Faculty of Science and Technology
Title | Faculty of Science and Technology |
---|---|
Alternative | S&T |
University | Middlesex University London |
Campus | London |
Latest research outputs
Sort by Date Title
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017). Churchill College, University of Cambridge, United Kingdom 22 - 23 Mar 2017 Association for Computing Machinery (ACM). https://doi.org/10.1145/3018896.3056795Conference paper
Exploring a new security framework for cloud storage using capabilities
Mapp, G., Aiash, M., Ondiege, B. and Clarke, M. 2014. Exploring a new security framework for cloud storage using capabilities. 1st International Workshop on Cyber Security and Cloud Computing, a workshop of SOSE. Oxford, United Kingdom 07 - 11 Apr 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 484-489 https://doi.org/10.1109/SOSE.2014.69Conference paper
Platelet activating acetylhydrolase involved in inflammation resolution in macrophages and neutrophils which have been stimulated with urate crystals
Yagnik, D. 2015. Platelet activating acetylhydrolase involved in inflammation resolution in macrophages and neutrophils which have been stimulated with urate crystals. The 12th World Congress on Inflammation. Boston, USA 08 - 12 Aug 2015 Springer. https://doi.org/10.1007/s00011-015-0839-4Conference paper
Continuous Regional Analysis Device for Neonates Lung (CRADL)
Bayford, R., Tizzard, A., Frerichs, I., Weiler, N., Karaoli, C., Christofides, S., Yiannakkaras, C., Rimensberger, P., Nordebo, S., Böhm, S., van Kaam, A., Fifield, B., Knox, C., Steuten, L., de Graaf, G., Yerworth, R., Butterworth, M. and Demosthenous, A. 2016. Continuous Regional Analysis Device for Neonates Lung (CRADL). MEDICON 2016: XIV Mediterranean Conference on Medical and Biological Engineering and Computing 2016. Paphos, Cyprus. 31 Mar - 02 Apr 2016 Springer. pp. 172 https://doi.org/10.1007/978-3-319-32703-7_35Conference poster
Supporting the externalisation of thinking in criminal intelligence analysis
Passmore, P., Attfield, S., Kodagoda, N., Groenewald, C. and Wong, B. 2015. Supporting the externalisation of thinking in criminal intelligence analysis. European Intelligence and Security Informatics Conference (EISIC) 2015. Manchester, United Kingdom 07 - 09 Sep 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 16-23 https://doi.org/10.1109/EISIC.2015.35Conference paper
Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility
Sardis, F., Mapp, G., Loo, J. and Aiash, M. 2014. Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility. 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC),. London, UK 08 - 11 Dec 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-306 https://doi.org/10.1109/UCC.2014.39Conference paper
Developing a comprehensive information security framework for mHealth: a detailed analysis
Vithanwattana, N., Mapp, G. and George, C. 2017. Developing a comprehensive information security framework for mHealth: a detailed analysis. Journal of Reliable Intelligent Environments. 3 (1), pp. 21-39. https://doi.org/10.1007/s40860-017-0038-xArticle
Admission control and buffer management of wireless communication systems with mobile stations and integrated voice and data services
Gemikonakli, E., Ever, E., Mapp, G. and Gemikonakli, O. 2017. Admission control and buffer management of wireless communication systems with mobile stations and integrated voice and data services. Telecommunication Systems. 65 (4), pp. 663-675. https://doi.org/10.1007/s11235-016-0259-yArticle
Elucidating the intra-species proteotypes of pseudomonas aeruginosa from cystic fibrosis
Olkun, A., Shah, A. and Shah, H. 2017. Elucidating the intra-species proteotypes of pseudomonas aeruginosa from cystic fibrosis. in: Shah, H. and Gharbia, S. (ed.) MALDI-TOF and Tandem MS for Clinical Microbiology Oxford, UK Wiley. pp. 579-592Book chapter
Subtyping of Staphylococcus spp. Based upon MALDI-TOF MS data analysis
Xu, Z., Olkun, A., Vranckx, K., Mkrtchyan, H., Shah, A., Pot, B., Cutler, R. and Shah, H. 2017. Subtyping of Staphylococcus spp. Based upon MALDI-TOF MS data analysis. in: Shah, H. and Gharbia, S. (ed.) MALDI-TOF and Tandem MS for Clinical Microbiology Oxford, UK Wiley. pp. 563-578Book chapter
Determination of antimicrobial resistance using tandem mass spectrometry
Shah, A., Serafim, V., Xu, Z., Mkrtchyan, H. and Shah, H. 2017. Determination of antimicrobial resistance using tandem mass spectrometry. in: Shah, H. and Gharbia, S. (ed.) MALDI-TOF and Tandem MS for Clinical Microbiology Oxford, UK Wiley. pp. 399-418Book chapter
Dynamic probabilistic linear discriminant analysis for video classification
Fabris, A., Nicolaou, M., Kotsia, I. and Zafeiriou, S. 2017. Dynamic probabilistic linear discriminant analysis for video classification. ICASSP 2017: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). New Orleans, USA 05 - 09 Mar 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 2781-2785 https://doi.org/10.1109/ICASSP.2017.7952663Conference paper
Microbial DNA analysis by MALDI-TOF mass spectrometry
Honisch, C., Serafim, V., Hennessy, N., Allen, D., Ring, C., Pantoja Munoz, L., Gharbia, S., Shah, A. and Shah, H. 2017. Microbial DNA analysis by MALDI-TOF mass spectrometry. in: Shah, H. and Gharbia, S. (ed.) MALDI-TOF and Tandem MS for Clinical Microbiology Oxford Wiley. pp. 187-209Book chapter
Child online protection in the MENA region
Patrick, B., Monica, B., Davidson, J., Ali, M., Davison, P., Day, E., DeMarco, J., Rasul, M., Razai, S., Scally, M. and Wex, B. 2016. Child online protection in the MENA region. Centre for Justice and Crime Prevention.Project report
EU online child safety: what does the literature say?
