Publications

2017

YE, Q., YIM, M.Y., APPIAH, K., KU, Y., HU, Y. and KWOK, S.C., 2017. Representation of temporal memory retrieval in the human precuneus. In: 23rd Annual Meeting of the Organization for Human Brain Mapping (OHBM 2017), Vancouver, Canada, 25-29 June 2017.

KANJO, E., YOUNIS, E.M.G. and SHERKAT, N., 2018. Towards unravelling the relationship between on-body, environmental and emotion data using sensor information fusion approach. Information Fusion, 40, pp. 18-31. ISSN 1566-2535

ELBAYOUDI, A., LOTFI, A., LANGENSIEPEN, C. and APPIAH, K., 2017. Trend analysis techniques in forecasting human behaviour evolution. In: Proceedings of the 10th International Conference on PErvasive Technologies Related to Assistive Environments, PETRA '17, Island of Rhodes, Greece, 21-23 June 2017. New York: ACM, pp. 293-299. ISBN 9781450352277

ORTEGA ANDEREZ, D., APPIAH, K., LOTFI, A. and LANGENSIEPEN, C., 2017. A hierarchical approach towards activity recognition. In: Proceedings of the 10th International Conference on PErvasive Technologies Related to Assistive Environments, PETRA '17, Island of Rhodes, Greece, 21-23 June 2017. New York: ACM, pp. 269-274. ISBN 9781450352277

ADAMA, D.A., LOTFI, A., LANGENSIEPEN, C., LEE, K. and TRINDADE, P., 2017. Learning human activities for assisted living robotics. In: Proceedings of the 10th International Conference on PErvasive Technologies Related to Assistive Environments, PETRA '17, Island of Rhodes, Greece, 21-23 June 2017. New York: ACM, pp. 286-292. ISBN 9781450352277

MAY, A.D., LOTFI, A., LANGENSIEPEN, C., LEE, K. and ACAMPORA, G., 2017. Human Emotional Understanding for Empathetic Companion Robots. In: P. ANGELOV, A. GEGOV, C. JAYNE and Q. SHEN, eds., Advances in computational intelligence systems. Advances in intelligent systems and computing, 513 (513). Cham: Springer, pp. 277-285. ISBN 9783319465616

AL RAWAHI, A., LEE, K. and LOTFI, A., 2017. Trading of cloud of things resources. In: ICC '17: Proceedings of the 2nd International Conference on Internet of Things, Data and Cloud Computing, Churchill College, Cambridge, 22-23 March 2017. New York: Association for Computing Machinery. ISBN 9781450347747

WANG, W., LEE, K. and MURRAY, D., 2017. A global generic architecture for the future Internet of Things. Service Oriented Computing and Applications. ISSN 1863-2386

ALSUMAYT, A., HAGGERTY, J. and LOTFI, A., 2017. Using trust to detect denial of service attacks in the internet of things over MANETs. International Journal of Space-Based and Situated Computing, 7 (1), pp. 43-56. ISSN 2044-4893

HAGGERTY, J. and HAGGERTY, S., 2017. Networking with a network: the Liverpool African Committee 1750-1810. Enterprise & Society. ISSN 1467-2227

ROBINSON, J., APPIAH, K. and YOUSAF, R., 2017. Improving the well-being of older people by reducing their energy consumption through energy-aware systems. In: Proceedings of the 9th International Conference on eHealth, Telemedicine, and Social Medicine (eTELEMED 2017), Nice, France, 19-23 March 2017. International Academy, Research and Industry Association (IARIA). ISBN 9781612085401

SALIH, A., MA, X. and PEYTCHEV, E., 2017. Implementation of hybrid artificial intelligence technique to detect covert channels in new generation network protocol IPv6. In: R. BENLAMRI and M. SPARER, eds., Leadership, innovation and entrepreneurship as driving forces of the global economy: proceedings of the 2016 International Conference on Leadership, Innovation and Entrepreneurship (ICLIE). Springer proceedings in business and economics . Cham: Springer, pp. 173-190. ISBN 9783319434339

2016

LEE, K. and GILLEADE, K., 2016. Generic processing of real-time physiological data in the cloud. International Journal of Big Data Intelligence, 3 (4), pp. 215-227. ISSN 2053-1389

