Find Research Outputs

Search concepts
Selected filters
2020

A Multi-layer Security Model for 5G-Enabled Industrial Internet of Things

Al-Aqrabi, H., Pulikkakudi Johnson, A., Hill, G., Lane, P. & Liu, L., 6 Jan 2020, Smart City and Informatization: 7th International Conference, iSCI 2019, Guangzhou, China, November 12–15, 2019, Proceedings. Wang, G., El Saddik, A., Lai, X., Martinez Perez, G. & Choo, K-K. R. (eds.). 1 ed. Springer Singapore, p. 279-292 14 p. (Communications in Computer and Information Science; vol. 1122 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of Things
Security Model
Multilayer
Hardware
Secure Communication

Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems

Johnson, A., Al-Aqrabi, H. & Hill, R., 5 Feb 2020, In : Sensors. 20, 3, p. 1-19 19 p., 844.

Research output: Contribution to journalArticle

Open Access
Internet
safety
Safety
Equipment and Supplies
hardware

Condition Monitoring of Motorised Devices for Smart Infrastructure Capabilities

Mistry, P., Lane, P., Allen, P., Al-Aqrabi, H. & Hill, G., 6 Jan 2020, Smart City and Informatization: 7th International Conference, iSCI 2019, Guangzhou, China, November 12–15, 2019, Proceedings. Wang, G., El Saddik, A., Lai, X., Martinez Perez, G. & Choo, K-K. R. (eds.). 1st ed. Springer Singapore, p. 392-403 12 p. (Communications in Computer and Information Science; vol. CCIS 1122).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Condition monitoring
Fault detection
Fast Fourier transforms
Rails
Signal processing

Implementing a Lightweight Cloud-Based Process Monitoring Solution for Smart Agriculture

Clarke, D., Al-Aqrabi, H., Hill, G., Mistry, P. & Lane, P., 6 Jan 2020, Smart City and Informatization: 7th International Conference, iSCI 2019, Guangzhou, China, November 12–15, 2019, Proceedings. Wang, G., El Saddik, A., Lai, X., Martinez Perez, G. & Choo, K-K. R. (eds.). 1st ed. Springer Singapore, p. 379-391 13 p. (Communications in Computer and Information Science; vol. 1122 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Process monitoring
Agriculture
Sensors
Microcontrollers
Industrial economics

Securing Manufacturing Intelligence for the Industrial Internet of Things

Hill, G., Al-Aqrabi, H., Lane, P. & Aagela, H., 3 Jan 2020, Fourth International Congress on Information and Communication Technology: ICICT 2019, London, Volume 2. Yang, X-S., Sherratt, S., Dey, N. & Joshi, A. (eds.). 1 ed. Springer Singapore, Vol. 2. p. 267-282 16 p. (Advances in Intelligent Systems and Computing; vol. 1027).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Competitive intelligence
Intellectual property
Internet of things
Hardware
Processing
2019

A Mutual Information Based Approach to Optimising View Orientation for Direct Volume Rendering

Cartwright, R., Chen, M. & Hill, R., 1 Dec 2019, In : IEEE Letters of the Computer Society. 2, 4, p. 40-43 4 p.

Research output: Contribution to journalArticle

Open Access
File
Volume rendering
Visualization
Costs

An efficient concurrent system networking protocol specification and verification using linear temporal logic

Abdelrahman, R. B., Al-Aqrabi, H. & Hill, R., 6 Dec 2019, Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and Cyberlife, Beijing, China, December 16-19, 2019, Proceedings, Part 11. Ning, H. (ed.). 1st ed. Springer Singapore, p. 149-168 20 p. (Communications in Computer and Information Science; vol. 1138).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear Temporal Logic
Temporal logic
Concurrent Systems
Networking
Specification
Open Access
File
Computer forensics
research process
science
Standardization
research method

Countermeasures for timing-based side-channel attacks against shared, modern computing hardware

Montasari, R., Hill, R., Hosseinian-far, A. & Montaseri, F., 1 Jul 2019, In : International Journal of Electronic Security and Digital Forensics. 11, 3, p. 294-320 27 p.

