
Makri, S., Blandford, A., Cox, A., Attfield, S. and Warwick, C. 2011. Evaluating the information behaviour methods: formative evaluations of two methods for assessing the functionality and usability of electronic information resources. International Journal of Human-Computer Studies. 69 (7-8), pp. 455-482. https://doi.org/10.1016/j.ijhcs.2011.04.004
Provenance for intelligence analysis using visual analytics.
Wong, B., Xu, K. and Attfield, S. 2011. Provenance for intelligence analysis using visual analytics. CHI 2011: Workshop on Analytic Provenance. Vancouver, BC, Canada 07 - 08 May 2011
Interactive visualization for information analysis in medical diagnosis
Wong, B., Xu, K. and Holzinger, A. 2011. Interactive visualization for information analysis in medical diagnosis. Workshop on Human-Computer Interaction & Knowledge Discovery and Data Mining (HCI-KDD). Graz, Austria 24 Nov 2011
INVISQUE: Intuitive information exploration through interactive visualization
Wong, B., Chen, R., Kodagoda, N., Rooney, C. and Xu, K. 2011. INVISQUE: Intuitive information exploration through interactive visualization. The ACM CHI Conference on Human Factors in Computing Systems. Vancouver, BC, Canada 07 - 12 May 2011
Visualisation and analysis of the complexome network of Saccharomyces cerevisiae.
Li, S., Xu, K. and Wilkins, M. 2011. Visualisation and analysis of the complexome network of Saccharomyces cerevisiae. Journal of Proteome Research. 10 (10), pp. 4744-4756. https://doi.org/10.1021/pr200548c
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
Le, A., Loo, J., Lasebae, A., Aiash, M. and Luo, Y. 2012. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems. 25 (9), pp. 1189-1212. https://doi.org/10.1002/dac.2356
A user study on curved edges in graph visualization
Xu, K., Rooney, C., Passmore, P., Ham, D. and Nguyen, P. 2012. A user study on curved edges in graph visualization. IEEE Transactions on Visualization and Computer Graphics. 18 (12), pp. 2449 -2456. https://doi.org/10.1109/TVCG.2012.189
M-Sieve: a visualisation tool for supporting network security analysts
Choudhury, S., Kodagoda, N., Nguyen, P., Rooney, C., Attfield, S., Xu, K., Zheng, Y., Wong, B., Chen, R., Mapp, G., Slabbert, L., Aiash, M. and Lasebae, A. 2012. M-Sieve: a visualisation tool for supporting network security analysts. VisWeek 2012. Seattle, WA, USA 14 - 19 Oct 2012
A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2012. A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking. 2012 (57). https://doi.org/10.1186/1687-1499-2012-57
Team Sensemaking Assessment Method (TSAM): an inspection method for evaluating collaborative analysis technologies
Hutton, R., Attfield, S., Wiggins, S., McGuinness, B. and Wong, B. 2012. Team Sensemaking Assessment Method (TSAM): an inspection method for evaluating collaborative analysis technologies. Anderson, M. (ed.) International conference on Ergonomics and Human Factors 2012. Blackpool, England, UK 16 - 19 Apr 2012 CRC Press. pp. 419-420
Stream bundle management layer for optimum management of co-existing telemedicine traffic streams under varying channel conditions in heterogeneous networks.
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2005. Stream bundle management layer for optimum management of co-existing telemedicine traffic streams under varying channel conditions in heterogeneous networks. MIT 2005. China
Middlesex University’s Invisque visual analytics tool: supported by text analytics techniques from the University of Leeds
Choudhury, S., Brierley, C., Rooney, C., Xu, K., Chen, R., Wong, B. and Atwell, E. 2011. Middlesex University’s Invisque visual analytics tool: supported by text analytics techniques from the University of Leeds. IEEE VAST Challenge 2011. Providence, Rhode Island, USA 23 - 28 Oct 2011
INVISQUE: Technology and methodologies for interactive information visualization and analytics in large library collections
Wong, B., Choudhury, S., Rooney, C., Chen, R. and Xu, K. 2011. INVISQUE: Technology and methodologies for interactive information visualization and analytics in large library collections. Gradmann, S., Borri, F., Meghini, C. and Schuldt, H. (ed.) Springer.
Teleporting in an X Window System Environment
Richardson, T., Bennett, F., Mapp, G., Hopper, A., Olivetti Research Laboratory and University of Cambridge 1994. Teleporting in an X Window System Environment. IEEE Personal Communications. 1 (3), pp. 6-12. https://doi.org/10.1109/MPC.1994.311827
Proactive policy management for heterogeneous networks
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2008. Proactive policy management for heterogeneous networks. 3rd International Conference on Information and Communication Technologies: from Theory to Applications (ICTTA 2008). Umayyad Palace, Damascus, Syria 07 - 11 Apr 2008
Client-based SBM layer for predictive management of traffic flows in heterogeneous networks
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2006. Client-based SBM layer for predictive management of traffic flows in heterogeneous networks. 2nd IEEE International Conference on Information and Communication Technologies: from Theory to Applications (ICTTA 2006). Damascus, Syria 24 - 28 Apr 2006
Tripwire: a synchronization primitive for virtual memory mapped communication.
Riddoch, D., Pope, S., Roberts, D., Mapp, G., Clarke, D., Ingram, D., Mansley, K., Hopper, A., AT&T Laboratories Cambridge and Laboratory for Communications Engineering 2001. Tripwire: a synchronization primitive for virtual memory mapped communication. Journal for Interconnection Networks. 2 (3), pp. 345-364. https://doi.org/10.1142/S0219265901000439
Traffic modelling in WLANs and cellular networks.
Gemikonakli, E., Mapp, G., Gemikonakli, O., Ever, E. and Middlesex University 2011. Traffic modelling in WLANs and cellular networks. First Global Conference on Communication, Science and Information Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
A survey of network coverage prediction mechanisms in 4G heterogeneous wireless networks.