ALBAWENDI, S., APPIAH, K., POWELL, H. and LOTFI, A., 2016. Video based fall detection with enhanced motion history images. In: Proceedings of the 9th ACM International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2016, Corfu, Greece, June 29 - July 1, 2016. New York: ACM. ISBN 9781450343374

APPIAH, K., MACHADO, P., COSTALAGO MERUELO, A. and MCGINNITY, T.M., 2016. C. elegans behavioural response germane to hardware modelling. In: Proceedings of the 2016 IEEE International Joint Conference on Neural Networks (IJCNN), Vancouver, Canada, 24-29 July 2016. Piscataway, New Jersey: IEEE, pp. 4743-4750. ISBN 9781509006205

COSTALAGO MERUELO, A., MACHADO, P., APPIAH, K. and MCGINNITY, T.M., 2016. Challenges in clustering C. elegans neurons using computational approaches. In: Proceedings of the 2016 IEEE International Joint Conference on Neural Networks (IJCNN), Vancouver, Canada, 24-29 July 2016. Piscataway, New Jersey: IEEE, pp. 4775-4781. ISBN 9781509006205

MACHADO, P., COSTALAGO MERUELO, A., PETRUSHIN, A., FERRARA, L., LAMA, N., ADAMA, D., APPIAH, K., BLAU, A. and MCGINNITY, T.M., 2016. Si elegans: evaluation of an innovative optical synaptic connectivity method for C. elegans phototaxis using FPGAs. In: Proceedings of the 2016 IEEE International Joint Conference on Neural Networks (IJCNN), Vancouver, Canada, 24-29 July 2016. Piscataway, New Jersey: IEEE, pp. 185-191. ISBN 9781509006205

ELBAYOUDI, A., LOTFI, A., LANGENSIEPEN, C. and APPIAH, K., 2016. Determining behavioural trends in an ambient intelligence environment. In: Proceedings of the 9th ACM International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2016, Corfu, Greece, June 29 - July 1, 2016. New York: ACM. ISBN 9781450343374

Fayoumi, A., 2016. Ecosystem-inspired enterprise modelling framework for collaborative and networked manufacturing systems. Computers in Industry,80, pp.54-68.

Fayoumi, A. and Loucopoulos, P., 2016. Conceptual modeling for the design of intelligent and emergent information systems. Expert Systems with Applications, 59, pp.174-194.

GUERRACHE, F., ALDABBAGH, A. and KANJO, E., 2016. Multiple sensor fusion approach to map environmental noise impact on health. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct - UbiComp '16. New York: Association for Computing Machinery, pp. 1074-1078. ISBN 9781450344623

ALFRJANI, R., OSMAN, T. and COSMA, G., 2016. A new approach to ontology-based semantic modelling for opinion mining. In: D. AL-DABASS, A. ORSONI, R. CANT and G. JENKINS, eds., UKSim2016: Proceedings of the UKSim-AMSS 18th International Conference on Mathematical Modelling & Computer Simulation, Cambridge, 6-8 April 2016. Institute of Electrical and Electronics Engineers (IEEE), pp. 267-272. ISBN 9781509008872

GUERRACHE, F., YOUNIS, E.M.G. and KANJO, E., 2016. Quantifying Environmental Noise impact on Heart Rate Variability. In: F. KAWSAR, P. ZHANG and M. MUSOLESI, eds., Proceedings of the The 8th EAI International Conference on Mobile Computing, Applications and Services, Cambridge, United Kingdom, 30 November - 1 December 2016. New York: Association for Computing Machinery. ISBN 9781631901379

KANJO, E. and CHAMBERLAIN, A., 2015. Emotions in context: examining pervasive affective sensing systems, applications, and analyses. Personal and Ubiquitous Computing. ISSN 1617-4909

2015

ATANBORI, J., DUAN, W., MURRAY, J., APPIAH, K. and DICKINSON, P., 2015. Automatic classification of flying bird species using computer vision techniques [forthcoming]. Pattern Recognition Letters. ISSN 0167-8655

