Middlesex University - Overseas Campuses
Title | Middlesex University - Overseas Campuses |
---|---|
Alternative | INT -- Overseas |
Faculty | Other Research |
Latest research outputs
Sort by Date Title
A ‘3P’ soft power model: an agile approach to diplomatic strategy
Stephens, M., Balasubramanian, S., Papadopoulos, N. and Hamzaoui-Essoussi, L. 2020. A ‘3P’ soft power model: an agile approach to diplomatic strategy. UAE Mohammed Bin Rashid School of Government (MBRSG).Report
Students go click, flick and cheat: e-cheating, technologies and more
Khan, Z. and Balasubramanian, S. 2012. Students go click, flick and cheat: e-cheating, technologies and more. Journal of Academic and Business Ethics. 6 (Sept), pp. 1-26.Article
A hierarchical framework of barriers to green supply chain management in the construction sector
Balasubramanian, S. 2012. A hierarchical framework of barriers to green supply chain management in the construction sector. Journal of Sustainable Development. 5 (10), pp. 15-27. https://doi.org/10.5539/jsd.v5n10p15Article
Using the IEPAR framework - a workshop to build a culture of integrity in higher education
Khan, Z., Balasubramanian, S. and Hysaj, A. 2022. Using the IEPAR framework - a workshop to build a culture of integrity in higher education. 8th European Conference on Academic Integrity and Plagiarism (ECAIP) 2022. Portugal 04 - 06 May 2022Conference item
System dynamics-based modelling and analysis of greening the construction industry supply chain
Sundarakani, B., Sikdar, A. and Balasubramanian, S. 2014. System dynamics-based modelling and analysis of greening the construction industry supply chain. International Journal of Logistics Systems and Management. 18 (4), pp. 517-537. https://doi.org/10.1504/IJLSM.2014.063983Article
E-Government users’ privacy and security concerns and availability of laws in Dubai
Sarabdeen, J., Rodrigues, G. and Balasubramanian, S. 2014. E-Government users’ privacy and security concerns and availability of laws in Dubai. International Review of Law Computers and Technology. 28 (3), pp. 261-276. https://doi.org/10.1080/13600869.2014.904450Article
A structural analysis of green supply chain management enablers in the UAE construction sector
Balasubramanian, S. 2014. A structural analysis of green supply chain management enablers in the UAE construction sector. International Journal of Logistics Systems and Management. 19 (2), pp. 131-150. https://doi.org/10.1504/IJLSM.2014.064655Article
Factors that influence consumer adoption of e-government services in the UAE: a UTAUT model perspective
Rodrigues, G., Sarabdeen, J. and Balasubramanian, S. 2016. Factors that influence consumer adoption of e-government services in the UAE: a UTAUT model perspective. Journal of Internet Commerce. 15 (1), pp. 18-39. https://doi.org/10.1080/15332861.2015.1121460Article
Assessing the green supply chain management for the United Arab Emirates construction industry
Balasubramanian, S. and Sundarakani, B. 2017. Assessing the green supply chain management for the United Arab Emirates construction industry. in: Khan, M., Hussain, M. and Ajmal, M. (ed.) Green Supply Chain Management for Sustainable Business Practice IGI Global. pp. 83-110Book chapter
"New managerialism" in higher education: the case of United Arab Emirates
Ajayan, S. and Balasubramanian, S. 2020. "New managerialism" in higher education: the case of United Arab Emirates. International Journal of Comparative Education and Development. 22 (2), pp. 147-168. https://doi.org/10.1108/IJCED-11-2019-0054Article
Knowledge management processes and performance: the impact of ownership of public sector organizations
Balasubramanian, S., Al-Ahbabi, S. and Sreejith, S. 2020. Knowledge management processes and performance: the impact of ownership of public sector organizations. International Journal of Public Sector Management. 33 (1), pp. 1-21. https://doi.org/10.1108/IJPSM-05-2019-0131Article
Estimating elasticity of demand for tourism in Dubai
Fernandes, C. and Karnik, A. 2010. Estimating elasticity of demand for tourism in Dubai. Tourism Analysis. 15 (1), pp. 57-69. https://doi.org/10.3727/108354210X12724734223630Article
Structural health monitoring and simulation assisted building management systems for modular buildings
Seeam, A., Zheng, T., Laurenson, D., Lu, Y. and Usmani, A. 2013. Structural health monitoring and simulation assisted building management systems for modular buildings. The 6th International Conference on Structural Health Monitoring of Intelligent Infrastructure, 9-11 December 2013, Hong Kong. Hong Kong 09 - 11 Dec 2013Conference paper
Temporal patterns: Smart-type reasoning and applications