Shaikh, F., Mapp, G., Lasebae, A., British Institute of Technology and e-Commerce and Middlesex University 2011. A survey of network coverage prediction mechanisms in 4G heterogeneous wireless networks. First Global Conference on Communication, Science and Information Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Exploring the concept of scope to provide better security for internet services.
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2011. Exploring the concept of scope to provide better security for internet services. First Global Conference on Communication, Science and Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
The development of a dynamic and robust event-based routing protocol in wireless sensor networks for environment monitoring.
Rantisi, M., Maquosi, A., Mapp, G., Gemikonakli, O., PSUT University, Petra University and Middlesex University 2011. The development of a dynamic and robust event-based routing protocol in wireless sensor networks for environment monitoring. First Global Conference on Communication, Science and Information Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Enhancing naming and location services to support multi-homed devices in heterogeneous environments
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Augusto, M., Vanni, R., Moreira, E., Middlesex University, Loughborough University and University of Sao Paulo 2011. Enhancing naming and location services to support multi-homed devices in heterogeneous environments. First Conference on Communication, Science and Information Enginneering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Networked surfaces: a new concept in mobile networking
Scott, J., Hoffman, F., Addlesee, M., Mapp, G., Hopper, A., Laboratory for Communications Engineering, AT&T Laboratories Cambridge and Cambridge University Engineering Department 2002. Networked surfaces: a new concept in mobile networking. Mobile Networks and Applications. 7 (5), pp. 353-364. https://doi.org/10.1023/A:1016539632660
Virtual memory support for distributed computing environments using a shared data object model
Huang, F., Bacon, J., Mapp, G. and University of Cambridge 1995. Virtual memory support for distributed computing environments using a shared data object model. Distributed Systems Engineering. 2 (4), pp. 202-211. https://doi.org/10.1088/0967-1846/2/4/003
Proactive policy management using TBVH mechanism in heterogeneous networks.
Shaikh, F., Mapp, G., Lasebae, A. and Middlesex University 2007. Proactive policy management using TBVH mechanism in heterogeneous networks. Proceedings of the International Conference and Exhibition on 'Next Generation Mobile Application, Services and Technologies' (NGMAST 2007). Cardiff, Wales 12 - 14 Sep 2007
Balancing streaming and demand accesses in a network based storage environment.
Thakker, D., Mapp, G., Gemikonakli, O. and Middlesex University 2010. Balancing streaming and demand accesses in a network based storage environment. in: Sobh, T., Elleithy, K. and Mahmood, A. (ed.) Novel algorithms and techniques in telecommunications and networking. London, New York Springer. pp. 403-408
A QoS framework for heterogeneous networking
Aiash, M., Mapp, G., Lasebae, A., Augusto, M., Vanni, R. and Moreira, E. 2011. A QoS framework for heterogeneous networking. ICWN'11: The 2011 International Conference of Wireless Networks (held as part of WCE 2011). London, UK 06 - 08 Jul 2011
Tactile reasoning and adaptive architecture for intelligence sense-making
Wong, B., Choudhury, S. and North Atlantic Treaty Organization 2011. Tactile reasoning and adaptive architecture for intelligence sense-making. Symposium on "Emerged/Emerging "Disruptive" Technologies (E2DT)". Madrid, Spain 09 - 10 May 2011
Impacts of buffering voice calls in integrated voice and data services
Gemikonakli, E., Gemikonakli, O., Ever, E., Mapp, G. and Institute of Electrical and Electronics Engineers 2011. Impacts of buffering voice calls in integrated voice and data services. Al-Dabass, D., Orsoni, A., Cant, R. and Abraham, A. (ed.) IEEE. pp. 507-512 https://doi.org/10.1109/UKSIM.2011.103
Exploring multi-homing issues in heterogeneous networks
Mapp, G., Aiash, M., Guardia, H., Crowcroft, J., Institute of Electrical and Electronics Engineers, Middlesex University, Federal University of Sao Paulo and University of Cambridge 2011. Exploring multi-homing issues in heterogeneous networks. IEEE. pp. 690-695 https://doi.org/10.1109/WAINA.2011.140
Visualisation of the complexome.
Li, S., Xu, K. and Wilkins, M. 2010. Visualisation of the complexome. Human Proteome Organisation 9th Annual World Congress. Sydney Convention and Exhibition centre
Genetic sequences: tracing the mutations of a disease.
Mitchell, I., Passmore, P. and Xu, K. 2010. Genetic sequences: tracing the mutations of a disease. IEEE VAST Symposium 2010 Challenge. Salt Lake City, Utah, USA 24 - 29 Oct 2010
Hospitalization records: characterization of pandemic spread.
Passmore, P., Zheng, Y., Rooney, C., Al-Sheikh, T. and Xu, K. 2010. Hospitalization records: characterization of pandemic spread. IEEE VAST Symposium 2010 Challenge. Salt Lake City, Utah, USA 24 - 29 Oct 2010
Web service management system for bioinformatics research: a case study.
Xu, K., Yu, Q., Liu, Q., Zhang, J. and Bouguettaya, A. 2011. Web service management system for bioinformatics research: a case study. Service Oriented Computing and Applications. 5 (1), pp. 1-15. https://doi.org/10.1007/s11761-011-0076-9
Y-Comm research [web page]
Mapp, G., Middlesex University, University of Cambridge, University of Sao Paulo and Loughborough University 2008. Y-Comm research [web page]. Middlesex University.
Prioritisation, resources and search terms: a study of decision-making at the virtual reference desk.
