Accepting PhD Students

PhD projects

Industry 4.0; industrial automation; computer vision; automated quality inspection; multiagent systems; agent based modelling; in-transit data analytics; machine learning; generative AI; distributed ledger technologies (Blockchain/IOTA); manufacturing systems; optimisation; formal methods; model checking; e-healthcare; change management; digital transformation.

Click on the Fingerprint icon below to learn more about the research topics, expertise and interests of this academic.

Calculated based on number of publications stored in Pure and citations from Scopus
20032025

Research activity per year

Filter
Chapter

Search results

  • 2022

    A Case Study of Diabetes Diagnosis Using a Neuro-Fuzzy System

    Russell, R., Chen, T. & Hill, R., 26 Oct 2022, Artificial Intelligence in Healthcare: Recent Applications and Developments. Chen, T., Carter, J., Mahmud, M. & Singh Khuman, A. (eds.). Springer Singapore, p. 277-298 22 p. (Brain Informatics and Health).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Effective Diagnosis of Parkinson’s Disease using Machine Learning Techniques

    Dash, B., Chen, T. & Hill, R., 26 Oct 2022, Artificial Intelligence in Healthcare: Recent Applications and Developments. Chen, T., Carter, J., Mahmud, M. & Singh Khuman, A. (eds.). 1st ed. Springer Singapore, p. 107-124 18 p. (Brain Informatics and Health).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2020

    Edge Intelligence and the Industrial Internet of Things

    Hill, R. & Al-Aqrabi, H., 2020, Advances in Edge Computing: Massive Parallel Processing and Applications. Xhafa, F. & Sangaiah, A. K. (eds.). IOS Press, Vol. 35. p. 178-196 19 p. (Advances in Parallel Computing; vol. 35).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    File
    1 Citation (Scopus)
  • Establishing Trustworthy Relationships in Multiparty Industrial Internet of Things Applications

    Bello, O., Al-Aqrabi, H. & Hill, R., 10 Dec 2020, Digital Forensic Investigation of Internet of Things (IoT) Devices. Montasari, R., Jahankhani, H., Hill, R. & Parkinson, S. (eds.). 1st ed. Cham: Springer Nature Switzerland AG, p. 205-221 17 p. (Advanced Sciences and Technologies for Security Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Evaluating Multi-layer Security Resistance to Adversarial Hacking Attacks on Industrial Internet of Things Devices

    Al-Aqrabi, H. & Hill, R., 10 Dec 2020, Digital Forensic Investigation of Internet of Things (IoT) Devices. Montasari, R., Jahankhani, H., Hill, R. & Parkinson, S. (eds.). 1st ed. Cham: Springer Nature Switzerland AG, p. 187-203 17 p. (Advanced Sciences and Technologies for Security Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Evaluation of the Standardised Digital Forensic Investigation Process Model (ESDFIPM)

    Montasari, R., Hill, R., Carpenter, V. & Hosseinian-Far, A., 17 Mar 2020, Cyber Security Practitioner's Guide. Jahankhani, H. (ed.). World Scientific, p. 303-363 61 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • 2019

    Internationalising the Postgraduate Curriculum: A Ten year Case Study

    Shadija, D. & Hill, R., 7 Oct 2019, Transnational Higher Education in Computing Courses: Experiences and Reflections . Carter, J. & Rosen, C. (eds.). 1 ed. Springer International Publishing AG, p. 155-171 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    File
  • The Standardised Digital Forensic Investigation Process Model (SDFIPM)

    Montasari, R., Hill, R., Carpenter, V. & Hosseinian-Far, A., 18 Apr 2019, Blockchain and Clinical Trial: Securing Patient Data. Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G. & Al-Khateeb, H. (eds.). 1st ed. Cham: Springer, Cham, p. 169-209 41 p. (Advanced Sciences and Technologies for Security Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    15 Citations (Scopus)
  • 2018

    Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments

    Montasari, R., Hosseinian-Far, A. & Hill, R., 6 Dec 2018, Cyber Criminology. Jahankhani, H. (ed.). 1st ed. Switzerland: Springer International Publishing AG, p. 71-93 23 p. (Advanced Sciences and Technologies for Security Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    6 Citations (Scopus)
  • 2017

    Cellular Automata and Agents in Simulations

    Smith, K., Hill, R., Berry, S. & Conniss, R., 13 Apr 2017, Guide to Computational Modelling for Decision Processes: Theory, Algorithms, Techniques and Applications. Berry, S., Lowndes, V. & Trovati, M. (eds.). 1st ed. Cham: Springer, Cham, p. 307-331 25 p. (Simulation Foundations, Methods and Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Towards In-Transit Analytics for Industry 4.0

