Virtualization and cyber security: arming future security practitioners

Conference paper


Tharayanil, M., Whitney, G., Aiash, M. and Benzaid, C. 2015. Virtualization and cyber security: arming future security practitioners. IEEE Trustcom/BigDataSE/ISPA: EFINS 2015 The 2nd IEEE International Workshop on the Emerging Future Internet and Network Security. Helsinki, Finland 20 - 22 Aug 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 1398-1402 https://doi.org/10.1109/trustcom.2015.537
TypeConference paper
TitleVirtualization and cyber security: arming future security practitioners
AuthorsTharayanil, M., Whitney, G., Aiash, M. and Benzaid, C.
Abstract

In the past five years cybercrime has grown to become one of the most significant threats to the safety of the nation and its economy. The government’s call to arms has been eagerly accepted by business enterprises and academia. But training cyber security professionals raises a unique set of challenges. Cost, space, time and scalability are among the issues identified and possible solutions proposed. As a cyber-security professionals, we have realized the importance of practical experience which can be hard to deliver in a lecture based environment. The primary aim of this project is to evaluate and recommend a platform for Virtual handson Labs which may be used to provide a secure environment for cyber security students to evaluate and receive hands-on experience on possible threats and countermeasures. There are similar labs setup in different universities across the world but we have not been able to find any studies evaluating the virtualization platforms for their merit in order to run a virtual lab. Hence we study three of the most popular virtualization platforms and recommendations are provided to guide anyone who desires to setup such a lab

ConferenceIEEE Trustcom/BigDataSE/ISPA: EFINS 2015 The 2nd IEEE International Workshop on the Emerging Future Internet and Network Security
Page range1398-1402
ISBN
Electronic9781467379526
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Publication dates
Print22 Aug 2015
Online03 Dec 2015
Publication process dates
Deposited28 Feb 2018
Accepted31 May 2015
Output statusPublished
Digital Object Identifier (DOI)https://doi.org/10.1109/trustcom.2015.537
LanguageEnglish
Book title2015 IEEE Trustcom/BigDataSE/ISPA
Permalink -

https://repository.mdx.ac.uk/item/877yy

  • 67
    total views
  • 0
    total downloads
  • 8
    views this month
  • 0
    downloads this month

Export as

Related outputs

Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications
Chowdhury, A., Isalm, M., Kaisar, S., Naha, R., Khoshkholghi, A., Aiash, M. and Khoda, M.E. 2023. Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2216-2221
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things. 24. https://doi.org/10.1016/j.iot.2023.100913
IoT-based emergency vehicle services in intelligent transportation system
Chowdhury, A., Kaisar, S., Khoda, M., Naha, R., Khoshkholghi, A. and Aiash, M. 2023. IoT-based emergency vehicle services in intelligent transportation system. Sensors. 23 (11). https://doi.org/10.3390/s23115324
An introduction of a modular framework for securing 5G networks and beyond
Edris, E., Aiash, M. and Loo, J. 2022. An introduction of a modular framework for securing 5G networks and beyond. Network. 2 (3), pp. 419-439. https://doi.org/10.3390/network2030026
Communicating the standardisation process and cybersecurity standards to undergraduate students
Whitney, G. 2022. Communicating the standardisation process and cybersecurity standards to undergraduate students. EURAS 2022: The 26th EURAS (European Academy for Standardisation e.V) Conference. University of Glasgow, UK 08 - 10 Jun 2022 pp. 365-373
A matter of life and death: how the Covid-19 pandemic threw the spotlight on digital financial exclusion in the UK
Hara, S., Whitney, G. and Whitney, L. 2021. A matter of life and death: how the Covid-19 pandemic threw the spotlight on digital financial exclusion in the UK. in: Jahankhani, H., Kendzierskyj, S. and Akhgar, B. (ed.) Information Security Technologies for Controlling Pandemics Springer International Publishing. pp. 65-108
Formalization and evaluation of EAP-AKA’ protocol for 5G network access security
Edris, E., Aiash, M. and Loo, J. 2022. Formalization and evaluation of EAP-AKA’ protocol for 5G network access security. Array. 16. https://doi.org/10.1016/j.array.2022.100254
DCSS protocol for data caching and sharing security in a 5G network
Edris, E., Aiash, M. and Loo, J. 2021. DCSS protocol for data caching and sharing security in a 5G network. Network. 1 (2), pp. 75-94. https://doi.org/10.3390/network1020006
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2022. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Computational Intelligence. 38 (3), pp. 811-828. https://doi.org/10.1111/coin.12421
Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif
Edris, E., Aiash, M. and Loo, J. 2021. Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif. Electronics. 10 (13). https://doi.org/10.3390/electronics10131608
Security in network services delivery for 5G enabled D2D communications: challenges and solutions
Edris, E., Aiash, M. and Loo, J. 2021. Security in network services delivery for 5G enabled D2D communications: challenges and solutions. in: Montasari, R., Jahankhani, H. and Al-Khateeb, H. (ed.) Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats Cham Springer. pp. 1-27
Formal verification of secondary authentication protocol for 5G secondary authentication
Edris, E., Aiash, M., Loo, J. and Alhakeem, M. 2021. Formal verification of secondary authentication protocol for 5G secondary authentication. International Journal of Security and Networks. 16 (4), pp. 223-234. https://doi.org/10.1504/IJSN.2021.119379