ALBAWENDI, S., APPIAH, K., POWELL, H. and LOTFI, A., 2015. Overview of Behavioural Understanding System with Filtered Vision Sensor. In: Proceedings of the 2015 International Conference on Interactive Technologies and Games (iTAG 2015), Nottingham, 22-23 October 2015. Los Alamitos, CA: Institute of Electrical and Electronics Engineers, pp. 90-95. ISBN 9781467378741

ELBAYOUDI, A., LOTFI, A., LANGENSIEPEN, C.S. and APPIAH, K., 2015. Modelling and simulation of activities of daily living representing an older adult's behaviour. In: F. MAKEDON, ed., Proceedings of the 8th ACM International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2015, Corfu, Greece, July 1-3, 2015. New York: ACM, 67:1-67:8. ISBN 9781450334525

ATANBORI, J., DUAN, W., MURRAY, J., APPIAH, K. and DICKINSON, P., 2015. A computer vision approach to classification of birds in flight from video sequences. In: T. AMARAL, S. MATTHEWS, T. PLÖTZ, S. MCKENNA and R. FISHER, eds., Proceedings of the Machine Vision of Animals and their Behaviour (MVAB 2015) Workshop, Swansea, 10 September 2015. BMVA Press.

ZHAI, X., APPIAH, K., EHSAN, S., HOWELLS, G., HU, H., GU, D. and MCDONALD-MAIER, K., 2015. Exploring ICMetrics to detect abnormal program behaviour on embedded devices. Journal of Systems Architecture. ISSN 1383-7621

COSTALAGO MERUELO, A., MACHADO, P., APPIAH, K. and MCGINNITY, T.M., 2015. Si elegans: a computational model of C. elegans muscle response to light. In: 3rd International Congress on Neurotechnology, Electronics and Informatics, Lisbon, Portugal, 2015.

MACHADO, P., WADE, J., APPIAH, K. and MCGINNITY, T.M., 2015. Si elegans: hardware architecture and communications protocol. In: 2015 International Joint Conference on Neural Networks (IJCNN), Killarney, Ireland, 12-17 July 2015.

ZHAI, X., APPIAH, K., EHSAN, S., HOWELLS, G., HU, H., GU, D., MCDONALD-MAIER, K. and KLAUS, D., 2015. A method for detecting abnormal program behavior on embedded devices. IEEE Transactions on Information Forensics and Security, 10 (8), pp. 1692-1704. ISSN 1556-6013

RAMACHANDRAN, G.S., DANIELS, W., MATTHYS, N., HUYGENS, C., MICHIELS, S., JOOSEN, W., MENEGHELLO, J., LEE, K., CANETE, E., RODRIGUEZ, M.D. and HUGHES, D., 2015. Measuring and modelling the energy cost of reconfiguration in sensor networks [forthcoming]. IEEE Sensors Journal. ISSN 1530-437X

LEE, K., SMALL, N. and MANN, G., 2015. Adaptive planning for distributed systems using goal accomplishment tracking. In: B. JAVADI and S. KUMAR, eds., Proceedings of the 13th Australasian Symposium on Parallel and Distributed Computing (AusPDC 2015). Australia: Australian Computer Society, pp. 61-70. ISBN 9781921770456

SMALL, N.J., MANN, G. and LEE, K., 2015. Assigned responsibility for remote robot operation. In: S. MARKS and R. BLAGOJEVIC, eds., Proceedings of the 16th Australasian User Interface Conference (AUIC 2015). Australia: Australian Computer Society, pp. 73-76. ISBN 9781921770449

MURRAY, D., LEE, K., KOZINIEC, T. and DIXON, M., 2015. Measuring the reliability of 802.11 WiFi networks [forthcoming]. In: Sixth IEEE International Conference on Internet Technologies & Applications, Wrexham, North Wales, September 2015. Los Alamitos, California: IEEE Computer Society, pp. 231-236.