Attfield, S., Makri, S., Kalbach, J., Blandford, A., De Gabrielle, S. and Edwards, M. 2008. Prioritisation, resources and search terms: a study of decision-making at the virtual reference desk. Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-540-87599-4_12
Improving the cost structure of sensemaking: analysing user concepts to inform information systems design
Attfield, S. and Blandford, A. 2009. Improving the cost structure of sensemaking: analysing user concepts to inform information systems design. Lecture Notes in Computer Science. 5726. https://doi.org/10.1007/978-3-642-03655-2_60
Sense-making in visual analytics: processes and challenges
Attfield, S., Hara, S. and Wong, B. 2010. Sense-making in visual analytics: processes and challenges. EuroVAST 2010: The 1st European Symposium on Visual Analytics Science and Technology.. Bordeaux, France 08 Jun 2010
Electronic resource discovery systems: from user behaviour to design.
Stelmaszewska, H., Wong, B., Attfield, S. and Chen, R. 2010. Electronic resource discovery systems: from user behaviour to design. in: Hvannberg, E., Larusdottir, M., Blandford, A. and Gulliksen, J. (ed.) NordiCHI '10 6th Nordic Conference on Human-Computer Interaction. Association for Computing Machinery (ACM). pp. 483-492
Social and interactional practices for disseminating current awareness information in an organisational setting.
Attfield, S., Blandford, A. and Makri, S. 2010. Social and interactional practices for disseminating current awareness information in an organisational setting. Information Processing and Management. 46 (6), pp. 632-645. https://doi.org/10.1016/j.ipm.2009.10.003
Discovery-led refinement in e-discovery investigations: sensemaking, cognitive ergonomics and system design.
Attfield, S. and Blandford, A. 2010. Discovery-led refinement in e-discovery investigations: sensemaking, cognitive ergonomics and system design. Artificial Intelligence and Law. 18 (4), pp. 387-412. https://doi.org/10.1007/s10506-010-9091-y
Conceptual misfits in email-based current awareness interaction
Attfield, S. and Blandford, A. 2010. Conceptual misfits in email-based current awareness interaction. Journal of Documentation. 67 (1), pp. 33-55. https://doi.org/10.1108/00220411111105443
Making sense of digital footprints in team-based legal investigations: the acquisition of focus
Attfield, S. and Blandford, A. 2011. Making sense of digital footprints in team-based legal investigations: the acquisition of focus. Human Computer Interaction. 26 (1-2), pp. 38-71. https://doi.org/10.1080/07370024.2011.556548
A knowledge discovery service system for provenance exploration
Liu, Q., Zhang, J., James, F., Xu, K. and Dinesh, N. 2011. A knowledge discovery service system for provenance exploration. International Conference on Data and Knowledge Engineering (ICDKE) 2011. Milan, Italy 06 - 08 Sep 2011
Exploring gate-limited analytical models for high-performance network storage servers
Mapp, G., Thakker, D., Gemikonakli, O. and Middlesex University 2011. Exploring gate-limited analytical models for high-performance network storage servers. Journal of Computer and System Sciences. 77 (5). https://doi.org/10.1016/j.jcss.2010.08.002
Towards an integrated network security framework using the Y-Comm architecture
Mapp, G., Crowcroft, J. and Phan, R. 2010. Towards an integrated network security framework using the Y-Comm architecture. in: Jahankhani, H., Watson, D., Me, G. and Leonhardt, F. (ed.) Handbook of electronic security and digital forensics Singapore World Scientific Publishing Co. Pte Ltd. pp. 169-183
Investigation of a mechatronic device for the remedial treatment of brain injured children.
Lasebae, A. 1999. Investigation of a mechatronic device for the remedial treatment of brain injured children. PhD thesis Middlesex University School of Engineering Systems
Providing security in 4G systems: unveiling the challenges
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2010. Providing security in 4G systems: unveiling the challenges. Atmaca, T., Palicot, J., Amor, N., Tsiatsos, T., Marot, M. and Dini, O. (ed.) IEEE. pp. 439-444 https://doi.org/10.1109/AICT.2010.24
The design of a storage architecture for mobile heterogeneous devices.
Mapp, G., Thakker, D. and Silcott, D. 2007. The design of a storage architecture for mobile heterogeneous devices. IEEE Computer Society. https://doi.org/10.1109/ICNS.2007.113
An architectural framework for heterogeneous networking.
Mapp, G., Cottingham, D., Shaikh, F., Vidales, P., Patanapongpibul, L., Baliosian, J. and Crowcroft, J. 2006. An architectural framework for heterogeneous networking. Vasiu, L. (ed.) Portugal Institute of Systems and Technologies of Information, Control and Communication.
Y-Comm: a global architecture for heterogeneous networking.
Mapp, G., Shaikh, F., Crowcroft, J., Cottingham, D. and Baliosian, J. 2007. Y-Comm: a global architecture for heterogeneous networking. 3rd International Conference on Wireless Internet. Austin, Texas
An analytical approach for performance analysis of handoffs in the next generation integrated cellular networks and WLANs
Kirsal, Y., Gemikonakli, E., Ever, E., Mapp, G., Gemikonakli, O. and Middlesex University 2010. An analytical approach for performance analysis of handoffs in the next generation integrated cellular networks and WLANs. IEEE. https://doi.org/10.1109/ICCCN.2010.5560093
Information for handover management in heterogeneous networks: data representation,languages and integrated platforms
Vanni, R., Branco, K., Moreira, E., Mapp, G., University of Sao Paulo and Middlesex University 2010. Information for handover management in heterogeneous networks: data representation,languages and integrated platforms. 7th International Conference on Information and Technology Management. Sao Paulo, Brazil 19 - 21 May 2010
Exploring Markov models for gate-limited service and their application to network-based services.
Mapp, G. 2009. Exploring Markov models for gate-limited service and their application to network-based services. Eight Mathematics of Networks Meeting. Cambridge 18 Sep 2009
Exploring a new Markov chain model for multiqueue systems.
Mapp, G., Thakker, D. and Gemikonakli, O. 2010. Exploring a new Markov chain model for multiqueue systems. Al-Dabass, D., Orsoni, A., Cant, R. and Abraham, A. (ed.) IEEE Computer Society. pp. 592-597 https://doi.org/10.1109/UKSIM.2010.113
Exploiting contextual handover information for versatile services in NGN environments.