ZKPVM: a zero-knowledge authentication protocol for VMs' live migration in mobile cloud computing
Edris, E. and Aiash, M. 2018. ZKPVM: a zero-knowledge authentication protocol for VMs' live migration in mobile cloud computing. ICSOFT 2018: 13th International Conference on Software Technologies. Porto, Portugal 26 - 28 Jul 2018 pp. 858-864
Investigating network services abstraction in 5G enabled device-to-device (D2D) communications
Edris, E., Aiash, M. and Loo, J. 2019. Investigating network services abstraction in 5G enabled device-to-device (D2D) communications. 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). Leicester, United Kingdom 19 - 23 Aug 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 1660-1665 https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00296
The case for federated identity management in 5G communications
Edris, E., Aiash, M. and Loo, J. 2020. The case for federated identity management in 5G communications. The Fifth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 120-127 https://doi.org/10.1109/FMEC49853.2020.9144855
Formal verification and analysis of primary authentication based on 5G-AKA protocol
Edris, E., Aiash, M. and Loo, J. 2020. Formal verification and analysis of primary authentication based on 5G-AKA protocol. Third International Symposium on 5G Emerging Technologies (5GET 2020) in conjunction with the Fourth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 256-261 https://doi.org/10.1109/SDS49854.2020.9143899
Network service federated identity (NS-FId) protocol for service authorization in 5G network
Edris, E., Aiash, M. and Loo, J. 2020. Network service federated identity (NS-FId) protocol for service authorization in 5G network. The Fifth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 128-135
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. ICC’17. Cambridge University, Cambridge 22 Mar 2019 ICC’17, Cambridge, United Kingdom © 2017 ACM.. pp. 1-6 https://doi.org/10.1145/3018896.3056795
Am I missing something? Experiences of using social media by blind and partially sighted users
Whitney, G. and Kolar, I. 2020. Am I missing something? Experiences of using social media by blind and partially sighted users. Universal Access in the Information Society. 19 (2), pp. 461-469. https://doi.org/10.1007/s10209-019-00648-z
Study on risks and opportunities of digitalisation for financial inclusion. The perspective of vulnerable users in Estonia, Italy and UK with a focus on groups covered by the European Accessibility Act
Whitney, G., Hara, S. and Whitney, L. 2018. Study on risks and opportunities of digitalisation for financial inclusion. The perspective of vulnerable users in Estonia, Italy and UK with a focus on groups covered by the European Accessibility Act. European Union. https://doi.org/10.2874/447984
The use of standards for identifying, codifying and transmitting expert ergonomic knowledge
Whitney, G. 2019. The use of standards for identifying, codifying and transmitting expert ergonomic knowledge. IEA 2018 20th International Ergonomics Association Congress. Florence, Italy 26 - 30 Aug 2018 Springer. pp. 1405-1410 https://doi.org/10.1007/978-3-319-96071-5_142
Requirement and input collection: development of guidelines to allow people with cognitive disabilities to exploit the full potential of mobile ICT
Von Niman, B., Böcker, M., Floratos, N., Martínez-Normand, L., Pluke, M., Schneider, M. and Whitney, G. 2015. Requirement and input collection: development of guidelines to allow people with cognitive disabilities to exploit the full potential of mobile ICT. MobileHCI 2015: 17th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct. Copenhagen, Denmark 24 - 27 Aug 2015 Association for Computing Machinery (ACM). pp. 1024-1029 https://doi.org/10.1145/2786567.2794317
Cognitive accessibility to mobile ICT
Böcker, M., Floratos, N., Martínez, L., Pluke, M., Von Niman, B. and Whitney, G. 2016. Cognitive accessibility to mobile ICT. 15th International Conference on Computers Helping People with Special Needs (ICCHP 2016). Linz, Austria 13 - 15 Jul 2016 Springer, Cham. https://doi.org/10.1007/978-3-319-41264-1_24
Project-based cooperative learning to enhance competence while teaching engineering modules
Gandhi, V., Yang, Z. and Aiash, M. 2017. Project-based cooperative learning to enhance competence while teaching engineering modules. International Journal of Continuing Engineering Education and Life-Long Learning. 27 (3), pp. 198-208. https://doi.org/10.1504/IJCEELL.2017.10003462
Investigating the impact of live migration on the network infrastructure in enterprise environments
Sinti, J., Jiffry, F. and Aiash, M. 2014. Investigating the impact of live migration on the network infrastructure in enterprise environments. Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. Victoria, Canada 13 - 16 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 154-159 https://doi.org/10.1109/WAINA.2014.34
A progressive approach to design authentication protocols for mobile heterogeneous networks
Kenaza, T., Aiash, M., Loo, J., Lasebae, A. and Whitney, G. 2016. A progressive approach to design authentication protocols for mobile heterogeneous networks. IEEE Trustcom/BigDataSE/I​SPA, 2016. Tianjin, China 23 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1776-1781 https://doi.org/10.1109/trustcom.2016.0273
A specification-based IDS for detecting attacks on RPL-based network topology
Le, A., Loo, J., Chai, K. and Aiash, M. 2016. A specification-based IDS for detecting attacks on RPL-based network topology. Information. 7 (2). https://doi.org/10.3390/info7020025