MANN, G., SMALL, N., LEE, K., CLARKE, J. and SHEH, R., 2015. Standardized field testing of assistant robots in a Mars-like environment. In: C. DIXON and K. TUYLS, eds., Towards Autonomous Robotic Systems: Proceedings of the 16th Annual Conference, TAROS 2015, Liverpool, 8-10 September 2015. Cham: Springer, pp. 167-179. ISBN 978-3-319-22415-2

LEE, K., BUSS, G. and VEIT, D., 2015. A heuristic approach for the allocation of resources in large-scale computing infrastructures. Concurrency and Computation: Practice and Experience. ISSN 1532-0626

ABUFANAS, A. and PEYTCHEV, E., 2015. Detecting Traffic Conditions Model Based On Clustering Nodes Situations In VANET. In: V.M. MLADENOV, G. SPASOV, P. GEORGIEVA and G. PETROVA, eds., Proceedings of the 29th European Conference on Modelling and Simulation, Albena, Varna, Bulgaria, 26-29 May 2015. European Council for Modelling and Simulation, pp. 511-515. ISBN 9780993244001

SALIH, A., MA, X. and PEYTCHEV, E., 2015. New intelligent heuristic algorithm to mitigate security vulnerabilities in IPv6. IJIS International Journal on Information Security, 4.

SALIH, A., MA, X. and PEYTCHEV, E., 2015. Detection and classification of covert channels in IPv6 using enhanced machine learning. In: 2015 International Conference on Computer Technology and Information Systems (ICCTIS’ 2015), Dubai, United Arab Emirates, 13-15 August 2015.

Taylor, M., Haggerty, J., Gresty, D., Criado Pacheco, N., Berry, T. & Almond, P., "Investigating employee harassment via social media", Journal of Systems and Information Technology, 17 (4), 2015.

Towards a Unified Meta-Model for Goal Oriented Modelling. Fayoumi A, Kavakli E and Loucopoulos P,Proceedings of the European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS 15), 2015, Athens, Greece

Alsumayt, A., Haggerty, J. & Lotfi, A., "Comparison of the MrDR Method Against Different DoS Attacks in MANETs", Proceedings of the Fifth International Conference on Digital Information Processing and Communications (ICDIPC2015), Sierre/Siders, Switzerland, October 7-9, 2015.

Alsumayt, A., Haggerty, J. & Lotfi, A., "Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANETs", Proceedings of the 2015 European Intelligence and Security Informatics Conference (EISIC 2015), Manchester, UK, 7-9 September, 2015.

Hegarty, R. & Haggerty, J., "Extrusion Detection of Illegal Files in Cloud-Based Systems", International Journal of Space-Based and Situated Computing, 5 (3), pp. 150-158, 2015.

Hegarty, R. & Haggerty, J., "Slackstick: Signature-Based File Identification for Live Digital Forensics Examinations", Proceedings of the 2015 European Intelligence and Security Informatics Conference (EISIC 2015), Manchester, UK, 7-9 September, 2015.

Haggerty, J., Hughes-Roberts, T. & Hegarty, R., "Hobson's Choice: Security and Privacy Permissions in Android and iOS Devices", LNCS 9190 Human Aspects of Information Security, Privacy and Trust, Springer, London, pp. 506-516, 2014. [Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy, and Trust, held as part of HCI International 2015, Los Angeles, CA, USA, 2-7 August, 2015].

Thurlby, C., Langensiepen, C., Haggerty, J. & Ranson, R., "Understanding User Knowledge of Computer Security and Risk: A Comparative Study", Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance, Lesvos, Greece, 1-3 July, 2015.

ZHAI, X., APPIAH, K., EHSAN, S., HOWELLS, G., HU, H., GU, D., MCDONALD-MAIER, K. and KLAUS, D., (2015), A method for detecting abnormal program behavior on embedded devices. IEEE Transactions on Information Forensics and Security, 10 (8), pp. 1692-1704. Abdulrahman Salih, Xiaoqi Ma and Evtim Peytchev. Detection and Classification of Covert Channels in IPv6 Using Enhanced Machine Learning. International Conference on Computer Technology and Information Systems 2015, Dubai, United Arab Emirates, 13-15 August, 2015.

Dania Aljeaid, Xiaoqi Ma and Caroline Langensiepen. A New Biometric ID-Based Cryptography Protocol and Security Analysis Using Petri Nets. The Sixth Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2015), Singapore, August 2015.