Research output: Contribution to journalArticle

hardware
Hardware
compromise
vulnerability
threat

Digital Forensic Investigation of Internet of Things (IoT) Devices

Montasari, R., Jahankhani, H., Hill, R. & Parkinson, S., 2019, (Accepted/In press) Springer Nature Switzerland AG.

Research output: Book/ReportBook

Digital Forensic Investigation of Social Media, Acquisition and Analysis of Digital Evidence

Montasari, R., Hill, R., Carpenter, V. & Montaseri, F., 2019, In : International Journal of Strategic Engineering (IJoSE) . 2, 1, p. 52-60 9 p.

Research output: Contribution to journalArticle

social media
networking
examiner
evidence
data acquisition

Digital Forensics: Challenges and Opportunities for Future Studies

Montasari, R., Hill, R., Parkinson, S., Peltola, P., Hosseinian-Far, A. & Daneshkhah, A., 26 Sep 2019, (Accepted/In press) In : International Journal of Organizational and Collective Intelligence. 10, 2

Research output: Contribution to journalArticle

Digital devices
Law enforcement
Unmanned aerial vehicles (UAV)
Global positioning system
Digital forensics
5 Citations (Scopus)

Dynamic Multiparty Authentication of Data Analytics Services within Cloud Environments

Al-Aqrabi, H. & Hill, R., 24 Jan 2019, Proceedings - 20th International Conference on High Performance Computing and Communications, 16th International Conference on Smart City and 4th International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018. IEEE Computer Society, p. 742-749 8 p. HPCC-290

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Authentication
Industry
Cloud computing
Profitability
Decision making

Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things

Al-Aqrabi, H., Johnson, A. & Hill, R., 29 May 2019, (Accepted/In press) IEEE Smartworld Congress 2019. IEEE Computer Society, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Hardware
Network protocols
Cloud computing
Access control

Edge Intelligence and the Industrial Internet of Things

Hill, R. & Al-Aqrabi, H., 28 Dec 2019, (Accepted/In press) Edge Computing for Massive Parallel Processing of IoT Data Streams. IOS Press

Research output: Chapter in Book/Report/Conference proceedingChapter

Visualization
Industry
Internet of things

Enabling Distributed Intelligence in the Internet of Things Using the IOTA Tangle Architecture

Alsboui, T., Qin, Y. & Hill, G., 4 May 2019, Proceedings of the 4th International Conference on Internet of Things, Big Data and Security: IoTBDS 2019. Ramachandran, M., Walters, R., Wills, G., Méndez Muñoz, V. & Chang, V. (eds.). SciTePress, Vol. 1. p. 392-398 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Mobile agents
Electronic data interchange
Scalability
Internet
Internet of things

Evaluation of the Standardised Digital Forensic Investigation Process Model (ESDFIPM)

Montasari, R., Hill, R., Carpenter, V. & Hosseinian-Far, A., 2019, (Accepted/In press) Cyber Security Practitioner's Guide. Jahankhani, H. (ed.). World Scientific

Research output: Chapter in Book/Report/Conference proceedingChapter

Law enforcement
Demonstrations
Digital forensics
Standardization

Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques

Montasari, R., Hill, R., Parkinson, S., Daneshkhah, A. & Hosseinian-Far, A., 31 Oct 2019, (Accepted/In press) In : International Journal of Electronic Security and Digital Forensics.

