School of Engineering, Technology and Design


Latest research outputs

Sort by Date Title
An investigation on forensic opportunities to recover evidential data from mobile phones and personal computers
Naughton, P. and Azhar, H. 2017. An investigation on forensic opportunities to recover evidential data from mobile phones and personal computers.

Conference paper

BCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients
Azhar, H., Barton, T., Casey, A. and Sakel, M. 2017. BCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients. Research and Knowledge Exchange Conference 2017.

Conference item

Open source forensics for a multi-platform drone system
Barton, T. and Azhar, H. 2018. Open source forensics for a multi-platform drone system. in: Matousek, P. and Schmiedecker, M. (ed.) 9th EAI International Conference on Digital Forensics & Cyber Crime Springer. pp. 83-96

Book chapter

Evaluation of the MPS Predictive Policing Trial (redacted)
Bryant, R., Azhar, H., Blackburn, B. and Falade, M. 2015. Evaluation of the MPS Predictive Policing Trial (redacted).

Project report

Technique developed to study camshaft and tappet wear on real production engine
Waseem Arshad, Muhammad Adnan Hanif, Muhammad Usman Bhutta, Riaz Ahmad Mufti, Samiur Rahman Shah, Muhammad Usman Abdullah and Muhammad Huzaifa Najeeb 2017. Technique developed to study camshaft and tappet wear on real production engine. Industrial Lubrication and Tribology. 69 (2), pp. 174-181. https://doi.org/10.1108/ILT-06-2016-0135

Journal article

Estimating the prevalence of problematic opiate use in Ireland using indirect statistical methods
Gordon Hay, Jaddoa, A., Jane Oyston, Jane Webster and Marie Claire Van Hout 2017. Estimating the prevalence of problematic opiate use in Ireland using indirect statistical methods. Dublin National Advisory Committee on Drugs and Alcohol.

Working paper

Crowd guilds: Worker-led reputation and feedback on crowdsourcing platforms
Whiting, M . E., Gamage, D., Gaikwad, S. S., Gilbee, A., Goyal, S., Ballav, A., Majeti, D., Chhibber, N., Richmond-Fuller, A., Vargus, F., Sharma, T. S., Chandrakanthan, V., Moura, T., Salih, M. H., Kalejaiye, G. B. T., Ginzberg, A., Mullings, C. A., Dayan, Y., Milland, K., Orefice, H., Regino, J., Parsi, S., Mainali, K., Sehgal, V., Matin, S., Sinha, A., Vaish, R. and Bernstein, M. S. 2017. Crowd guilds: Worker-led reputation and feedback on crowdsourcing platforms. in: CSCW '17: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing New York Association for Computing Machinery. pp. 1902-1913

Book chapter

The Daemo crowdsourcing marketplace
Gaikwad, S. S., Whiting, M., Gamage, D., Mullings, C. A., Majeti, D., Goyal, S., Gilbee, A., Chhibber, N., Ginzberg, A., Ballav, A., Matin, A., Richmond-Fuller, A., Sehgal, V., Sarma, T., Nasser, A., Regino, J., Zhou, S., Stolzoff, A., Mananova, K., Dhakal, D., Srinivas, P., Ziulkoski, K., Niranga, S. S., Salih, M., Sinha, A., Vaish, R. and Bernstein, M. S. 2017. The Daemo crowdsourcing marketplace. in: Lee, C.P. and Poltrock, S. (ed.) CSCW '17 Companion: Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing New York Association for Computing Machinery.

Book chapter

Forensic analysis of popular UAV systems
Barton, T. and Azhar, H. 2017. Forensic analysis of popular UAV systems. Emerging Security Technologies (EST), 2017 Seventh International Conference on. https://doi.org/10.1109/EST.2017.8090405

Journal article

A wearable brain-computer interface controlled robot
Azhar, H., Badicioiu, A. and Barton, T. 2016. A wearable brain-computer interface controlled robot.

Conference paper

Forensic analysis of the recovery of Wickr’s ephemeral data on Android platforms
Barton, T. and Azhar, H. 2016. Forensic analysis of the recovery of Wickr’s ephemeral data on Android platforms. in: Klemas, T. and Falk, R. (ed.) CYBER 2016 : The First International Conference on Cyber-Technologies and Cyber-Systems IARIA. pp. 35-40

Book chapter

Forensic analysis of secure ephemeral messaging applications on Android platforms
Azhar, H. and Barton, T. 2017. Forensic analysis of secure ephemeral messaging applications on Android platforms. in: Global Security, Safety and Sustainability - The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings Springer.