A security framework for node-to-node communications based on the LISP architecture
Kallash, M., Loo, J., Lasebae, A. and Aiash, M. 2018. A security framework for node-to-node communications based on the LISP architecture. International Journal of Electronic Security and Digital Forensics. 10 (3), pp. 276-291. https://doi.org/10.1504/IJESDF.2018.093024
Formalization and analysis of a resource allocation security protocol for secure service migration
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2018. Formalization and analysis of a resource allocation security protocol for secure service migration. IEEE/ACM International Conference on Utility and Cloud Computing (UCC2018). Zurich, Switzerland 17 - 20 Dec 2018 IEEE. pp. 207-212 https://doi.org/10.1109/UCC-Companion.2018.00058
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017). Churchill College, University of Cambridge, United Kingdom 22 - 23 Mar 2017 Association for Computing Machinery (ACM). https://doi.org/10.1145/3018896.3056795
Exploring a new security framework for cloud storage using capabilities
Mapp, G., Aiash, M., Ondiege, B. and Clarke, M. 2014. Exploring a new security framework for cloud storage using capabilities. 1st International Workshop on Cyber Security and Cloud Computing, a workshop of SOSE. Oxford, United Kingdom 07 - 11 Apr 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 484-489 https://doi.org/10.1109/SOSE.2014.69
Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility
Sardis, F., Mapp, G., Loo, J. and Aiash, M. 2014. Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility. 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC),. London, UK 08 - 11 Dec 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-306 https://doi.org/10.1109/UCC.2014.39
Machine learning based botnet identification traffic
Azab, A., Alazab, M. and Aiash, M. 2016. Machine learning based botnet identification traffic. 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2016). Tianjin, China 23 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1788-1794 https://doi.org/10.1109/TrustCom.2016.0275
Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids
Kenaza, T., Bennaceur, K., Labed, A. and Aiash, M. 2016. Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids. 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Tianjin, China 23 - 25 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1765-1770 https://doi.org/10.1109/TrustCom.2016.0271
Toward an efficient ontology-based event correlation in SIEM
Kenazag, T. and Aiash, M. 2016. Toward an efficient ontology-based event correlation in SIEM. 7th International Conference on Ambient Systems, Networks and Technologies (ANT2016). Madrid, Spain 23 - 26 May 2016 Elsevier. pp. 139-146 https://doi.org/10.1016/j.procs.2016.04.109
Software defined networking for wireless sensor networks: a survey
Hassan, M., Vien, Q. and Aiash, M. 2017. Software defined networking for wireless sensor networks: a survey. Advances in Wireless Communications and Networks. 3 (2), pp. 10-22. https://doi.org/10.11648/j.awcn.20170302.11
Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement
Raheem, R., Lasebae, A., Aiash, M., Loo, J. and Colson, R. 2017. Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement. Vehicular Communications. 9 (12), pp. 31-42. https://doi.org/10.1016/j.vehcom.2017.02.003
Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks
Raheem, R., Lasebae, A., Aiash, M., Loo, J., Colson, R. and Raheem, A. 2017. Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks. in: Yurish, S. (ed.) Advances in Networks, Security and Communications: Reviews - Volume 1 International Frequency Sensor Association Publishing.
Mobility management for vehicular user equipment in LTE/mobile femtocell networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2017. Mobility management for vehicular user equipment in LTE/mobile femtocell networks. International Journal of Information Systems in the Service Sector. 9 (4), pp. 60-87. https://doi.org/10.4018/IJISSS.2017100105
Human–computer interaction and international public policymaking: a framework for understanding and taking future actions
Lazar, J., Abascal, J., Barbosa, S., Barksdale, J., Friedman, B., Grossklags, J., Gulliksen, J., Johnson, J., McEwan, T., Martínez-Normand, L., Michalk, W., Tsai, J., Van der Veer, G., Von Axelson, H., Walldius, A., Whitney, G., Marco Winckler, M., Wulf, V., Churchill, E., Cranor, L., Davis, J., Hedge, A., Hochheiser, H., Pablo Hourcade, J., Lewis, C., Nathan, L., Paterno, F., Reid, B., Quesenbery, W., Selker, T. and Wentz, B. 2016. Human–computer interaction and international public policymaking: a framework for understanding and taking future actions. ACM CHI 2016. San Jose, CA, USA 07 - 12 May 2016 Now Publishers. pp. 69-149 https://doi.org/10.1561/1100000062
Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks. Journal of Networking Technology. 7 (1), pp. 16-33.
Interference management for co-channel mobile femtocells technology in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Interference management for co-channel mobile femtocells technology in LTE networks. 2016 12th International Conference on Intelligent Environments (IE). London, United Kingdom 14 - 16 Sep 2016 IEEE. pp. 80-87 https://doi.org/10.1109/IE.2016.21
Accessible web design – the power of the personal message
Whitney, G. 2015. Accessible web design – the power of the personal message. Sik-Lányi, C., Hoogerwerf, E., Miesenberger, K. and Cudd, P. (ed.) 13th AAATE (Association for the Advancement of Assistive Technology in Europe) Conference. Budapest, Hungary 09 - 12 Sep 2015 IOS Press. pp. 142-145 https://doi.org/10.3233/978-1-61499-566-1-142
Can we fix the web?