Research output: Contribution to journalArticle

hardware
threat
Hardware
vulnerability
virtualization

Internationalising the Postgraduate Curriculum: A Ten year Case Study

Shadija, D. & Hill, R., 7 Oct 2019, Transnational Higher Education in Computing Courses: Experiences and Reflections . Carter, J. & Rosen, C. (eds.). 1 ed. Springer International Publishing AG, p. 155-171 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

curriculum
student
participation
Teaching
learning

Internet of Things Devices: Digital Forensic Process and Data Reduction

Montasari, R., Hill, R., Montaseri, F., Jahankhani, H. & Hosseinian-Far, A., 14 Nov 2019, (Accepted/In press) In : International Journal of Electronic Security and Digital Forensics.

Research output: Contribution to journalArticle

Data reduction
Internet
Seizing
Digital devices
Law enforcement

Multi-Platform Architecture for Cooperative Pedestrian Navigation Applications

Peltola, P., Montasari, R., Seco, F., Jimenez, A. R. & Hill, R., 28 Nov 2019, 2019 International Conference on Indoor Positioning and Indoor Navigation (IPIN). IEEE, 8 p. 8911786

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Navigation
Location based services
Communication
Sensors
Software architecture
2 Citations (Scopus)

Next-Generation Digital Forensics: Challenges and Future Paradigms

Montasari, R. & Hill, R., 11 Apr 2019, Proceedings of 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability, ICGS3. London: IEEE, p. 205-212 8 p. 8688020

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Law enforcement
Mobile devices
Digital forensics
Communication

Performance Evaluation of Multiparty Authentication in 5G IIoT Environments

Hill, G., Al-Aqrabi, H. & Lane, P., 6 Dec 2019, Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife, Beijing, China, December 16–18, 2019, Proceedings, Part I. Ning, H. (ed.). 1st ed. Springer Singapore, p. 169-184 15 p. (Communications in Computer and Information Science; vol. 1138).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Communication systems
Throughput
Internet of things
Industry

Research Directions on Big IoT Data Processing Using Distributed Ledger Technology: A Position Paper

Agbo, B., Qin, Y. & Hill, G., 4 May 2019, Proceedings of the 4th International Conference on Internet of Things, Big Data and Security: IoTBDS 2019. Ramachandran, M., Walters, R., Wills, G., Méndez Muñoz, V. & Chang, V. (eds.). SciTePress, Vol. 1. p. 385-391 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Internet of things

Sentiment Classification of Drug Reviews Using Fuzzy-rough Feature Selection

Chen, T., Su, P., Shang, C., Hill, R., Zhang, H. & Shen, Q., 10 Oct 2019, 2019 IEEE International Conferences on Fuzzy Systems (FUZZ-IEEE). IEEE, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Feature extraction
Public health
1 Citation (Scopus)

The Standardised Digital Forensic Investigation Process Model (SDFIPM)

Montasari, R., Hill, R., Carpenter, V. & Hosseinian-Far, A., 18 Apr 2019, Blockchain and Clinical Trial: Securing Patient Data. Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G. & Al-Khateeb, H. (eds.). 1st ed. Cham: Springer, Cham, p. 169-209 41 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

law enforcement
commerce
incident
lack
experience

Towards Building a Scalable Tangle-Based Distributed Intelligence Approach for the Internet of Things

Alsboui, T., Qin, Y. & Hill, R., 31 Oct 2019, (Accepted/In press) Intelligent Computing: Proceedings of the 2020 Computing Conference. Springer Verlag, 16 p. (Advances in Intelligent Systems and Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalability
Internet of things
Energy utilization
Processing
Experiments
2018

Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?

Montasari, R., Hosseinian-far, A., Hill, R., Montaseri, F., Sharma, M. & Shabbir, S., 24 Apr 2018, In : International Journal of Organizational and Collective Intelligence. 8, 2, p. 32-59 28 p., 3.

