Find Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Richard Hill
Article

A Mutual Information Based Approach to Optimising View Orientation for Direct Volume Rendering

Cartwright, R., Chen, M. & Hill, R., 1 Dec 2019, In : IEEE Letters of the Computer Society. 2, 4, p. 40-43 4 p.

Research output: Contribution to journalArticle

Open Access
File

Analysis of Critical Thinking Skills in an International, Cross-Institutional Group of Engineering Master's Students

Bramhall, M. D., Gray, L., Corker, C., Garnett, K. & Hill, R., 1 Aug 2012, In : Industry and Higher Education. 26, 4, p. 323-327 5 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Approaching the Internet of things (IoT): A modelling, analysis and abstraction framework

Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L. & Sotiriadis, S., 10 Jun 2015, In : Concurrency Computation. 27, 8, p. 1966-1984 19 p.

Research output: Contribution to journalArticle

24 Citations (Scopus)

Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?

Montasari, R., Hosseinian-far, A., Hill, R., Montaseri, F., Sharma, M. & Shabbir, S., 24 Apr 2018, In : International Journal of Organizational and Collective Intelligence. 8, 2, p. 32-59 28 p., 3.

Research output: Contribution to journalArticle

Open Access
File
Open Access
File

Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems

Johnson, A., Al-Aqrabi, H. & Hill, R., 5 Feb 2020, In : Sensors. 20, 3, p. 1-19 19 p., 844.

Research output: Contribution to journalArticle

Open Access

Cloud-based scalable object detection and classification in video streams

Yaseen, M. U., Anjum, A., Rana, O. & Hill, R., Mar 2018, In : Future Generation Computer Systems. 80, p. 286-298 13 p.

Research output: Contribution to journalArticle

Open Access
20 Citations (Scopus)

Cloud BI: Future of business intelligence in the Cloud

Al-Aqrabi, H., Liu, L., Hill, R. & Antonopoulos, N., Feb 2015, In : Journal of Computer and System Sciences. 81, 1, p. 85-96 12 p.

Research output: Contribution to journalArticle

24 Citations (Scopus)

Countermeasures for timing-based side-channel attacks against shared, modern computing hardware

Montasari, R., Hill, R., Hosseinian-far, A. & Montaseri, F., 1 Jul 2019, In : International Journal of Electronic Security and Digital Forensics. 11, 3, p. 294-320 27 p.

Research output: Contribution to journalArticle

Digital Forensic Investigation of Social Media, Acquisition and Analysis of Digital Evidence

Montasari, R., Hill, R., Carpenter, V. & Montaseri, F., 2019, In : International Journal of Strategic Engineering (IJoSE) . 2, 1, p. 52-60 9 p.

Research output: Contribution to journalArticle

Digital Forensics: Challenges and Opportunities for Future Studies

Montasari, R., Hill, R., Parkinson, S., Peltola, P., Hosseinian-Far, A. & Daneshkhah, A., 26 Sep 2019, (Accepted/In press) In : International Journal of Organizational and Collective Intelligence. 10, 2

Research output: Contribution to journalArticle

Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing

Liu, Z., Liu, L., Hardy, J., Anjum, A., Hill, R. & Antonopoulos, N., 12 Apr 2012, In : Journal of Cloud Computing. 1, 3, 20 p.

Research output: Contribution to journalArticle

Open Access
3 Citations (Scopus)

Enabling Distributed Intelligence in the Internet of Things with IOTA and Mobile Agents

Alsboui, T., Qin, L., Hill, R. & Al-Aqrabi, H., 28 Jan 2020, (Accepted/In press) In : Computing (Vienna/New York).

Research output: Contribution to journalArticle

Glueing grids and clouds together: a service-oriented approach

Anjum, A., Hill, R., McClatchey, R., Bessis, N. & Branson, A., 22 Sep 2012, In : International Journal of Web and Grid Services. 8, 3, p. 248-265 18 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Grid workflow validation using ontology-based tacit knowledge: A case study for quantitative remote sensing applications

Liu, J., Liu, L., Xue, Y., Dong, J., Hu, Y., Hill, R., Guang, J. & Li, C., Jan 2017, In : Computers and Geosciences. 98, p. 46-54 9 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques

Montasari, R., Hill, R., Parkinson, S., Daneshkhah, A. & Hosseinian-Far, A., 31 Oct 2019, (Accepted/In press) In : International Journal of Electronic Security and Digital Forensics.

Research output: Contribution to journalArticle

Hardware-intrinsic Multi-layer Security: A New Frontier for 5G enabled IIoT

Al-Aqrabi, H., Johnson, A., Hill, R., Lane, P. & Alsboui, T., 28 Mar 2020, (Accepted/In press) In : Sensors.

Research output: Contribution to journalArticle

Internet of Things Devices: Digital Forensic Process and Data Reduction

Montasari, R., Hill, R., Montaseri, F., Jahankhani, H. & Hosseinian-Far, A., 14 Nov 2019, (Accepted/In press) In : International Journal of Electronic Security and Digital Forensics.