Kolar, I. and Whitney, G. 2015. Can we fix the web? Sik-Lányi, C., Hoogerwerf, E., Miesenberger, K. and Cudd, P. (ed.) 13th AAATE (Association for the Advancement of Assistive Technology in Europe) Conference. Budapest, Hungary 09 - 12 Sep 2015 IOS Press. pp. 127-133 https://doi.org/10.3233/978-1-61499-566-1-127
A formally verified access control mechanism for information centric networks
Aiash, M. and Loo, J. 2015. A formally verified access control mechanism for information centric networks. The 12th International Conference on Security and Cryptography (SECRYPT 2015). Colmar, Alsace, France 20 - 22 Jul 2015 SciTePress. pp. 377-383 https://doi.org/10.5220/0005566303770383
U-sphere: strengthening scalable flat-name routing for decentralized networks
Kos, J., Aiash, M., Loo, J. and Trček, D. 2015. U-sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks. 89, pp. 14-31. https://doi.org/10.1016/j.comnet.2015.07.006
Supporting communications in the IOTs using the location/ID split protocol: a security analysis
Lasebae, A., Loo, J., Aiash, M. and Raheem, A. 2013. Supporting communications in the IOTs using the location/ID split protocol: a security analysis. Future Generation Communication Technology (FGCT) 4- date of conference in full: 12-14 Nov. 2013. London, UK 12 - 14 Nov 2013 pp. 1-5
Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing
Carnielli, A. and Aiash, M. 2015. Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, Korea 24 - 27 Mar 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 135-140
Supporting communication in information centric networks using the location/ID split protocol and time released caching
Aiash, M., Mapp, G. and Kallash, M. 2015. Supporting communication in information centric networks using the location/ID split protocol and time released caching. 2015 International Conference on Cloud Computing (ICCC). Riyadh, Saudi Arabia 26 - 29 Apr 2015 Institute of Electrical and Electronics Engineers. pp. 233-238 https://doi.org/10.1109/CLOUDCOMP.2015.7149657
Introducing a hybrid infrastructure and information-centric approach for secure cloud computing
Aiash, M., Colson, R. and Kallash, M. 2015. Introducing a hybrid infrastructure and information-centric approach for secure cloud computing. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, Korea 24 - 27 Mar 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 154-159 https://doi.org/10.1109/WAINA.2015.80
Human-computer interaction and international public policymaking: a framework for understanding and taking future actions. SIGCHI report: April 2015
Abascal, J., Barbosa, S., Barksdale, J., Friedman, B., Grossklags, J., Gulliksen, J., Johnson, J., Lazar, J., McEwan, T., Martínez-Normand, L., Michalk, W., Tsai, J., Van der Veer, G., Von Axelson, H., Walldius, A., Whitney, G., Winckler, M. and Wulf, V. 2015. Human-computer interaction and international public policymaking: a framework for understanding and taking future actions. SIGCHI report: April 2015. SIGCHI.
A secure framework for communications in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A. and Loo, J. 2014. A secure framework for communications in heterogeneous networks. WAINA 2014 28th International Conference on Advanced Information Networking and Applications Workshops. Victoria, BC 13 - 16 May 2014 pp. 841-846
A formal analysis of authentication protocols for mobile devices in next generation networks
Aiash, M. 2015. A formal analysis of authentication protocols for mobile devices in next generation networks. Concurrency and Computation: Practice and Experience. 27 (12), pp. 2938-2953. https://doi.org/10.1002/cpe.3260
An integrated authentication and authorization approach for the network of information architecture
Aiash, M. and Loo, J. 2015. An integrated authentication and authorization approach for the network of information architecture. Journal of Network and Computer Applications. 50, pp. 73-79. https://doi.org/10.1016/j.jnca.2014.06.004
Challenges and solutions for secure information centric networks: a case study of the NetInf architecture
Loo, J. and Aiash, M. 2015. Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. Journal of Network and Computer Applications. 50, pp. 64-72. https://doi.org/10.1016/j.jnca.2014.06.003
Employable knowledge: benchmarking education about standardization in the UK
Whitney, G., Keith, S., Selvaraj, N., Maguire, M. and Nicolle, C. 2014. Employable knowledge: benchmarking education about standardization in the UK. London, UK British Standards Institute.
Secure live virtual machines migration: issues and solutions
Aiash, M., Mapp, G. and Gemikonakli, O. 2014. Secure live virtual machines migration: issues and solutions. IEEE AINA 2014. Victoria, BC, Canada 13 - 16 May 2014
Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR
Aiash, M. and Loo, J. 2014. Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. International Journal of Communication Systems. 27 (12), pp. 3600-3618. https://doi.org/10.1002/dac.2561
The case for integrating needs and preferences in the internet of things
Heath, A., Whitney, G., Kolar, I. and Springett, M. 2013. The case for integrating needs and preferences in the internet of things. The Sixth International Conference on Advances in Human Oriented and Personalized Mechanisms, Technologies, and Services: CENTRIC 2013. Venice, Italy 27 Oct - 01 Nov 2013
Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness
Kodagoda, N., Attfield, S., Choudhury, S., Rooney, C., Mapp, G., Nguyen, P., Slabbert, L., Wong, B., Aiash, M., Zheng, Y., Xu, K. and Lasebae, A. 2014. Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness. Information Visualization. 13 (4), pp. 346-360. https://doi.org/10.1177/1473871613490291
Working internationally to meet the academic needs of accessibility professionals
Whitney, G. 2013. Working internationally to meet the academic needs of accessibility professionals. Encarnação, P., Azevedo, L., Gelderblom, G., Newell, A. and Mathiassen, N. (ed.) 12th European AAATE Conference. Vilamoura, Portugal 19 - 22 Sep 2013 IOS Press. pp. 1092-1095 https://doi.org/10.3233/978-1-61499-304-9-1092
The use and usability of accessibility standardization
Whitney, G. 2013. The use and usability of accessibility standardization. Encarnação, P., Azevedo, L., Gelderblom, G., Newell, A. and Mathiassen, N. (ed.) 12th European AAATE Conference. Vilamoura, Portugal 19 - 22 Sep 2013 IOS Press. pp. 298-302 https://doi.org/10.3233/978-1-61499-304-9-298
Integrating mobility, quality-of-service and security in future mobile networks
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2013. Integrating mobility, quality-of-service and security in future mobile networks. in: Ao, S. and Gelman, L. (ed.) Electrical Engineering and Intelligent Systems New York Springer.