Moreira, E., Cottingham, D., Crowcroft, J., Hui, P., Mapp, G., Vanni, R. and Institute of Electrical and Electronics Engineers 2007. Exploiting contextual handover information for versatile services in NGN environments. in: Digital Information Management, 2007. ICDIM '07. 2nd International Conference. IEEE Computer Society. pp. 506-512
Change blindness and situation awareness in a police C2 environment.
Mancero, G., Wong, B. and Loomes, M. 2009. Change blindness and situation awareness in a police C2 environment. in: Norros, L. (ed.) ECCE 2009 - European Conference on Cognitive Ergonomics: designing beyond the product: understanding activity and user experience in ubiquitous environments. Vuorimiehentie VTT Technical Research Centre of Finland.
Behaviour characteristics: low and high literacy users information seeking on social service websites.
Kodagoda, N., Wong, B. and Khan, N. 2009. Behaviour characteristics: low and high literacy users information seeking on social service websites. in: Proceedings of the 10th International Conference NZ Chapter of the ACM's Special Interest Group on Human-Computer Interaction. New York Association for Computing Machinery (ACM). pp. 13-16
Overview of behaviour characteristics of high and low literacy users: information seeking of an online social service system
Kodagoda, N., Wong, B. and Khan, N. 2009. Overview of behaviour characteristics of high and low literacy users: information seeking of an online social service system. in: Gross, T., Gulliksen, J., Kotzé, P., Oestreicher, L., Palanque, P., Prates, R. and Winckler, M. (ed.) Human-Computer Interaction – INTERACT 2009: 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24-28, 2009, Proceedigns Part I Springer.
Seeing more than the graph: evaluation of multivariategraph visualization methods.
Cunningham, A., Xu, K. and Thomas, B. 2010. Seeing more than the graph: evaluation of multivariategraph visualization methods. Santucci, G. (ed.) Association for Computing Machinery (ACM). pp. 429 https://doi.org/10.1145/1842993.1843106
Security models for heterogeneous networking
Mapp, G., Aiash, M., Lasebae, A. and Phan, R. 2010. Security models for heterogeneous networking. Katsikas, S. (ed.) 4th International Conference on Security and Cryptography. Athens, Greece 26 - 28 Jul 2010 IEEE. pp. 1-4
Identifying expertise for CAL program development in operative dentistry
Wong, B., Ng, B. and Clark, S. 2000. Identifying expertise for CAL program development in operative dentistry. Journal of dentistry.
Assessing the effectiveness of animation and virtual reality in teaching operative dentistry
Wong, B., Ng, B. and Clark, S. 2000. Assessing the effectiveness of animation and virtual reality in teaching operative dentistry. Journal of dentistry. 1 (1).
Depth, layering and transparency: developing design techniques.
Wong, B., Joyekurun, R., Mansour, H., Amaldi, P., Nees, A. and Villanueva, R. 2005. Depth, layering and transparency: developing design techniques. in: Bentley, T. and Balbo, S. (ed.) OZCHI 2005 citizens online: considerations for today & the future. CHISIG.
What makes emergency ambulance command and control complex?
Wong, B., Hayes, J. and Moore, T. 2005. What makes emergency ambulance command and control complex? in: Johnson, C. (ed.) 2nd workshop on complexity in design and engineering. Glasgow University of Glasgow, Department of Computing Science. pp. 106-116
Research into EMD at the London ambulance service: stage 1 report requirements, priorities and projects.
Wong, B., Fields, B. and Blandford, A. 2000. Research into EMD at the London ambulance service: stage 1 report requirements, priorities and projects. London Middlesex University.
Emergency medical dispatch at the London ambulance service.
Wong, B., Blandford, A. and Fields, B. 2000. Emergency medical dispatch at the London ambulance service. Middlesex University.
Preliminary report to the Snowy Mountain hydro electric authority: NSW-Victoria system separation incident.
Wong, B. and Sanderson, P. 2001. Preliminary report to the Snowy Mountain hydro electric authority: NSW-Victoria system separation incident. Melbourne Swinburne University of Technology.
Future design.
Wong, B. and Ham, D. 2008. Future design. in: Golightly, D., Rose, T., Bonner, J. and Boyd Davis, S. (ed.) Create2008: proceedings Ergonomics Society.
Interaction design at Middlesex University: innovative human-centred solutions.
Wong, B. and Curzon, P. 2005. Interaction design at Middlesex University: innovative human-centred solutions. in: Fincher, S. (ed.) People and ccmputers XVIII: design for life: proceedings of HCI 2004 London Springer. pp. 209-210
Extracting information handling strategies.
Wong, B. and Blandford, A. 2007. Extracting information handling strategies. in: Mosier, K. and Fischer, U. (ed.) NDM 8: Eighth international conference on naturalistic decision making: proceedings NDM8. pp. 302-309
Situation awareness in an emergency medical dispatch centre.
Wong, B. and Blandford, A. 2004. Situation awareness in an emergency medical dispatch centre. in: Proceedings of the human factors and ergonomics society: 48th annual meeting. Santa Monica, CA. HFES. pp. 285-289
Information handling in dynamic decision making environments.
Wong, B. and Blandford, A. 2004. Information handling in dynamic decision making environments. in: Blythe, M., Baxter, G. and Reed, D. (ed.) ECCE-12: proceedings of the twelfth European conference on cognitive economics. York European Association of Cognitive Ergonomics/ University of York. pp. 195-202
Analysing ambulance dispatcher decision making: trialing emergent themes analysis
Wong, B. and Blandford, A. 2002. Analysing ambulance dispatcher decision making: trialing emergent themes analysis. in: Vatere, F., Johnston, L. and Kushinsky, R. (ed.) Proceedings of the HF2002 human factors conference design for the whole person - integrating physical, cognitive and social aspects: a joint conference of the Ergonomics society of Australia (ESA) and the Computer human interaction special interest group. Canberra Ergonomics Society of Australia..
