• 452 Citations
  • 11 h-Index
20032020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Chapter
2020

Edge Intelligence and the Industrial Internet of Things

Hill, R. & Al-Aqrabi, H., 2020, Advances in Edge Computing: Massive Parallel Processing and Applications. Xhafa, F. & Sangaiah, A. K. (eds.). IOS Press, Vol. 35. p. 178-196 19 p. (Advances in Parallel Computing; vol. 35).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
File

Evaluation of the Standardised Digital Forensic Investigation Process Model (ESDFIPM)

Montasari, R., Hill, R., Carpenter, V. & Hosseinian-Far, A., 17 Mar 2020, Cyber Security Practitioner's Guide. Jahankhani, H. (ed.). World Scientific, p. 303-363 61 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2019

Internationalising the Postgraduate Curriculum: A Ten year Case Study

Shadija, D. & Hill, R., 7 Oct 2019, Transnational Higher Education in Computing Courses: Experiences and Reflections . Carter, J. & Rosen, C. (eds.). 1 ed. Springer International Publishing AG, p. 155-171 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

The Standardised Digital Forensic Investigation Process Model (SDFIPM)

Montasari, R., Hill, R., Carpenter, V. & Hosseinian-Far, A., 18 Apr 2019, Blockchain and Clinical Trial: Securing Patient Data. Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G. & Al-Khateeb, H. (eds.). 1st ed. Cham: Springer, Cham, p. 169-209 41 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)
2018

Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments

Montasari, R., Hosseinian-Far, A. & Hill, R., 6 Dec 2018, Cyber Criminology. Jahankhani, H. (ed.). 1st ed. Switzerland: Springer International Publishing AG, p. 71-93 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)
2017

Cellular Automata and Agents in Simulations

Smith, K., Hill, R., Berry, S. & Conniss, R., 13 Apr 2017, Guide to Computational Modelling for Decision Processes: Theory, Algorithms, Techniques and Applications. Berry, S., Lowndes, V. & Trovati, M. (eds.). 1st ed. Cham: Springer, Cham, p. 307-331 25 p. (Simulation Foundations, Methods and Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

Towards In-Transit Analytics for Industry 4.0

Hill, R., Devitt, J., Anjum, A. & Ali, M., Jun 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, p. 810-817 8 p. (2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)).

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)
2016

A platform for analytics on social networks derived from organisational calendar data

Davies-Tagg, D., Anjum, A. & Hill, R., 13 Jan 2016, Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications. Trovati, M., Hill, R., Anjum, A., Zhu, S. Y. & Liu, L. (eds.). Springer, Cham, p. 147-165 19 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2015

A Non-genuine Message Detection Method Based on Unstructured Datasets

Trovati, M., Hill, R. & Bessis, N., 2015, Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015. Institute of Electrical and Electronics Engineers Inc., p. 597-600 4 p. (Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Chapter 1 - An Introduction to Big Data

Panneerselvam, J., Liu, L. & Hill, R., 2015, Application of Big Data for National Security. Elsevier Inc., p. 3-13 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Requirements and Challenges for Big Data Architectures

Akhgar, B. (ed.), Saathoff, G. B. (ed.), Arabnia, H. R. (ed.), Hill, R., Staniforth, A. (ed.), Bayerl, P. S. (ed.), Panneerselvam, J., Liu, L. & Hill, R., 2015, Application of Big Data for National Security. Akhgar, B., Saathoff, G. B., Arabnia, H. R., Hill, R., Staniforth, A. & Bayerl, P. S. (eds.). First ed. Butterworth-Heinemann, p. 131-139 9 p. (Application of Big Data for National Security).

Research output: Chapter in Book/Report/Conference proceedingChapter

2014

A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service

Al-Aqrabi, H. A., Liu, L., Hill, R. & Antonopoulos, N., Aug 2014, 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS). Institute of Electrical and Electronics Engineers Inc., p. 498-505 8 p. (Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014).

Research output: Chapter in Book/Report/Conference proceedingChapter

10 Citations (Scopus)
2013

Business intelligence security on the clouds: Challenges, solutions and future directions

Al-Aqrabi, H., Liu, L., Hill, R., Ding, Z. & Antonopoulos, N., 2013, Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013. p. 137-144 8 p. (Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013).

Research output: Chapter in Book/Report/Conference proceedingChapter

13 Citations (Scopus)

Energy conservation in mobile devices and applications: A case for context parsing, processing and distribution in clouds

Kiani, S. L., Anjum, A., Bessis, N., Hill, R. & Knappmeyer, M., 2013, Mobile Information Systems. Hindawi Limited, p. 1-17 17 p. (Mobile Information Systems; vol. 9).

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)
2012

The use of crowdsourcing to aid quest design in games

Carter, S., Bali, S., Sotiriadis, S., Bessis, N. & Hill, R., 2012, Proceedings - 3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012. p. 302-305 4 p. (Proceedings - 3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)
2011

Base62x: An alternative approach to Base64 for non-alphanumeric characters

Liu, Z., Liu, L., Hill, R. & Zhan, Y., 2011, Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011. p. 2667-2670 4 p. (Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011; vol. 4).

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)

Dot-base62x: A compact textual representation of IPv6 address for clouds

Liu, Z., Liu, L., Hardy, J., Anjum, A., Hill, R. & Antonopoulos, N., 2011, Proceedings - 2011 4th IEEE International Conference on Utility and Cloud Computing, UCC 2011. p. 427-432 6 p. (Proceedings - 2011 4th IEEE International Conference on Utility and Cloud Computing, UCC 2011).

Research output: Chapter in Book/Report/Conference proceedingChapter

Enterprise Architecture Fundamentals

Hill, R. & Moshiri, S., 2011, Cloud Computing for Enterprise Architectures. Mahmood, Z. & Hill, R. (eds.). Springer-Verlag London Limited, p. 21-41 21 p. (Cloud Computing for Enterprise Architectures).

Research output: Chapter in Book/Report/Conference proceedingChapter

2007

Capturing and Specifying Multiagent Systems for the Management of Community Healthcare

Hill, R., 2007, Advanced Computational Intelligence Paradigms in Healthcare - 1. Yoshida, H., Jain, A., Ichalkaranje, A., Jain, L. C. & Ichalkaranje, N. (eds.). Springer Heidelberg, p. 127-163 37 p. (Studies in Computational Intelligence; vol. 48).

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)