Dania Aljeaid, Xiaoqi Ma and Caroline Langensiepen. Analysis of Security Protocols Using Finite-State Machine. International Journal of Advanced Research in Artificial Intelligence (IJARAI), Vol 4, No 4, pp 46-53, April 2015.

ALJAMEL, A., OSMAN, T. and ACAMPORA, G., 2015. Domain-Specific Relation Extraction - Using Distant Supervision Machine Learning. In: A. FRED, J. DIETZ, D. AVEIRO, K. LIU and J. FILIPE, eds., Proceedings of the 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, Lisbon, Portugal, 12-14 November 2015. Setúbal: Scitepress - Science and Technology Publications, pp. 92-103. ISBN 9789897581588

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2015. Analysis of security protocols using finite-state machines. International Journal of Advanced Research in Artificial Intelligence (IJARAI), 4 (4), pp. 46-53. ISSN 2165-4069

JIANG, H., ZHAO, D., ZHENG, R. and MA, X., 2015. Construction of Pancreatic Cancer Classifier Based on SVM Optimized by Improved FOA. BioMed Research International, 2015, p. 781023. ISSN 2314-6133

MA, X., 2015. Managing identities in cloud computing environments. In: The Second International Conference on Information Science and Control Engineering, Shanghai, China, April 2015, Shanghai, China.

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2015. A New Biometric ID-Based Cryptography Protocol and Security Analysis Using Petri Nets. In: 6th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2016), Singapore, 27-28 July 2015.

2014

MUNRO, J., APPIAH, K. and DICKINSON, P., 2014. Investigating informative performance metrics for a multicore game world server. Entertainment Computing, 5 (1), pp. 1-17. ISSN 1875-9521

ALBISTON, G., OSMAN, T. and PEYTCHEV, E., 2014. Modelling trust in semantic web applications. In: Proceedings of the 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, Cambridge.

APPIAH, K., HUNTER, A., LOTFI, A., WALTHAM, C. and DICKINSON, P., 2014. Human behavioural analysis with self-organizing map for ambient assisted living. In: 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Beijing, China, 6.7.2014. IEEE, pp. 2430-2437. ISBN 9781479920730

ACAMPORA, G., APPIAH, K., HUNTER, A. and VITIELLO, A., 2014. Interoperable services based on activity monitoring in ambient assisted living environments. In: 2014 IEEE Symposium on Intelligent Agents (IA) [Orlando, Florida, United States, 9-12 December 2014]: proceedings. New York, NY: IEEE, pp. 81-88. ISBN 9781479944897

ZHANG, Q. and PEYTCHEV, E., 2014. Distributed traffic simulation models and traffic prediction model based on the wireless ad-hoc networks. In: A. BILAL, A. RATNAYAKA, A. ZOBENBULLER, C. COINTOT, D. HARBIDGE, D. WHATMAN, E. MBISE, F. AL-HASHIMI, G. MARTÍNEZ-ARELLANO, G. ROGERS, I. GOSTAUTAS, J. TAYLOR, K. TRYTKO, L. PISCICELLI, M. AHMED, M. ALASHAB, M. MAHMOOD, S. WILSON, T. ELFAYEZ and Y. LIAO, eds., Breaking Boundaries 2014: First Annual Professional Research Practice Conference, Nottingham Trent University, 15 May 2014. Nottingham: Nottingham Trent University: Graduate School, pp. 115-123. ISBN 9780992995706

ANYAMELUHOR, N. and PEYTCHEV, E., 2014. Routing And Communication Path Mapping In VANETS. In: F. SQUAZZONI, F. BARONIO, C. ARCHETTI and M. CASTELLANI, eds., Proceedings of the 28th European Conference on Modelling and Simulation (ECMS 2014), Brescia, Italy, 27-30 May 2014. European Council for Modelling and Simulation, pp. 359-363. ISBN 9780956494481

Business Rules, Constraints and Simulation for Enterprise Governance. Fayoumi A and Loucopoulos P,Enterprise and Organizational Modeling and Simulation - 10th International Workshop, EOMAS 2014, held at CAiSE 2014, Thessaloniki, Greece, selected Papers, 2014, 96-112

Haggerty, J., Haggerty, S. & Taylor, M., "Forensic Triage of Email Network Narratives through Visualisation", Journal of Information Management and Computer Security, 22 (4), doi http://dx.doi.org/10.1108/IMCS-11-2013-0080, 2014.