Chuckravanen, D., Daykin, J., Hunsdale, K. and Seeam, A. 2017. Temporal patterns: Smart-type reasoning and applications. PATTERNS 2017 : The Ninth International Conferences on Pervasive Patterns and Applications. Athens, Greece 19 - 23 Feb 2017 International Academy, Research, and Industry Association (IARIA).Conference paper
Allen’s interval algebra and smart-type environments
Chuckravanen, D., Daykin, J., Hunsdale, K. and Seeam, A. 2017. Allen’s interval algebra and smart-type environments. International Journal on Advances in Software. 10 (3 & 4), pp. 221-230.Article
Characterization and monitoring of seismic performance of post-tensioned steel modular structures
Zheng, T., Lu, Y., Usmani, A., Seeam, A. and Laurenson, D. 2012. Characterization and monitoring of seismic performance of post-tensioned steel modular structures. Proceedings of the 15th World Conference on Earthquake Engineering (15 WCEE).Article
BIM integrated workflow management and monitoring system for modular buildings
Seeam, A., Zheng, T., Lu, Y., Usmani, A. and Laurenson, D. 2013. BIM integrated workflow management and monitoring system for modular buildings. International Journal of 3-D Information Modeling (IJ3DIM). 2 (1), pp. 17-28. https://doi.org/10.4018/ij3dim.2013010103Article
Detection and mitigation of DDoS attacks using conditional entropy in software-defined networking
Xuanyuan, M., Ramsurrun, V. and Seeam, A. 2020. Detection and mitigation of DDoS attacks using conditional entropy in software-defined networking. 2019 11th International Conference on Advanced Computing (ICoAC). Chennai, India 18 - 20 Dec 2019 pp. 66-71 https://doi.org/10.1109/ICoAC48765.2019.246818Conference paper
Cyber-security internals of a Skoda Octavia vRS: a hands on approach
Urquhart, C., Bellekens, X., Tachtatzis, C., Atkinson, R., Hindy, H. and Seeam, A. 2019. Cyber-security internals of a Skoda Octavia vRS: a hands on approach. IEEE Access. 7, pp. 146057-146069. https://doi.org/10.1109/ACCESS.2019.2943837Article
DNSSEC as a service-A prototype implementation
Hemanthindra, A., Phokeer, A., Ramsurrun, V., Katsina, P., Anantwar, S. and Seeam, A. 2021. DNSSEC as a service-A prototype implementation. 2020 32nd International Conference on Microelectronics (ICM). Jordan 14 - 17 Dec 2020 https://doi.org/10.1109/ICM50269.2020.9331810Conference paper
Benchmarking the research performance of United Arab Emirates with gulf cooperation council countries – A bibliometric study
Ajayan, S., Balasubramanian, S. and Ramachandran, S. 2022. Benchmarking the research performance of United Arab Emirates with gulf cooperation council countries – A bibliometric study. Frontiers in Education. 7, pp. 1-14. https://doi.org/10.3389/feduc.2022.792548Article
Trie compression for GPU accelerated multi-pattern matching
Bellekens, X., Seeam, A., Tachtatzis, C. and Atkinson, R. 2017. Trie compression for GPU accelerated multi-pattern matching. arXiv. https://doi.org/10.48550/arXiv.1702.03657Other
A taxonomy of malicious traffic for intrusion detection systems
Hindy, H., Hodo, E., Bayne, E., Seeam, A., Atkinson, R. and Bellekens, X. 2018. A taxonomy of malicious traffic for intrusion detection systems. arXiv. https://doi.org/10.48550/arXiv.1806.03516Other
A taxonomy and survey of intrusion detection system design techniques, network threats and datasets
Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R. and Bellekens, X. 2018. A taxonomy and survey of intrusion detection system design techniques, network threats and datasets. arXiv. https://doi.org/10.48550/arXiv.1806.03517Other
Critical patient eHealth monitoring system using wearable sensors
Omoogun, M., Ramsurrun, V., Guness, S., Seeam, P., Bellekens, X. and Seeam, A. 2017. Critical patient eHealth monitoring system using wearable sensors. 1st International Conference on Next Generation Computing Applications (NextComp). Mauritius 19 - 21 Jul 2017 pp. 169-174 https://doi.org/10.1109/NEXTCOMP.2017.8016194Conference paper
A taxonomy of malicious traffic for intrusion detection systems
Hindy, H., Hodo, E., Bayne, E., Seeam, A., Atkinson, R. and Bellekens, X. 2018. A taxonomy of malicious traffic for intrusion detection systems. International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). Glasgow, UK 11 - 12 Jun 2018 IEEE. https://doi.org/10.1109/CyberSA.2018.8551386Conference paper
Consumer perceptions towards unsolicited advertisements on social media
Romano, R. and Han, J. 2022. Consumer perceptions towards unsolicited advertisements on social media. Data. 7 (10). https://doi.org/10.3390/data7100138Article
Education in the UAE: the relevance of international human rights law and social welfare for a sustainable economy