Book chapter

Parallelizing abnormal event detection in crowded scenes with GPU
Yavari, M., Li, M., Li, S. and Qi, M. 2015. Parallelizing abnormal event detection in crowded scenes with GPU.

Conference paper

Reusable knowledge in security requirements engineering: a systematic mapping study
Souag, A., Mazo, R., Salinesi, C. and Comyn-Wattiau, I. 2016. Reusable knowledge in security requirements engineering: a systematic mapping study. Requirements Engineering Journal. 21 (251–283). https://doi.org/10.1007/s00766-015-0220-8

Journal article

Boomerang: Rebounding the consequences of reputation feedback on crowdsourcing platforms
Gaikwad, N.S., Morina, D., Ginzberg, A., Mullings, C., Goyal, S., Gamage, D., Diemert, C., Burton, M., Zhou, S., Whiting, M., Ziulkoski, K., Gilbee, A., Niranga, S. S., Sehgal, V., Lin, J., Kristianto, L., Richmond-Fuller, A., Regino, J., Chhibber, N., Majeti, D., Sharma, S., Mananova, K., Dhakal, D., Dai, W., Purynova, V., Sandeep, S., Chandrakanthan, V., Sarma, T., Matin, S., Nasser, A., Nistala, R., Stolzoff, A., Milland, K., Mathur, V., Vaish, R. and Bernstein, M. S. 2016. Boomerang: Rebounding the consequences of reputation feedback on crowdsourcing platforms. in: Rekimoto, J. and Igarashi, T. (ed.) UIST '16: Proceedings of the 29th Annual Symposium on User Interface Software and Technology New York Association for Computing Machinery. pp. 625-637

Book chapter

New DNA sequences from bacteria converting phenol into acetate under strict anaerobic conditions
Hernandez, E. and Edyvean, R. 2016. New DNA sequences from bacteria converting phenol into acetate under strict anaerobic conditions. Journal of Medical and Bioengineering. 5 (1), pp. 1-10. https://doi.org/10.12720/jomb.5.1.1-10

Journal article

Usability and performance measure of a consumer-grade brain computer interface system for environmental control by neurological patients
Deravi, F., Ang, C., Azhar, H., Al-Wabil, A., Philips, M. and Sakel, M. 2015. Usability and performance measure of a consumer-grade brain computer interface system for environmental control by neurological patients. International Journal of Engineering and Technology Innovation (IJETI). 5 (3), pp. 165-177.

Journal article

Criticality dispersion in swarms to optimize n-tuples
Azhar, H., Deravi, F. and Dimond, K. 2008. Criticality dispersion in swarms to optimize n-tuples. in: GECCO '08: Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation New York Association for Computing Machinery. pp. 1-8

Book chapter

Particle swarm intelligence to optimize the learning of n-tuples
Azhar, H., Deravi, F. and Dimond, K. 2008. Particle swarm intelligence to optimize the learning of n-tuples. Journal of Intelligent Systems. 17 (S), pp. 169-196. https://doi.org/10.1515/JISYS.2008.17.S1.169

Journal article

Automatic identification of wildlife using local binary patterns
Azhar, H., Hoque, S. and Deravi, F. 2012. Automatic identification of wildlife using local binary patterns. in: IET Conference on Image Processing (IPR 2012) Institute of Engineering and Technology. pp. 5-11

Book chapter

Zoometrics - biometric identification of wildlife using natural body marks
Hoque, S., Azhar, H. and Deravi, F. 2011. Zoometrics - biometric identification of wildlife using natural body marks. International Journal of Bio-Science and Bio-Technology. 3 (3), pp. 45-53.

Journal article

Big data management in digital forensics
Qi, M. 2014. Big data management in digital forensics. in: 2014 IEEE 17th International Conference on Computational Science and Engineering (CSE) IEEE. pp. 238-243

Book chapter

Digital forensics and NoSQL databases
Qi, M. 2014. Digital forensics and NoSQL databases. in: Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2014 IEEE. pp. 734-739

Book chapter

Employing neural networks for DDoS detection
Qi, M. 2014. Employing neural networks for DDoS detection.