Haggerty, J. & Taylor, M.J., "Retrieval and Analysis of Web Search Narratives for Digital Investigations", Proceedings of the 10th International Network Conference, Plymouth, UK, 8-10 July, 2014, pp. 153-162, 2014.

Haggerty, J. & Hughes-Roberts, T., "Visualization of System Log Files for Post-Incident Analysis", in Tryfonas, T. & Askoxylakis, I. (eds.), LNCS 8533 Human Aspects of Information Security, Privacy and Trust, Springer, London, pp. 23-32, 2014. [Proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, Held as Part of HCI International 2014, Heraklion, Greece, 22-27 June, 2014].

Alsumayt, A. & Haggerty, J., "A Survey of the Mitigation Methods against DDoS Attacks on MANETs", Proceedings of the Science and Information Conference, London, UK, 27-29 August, 2014, pp. 538-544, 2014.

Alsumayt, A. & Haggerty, J., "A Taxonomy of Defence Mechanisms to Mitigate DoS Attacks in MANETs", Proceedings of the 10th International Network Conference, Plymouth, UK, 8-10 July, 2014, pp. 3-12, 2014.

Alsumayt, A. & Haggerty, J., "Using Trust Based Method to Detect DoS Attack in MANETs", Proceedings of PGNet 2014, Liverpool, UK, 23-24 June, 2014.

Dania Aljeaid, Xiaoqi Ma and Caroline Langensiepen. Modelling and Simulation of a Biometric Identity-Based Cryptography. International Journal of Advanced Research in Artificial Intelligence (IJARAI), Vol 3, No 10, pp 35-44, 2014.

Dania Aljeaid, Xiaoqi Ma and Caroline Langensiepen. Biometric Identity-Based Cryptography for e-Government Environment. Science and Information Conference 2014, London, UK, August 2014.

CHAMBERLAIN, A., PAXTON, M., GLOVER, K., FLINTHAM, M., PRICE, D., GREENHALGH, C., BENFORD, S., TOLMIE, P., KANJO, E., GOWER, A., GOWER, A., WOODGATE, D. and FRASER, D.S., 2014. Understanding mass participatory pervasive computing systems for environmental campaigns. Personal and Ubiquitous Computing, 18 (7), pp. 1775-1792. ISSN 1617-4909

KANJO, E., 2014. Exploiting customer emotional responses to rate shops and enhance customer experience. In: IEEE AICCSA Conference, Doha, Qatar, 2014, Doha, Qatar.

ALZUHAIR, M., BENABID, A. and KANJO, E., 2014. NFC based applications for visually impaired people - review. In: EEE International Conference Multimedia and Expo Workshops (ICMEW), Chengdu, China, 14-18 July 2014, Chengdu, China.

ISIAQ, S. and OSMAN, T., 2014. Ontology modelling methodology for temporal and interdependent applications. In: Proceedings of the 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, Cambridge.

OSMAN, T., LOTFI, A., LANGENSIEPEN, C., SAEED, M. and CHERNBUMROONG, S., 2014. Semantic-based decision support for remote care of dementia patients. In: IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2014), Orlando, Florida, 9-12 December 2014, Orlando, Florida.

ACAMPORA, G., COSMA, G. and OSMAN, T., 2014. An extended neuro-fuzzy approach for efficiently predicting review ratings in E-markets. In: 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Beijing International Convention Center, Beijing, 6-11 July 2014, Beijing.

KANJO, E., 2014. Overview of mobile sensing for special needs: lessons learned from I Can Workshop. In: S-CUBE 2014: The 5th International Conference on Sensor Systems and Software, Warwick, 6-7 October 2014, Warwick.

ALZUHAIR, M., BENABID, A. and KANJO, E., 2014. User involvement for the development of indoor navigation system for the visually impaired. In: 3rd International Conference on User Science and Engineering 2014 (i-USEr 2014), Malaysia, 2-5 September 2014, Malaysia.