Research output: Contribution to journalArticle

Open Access
File
Hardware
Side channel attack

A Scalable Model for Secure Multiparty Authentication

Hill, R. & Al-Aqrabi, H., 4 Dec 2018, Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018. Wang, G., Han, Q., Bhulyan, M. Z. A., Ma, X., Loulergue, F., Li, P., Roveri, M. & Chen, L. (eds.). IEEE Computer Society, p. 17-22 6 p. 8560017

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Authentication
Cloud computing
Access control
Computer hardware
Sensor networks

A Secure Connectivity Model for Internet of Things Analytics Service Delivery

Al-Aqrabi, H. & Hill, G., 4 Dec 2018, 2018 IEEE Smart World, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). Loulergue, F., Wang, G., Bhuiyan, M. Z. A., Ma, X., Li, P., Roveri, M., Han, Q. & Chen, L. (eds.). IEEE Computer Society, p. 9-16 8 p. 8560016

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Authentication
Cloud computing
Internet of things
Profitability
18 Citations (Scopus)

Cloud-based scalable object detection and classification in video streams

Yaseen, M. U., Anjum, A., Rana, O. & Hill, R., Mar 2018, In : Future Generation Computer Systems. 80, p. 286-298 13 p.

Research output: Contribution to journalArticle

Open Access
Scalability
Supervised learning
Video cameras
Data transfer
Metadata

Connecting to Smart Cities: Analyzing Energy Times Series to Visualize Monthly Electricity Peak Load in Residential Buildings

Iram, S., Fernando, T. & Hill, R., 18 Oct 2018, Proceedings of the Future Technologies Conference (FTC) 2018. Arai, K., Bhatia, R. & Kapoor, S. (eds.). Springer Verlag, p. 333-342 10 p. ( Advances in Intelligent Systems and Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Time series
Energy utilization
Electricity
Intelligent buildings
Energy efficiency
3 Citations (Scopus)

Enabling community health care with microservices

Hill, R., Shadija, D. & Rezai, M., 28 May 2018, Proceedings - 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and Communications, ISPA/IUCC 2017. Wang, G., Fox, G., Martinez, G., Hill, R. & Mueller, P. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1444-1450 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health care
Healthcare
Internet of Things
Resilience
Interaction
artificial intelligence
vulnerability
analysis
networking
art
1 Citation (Scopus)

Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments

Montasari, R., Hosseinian-Far, A. & Hill, R., 6 Dec 2018, Cyber Criminology. Jahankhani, H. (ed.). 1st ed. Switzerland: Springer International Publishing AG, p. 71-93 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

Industry
Human engineering

Welcome Message from the IUCC 2017 Program Chairs

Hill, R., Mueller, P. & Wang, G., 28 May 2018, 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and Communications, ISPA/IUCC 2017. Bilof, R. (ed.). Institute of Electrical and Electronics Engineers Inc., p. xxxi 1 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

messages
seats
congressional reports
2017

Cellular Automata and Agents in Simulations

Smith, K., Hill, R., Berry, S. & Conniss, R., 13 Apr 2017, Guide to Computational Modelling for Decision Processes: Theory, Algorithms, Techniques and Applications. Berry, S., Lowndes, V. & Trovati, M. (eds.). 1st ed. Cham: Springer, Cham, p. 307-331 25 p. (Simulation Foundations, Methods and Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

Wi-Fi
Cellular automata
Wireless ad hoc networks
Mobile phones
Telephone
5 Citations (Scopus)

Grid workflow validation using ontology-based tacit knowledge: A case study for quantitative remote sensing applications

Liu, J., Liu, L., Xue, Y., Dong, J., Hu, Y., Hill, R., Guang, J. & Li, C., Jan 2017, In : Computers and Geosciences. 98, p. 46-54 9 p.