A novel security protocol for resolving addresses in the location/ID split architecture
Aiash, M. 2013. A novel security protocol for resolving addresses in the location/ID split architecture. The 7th International Conference on Network and System Security (NSS 2013). Spain 03 - 04 Jun 2013
Securing address registration in location/ID split protocol using ID-based cryptography
Aiash, M., Al-Nemrat, A. and Preston, D. 2013. Securing address registration in location/ID split protocol using ID-based cryptography. Tsaoussidis, V., Kassler, A., Koucheryavy, Y. and Mellouk, A. (ed.) In proceeding of: The 11th International Conference on Wired/Wireless Internet Communications WWIC 2013. Russia 05 - 07 Jun 2013 Springer. https://doi.org/10.1007/978-3-642-38401-1_10
An integrated approach to QoS and security in future mobile networks using the Y-Comm framework
Aiash, M. 2012. An integrated approach to QoS and security in future mobile networks using the Y-Comm framework. PhD thesis Middlesex University School of Engineering and Information Sciences
From fixed to mobile femtocells in LTE systems: issues and challenges
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2013. From fixed to mobile femtocells in LTE systems: issues and challenges. 2013 Second International Conference on Future Generation Communication Technology (FGCT). London, United Kingdom 12 - 14 Nov 2013 Institute of Electrical and Electronics Engineers (IEEE). pp. 207-212 https://doi.org/10.1109/FGCT.2013.6767218
On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms
Sardis, F., Mapp, G., Loo, J., Aiash, M. and Vinel, A. 2013. On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms. IEEE Transactions on Multimedia. 15 (4), pp. 769-777. https://doi.org/10.1109/TMM.2013.2240286
Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments
Mapp, G., Katsriku, F., Aiash, M., Chinnam, N., Lopes, R., Moreira, E., Vanni, R., Augusto, M., Middlesex University and University of Sao Paulo 2012. Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments. Journal of Computer Networks and Communications. https://doi.org/10.1155/2012/748163
A formally verified device authentication protocol using Casper/FDR
Aiash, M., Mapp, G., Phan, R., Lasebae, A. and Loo, J. 2012. A formally verified device authentication protocol using Casper/FDR. Min, G., Wu, Y., Liu, L., Jin, X., Jarvis, S. and Al-Dubai, A. (ed.) 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012). Liverpool, UK 25 - 27 Jun 2012 IEEE. pp. 1293-1298 https://doi.org/10.1109/TrustCom.2012.27
A survey of potential architectures for communication in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A., Loo, J., Sardis, F., Phan, R., Augusto, M., Moreira, E. and Vanni, R. 2012. A survey of potential architectures for communication in heterogeneous networks. IEEE Wireless Telecommunications Symposium (WTS 2012). London 18 - 20 Apr 2012 IEEE. pp. 1-6 https://doi.org/10.1109/WTS.2012.6266121
Certification or conformance: making a successful commitment to WCAG 2.0
Keith, S., Floratos, N. and Whitney, G. 2012. Certification or conformance: making a successful commitment to WCAG 2.0. Vigo, M., Abascal, J., Lopes, R. and Salomoni, P. (ed.) 9th International Cross-Disciplinary Conference on Web Accessibility. Lyon, France 16 - 17 Apr 2012 New York ACM. https://doi.org/10.1145/2207016.2207029
Security and QoS integration for protecting service providers in hterogeneous environments
Aiash, M., Mapp, G. and Lasebae, A. 2011. Security and QoS integration for protecting service providers in hterogeneous environments. International Journal of Computer Science. 38 (4), pp. 384-393.
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
Le, A., Loo, J., Lasebae, A., Aiash, M. and Luo, Y. 2012. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems. 25 (9), pp. 1189-1212. https://doi.org/10.1002/dac.2356
M-Sieve: a visualisation tool for supporting network security analysts
Choudhury, S., Kodagoda, N., Nguyen, P., Rooney, C., Attfield, S., Xu, K., Zheng, Y., Wong, B., Chen, R., Mapp, G., Slabbert, L., Aiash, M. and Lasebae, A. 2012. M-Sieve: a visualisation tool for supporting network security analysts. VisWeek 2012. Seattle, WA, USA 14 - 19 Oct 2012
A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2012. A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking. 2012 (57). https://doi.org/10.1186/1687-1499-2012-57
Exploring the concept of scope to provide better security for internet services.
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2011. Exploring the concept of scope to provide better security for internet services. First Global Conference on Communication, Science and Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Enhancing naming and location services to support multi-homed devices in heterogeneous environments
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Augusto, M., Vanni, R., Moreira, E., Middlesex University, Loughborough University and University of Sao Paulo 2011. Enhancing naming and location services to support multi-homed devices in heterogeneous environments. First Conference on Communication, Science and Information Enginneering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
A QoS framework for heterogeneous networking
Aiash, M., Mapp, G., Lasebae, A., Augusto, M., Vanni, R. and Moreira, E. 2011. A QoS framework for heterogeneous networking. ICWN'11: The 2011 International Conference of Wireless Networks (held as part of WCE 2011). London, UK 06 - 08 Jul 2011
Twenty five years of training and education in ICT Design for All and Assistive Technology.