KANJO, E. and ALSAFADI, L., 2014. Zone-based indoor mobile noise monitoring. In: The Sixth International Conference on Mobile Computing, Applications and Services Conference (Mobicase), Austin, Texas, 6-7 November 2014, Austin, Texas.

KHALIL, H. and OSMAN, T., 2014. Challenges in Information Retrieval from Unstructured Arabic Data. In: 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, Cambridge, 26-28 March 2014. Los Alamitos, California: IEEE Computer Society, pp. 456-461. ISBN 9781479949236

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2014. Biometric identity-based cryptography for e-Government environment. In: 2014 Science and Information Conference (SAI), London, 27-29 August 2014, London.

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2014. Modelling and simulation of a biometric identity-based cryptography. International Journal of Advanced Research in Artificial Intelligence (IJARAI), pp. 35-44.

2013

THOMPSON, N. and LEE, K., 2013. Information security challenge of QR codes. Journal of Digital Forensics, Security and Law, 8 (2), pp. 41-72. ISSN 1558-7215

Haggerty, J., Casson, M.C., Haggerty, S. & Taylor, M.J., "A Framework for the Forensic Analysis of User Interaction with Social Media", in Li, C.T. (ed.), Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, IGI-Global, pp. 195-210, 2013.

Haggerty, J., Haggerty, S. & Taylor, M.J., "Visual Triage of Email Network Narratives for Digital Investigations", Proceedings of the European Information Security Multi-Conference, Lisbon, Portugal, 8-9 May, pp. 102-111, 2013.

Using Architecture Patterns to Architect and Analyze Systems of Systems. Kalawsky RS, Joannou D, Tian Y, Fayoumi A, Procedia Computer Science, 2013, 16, 283-292

Hybrid Enterprise Modelling: Integrating Modelling Mechanisms for Socio-Technical Systems Analysis and Design. Fayoumi A, Loucopulos P and Ayham F, Journal of Software Engineering and Applications, 2013, 7, 6

Roberts, M.P. & Haggerty, J., "MetaFor: Metadata Signatures for Automated Remote File Identification in Forensic Investigations", Proceedings of the European Information Security Multi-Conference, Lisbon, Portugal, 8-9 May, pp. 123-132, 2013.

Abdullah Alabdulatif and Xiaoqi Ma. Analysing the EAP-TLS Handshake and the 4-Way Handshake of the 802.11i Standard. International Journal for Information Security Research (IJISR), Volume 3, Issues 3/4, 2013.

Abdullah Alabdulatif, Xiaoqi Ma and Lars Nolle. Analysing and Attacking the 4-Way Handshake of IEEE 802.11i Standard. The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), London, UK, December 9-12, 2013.

Abdullah Alabdulatif, Xiaoqi Ma and Lars Nolle. A Framework for Proving the Correctness of Cryptographic Protocol Properties by Linear Temporal Logic. International Journal of Digital Society, Vol 4, No 1, pp 749-757, 2013.

TMDA: A broadcast-based message. Li Y, Papanastasiou S, Akhlaghinia J and Peytchev E, International Journal on Advances in Telecommunications, 2013, 6 (1&2)

OSMAN, T., SHIRES, L., OMITOLA, T., SHADBOLT, N. and HAGUE, J., 2013. Investigating the use of semantic technologies in spatial mapping applications. In: 27th European Conference on Modelling and Simulation, Aalesund, Norway, 27-30 May 2013. European Council for Modeling and Simulation (ECMS). ISBN 9780956494467

OSMAN, T., RMASWAMY, S., MAHMOUD, S. and SAEED, M., 2013. Utilising semantic technologies for decision support in dementia care. In: 2013 UKSim 15th International Conference on Computer Modelling and Simulation (UKSim), Cambridge, United Kingdom, 10 April 2013. IEEE, pp. 628-633. ISBN 9780769549941

KRAYEM, A., SHERKAT, N., EVETT, L. and OSMAN, T., 2013. Holistic arabic whole word recognition using HMM and block-based DCT. 12th International Conference on Document Analysis and Recognition (ICDAR) 2013, Washington, DC, 25-28 August 2013, pp. 1120-1124. ISSN 1520-5363

OSMAN, T., THAKKER, D. and SCHAEFER, G., 2013. Utilising semantic technologies for intelligent indexing and retrieval of digital images. Computing. ISSN 0010-485X

KANJO, E. and ALBARRAK, L., 2013. Categorizing outdoor places using EEG signals. In: 5th International BCI Meeting Fifth International BCI Meeting, Pacific Grove, California, June 2013, Pacific Grove, California.