Research output: Contribution to journalArticle

Measuring efficiency in opportunistic ad hoc networks

Smith, A. & Hill, R., Sep 2011, In : Journal of Interconnection Networks. 12, 3, p. 189-203 15 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Meta-scheduling algorithms for managing inter-cloud interoperability

Sotiriadis, S., Bessis, N., Antonopoulos, N. & Hill, R., 2013, In : International Journal of High Performance Computing and Networking. 7, 3, p. 156-172 17 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)

Peer-to-peer networks and collective intelligence: the case for agency

Hill, R., Antonopoulos, N. & Berry, S., 1 Dec 2012, In : International Journal of Grid and Utility Computing. 3, 4, p. 233-241 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
Book

Big-data analytics and cloud computing: Theory, algorithms and applications

Trovati, M., Hill, R., Anjum, A., Zhu, S. Y. & Liu, L., 1 Jan 2016, Springer International Publishing AG.

Research output: Book/ReportBook

1 Citation (Scopus)

Cloud Computing for Enterprise Architectures

Mahmood, Z. (ed.), Ahmed, K. E. U., Alexandrov, V., Mahmood, Z. & Hill, R. (ed.), 2011, Springer London. 19 p.

Research output: Book/ReportBook

Conceptual Structures for Discovering Knowledge: 19th International Conference on Conceptual Structures, ICCS 2011, Derby, UK, July 25-29, 2011, Proceedings

Andrews, S. (ed.), Polovina, S. (ed.), Hill, R. (ed.) & Akhgar, B. (ed.), 18 Jul 2011, Berlin, Heidelberg: Springer Verlag. 424 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. LNCS/LNAI 6828)

Research output: Book/ReportBook

Digital Forensic Investigation of Internet of Things (IoT) Devices

Montasari, R., Jahankhani, H., Hill, R. & Parkinson, S., 2019, (Accepted/In press) Springer Nature Switzerland AG.

Research output: Book/ReportBook

Guide to Cloud Computing: Principles and Practice

Hill, G., Hirsch, L., Lake, P. & Moshiri, S., 2013, 1 ed. London: Springer Verlag. 278 p. (Guide to Cloud Computing)

Research output: Book/ReportBook

26 Citations (Scopus)
Chapter

A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service

Al-Aqrabi, H. A., Liu, L., Hill, R. & Antonopoulos, N., Aug 2014, 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS). Institute of Electrical and Electronics Engineers Inc., p. 498-505 8 p. (Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014).

Research output: Chapter in Book/Report/Conference proceedingChapter

7 Citations (Scopus)

A Non-genuine Message Detection Method Based on Unstructured Datasets

Trovati, M., Hill, R. & Bessis, N., 2015, Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015. Institute of Electrical and Electronics Engineers Inc., p. 597-600 4 p. (Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

A platform for analytics on social networks derived from organisational calendar data

Davies-Tagg, D., Anjum, A. & Hill, R., 13 Jan 2016, Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications. Trovati, M., Hill, R., Anjum, A., Zhu, S. Y. & Liu, L. (eds.). Springer, Cham, p. 147-165 19 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Base62x: An alternative approach to Base64 for non-alphanumeric characters

Liu, Z., Liu, L., Hill, R. & Zhan, Y., 2011, Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011. p. 2667-2670 4 p. (Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011; vol. 4).

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)

Business intelligence security on the clouds: Challenges, solutions and future directions

Al-Aqrabi, H., Liu, L., Hill, R., Ding, Z. & Antonopoulos, N., 2013, Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013. p. 137-144 8 p. (Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013).

Research output: Chapter in Book/Report/Conference proceedingChapter

12 Citations (Scopus)

Cellular Automata and Agents in Simulations

Smith, K., Hill, R., Berry, S. & Conniss, R., 13 Apr 2017, Guide to Computational Modelling for Decision Processes: Theory, Algorithms, Techniques and Applications. Berry, S., Lowndes, V. & Trovati, M. (eds.). 1st ed. Cham: Springer, Cham, p. 307-331 25 p. (Simulation Foundations, Methods and Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

Chapter 1 - An Introduction to Big Data

Panneerselvam, J., Liu, L. & Hill, R., 2015, Application of Big Data for National Security. Elsevier Inc., p. 3-13 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Dot-base62x: A compact textual representation of IPv6 address for clouds

Liu, Z., Liu, L., Hardy, J., Anjum, A., Hill, R. & Antonopoulos, N., 2011, Proceedings - 2011 4th IEEE International Conference on Utility and Cloud Computing, UCC 2011. p. 427-432 6 p. (Proceedings - 2011 4th IEEE International Conference on Utility and Cloud Computing, UCC 2011).