Whitney, G., Keith, S., Bühler, C., Hewer, S., Lhotska, L., Miesenberger, K., Sandnes, F., Stephanidis, C. and Velasco, C. 2011. Twenty five years of training and education in ICT Design for All and Assistive Technology. Technology and Disability. 23 (3), pp. 163-170. https://doi.org/10.3233/TAD-2011-0324
Exploring multi-homing issues in heterogeneous networks
Mapp, G., Aiash, M., Guardia, H., Crowcroft, J., Institute of Electrical and Electronics Engineers, Middlesex University, Federal University of Sao Paulo and University of Cambridge 2011. Exploring multi-homing issues in heterogeneous networks. IEEE. pp. 690-695 https://doi.org/10.1109/WAINA.2011.140
Mainstreaming accessibility? Multidisciplinary problems or technical solutions.
Keith, S. and Whitney, G. 2011. Mainstreaming accessibility? Multidisciplinary problems or technical solutions. International Journal of Knowledge and Web Intelligence. 2 (1), pp. 53-63. https://doi.org/10.1504/IJKWI.2011.038628
Design for all in ICT training and education.
Keith, S. and Whitney, G. 2009. Design for all in ICT training and education. in: Lanyi, C. (ed.) Principles and practice in Europe for e-accessibility. Veszprém, Hungary Pannonian University Press. pp. 63-72
Providing security in 4G systems: unveiling the challenges
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2010. Providing security in 4G systems: unveiling the challenges. Atmaca, T., Palicot, J., Amor, N., Tsiatsos, T., Marot, M. and Dini, O. (ed.) IEEE. pp. 439-444 https://doi.org/10.1109/AICT.2010.24
The challenge of mainstreaming ICT design for all.
Whitney, G., Keith, S. and Schmidt-Belz, B. 2010. The challenge of mainstreaming ICT design for all. Miesenberger, K., Klaus, J., Zagler, W. and Karshmer, A. (ed.) 12th International Conference on Computers Helping People with Special Needs (ICCHP 2010). Vienna University of Technology, Austria 12 - 16 Jul 2010 Springer. https://doi.org/10.1007/978-3-642-14097-6_94
Combining technical and user knowledge in the curriculum.
Whitney, G. and Keith, S. 2009. Combining technical and user knowledge in the curriculum. 9th Annual Learning and Teaching Conference: The dynamics of difference: Making it work.. Middlesex University, London 01 Jul 2009
D6.3b Evaluation of syllabi with members of EDeAN and other interested parties. IST CA 0033838 Design for All for eInclusion.
Keith, S. and Whitney, G. 2009. D6.3b Evaluation of syllabi with members of EDeAN and other interested parties. IST CA 0033838 Design for All for eInclusion. Online DfA @eInclusion.
D6.4a Report on the possibility of accreditation of DfA Inclusion and dissemination of information from WP6: IST CA 0033838 Design for All for eInclusion.
Keith, S., Whitney, G. and Kolar, I. 2009. D6.4a Report on the possibility of accreditation of DfA Inclusion and dissemination of information from WP6: IST CA 0033838 Design for All for eInclusion. Online DfA @eInclusion.
D6.4b: Review of WP6 training activities: IST CA 0033838 design for all for eInclusion.
Keith, S., Whitney, G. and Kolar, I. 2009. D6.4b: Review of WP6 training activities: IST CA 0033838 design for all for eInclusion. Online DfA @eInclusion.
The missing link? Design for all elements in ICT education fostering e-inclusion.
Petz, A., Keith, S. and Whitney, G. 2009. The missing link? Design for all elements in ICT education fostering e-inclusion. 24th Annual International Technology and Persons with Disabilities Conference. California State University, Northridge, USA 16 - 21 Mar 2009
Improving ICT accessibility using standards and legislation.
Whitney, G. and Keith, S. 2009. Improving ICT accessibility using standards and legislation. Techshare 2009. Excel, London 16 - 18 Sep 2009
Design for all as focus in European ICT teaching and training activities.
Keith, S., Whitney, G. and Petz, A. 2009. Design for all as focus in European ICT teaching and training activities. in: Myerson, J., Bichard, J. and Davidson, C. (ed.) Inclusive design into innovation: transforming practice in design, research and business. [Include 2009] London Royal College of Art.
Applying Best Practice in Accessibility and Design in the Real World.
Whitney, G. 2009. Applying Best Practice in Accessibility and Design in the Real World. in: Sapio, B. (ed.) The good, the bad and the challenging, the user and the future of information and communication technologies. Koper, Slovenia ABS Center.
Bridging the gap between young designers and older users.
Whitney, G. and Keith, S. 2009. Bridging the gap between young designers and older users. in: Sapio, B. (ed.) The good, the bad and the challenging: the user and the future of information and communication technologies. Conference proceedings. Koper, Slovenia ABS Center.
Design For All for eInclusion.
Emiliani, P., Burzagli, L., Gabbanini, F., Bühler, C., Klironomos, I., Aalykke, S., Schmidt-Belz, B., Knops, H., Reichrath, E. and Whitney, G. 2009. Design For All for eInclusion. in: Emiliani, P., Burzagli, L., Como, A., Gabbanini, F. and Salminen, A. (ed.) Assistive technology from adapted equipment to inclusive environments. IOS Press.
Design For All @ eInclusion: Best Practice In Education And Training.
Whitney, G., Keith, S. and Wilson, J. 2009. Design For All @ eInclusion: Best Practice In Education And Training. in: Emiliani, P., Burzagli, L., Como, A., Gabbanini, F. and Salminen, A. (ed.) Assistive technology from adapted equipment to inclusive environments. Amsterdam, Netherlands IOS Press.