Situation awareness and its implications for human-systems interaction
Wong, B. and Blandford, A. 2001. Situation awareness and its implications for human-systems interaction. in: Thomas, R., Apperley, M. and Smith, W. (ed.) OZCHI 2001 usability and usefulness for knowledge economies: conference proceedings. Sydney CHISIG. pp. 181-186
Naturalistic decision making in emergency ambulance command and control.
Wong, B. and Blandford, A. 2001. Naturalistic decision making in emergency ambulance command and control. Dunedin, NZ. University of Otagoo.
Inventivity in HCI education.
Wong, B. 2006. Inventivity in HCI education. in: Hvannberg, E. (ed.) Inventivity : teaching theory, design and innovation in HCI. Limerick, Ireland University of Limerick. pp. 67-72
Technology affordances of the ActualDepth multi-layered display
Wong, B. 2003. Technology affordances of the ActualDepth multi-layered display. Dunedin, NZ University of Otagoo.
The integrated decision model in emergency dispatch management and its implications for design
Wong, B. 2000. The integrated decision model in emergency dispatch management and its implications for design. Australian journal of information systems. 2 (7), pp. 95-107.
Virtual tours in tourism: interaction issues.
Villanueva, R. and Wong, B. 2001. Virtual tours in tourism: interaction issues. in: Thomas, R., Apperley, M. and Smith, W. (ed.) OZCHI 2001 usability and usefulness for knowledge economies: conference proceedings. Sydney CHISIG. pp. 235-239
Hydro scheme control in a deregulated environment: cognitive work models and design implications.
Sanderson, P., Wong, B., Choudhury, S. and Memisevic, R. 2003. Hydro scheme control in a deregulated environment: cognitive work models and design implications. in: Proceedings of the human factors and ergonomics society: 47th annual meeting. Denver, Colorado HFES. pp. 458-462
Analysing cognitive work of hydroelectricity generation in a dynamic deregulated market.
Sanderson, P., Memisevic, R. and Wong, B. 2004. Analysing cognitive work of hydroelectricity generation in a dynamic deregulated market. in: Proceedings of the human factors and ergonomics society: 48th annual meeting. Santa Monica, CA. Human Factors. pp. 484-488
Ergonomic consulting for SMCC facilities upgrade project: task analysis input to control room redesign.
Sanderson, P. and Wong, B. 2001. Ergonomic consulting for SMCC facilities upgrade project: task analysis input to control room redesign. Cooma, NSW 2630. Melbourne. Swinburne University of Technology. https://doi.org/SCHIL-SMCC-2001-2
Evaluating human-system integration solutions for SMCC's proposed AGC and GEMS systems: design brief to Snowy Mountains hydro electric authority.
Sanderson, P. and Wong, B. 2000. Evaluating human-system integration solutions for SMCC's proposed AGC and GEMS systems: design brief to Snowy Mountains hydro electric authority. Cooma, NSW, Australia Snowy Mountain Hydro Electric Authority..
Developing visualisations to support spatial-temporal reasoning in ATC.
Rozzi, S., Wong, B., Woodward, P., Amaldi, P., Fields, B. and Panizzi, E. 2006. Developing visualisations to support spatial-temporal reasoning in ATC. in: Pejcic-Tarle, S. (ed.) Second international conference on research in air transportation. Belgrade, Serbia University of Belgrade: Faculty of Traffic and Transport Engineering.
Learning to look: real and virtual artifacts.
Rowntree, J., Wong, B. and Hannah, R. 2002. Learning to look: real and virtual artifacts. Educational technology & society: journal of International forum of educational technology & society and IEEE learning technology task force.. 5 (1), pp. 129-134.
A fide-mediation framework for virtual objects
Rowntree, J., Hannah, R. and Wong, B. 2004. A fide-mediation framework for virtual objects. International journal of learning technology. 1 (2), pp. 163-178. https://doi.org/10.1504/IJLT.2004.004874
Learning with digital artifacts: gaining a sense of the object
Rowntree, J., Hannah, R. and Wong, B. 2002. Learning with digital artifacts: gaining a sense of the object. VINE. 32 (3), pp. 14-21. https://doi.org/10.1108/03055720210474244
Digital artifacts in teaching classical art: some educational considerations.
Rowntree, J., Hannah, R. and Wong, B. 2006. Digital artifacts in teaching classical art: some educational considerations. in: Mattusch, C., Donohue, A. and Brauer, A. (ed.) Common ground: archaeology, art, science, and humanities: proceedings of the XVIth International congress of classical archaeology, Boston, August 23-26, 2003. Oxford Oxbow. pp. 300-321
Interactive children: the use of virtual reality and web technologies.
Peterson, K. and Wong, B. 2000. Interactive children: the use of virtual reality and web technologies. in: Paris, C. (ed.) OZCHI 2000: 4th-8th December 2000, the University of Technology, Sydney, Australia. Sydney CHISIG. pp. 12-13
Cognitive task analysis for decision centred design and training.
O'Hare, D., Wiggins, M. and Wong, B. 2000. Cognitive task analysis for decision centred design and training. in: Annett, J. and Stanton, N. (ed.) Task analysis Taylor and Francis.
Activity breakdown in quickTime virtual reality environments.
Norris, B. and Wong, B. 2000. Activity breakdown in quickTime virtual reality environments. in: Thomas, B. and Warren, J. (ed.) First Australasian user interface conference (AUIC 2000): proceedings. Los Alamitos, Calif. IEEE Computer Society.
Cartographic and cognitive analysis of ambulance dispatch displays.
Moore, A., Hayes, J. and Wong, B. 2007. Cartographic and cognitive analysis of ambulance dispatch displays. Going global; mapping New Zealand's trajectory (GeoCart 2006). Auckland, New Zealand 04 - 06 Sep 2006
Next generation 4D HMI concepts. Deliverable 14. Report prepared for AD4: 4D virtual airspace management system, sixth framework programme, priority 1.4 aeronautics and space.