Research output: Contribution to journalArticle

Ontology
Remote sensing
remote sensing
metadata
Grid computing
5 Citations (Scopus)

Microservices: Granularity vs. Performance

Shadija, D., Rezai, M. & Hill, R., 5 Dec 2017, UCC 2017 Companion - Companion Proceedings of the 10th International Conference on Utility and Cloud Computing. Association for Computing Machinery, Inc, p. 215-220 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Containers
Application programs
Software engineering
Industry
12 Citations (Scopus)

Towards an Understanding of Microservices

Shadija, D., Rezai, M. & Hill, G., 26 Oct 2017, 2017 23rd International Conference on Automation & Computing (ICAC). Institute of Electrical and Electronics Engineers Inc., 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Service oriented architecture (SOA)
Industry
Internet of things
5 Citations (Scopus)

Towards In-Transit Analytics for Industry 4.0

Hill, R., Devitt, J., Anjum, A. & Ali, M., Jun 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, p. 810-817 8 p. (2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)).

Research output: Chapter in Book/Report/Conference proceedingChapter

Innovation
Industry
Visualization
Internet of things
2016
3 Citations (Scopus)

A Kuramoto Model Based Approach to Extract and Assess Influence Relations

Trovati, M., Castiglione, A., Bessis, N. & Hill, R., 19 Jan 2016, Computational Intelligence and Intelligent Systems: 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers. Li, K., Li, J., Liu, Y. & Castiglione, A. (eds.). Springer Verlag, p. 464-473 10 p. (Communications in Computer and Information Science; vol. 575).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kuramoto Model
Model-based
Evaluation
Concepts
Influence

A platform for analytics on social networks derived from organisational calendar data

Davies-Tagg, D., Anjum, A. & Hill, R., 13 Jan 2016, Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications. Trovati, M., Hill, R., Anjum, A., Zhu, S. Y. & Liu, L. (eds.). Springer, Cham, p. 147-165 19 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Communication
Processing
Costs
1 Citation (Scopus)

Big-data analytics and cloud computing: Theory, algorithms and applications

Trovati, M., Hill, R., Anjum, A., Zhu, S. Y. & Liu, L., 1 Jan 2016, Springer International Publishing AG.

Research output: Book/ReportBook

Cloud computing
Big data
Industry
3 Citations (Scopus)

High performance video processing in cloud data centres

Yaseen, M. U., Zafar, M. S., Anjum, A. & Hill, R., 18 May 2016, Proceedings - 2016 IEEE Symposium on Service-Oriented System Engineering, SOSE 2016. Institute of Electrical and Electronics Engineers Inc., p. 180-189 10 p. 7473021

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data transfer
Processing
Object recognition
Mobile phones
Scalability

Message from EC 2016 Workshop Chairs

Zhu, S. Y., Allison, C. & Hill, R., 19 May 2016, IEEE SOSE 2016: 10th International IEEE Symposium on Service-Oriented System Engineering. Guerrero, J. E. (ed.). IEEE, p. xiii 1 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

1 Citation (Scopus)

Preface

Trovati, M., Hill, R., Anjum, A., Zhu, S. Y. & Liu, L., 1 Jan 2016, Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications. Trovati, M., Hill, R., Anjum, A., Zhu, S. Y. & Liu, L. (eds.). Cham: Springer International Publishing, p. vii-ix 3 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

2015
1 Citation (Scopus)

A Non-genuine Message Detection Method Based on Unstructured Datasets

Trovati, M., Hill, R. & Bessis, N., 2015, Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015. Institute of Electrical and Electronics Engineers Inc., p. 597-600 4 p. (Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015).

Research output: Chapter in Book/Report/Conference proceedingChapter

Semantics
24 Citations (Scopus)

Approaching the Internet of things (IoT): A modelling, analysis and abstraction framework

Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L. & Sotiriadis, S., 10 Jun 2015, In : Concurrency Computation. 27, 8, p. 1966-1984 19 p.

Research output: Contribution to journalArticle

Internet of Things
Modeling
Communication Protocol
Chemical Reaction
Computational Model

Chapter 1 - An Introduction to Big Data

Panneerselvam, J., Liu, L. & Hill, R., 2015, Application of Big Data for National Security. Elsevier Inc., p. 3-13 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Data management
Piles
Nature
Assets
Governance