Research output: Chapter in Book/Report/Conference proceedingChapter

Edge Intelligence and the Industrial Internet of Things

Hill, R. & Al-Aqrabi, H., 28 Dec 2019, (Accepted/In press) Edge Computing for Massive Parallel Processing of IoT Data Streams. IOS Press

Research output: Chapter in Book/Report/Conference proceedingChapter

Energy conservation in mobile devices and applications: A case for context parsing, processing and distribution in clouds

Kiani, S. L., Anjum, A., Bessis, N., Hill, R. & Knappmeyer, M., 2013, Mobile Information Systems. Hindawi Limited, p. 1-17 17 p. (Mobile Information Systems; vol. 9).

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)

Enterprise Architecture Fundamentals

Hill, R. & Moshiri, S., 2011, Cloud Computing for Enterprise Architectures. Mahmood, Z. & Hill, R. (eds.). Springer-Verlag London Limited, p. 21-41 21 p. (Cloud Computing for Enterprise Architectures).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Evaluation of the Standardised Digital Forensic Investigation Process Model (ESDFIPM)

Montasari, R., Hill, R., Carpenter, V. & Hosseinian-Far, A., 17 Mar 2020, Cyber Security Practitioner's Guide. Jahankhani, H. (ed.). World Scientific, p. 303-363 61 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Internationalising the Postgraduate Curriculum: A Ten year Case Study

Shadija, D. & Hill, R., 7 Oct 2019, Transnational Higher Education in Computing Courses: Experiences and Reflections . Carter, J. & Rosen, C. (eds.). 1 ed. Springer International Publishing AG, p. 155-171 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments

Montasari, R., Hosseinian-Far, A. & Hill, R., 6 Dec 2018, Cyber Criminology. Jahankhani, H. (ed.). 1st ed. Switzerland: Springer International Publishing AG, p. 71-93 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Requirements and Challenges for Big Data Architectures

Akhgar, B. (ed.), Saathoff, G. B. (ed.), Arabnia, H. R. (ed.), Hill, R., Staniforth, A. (ed.), Bayerl, P. S. (ed.), Panneerselvam, J., Liu, L. & Hill, R., 2015, Application of Big Data for National Security. Akhgar, B., Saathoff, G. B., Arabnia, H. R., Hill, R., Staniforth, A. & Bayerl, P. S. (eds.). First ed. Butterworth-Heinemann, p. 131-139 9 p. (Application of Big Data for National Security).

Research output: Chapter in Book/Report/Conference proceedingChapter

The Standardised Digital Forensic Investigation Process Model (SDFIPM)

Montasari, R., Hill, R., Carpenter, V. & Hosseinian-Far, A., 18 Apr 2019, Blockchain and Clinical Trial: Securing Patient Data. Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G. & Al-Khateeb, H. (eds.). 1st ed. Cham: Springer, Cham, p. 169-209 41 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

The use of crowdsourcing to aid quest design in games

Carter, S., Bali, S., Sotiriadis, S., Bessis, N. & Hill, R., 2012, Proceedings - 3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012. p. 302-305 4 p. (Proceedings - 3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

Towards In-Transit Analytics for Industry 4.0

Hill, R., Devitt, J., Anjum, A. & Ali, M., Jun 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, p. 810-817 8 p. (2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)).

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)
Conference contribution

A Kuramoto Model Based Approach to Extract and Assess Influence Relations

Trovati, M., Castiglione, A., Bessis, N. & Hill, R., 19 Jan 2016, Computational Intelligence and Intelligent Systems: 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers. Li, K., Li, J., Liu, Y. & Castiglione, A. (eds.). Springer Verlag, p. 464-473 10 p. (Communications in Computer and Information Science; vol. 575).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

A Multi-layer Security Model for 5G-Enabled Industrial Internet of Things

Al-Aqrabi, H., Pulikkakudi Johnson, A., Hill, G., Lane, P. & Liu, L., 6 Jan 2020, Smart City and Informatization: 7th International Conference, iSCI 2019, Guangzhou, China, November 12–15, 2019, Proceedings. Wang, G., El Saddik, A., Lai, X., Martinez Perez, G. & Choo, K-K. R. (eds.). 1 ed. Springer Singapore, p. 279-292 14 p. (Communications in Computer and Information Science; vol. 1122 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An efficient concurrent system networking protocol specification and verification using linear temporal logic

Abdelrahman, R. B., Al-Aqrabi, H. & Hill, R., 6 Dec 2019, Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and Cyberlife, Beijing, China, December 16-19, 2019, Proceedings, Part 11. Ning, H. (ed.). 1st ed. Springer Singapore, p. 149-168 20 p. (Communications in Computer and Information Science; vol. 1138).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An investigation of the effect of cloud computing on network management

Panneerselvam, J., Liu, L., Hill, R., Zhan, Y. & Liu, W., 18 Oct 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems. IEEE Computer Society, p. 1794-1799 6 p. 6332403

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

A Scalable Model for Secure Multiparty Authentication

Hill, R. & Al-Aqrabi, H., 4 Dec 2018, Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018. Wang, G., Han, Q., Bhulyan, M. Z. A., Ma, X., Loulergue, F., Li, P., Roveri, M. & Chen, L. (eds.). IEEE Computer Society, p. 17-22 6 p. 8560017

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File