Wong, B., Panifici, E., Lot, D., Amaldi, P., Fields, B. and Rozzi, S. 2005. Next generation 4D HMI concepts. Deliverable 14. Report prepared for AD4: 4D virtual airspace management system, sixth framework programme, priority 1.4 aeronautics and space. Rome NEXT Sistems Ingegeria o..
Investigating human-system interaction with an integrated hydropower and market system simulator
Memisevic, R., Sanderson, P., Wong, B., Choudhury, S. and Li, X. 2007. Investigating human-system interaction with an integrated hydropower and market system simulator. IEEE transactions on power systems. 22 (2), pp. 762-769.
Work domain analysis and ecological interface design for hydropower system monitoring and control.
Memisevic, R., Sanderson, P., Choudhury, S. and Wong, B. 2005. Work domain analysis and ecological interface design for hydropower system monitoring and control. in: Proceedings: the international conference on systems, man and cybernetics. IEEE.
Integrated power scheme simulator for human-system integration studies.
Memisevic, R., Choudhury, S., Sanderson, P. and Wong, B. 2004. Integrated power scheme simulator for human-system integration studies. in: Walker, G. (ed.) Proceedings of AUPEC'2004 : Australasian universities power engineering conference. AUPEC.
The utility of depth affordance in multi-layered displays for supporting change detection.
Mancero, G. and Wong, B. 2008. The utility of depth affordance in multi-layered displays for supporting change detection. in: Proceedings of the human factors and ergonomics society 52nd annual meeting. Santa Monica, CA, USA Human Factors and Ergonomics Society.
Applying the control adaptation method to a real world system: hydropower system example.
Li, X., Sanderson, P., Wong, B., Choudhury, S. and Memisevic, R. 2005. Applying the control adaptation method to a real world system: hydropower system example. in: Marmaras, N. (ed.) Proceedings of the annual conference of the European association of cognitive ergonomics, EACE 2005 conference. Athens University of Athens..
Accessibility, usability and fit for purpose: a framework for evaluating information delivery.
Keith, S., Whitney, G. and Wong, B. 2006. Accessibility, usability and fit for purpose: a framework for evaluating information delivery. in: Bust, P. (ed.) Contemporary ergonomics 2006. Taylor and Francis.
Fit for purpose: accessibility of on-line public service information through the Barnet CAB electronic advice project.
Keith, S. and Wong, B. 2004. Fit for purpose: accessibility of on-line public service information through the Barnet CAB electronic advice project. Middlesex University. https://doi.org/MUVL-6505o
A functional collaborative work unit for analysing hazardous flight approaches.
Joyekurun, R., Amaldi, P. and Wong, B. 2007. A functional collaborative work unit for analysing hazardous flight approaches. in: Proceedings of the human factors and ergonomics society: 51st Annual Meeting. Human Factors and Ergonomics Society.
Complexity factors in ambulance command and control.
Hayes, J., Moore, A., Benwell, G. and Wong, B. 2005. Complexity factors in ambulance command and control. in: Proceedings of the human factors and ergonomics society: 49th annual meeting. Santa Monica, Calif. Human Factors and Ergonomics Society.
Ambulance dispatch complexity and dispatcher decision strategies: implications for interface design.
Hayes, J., Moore, A., Benwell, G. and Wong, B. 2004. Ambulance dispatch complexity and dispatcher decision strategies: implications for interface design. in: Masoodian, M., Jones, S. and Rogers, B. (ed.) Computer human interaction: 6th Asia Pacific conference, APCHI 2004. Berlin Springer.
Proceedings: create 2007
Golightly, D., Rose, T., Wong, B. and Light, A. 2007. Proceedings: create 2007. Ergonomics Society.
QTVR support for teaching operative procedures in dentistry.
Clark, S., Ng, B. and Wong, B. 2000. QTVR support for teaching operative procedures in dentistry. in: McDonald, S., Waern, Y. and Cockton, G. (ed.) People and computers XIV : usability or else!: proceedings of HCI 2000. London Springer. pp. 287-298
Multiple viewpoints on computer supported team work: a case study on ambulance dispatch.
Blandford, A., Wong, B., Connell, I. and Green, T. 2002. Multiple viewpoints on computer supported team work: a case study on ambulance dispatch. in: Faulkner, X., Finlay, J. and Detienne, F. (ed.) People and computers XVI: memorable yet invisible: proceedings of HCI 2002. London Springer. pp. 139-156
State of the art: HCI in New Zealand.
Wong, B., Apperley, M., Carter, P., Churcher, C., Cockburn, A., Jones, M., Lobb, B., Novins, K. and Phillips, C. 2003. State of the art: HCI in New Zealand. in: Rauterberg, M., Menozzi, M. and Wesson, J. (ed.) Human-computer interaction, INTERACT '03: IFIP TC13 International conference on human-computer interaction. Oxford IOS. pp. 1079-1080
Operational concepts report Vol.2: tower control deliverable 12.
Amaldi, P., Fields, B., Rozzi, S., Woodward, P. and Wong, B. 2005. Operational concepts report Vol.2: tower control deliverable 12. Middlesex University Press.
Operational Concepts Report Vol.1: Approach Control.
Amaldi, P., Fields, B., Rozzi, S. and Wong, B. 2005. Operational Concepts Report Vol.1: Approach Control. London Middlesex University Press.
Using a reconstruction-exploration approach to empower cognitive analysis methods: Possibilities and challenges
Albinsson, P., Wong, B. and Pilemalm, S. 2005. Using a reconstruction-exploration approach to empower cognitive analysis methods: Possibilities and challenges. in: Proceedings of the human factors and ergonomics society: 49th annual meeting. Santa Monica, Calif. Human Factors and Ergonomics Society. pp. 224-228
A framework for evaluating barriers to accessibility, usability and fit for purpose.