Conference paper

A MapReduce based distributed LSI for scalable information retrieval
Liu, Y., Li, M., Khan, M. and Qi, M. 2014. A MapReduce based distributed LSI for scalable information retrieval. Computing and Informatics. 33 (2), pp. 259-280.

Journal article

Clear up grey areas: cybercrime legislation progress in China
Qi, M. 2013. Clear up grey areas: cybercrime legislation progress in China.

Conference paper

Preparation and spectroscopic studies of Hydroxyapatite embedded in Poly(N-Vinylpyrrolidone) matrix
A. Aly, S. Elashmawi and E. M. Abdelrazek 2015. Preparation and spectroscopic studies of Hydroxyapatite embedded in Poly(N-Vinylpyrrolidone) matrix. Journal of Research in Spectroscopy. 2015 (2015). https://doi.org/10.5171/2015.935535

Journal article

Analysis of potential flow around two-dimensional body by finite element method
Tarafder, S. and Naz, N. 2015. Analysis of potential flow around two-dimensional body by finite element method. Journal of Mechanical Engineering Research. 7 (2), pp. 9-22. https://doi.org/10.5897/JMER2014.0342

Journal article

A security ontology for security requirements elicitation
Souag, A. and Salinesi C., Mazo R., Comyn-Wattiau I. 2015. A security ontology for security requirements elicitation. https://doi.org/10.1007/978-3-319-15618-7_13

Conference paper

AMAN-DA: A knowledge reuse based approach for domain specific security requirements engineering
Souag, A. 2015. AMAN-DA: A knowledge reuse based approach for domain specific security requirements engineering. PhD Thesis Université Paris 1 Panthéon-Sorbonne CRI - Centre de Recherche en Informatique de Paris 1

PhD Thesis

A resource aware MapReduce based parallel SVM for large scale image classification
Guo, W., Khalid, N., Liu, Y., Li, M., Qi, M., Guo, W., Khalid, N., Liu, Y., Li, M. and Qi, M. 2015. A resource aware MapReduce based parallel SVM for large scale image classification. Neural Processing Letters. 44 (1), pp. 161-184.

Journal article

Forensic acquisitions of WhatsApp data on popular mobile platforms
Shortall, A. and Azhar, H. 2015. Forensic acquisitions of WhatsApp data on popular mobile platforms. in: Proceedings of the Sixth International Conference on Emerging Security Technologies IEEE. pp. 13-17

Book chapter

Social media in law enforcement: the role and issues
Qi, M. 2012. Social media in law enforcement: the role and issues.

Conference paper

A distributed storage system for archiving broadcast media content
Cherry, D., Li, M. and Qi, M. 2012. A distributed storage system for archiving broadcast media content. in: Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications IGI Global. pp. 669-679

Book chapter

A distributed SVM ensemble for image classification and annotation
Alham, M., Li, M., Liu, Y., Ponraj, M. and Qi, M. 2012. A distributed SVM ensemble for image classification and annotation. in: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) IEEE. pp. 1581-1584

Book chapter

Computer forensics in communication networks
Wang, Y. and Qi, M. 2012. Computer forensics in communication networks. in: IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2011) Curran.

Book chapter

A MapReduce based parallel SVM for large scale spam filtering
Caruana, G., Li, M. and Qi, M. 2011. A MapReduce based parallel SVM for large scale spam filtering. in: Caruana, G. (ed.) Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2011 IEEE.

Book chapter

Cyber safety in schools
Qi, M. 2011. Cyber safety in schools.

Conference paper

The social effects of spam
Mousoli, R., Qi, M. and Edgar-Nevill, D. 2008. The social effects of spam. in: Edgar-Nevill, D. (ed.) Proceedings of CFET 2008 – 2nd Annual International Conference on Cybercrime Forensics Education and Training Canterbury Canterbury Christ Church University. pp. 71-78

Book chapter

A methodology for defining security requirements using security and domain ontologies
Souag, A., Salinesi C. and Comyn-Wattiau I. 2013. A methodology for defining security requirements using security and domain ontologies. Insight. Volume 16 (4), pp. 14-16. https://doi.org/10.1002/inst.201316414

Journal article

  • 38866
    total views
  • 22312
    total downloads
  • 66
    views this month
  • 22
    downloads this month