Keane, D. and Kyriazi, T. 2018. Education in the UAE: the relevance of international human rights law and social welfare for a sustainable economy. 4th International Conference on Emerging Research Paradigms in Business and Social Sciences. Dubai, UAE 16 - 18 Jan 2018Conference item
Education in the UAE and the relevance of international human rights law
Keane, D. and Kyriazi, T. 2015. Education in the UAE and the relevance of international human rights law. 3rd International Conference on Emerging Research Paradigms in Business and Social Sciences. Dubai, UAE 24 - 26 Nov 2015Conference item
Using technology to introduce frequent assessments for effective learning: Registering student perceptions
Kyriazi, T. 2015. Using technology to introduce frequent assessments for effective learning: Registering student perceptions. 7th World Conference on Educational Sciences. Athens, Greece 05 - 07 Feb 2015Conference item
Differential roles of push and pull factors on escape for travel: Personal and social identity perspectives
Michael, N., Nyadzayo, M., Michael, I. and Balasubramanian, S. 2020. Differential roles of push and pull factors on escape for travel: Personal and social identity perspectives. International Journal of Tourism Research. 22 (4), pp. 464-478. https://doi.org/10.1002/jtr.2349Article
Challenges of security and trust in avionics wireless networks
Akram, R., Markantonakis, K., Kariyawasam, S., Ayub, S., Seeam, A. and Atkinson, R. 2015. Challenges of security and trust in avionics wireless networks. 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). Prague, Czech Republic 13 - 17 Sep 2015 IEEE. pp. 4B1-1 https://doi.org/10.1109/DASC.2015.7311416Conference paper
An integrated monitoring system for modular buildings
Seeam, A., Zheng, T., Laurenson, D., Lu, Y. and Usmani, A. 2011. An integrated monitoring system for modular buildings. 5th International Conference on Structural Health Monitoring of Intelligent Infrastructure (SHMII-5). Cancun, Mexico 11 - 15 Dec 2011Conference paper
When eHealth meets the internet of things: pervasive security and privacy challenges
Omoogun, M., Seeam, P., Ramsurrun, V., Bellekens, X. and Seeam, A. 2017. When eHealth meets the internet of things: pervasive security and privacy challenges. 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security). London, UK 19 - 20 Jun 2017 IEEE. pp. 1-7 https://doi.org/10.1109/CyberSecPODS.2017.8074857Conference paper
Pervasive eHealth services a security and privacy risk awareness survey
Bellekens, X., Hamilton, A., Seeam, P., Nieradzinska, K., Franssen, Q. and Seeam, A. 2016. Pervasive eHealth services a security and privacy risk awareness survey. 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA). London, UK 13 - 14 Jun 2016 IEEE. pp. 1-4 https://doi.org/10.1109/CyberSA.2016.7503293Conference paper
A taxonomy of network threats and the effect of current datasets on intrusion detection systems
Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R. and Bellekens, X. 2020. A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access. 8, pp. 104650-104675. https://doi.org/10.1109/ACCESS.2020.3000179Article
Supply chain transparency, ethical sourcing, and synthetic diamond alternatives: exploring the perspectives of diamond retailers
Schulte, M. and Paris, C. 2022. Supply chain transparency, ethical sourcing, and synthetic diamond alternatives: exploring the perspectives of diamond retailers. International Journal of Intelligent Enterprise. 9 (4), pp. 438-457. https://doi.org/10.1504/IJIE.2022.126399Article
Trafficking in human beings in the Middle East
Kyriazi, T. 2017. Trafficking in human beings in the Middle East. in: Piotrowicz, R., Rijken, C. and Uhl, B. (ed.) The Routledge Handbook of Human Trafficking Routledge.Book chapter
Challenges to the right of fair trial by the application of Sharia law within the Council of Europe
Kyriazi, T. 2020. Challenges to the right of fair trial by the application of Sharia law within the Council of Europe. in: Spano, R., Motoc, I., Lubarda, B., de Albuquerque, P. and Lazana, A. (ed.) Fair Trial: Regional and International Perspectives / Procès équitable : perspectives régionales et internationales - Liber Amicorum Linos-Alexandre Sicilianos Anthemis. pp. 309-334Book chapter
Trafficking in human beings in the tourism industry: trends and approaches
Kyriazi, T. 2020. Trafficking in human beings in the tourism industry: trends and approaches. in: Vizcaino, P., Jeffrey, H. and Eger, C. (ed.) Tourism and Gender-Based Violence: Challenging Inequalities Wallingford, Oxfordshire, UK CAB International. pp. 95-110Book chapter
29796
total views13922
total downloads131
views this month117
downloads this month