DeMarco, J., Davidson, J., Bifulco, A., Scally, M., Cheevers, C., Schimmenti, A., Caretti, V., Puccia, A., Corbari, E., Schilder, J. and Bogaerts, S. 2016. EU online child safety: what does the literature say? Crimen et Delictum: International Journal of Criminological and Investigative Sciences. 11 (1), pp. 1-19.Article
SenseMap: supporting browser-based online sensemaking through analytic provenance
Nguyen, P., Xu, K., Bardill, A., Salman, B., Herd, K. and Wong, B. 2016. SenseMap: supporting browser-based online sensemaking through analytic provenance. VIS 2016: IEEE Visualization Conference. Baltimore, Maryland, USA 23 - 28 Oct 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 91-100 https://doi.org/10.1109/vast.2016.7883515Conference paper
Neuron-based control mechanisms for a robotic arm and hand
Singh, N., Huyck, C., Gandhi, V. and Jones, A. 2017. Neuron-based control mechanisms for a robotic arm and hand. International Journal of Computer, Electrical, Automation, Control and Information Engineering. 11 (2), pp. 221-229. https://doi.org/10.5281/zenodo.1128871Article
Formal reasoning on infinite data values: an ongoing quest
Chen, T., Song, F. and Wu, Z. 2017. Formal reasoning on infinite data values: an ongoing quest. SETSS 2016: Second International School Engineering Trustworthy Software Systems, Tutorial Lectures. Chongqing, China 28 Mar - 02 Apr 2016 Springer. pp. 195-257 https://doi.org/10.1007/978-3-319-56841-6_6Conference paper
ProEva: runtime proactive performance evaluation based on continuous-time markov chains
Su, G., Chen, T., Feng, Y. and Rosenblum, D. 2017. ProEva: runtime proactive performance evaluation based on continuous-time markov chains. 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE). Buenos Aires, Argentina 20 - 28 May 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 484-495 https://doi.org/10.1109/ICSE.2017.51Conference paper
Analyzing APIs documentation and code to detect directive defects
Zhou, Y., Gu, R., Chen, T., Huang, Z., Panichella, S. and Gall, H. 2017. Analyzing APIs documentation and code to detect directive defects. 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE). Buenos Aires, Argentina 20 - 28 May 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 27-37 https://doi.org/10.1109/ICSE.2017.11Conference paper
The packing chromatic number of the infinite square lattice is between 13 and 15
Martin, B., Raimondi, F., Chen, T. and Martin, J. 2017. The packing chromatic number of the infinite square lattice is between 13 and 15. Discrete Applied Mathematics. 225, pp. 136-142. https://doi.org/10.1016/j.dam.2017.03.013Article
Monitoring changes in power, speed, agility and endurance in elite cricketers during the off-season
Herridge, R., Turner, A. and Bishop, C. 2020. Monitoring changes in power, speed, agility and endurance in elite cricketers during the off-season. The Journal of Strength and Conditioning Research. 34 (8), pp. 2285-2293. https://doi.org/10.1519/JSC.0000000000002077Article
Teaching atomic structure as a threshold concept in chemistry for biologists
Loizidou, E. and Jones, H. 2016. Teaching atomic structure as a threshold concept in chemistry for biologists. 253rd American Chemical Society National Meeting & Exposition. San Francisco, CA, USA 02 - 06 Apr 2017Conference item
Holistic hamstring health: not just the Nordic hamstring exercise
Oakley, A., Jennings, J. and Bishop, C. 2018. Holistic hamstring health: not just the Nordic hamstring exercise. British Journal of Sports Medicine. 52 (13), pp. 816-817. https://doi.org/10.1136/bjsports-2016-097137Article
The single leg squat: when to prescribe this exercise
Bishop, C., Brierly, S. and Turner, A. 2016. The single leg squat: when to prescribe this exercise. Professional Strength and Conditioning.Article
Profile of a strength and conditioning coach: backgrounds, duties, and perceptions
Hartshorn, M., Read, P., Bishop, C. and Turner, A. 2016. Profile of a strength and conditioning coach: backgrounds, duties, and perceptions. Strength and Conditioning Journal. 38 (6), pp. 89-94. https://doi.org/10.1519/SSC.0000000000000255Article
Using the split squat to potentiate bilateral and unilateral jump performance
Bishop, C., Tarrant, J., Jarvis, P. and Turner, A. 2017. Using the split squat to potentiate bilateral and unilateral jump performance. The Journal of Strength and Conditioning Research. 31 (8), pp. 2216-2222. https://doi.org/10.1519/JSC.0000000000001696Article
Physiological demands of sabre competitions in elite fencers