HCI and the older population
Goodman-Deane, J., Keith, S. and Whitney, G. 2009. HCI and the older population. Universal Access in the Information Society. 8 (1), pp. 1-3. https://doi.org/10.1007/s10209-008-0125-0
Security models for heterogeneous networking
Mapp, G., Aiash, M., Lasebae, A. and Phan, R. 2010. Security models for heterogeneous networking. Katsikas, S. (ed.) 4th International Conference on Security and Cryptography. Athens, Greece 26 - 28 Jul 2010 IEEE. pp. 1-4
Accessibility, usability and fit for purpose: a framework for evaluating information delivery.
Keith, S., Whitney, G. and Wong, B. 2006. Accessibility, usability and fit for purpose: a framework for evaluating information delivery. in: Bust, P. (ed.) Contemporary ergonomics 2006. Taylor and Francis.
Visual displays as part of an information system.
Whitney, G. 2007. Visual displays as part of an information system. Accommodating disability with displays and lighting.. Bletchley Park 16 May 2007
Seniors route-planning: a reality check for the design of navigation systems.
Wilson, J., Curzon, P. and Whitney, G. 2007. Seniors route-planning: a reality check for the design of navigation systems. in: TRANSED 2007 conference proceedings. Transport Canada.
Active ageing through universal design.
Whitney, G. and Keith, S. 2006. Active ageing through universal design. Gerontechnology. 5 (3).
European developments in the design and implementation of training for eInclusion.
Whitney, G. and Keith, S. 2008. European developments in the design and implementation of training for eInclusion. in: Computers helping people with special needs: 11th international conference, ICCHP 2008. Berlin Springer. pp. 156-161
Independent mobility for blind and partially sighted people travelling by large passenger ships.
Whitney, G., Keith, S. and Kolar, I. 2005. Independent mobility for blind and partially sighted people travelling by large passenger ships. in: Hamlin, D. and Rubin, G. (ed.) Vison 2005 : proceedings of the Vision 2005 conference. Elsevier.
Applying best practise in accessibility and design in the real world.
Whitney, G. 2008. Applying best practise in accessibility and design in the real world. Accessible design in the digital world '08. York 22 - 24 Oct 2008
The need for and the problems with location aware services (LAS) for people with disabilities.
Whitney, G. 2002. The need for and the problems with location aware services (LAS) for people with disabilities. First European workshop on location based service.. London
The navigation requirements of older people with a range of disabilities in complex pedestrian environments.
Whitney, G. 2002. The navigation requirements of older people with a range of disabilities in complex pedestrian environments. in: Faulkner, X., Finlay, J. and Detienne, F. (ed.) People and computers XVI: memorable yet invisible / proceedings of HCI 2002. London Springer.
The future requirements for assistive technology devices to enable elderly and disabled people to use ICT equipment.
Whitney, G. 2001. The future requirements for assistive technology devices to enable elderly and disabled people to use ICT equipment. in: Nordby, K. (ed.) Human factors in telecommunication: 18th international symposium HFT Permanent Steering.
The current state of electronic mobility devices and electronic orientation aids for blind and partially sighted people in the United Kingdom.
Whitney, G. 2000. The current state of electronic mobility devices and electronic orientation aids for blind and partially sighted people in the United Kingdom. in: Making independent language learning accessible. Southampton CIEL Project.
The current state of electronic mobility devices and electronic orientation aids for blind and partially sighted people in the United Kingdom.
Whitney, G. 2000. The current state of electronic mobility devices and electronic orientation aids for blind and partially sighted people in the United Kingdom. in: Blom, T. (ed.) Developments in low vision: abstracts of the fourth European conference on low vision De Blauwe Kamer Theofaan Groep.
DDA compliant display
Whitney, G. 2007. DDA compliant display. Bletchley Park 26 Jan 2007
Mixed methods requirement capture in older drivers' use of complex driving information systems
Whitney, G., Keith, S., Bradley, M., Goodwin, R., Kolar, I., Wicks, C. and Wilson, J. 2003. Mixed methods requirement capture in older drivers' use of complex driving information systems. in: The 3rd IEE conference on automotive electronics. Institution of Engineering Technology..
Developing independence: the potential of information and communication technologies (ICT) to assist elderly and disabled people.
Whitney, G., Keith, S. and Wilson, J. 2003. Developing independence: the potential of information and communication technologies (ICT) to assist elderly and disabled people. in: The good, the bad and the irrelevant: the user and the future of information and communication technologies: conference proceedings. Helsinki Media Lab, University of Art and Design Helsinki.
How technology is assisting blind and partially sighted people to travel within and use the built environment.
Whitney, G. 2000. How technology is assisting blind and partially sighted people to travel within and use the built environment. TechShare. Birmingham Nov 2000
Standardising access to information and electronic services for all in Europe.
Whitney, G. and Van den Berghe, L. 2003. Standardising access to information and electronic services for all in Europe. British journal of healthcare computing. 20 (9).
Electronic travel booking: the evaluation of usability, accessibility and fitness for purpose by older people and people with disabilities.
Whitney, G., Keith, S. and Kolar, I. 2005. Electronic travel booking: the evaluation of usability, accessibility and fitness for purpose by older people and people with disabilities. in: HCI International 2005: 11th international conference on human-computer interaction. Mahwah, NJ. Lawrence Erlbaum Associates..
Critical analysis of high speed wireless standards for transferring telementoring information
Shaikh, F., Lasebae, A. and Whitney, G. 2004. Critical analysis of high speed wireless standards for transferring telementoring information. in: ICTTA'04: 2004 International conference on information & communication technologies: from theory to applications. Institute of Electrical and Electronics Engineers: French section.
Computer-vision-based navigation system for the visually impaired.