Keith, S., Whitney, G. and Wong, B. 2006. A framework for evaluating barriers to accessibility, usability and fit for purpose. in: Bust, P. (ed.) Contemporary ergonomics 2006. London Taylor and Francis.
Review of DPTAC guidance: large passenger ships and passenger infrastructure.
Keith, S., Whitney, G., Sentinella, J., Wong, B., Platt-Evans, C., Fielding, C. and Smith, L. 2006. Review of DPTAC guidance: large passenger ships and passenger infrastructure. Disabled Persons Transport Advisory Committee (DPTAC).
Purpose and context: selecting multiple methods for evaluating a pilot public information terminal.
Keith, S., Springett, M. and Wong, B. 2005. Purpose and context: selecting multiple methods for evaluating a pilot public information terminal. in: Bust, P. and McCabe, P. (ed.) Contemporary ergonomics. 2005 Taylor and Francis.
Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol. in: WSEAS Conferences: Elounda, Agios Nikolaos, Crete, Greece, August 18-20, 2006 Athens WSEAS.
Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6. WSEAS transactions on communications. 5 (10), pp. 1109-2742.
Distributed authentication protocol for the security of binding updates in mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Distributed authentication protocol for the security of binding updates in mobile IPv6. in: Proceedings of the 9th WSEAS international CSCC multiconference: circuits 05, systems 05, computers 05, communications 05. WSEAS.
Binding update security for mobile IPv6 using a distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Binding update security for mobile IPv6 using a distributed authentication protocol. WSEAS transactions on communications. 4 (9), pp. 1109-2742.
Trinity protocol for authentication of binding updates in mobile IPv6.
Luo, Y., Comley, R., Lasebae, A. and Georgiades, A. 2004. Trinity protocol for authentication of binding updates in mobile IPv6. WSEAS transactions on communications. 3 (3), pp. 872-877.
Modelling and performability analysis of network memory servers.
Gemikonakli, O., Mapp, G., Thakker, D., Ever, E. and Society for Modeling and Simulation International 2006. Modelling and performability analysis of network memory servers. in: 39th Annual Simulation Symposium: proceedings. California IEEE Computer Society. pp. 127-134
Modelling network memory servers with parallel processors, break-downs and repairs.
Gemikonakli, O., Mapp, G., Ever, E. and Thakker, D. 2007. Modelling network memory servers with parallel processors, break-downs and repairs. California IEEE Computer Society. pp. 11-20 https://doi.org/10.1109/ANSS.2007.29
Exploring efficient imperative handover mechanisms for heterogeneous wireless networks
Mapp, G., Shaikh, F., Aiash, M., Vanni, R., Augusto, M. and Moreira, E. 2009. Exploring efficient imperative handover mechanisms for heterogeneous wireless networks. Duresi, A., Barolli, L., Enokido, T., Uehara, M., Shakshuki, E. and Takizawa, M. (ed.) 12th International Conference on Network-Based Information Systems. Indianapolis, Indiana 19 - 21 Aug 2009 IEEE. pp. 286-291 https://doi.org/10.1109/NBiS.2009.95
Identifying information seeking behaviours of low andhigh literacy users: combined cognitive task analysis.
Kodagoda, N., Wong, B. and Khan, N. 2009. Identifying information seeking behaviours of low andhigh literacy users: combined cognitive task analysis. British Computer Society. pp. 347-354
Fit for purpose evaluation: the case of a public information kiosk for the socially disadvantaged.
Wong, B., Springett, M. and Keith, S. 2005. Fit for purpose evaluation: the case of a public information kiosk for the socially disadvantaged. in: People and Computers XIX - The Bigger Picture: Proceedings of HCI 2005 (BCS Conference) Springer Verlag. pp. 149-165
Critical Decision Method data analysis
Wong, B. 2003. Critical Decision Method data analysis. in: Diaper, D. and Stanton, N. (ed.) The handbook of task analysis for human-computer interaction Lawrence Erlbaum Associates.. pp. 327-346
A practical approach for 4G systems: deployment of overlay networks.
Mapp, G., Stajano, F., Crowcroft, J. and Vidales, P. 2005. A practical approach for 4G systems: deployment of overlay networks. in: First International Conference on Testbeds and Research Infrastructures for the DEvelopment of NeTworks and COMmunities, Tridentcom 2005, Trento, Italy. IEEE Computer Society Press. pp. 172-181
A client-based handoff mechanism for mobile IPv6 wireless networks.
Mapp, G. and Pantanapongpibul, L. 2003. A client-based handoff mechanism for mobile IPv6 wireless networks. in: 8th IEEE Symposium on Computers and Communications (ISCC), Antalya, Turkey. Proceedings IEEE Computer Society Press. pp. 563-568
Autonomic system for mobility support in 4G networks
Mapp, G., Baliosian, J., Serrat, J. and Vidales, P. 2005. Autonomic system for mobility support in 4G networks. IEEE Journal on Selected Areas in Communications. 23 (12), pp. 2288-2304. https://doi.org/10.1109/JSAC.2005.857198
Evaluating functional displays for hydropower system: model-based guidance of scenario design.