Turner, A., Dimitriou, L., Marshall, G., Russell, M., Bannock, L. and Bishop, C. 2018. Physiological demands of sabre competitions in elite fencers. Journal of Australian Strength and Conditioning. 26 (1).Article
Model based analysis of insider threats
Chen, T., Han, T., Kammueller, F., Nemli, I. and Probst, C. 2016. Model based analysis of insider threats. 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). London, United Kingdom 13 - 14 Jun 2016 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/CyberSecPODS.2016.7502350Conference paper
Formal modeling and analysis with humans in infrastructures for IoT health care systems
Kammueller, F. 2017. Formal modeling and analysis with humans in infrastructures for IoT health care systems. 5th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2017. Vancouver, BC, Canada 09 - 14 Jul 2017 Springer. pp. 339-352 https://doi.org/10.1007/978-3-319-58460-7_24Conference paper
Human centric security and privacy for the IoT using formal techniques
Kammueller, F. 2018. Human centric security and privacy for the IoT using formal techniques. 3rd International Conference on Human Factors in Cybersecurity. Los Angeles, CA, United States 17 - 21 Jul 2017 Springer. pp. 106-116 https://doi.org/10.1007/978-3-319-60585-2_12Conference paper
Crispr/Cas9 gene editing reveals novel tertiary constraints in clustered mirna processing
Lataniotis, L., Albrecht, A., Kok, F., Monfries, C., Benedetti, L., Lawson, N., Hughes, S., Steinhofel, K., Mayr, M. and Zampetaki, A. 2017. Crispr/Cas9 gene editing reveals novel tertiary constraints in clustered mirna processing. Heart. 103 (5), p. A133. https://doi.org/10.1136/heartjnl-2017-311726.193Article
Insider threats for auctions: formalization, mechanized proof, and code generation
Kammueller, F., Kerber, M. and Probst, C. 2017. Insider threats for auctions: formalization, mechanized proof, and code generation. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 8 (1), pp. 44-78. https://doi.org/10.22667/JOWUA.2017.03.31.044Article
Managing software uninstall with negative trust
Primiero, G. and Boender, J. 2017. Managing software uninstall with negative trust. 11th IFIP WG 11.11 International Conference, IFIPTM 2017. Gothenburg, Sweden 12 - 16 Jun 2017 Springer. pp. 79-93 https://doi.org/10.1007/978-3-319-59171-1_7Conference paper
Reciprocal mutualism not altruism: immediate but not delayed time matching in chimpanzee social grooming
Phelps, S., Ng, W., Musolesi, M. and Russell, Y. 2016. Reciprocal mutualism not altruism: immediate but not delayed time matching in chimpanzee social grooming. 8th European Conference on Behavioural Biology (ECBB2016). Vienna 12 - 15 Jul 2016Conference poster
A wideband low-distortion CMOS current driver for tissue impedance analysis
Constantinou, L., Bayford, R. and Demosthenous, A. 2015. A wideband low-distortion CMOS current driver for tissue impedance analysis. IEEE Transactions on Circuits and Systems II: Express Briefs. 62 (2), pp. 154-158. https://doi.org/10.1109/tcsii.2014.2387632Article
Machine learning based botnet identification traffic
Azab, A., Alazab, M. and Aiash, M. 2016. Machine learning based botnet identification traffic. 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2016). Tianjin, China 23 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1788-1794 https://doi.org/10.1109/TrustCom.2016.0275Conference paper
Insight/inside learning: a participatory app for analysing the effectiveness of school environments
Szynalska, K., Fields, B. and Bardill, A. 2017. Insight/inside learning: a participatory app for analysing the effectiveness of school environments. People, Personal Data and the Built Environment: A DIS2017 Workshop. Edinburgh 10 Jun 2017Conference paper
Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids
Kenaza, T., Bennaceur, K., Labed, A. and Aiash, M. 2016. Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids. 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Tianjin, China 23 - 25 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1765-1770 https://doi.org/10.1109/TrustCom.2016.0271Conference paper
Toward an efficient ontology-based event correlation in SIEM
Kenazag, T. and Aiash, M. 2016. Toward an efficient ontology-based event correlation in SIEM. 7th International Conference on Ambient Systems, Networks and Technologies (ANT2016). Madrid, Spain 23 - 26 May 2016 Elsevier. pp. 139-146 https://doi.org/10.1016/j.procs.2016.04.109Conference paper
491169
total views136391
total downloads50842
views this month15304
downloads this month