    Hill, R., Devitt, J., Anjum, A. & Ali, M., Jun 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, p. 810-817 8 p. (2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    20 Citations (Scopus)
  • 2016

    A platform for analytics on social networks derived from organisational calendar data

    Davies-Tagg, D., Anjum, A. & Hill, R., 13 Jan 2016, Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications. Trovati, M., Hill, R., Anjum, A., Zhu, S. Y. & Liu, L. (eds.). Springer, Cham, p. 147-165 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2015

    An Introduction to Big Data

    Panneerselvam, J., Liu, L. & Hill, R., 14 Feb 2015, Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies. Akhgar, B., Saathoff, G. B., Arabnia, H. R., Hill, R., Staniforth, A. & Beyerl, P. S. (eds.). 1st ed. Butterworth-Heinemann, p. 3-13 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    7 Citations (Scopus)
  • A Non-genuine Message Detection Method Based on Unstructured Datasets

    Trovati, M., Hill, R. & Bessis, N., 2015, Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015. Institute of Electrical and Electronics Engineers Inc., p. 597-600 4 p. (Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • Chapter 1 - An Introduction to Big Data

    Panneerselvam, J., Liu, L. & Hill, R., 2015, Application of Big Data for National Security. Elsevier Inc., p. 3-13 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Requirements and Challenges for Big Data Architectures

    Panneerselvam, J., Liu, L. & Hill, R., 14 Feb 2015, Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies. Akhgar, B., Saathoff, G. B., Arabnia, H. R., Hill, R., Staniforth, A. & Bayerl, P. S. (eds.). First ed. Butterworth-Heinemann, p. 131-139 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • 2014

    A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service

    Al-Aqrabi, H. A., Liu, L., Hill, R. & Antonopoulos, N., Aug 2014, 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS). Institute of Electrical and Electronics Engineers Inc., p. 498-505 8 p. (Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    14 Citations (Scopus)
  • 2013

    Business intelligence security on the clouds: Challenges, solutions and future directions

    Al-Aqrabi, H., Liu, L., Hill, R., Ding, Z. & Antonopoulos, N., 2013, Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013. p. 137-144 8 p. (Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    14 Citations (Scopus)
  • Energy conservation in mobile devices and applications: A case for context parsing, processing and distribution in clouds

    Kiani, S. L., Anjum, A., Bessis, N., Hill, R. & Knappmeyer, M., 2013, Mobile Information Systems. Hindawi Limited, p. 1-17 17 p. (Mobile Information Systems; vol. 9).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    6 Citations (Scopus)
  • 2012

    The use of crowdsourcing to aid quest design in games

    Carter, S., Bali, S., Sotiriadis, S., Bessis, N. & Hill, R., 2012, Proceedings - 3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012. p. 302-305 4 p. (Proceedings - 3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    3 Citations (Scopus)
  • 2011

    Base62x: An alternative approach to Base64 for non-alphanumeric characters

    Liu, Z., Liu, L., Hill, R. & Zhan, Y., 2011, Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011. p. 2667-2670 4 p. (Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    10 Citations (Scopus)
  • Dot-base62x: A compact textual representation of IPv6 address for clouds

    Liu, Z., Liu, L., Hardy, J., Anjum, A., Hill, R. & Antonopoulos, N., 2011, Proceedings - 2011 4th IEEE International Conference on Utility and Cloud Computing, UCC 2011. p. 427-432 6 p. (Proceedings - 2011 4th IEEE International Conference on Utility and Cloud Computing, UCC 2011).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Enterprise Architecture Fundamentals

    Hill, R. & Moshiri, S., 2011, Cloud Computing for Enterprise Architectures. Mahmood, Z. & Hill, R. (eds.). Springer-Verlag London Limited, p. 21-41 21 p. (Cloud Computing for Enterprise Architectures).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2007

    Capturing and Specifying Multiagent Systems for the Management of Community Healthcare

    Hill, R., 2007, Advanced Computational Intelligence Paradigms in Healthcare - 1. Yoshida, H., Jain, A., Ichalkaranje, A., Jain, L. C. & Ichalkaranje, N. (eds.). Springer Heidelberg, p. 127-163 37 p. (Studies in Computational Intelligence; vol. 48).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)