Li, X., Sanderson, P., Memisevic, R., Wong, B. and Choudhury, S. 2006. Evaluating functional displays for hydropower system: model-based guidance of scenario design. Cognition, Technology and Work. 8 (4), pp. 269-282. https://doi.org/10.1007/s10111-006-0044-x
Situation awareness in emergency medical dispatch
Wong, B. and Blandford, A. 2004. Situation awareness in emergency medical dispatch. International Journal of Human-Computer Studies. 61 (4), pp. 421-452. https://doi.org/10.1016/j.ijhcs.2003.12.012
Framework and model of usability factors of mobile phones
Ham, D., Heo, J., Fossick, P., Wong, B., Park, S., Song, C. and Bradley, M.D. 2008. Framework and model of usability factors of mobile phones. in: Lumsden, J. (ed.) Handbook of research on user interface design and evaluation for mobile technology. Hershey, PA. Information Science Reference. pp. 877-896
Editorial: In use, in situ: extending field research methods
Fields, B., Amaldi, P., Wong, B. and Gill, S. 2007. Editorial: In use, in situ: extending field research methods. International Journal of Human-Computer Interaction. 22 (1-2), pp. 1-6. https://doi.org/10.1080/10447310709336952
3D-in-2D Displays for ATC
Wong, B., Rozzi, S., Boccalatte, A., Gaukrodger, S., Amaldi, P., Fields, B., Loomes, M. and Martin, P. 2007. 3D-in-2D Displays for ATC. Brochard, M. and Jurgens, M. (ed.) 6th EUROCONTROL Innovative Research Workshop and Exhibition. Brétigny-sur-Orge, France 05 - 07 Dec 2007 Eurocontrol. pp. 47-62
Operational potential for 3D displays in air traffic control
Rozzi, S., Amaldi, P., Wong, B. and Fields, B. 2007. Operational potential for 3D displays in air traffic control. Brinkman, W., Ham, D. and Wong, B. (ed.) ECCE07: European Conference on Cognitive Ergonomics 2007. London, United Kingdom 28 - 31 Aug 2007 New York Association for Computing Machinery (ACM). pp. 179-183 https://doi.org/10.1145/1362550.1362586
Looking but not seeing: implications for HCI
Mancero, G., Wong, B. and Amaldi, P. 2007. Looking but not seeing: implications for HCI. in: Brinkman, W., Ham, D. and Wong, B. (ed.) ECCE 2007 European conference on cognitive ergonomics 2007: invent! explore! New York Association for Computing Machinery (ACM). pp. 167-174
A framework for considering spatial-temporal representation design in air traffic control
Wong, B., Rozzi, S., Amaldi, P., Woodward, P. and Fields, B. 2006. A framework for considering spatial-temporal representation design in air traffic control. Human Factors and Ergonomics Society 50th annual meeting. San Francisco, USA 16 - 20 Oct 2006 Human Factors and Ergonomics Society. pp. 250-254 https://doi.org/10.1177/154193120605000309
The critical decision method
Wong, B. 2006. The critical decision method. in: Karwowski, W. (ed.) International Encyclopedia of Ergonomics and Human Factors - 3 Volume Set CRC Press. pp. 3067-3073
Evaluating combined 2D/3D displays for ATC
Rozzi, S., Woodward, P., Amaldi, P., Fields, B. and Wong, B. 2006. Evaluating combined 2D/3D displays for ATC. 5th EUROCONTROL Innovative Research Workshop and Exhibition. Bretigny-sur-Orge, France 05 - 07 Dec 2006 Eurocontrol. pp. 173-180
Design sketching for space and time
Rozzi, S., Wong, B., Amaldi, P., Woodward, P. and Fields, B. 2006. Design sketching for space and time. Clemmensen, T., Orngreen, R., Pejtersen, A. and Wong, B. (ed.) 1st IFIP Working Conference on Human Work Interaction Design. Madeira, Portugal 13 - 15 Feb 2006 New York, NY Springer. pp. 161-183 https://doi.org/10.1007/978-0-387-36792-7_10
Information layering to de-clutter displays in emergency ambulance dispatch.
Hayes, J., Moore, A. and Wong, B. 2006. Information layering to de-clutter displays in emergency ambulance dispatch. in: Rizzo, A., Grote, G. and Wong, B. (ed.) Proceedings of the 13th Eurpoean conference on cognitive ergonomics trust and control in complex socio-technical systems. New York Association for Computing Machinery (ACM). pp. 10-16
An end-system approach to mobility management for 4G networks and its application to thin-client computing.
Mapp, G., Hopper, A. and Pantanapongpibul, L. 2006. An end-system approach to mobility management for 4G networks and its application to thin-client computing. ACM SIGMOBILE Mobile Computing and Communications Review. 10 (3), pp. 13-33. https://doi.org/10.1145/1148094.1148097
Information layering, depth and transparency effects on multi-layered displays for command and control
Wong, B., Joyekurun, R., Nees, A., Amaldi, P. and Villanueva, R. 2005. Information layering, depth and transparency effects on multi-layered displays for command and control. Human factors and ergonomics society 49th annual meeting. Orlando, USA. 26 - 30 Sep 2005 Human Factors and Ergonomics Society. pp. 353-356 https://doi.org/10.1177/154193120504900329
Critical analysis of high speed wireless standards for transferring telementoring information
Shaikh, F., Lasebae, A. and Whitney, G. 2004. Critical analysis of high speed wireless standards for transferring telementoring information. in: ICTTA'04: 2004 International conference on information & communication technologies: from theory to applications. IEEE.
Link layer-based TCP optimisation for disconnecting networks.
Scott, J. and Mapp, G. 2003. Link layer-based TCP optimisation for disconnecting networks. ACM SIGCOMM Computer Communication Review. 33 (5), pp. 31-42. https://doi.org/10.1145/963985.963989
Field research in HCI: a case study
Wong, B. and Blandford, A. 2003. Field research in HCI: a case study. Kemp, E., Phillips, C. and Wong, B. (ed.) 4th Annual Conference of the ACM Special Interest Group on Computer-Human Interaction. Dunedin, New Zealand 03 - 04 Jul 2003 New York, NY, United States. Association for Computing Machinery (ACM). pp. 69-74 https://doi.org/10.1145/2331829.2331842
Proceedings of CHINZ'03, the 4th annual conference of the ACM special interest group on computer human interaction
Kemp, E., Phillips, C. and Wong, B. 2003. Proceedings of CHINZ'03, the 4th annual conference of the ACM special interest group on computer human interaction. New York, NY, United States. Association for Computing Machinery (ACM).