Rahman, S., Shah, A. and Whitney, G. 2004. Computer-vision-based navigation system for the visually impaired. SIGGRAPH 2004: 31st International Conference on Computer Graphics and Interactive Techniques.. Los Angeles, California 08 - 12 Aug 2004
A framework for evaluating barriers to accessibility, usability and fit for purpose.
Keith, S., Whitney, G. and Wong, B. 2006. A framework for evaluating barriers to accessibility, usability and fit for purpose. in: Bust, P. (ed.) Contemporary ergonomics 2006. London Taylor and Francis.
A scenario-based evaluation of travel information for older people and people with disabilities.
Keith, S., Whitney, G. and Kolar, I. 2005. A scenario-based evaluation of travel information for older people and people with disabilities. HCI and the older population.. Napier University, Edinburgh 05 Sep 2005
Review of DPTAC guidance: large passenger ships and passenger infrastructure.
Keith, S., Whitney, G., Sentinella, J., Wong, B., Platt-Evans, C., Fielding, C. and Smith, L. 2006. Review of DPTAC guidance: large passenger ships and passenger infrastructure. Disabled Persons Transport Advisory Committee (DPTAC).
Investigating the usability of large passenger ships by older and disabled people.
Keith, S. and Whitney, G. 2004. Investigating the usability of large passenger ships by older and disabled people. Access to Buildings and Transport Conference. Britannia Street Conference Centre, London
Information seeking strategies used by older people.
Curzon, P., Keith, S., Wilson, J. and Whitney, G. 2004. Information seeking strategies used by older people. Utopia workshops: HCI and the older population. Leeds
Agent design method for enhancing accessibility.
Cook, J., Huyck, C. and Whitney, G. 2004. Agent design method for enhancing accessibility. in: McLoughlin, C. and Cantoni, L. (ed.) ED-MEDIA 2004: world conference on educational multimedia, hypermedia and telecommunications: proceedings of ED-MEDIA 2004. Association for the Advancement of Computing in Education.
Universal access in an information world
Adams, R. and Whitney, G. 2005. Universal access in an information world. in: Adams, R. (ed.) Natural computing and interactive system design Harlow Pearson Education.
The use of computers in rehabilitation
Adams, R. and Whitney, G. 2005. The use of computers in rehabilitation. in: Salvendy, G. (ed.) HCI international 2005: 11th international conference on human-computer interaction. Mahwah, NJ. Lawrence Erlbaum Associates..
The need for an interface accessibility initiative
Whitney, G. and Adams, R. 2003. The need for an interface accessibility initiative. in: Carbonell, N. and Stephanidis, C. (ed.) Universal Access: theoretical perspectives, practice, and experience: 7th ERCIM international workshop on user interfaces for all Berlin Springer.
Universal access heuristics for blind and visually impaired people who use ICT
Adams, R., Whitney, G. and Langdon, P. 2003. Universal access heuristics for blind and visually impaired people who use ICT. in: Stephanidis, C. (ed.) Universal access in HCI: inclusive design in the information society. Lawrence Erlbaum Associates..
Accessibility for all and tacit knowledge requirements of systems at work.
Adams, R. and Whitney, G. 2003. Accessibility for all and tacit knowledge requirements of systems at work. CEN / CENELEC / ETSI Conference on Accessibility for All. Nice 27 - 28 Mar 2003
Exploring efficient imperative handover mechanisms for heterogeneous wireless networks
Mapp, G., Shaikh, F., Aiash, M., Vanni, R., Augusto, M. and Moreira, E. 2009. Exploring efficient imperative handover mechanisms for heterogeneous wireless networks. Duresi, A., Barolli, L., Enokido, T., Uehara, M., Shakshuki, E. and Takizawa, M. (ed.) 12th International Conference on Network-Based Information Systems. Indianapolis, Indiana 19 - 21 Aug 2009 IEEE. pp. 286-291 https://doi.org/10.1109/NBiS.2009.95
Identifying and characterising diversity of the older car driver.
Bradley, M., Keith, S., Kolar, I. and Whitney, G. 2007. Identifying and characterising diversity of the older car driver. Bust, P. (ed.) Taylor and Francis.
The development of a participatory research methodology with older drivers.
Bradley, M., Keith, S., Whitney, G. and Wilson, J. 2007. The development of a participatory research methodology with older drivers. Proceedings of the 11th International Conference on Mobility and Transport for Elderly and Disabled Persons. Montréal, Québec.
The use of design for all to support elderly blind and partially sighted users to retain their independence.
Whitney, G. 2003. The use of design for all to support elderly blind and partially sighted users to retain their independence. in: Stephanidis, C. (ed.) 10th International Conference on Human - Computer Interaction, Crete. Published in Universal Access in HCI: Inclusive Design in the Information Society Lawrence Erlbaum Associates.. pp. 1340-1344
Strategies for finding government information by older people
Curzon, P., Wilson, J., Keith, S. and Whitney, G. 2004. Strategies for finding government information by older people. in: User-Centered Interaction Paradigms for Universal Access in the Information Society: 8th ERCIM Workshop on User Interfaces for All , Vienna, Austria, June 28-29, 2004, Revised Selected Papers Heidelberg. Springer Berlin.
Successful strategies of older people for finding information
Whitney, G., Wilson, J. and Curzon, P. 2005. Successful strategies of older people for finding information. Interacting with Computers. 17 (6), pp. 660-671. https://doi.org/10.1016/j.intcom.2005.09.006
Enabling People with Sensory Impairments to Participate Effectively in Research
Whitney, G. 2006. Enabling People with Sensory Impairments to Participate Effectively in Research. Universal Access in the Information Society. 5 (3), pp. 287-291. https://doi.org/10.1007/s10209-006-0052-x