KANJO, E., 2013. EnvAware: social network for community environmental awareness. In: International Conference on Computer Systems and Applicatiosn, AICCSA, 2013.

KANJO, E., ALBARRAK, L., ALHAKBANI, N., ALTAMMAMI, S. and ALGHAMDI, N., 2013. I CAN overview of mobile technology for special need. In: IEEE ICTHP-2013, February 2013.

ALAJLAN, M., AL-DOWAIHI, D., AL-ZAHRANI, N., AL-QWIFLY, N., ALJWISR, N. and KANJO, E., 2013. Mbreath: asthma monitoring on the go. In: IEEE International Conference on medical Applications ICCMA, 2013.

KANJO, E. and ALBARRAK, L., 2013. NeuroPlace: making sense of a place. In: 4th International Conference on Augmented Human, in Cooperation with ACM, Stuttgart, March 2013, Stuttgart.

ALHUSSAIN, L. and KANJO, E., 2013. Sense of space: mapping physiological emotion response in urban space. In: SenCity at Ubicomp, Zurich, September 2013, Zurich.

ALAJMI, N., KANJO, E., EL MAWASS, N. and CHAMBERLAIN, A., 2013. Shopmobia: an emotion based shop rating system. In: AFFINE 2013: Affective Interaction in Natural Environments (AFFINE), acii2013, Geneva, September 2013, Geneva, Switzerland.

KANJO, E., EL MAWASS, N. and CRAVEIRO, J.P., 2013. Social, disconnected or in between: mobile data reveals urban mood. In: 3rd International Conference on the Analysis of Mobile Phone Datasets (NetMob'13), Cambridge, Massachusetts, May 2013, Cambridge, Massachusetts.

CRAVEIRO, J.P., RAMOS, F.M.V., KANJO, E. and EL MAWASS, N., 2013. Towards an early warning system: the effect of weather on mobile phone usage. A case study in Abidjan. In: 3rd International Conference on the Analysis of Mobile Phone Datasets (NetMob'13), Cambridge, Massachusetts, May 2013, Cambridge, Massachusetts.

ALHAKBANI, N. and KANJO, E., 2013. Zone based indoor mobile pollution monitoring. In: Human Interfaces for Civic and Urban Engagement , Ubicomp, Zurich, September 2013, Zurich.

ALBARRAK, L. and KANJO, E., 2013. A mobile brain sensing system for recommending third places. In: Human Interfaces for Civic and Urban Engagement, UbiComp, Zurich, September 2013, Zurich.

EL MAWASS, N. and KANJO, E., 2013. A supermarket stress map. In: Pervasive Technologies in Retail Environments, Ubicomp, Zurich, September 2013, Zurich.

ALABDULATIF, A. and MA, X., 2013. Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard. International Journal for Information Security Research (IJISR), 3 (34), pp. 439-448. ISSN 2042-4639

ALABDULATIF, A., MA, X. and NOLLE, L., 2013. Analysing and attacking the 4-way handshake of IEEE 802.11i standard. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST), London, 9 December 2013. IEEE, pp. 382-387. ISBN 9781908320209

MA, X., 2013. A framework for proving the correctness of cryptographic protocol properties by linear temporal logic. International Journal of Digital Society (IJDS), 41 (12), pp. 749-757. ISSN 2040-2570

2012

SBVR: Knowledge Definition, Vocabulary Management, and Rules Integrations. Fayoumi A, Yang L,International Journal of E-Business Development, 2012, 2 (2), 70-76

Appiah, Kofi and Hunter, Andrew and Dickinson, Patrick and Meng, Hongying (2012) Implementation and Applications of Tri-State Self Organising Maps on FPGA. IEEE Transactions on Circuits and Systems for Video Technology (CSVT). Volume 22, Issue 8, pgs 1150 -1160. August 2012.

Xiaoqi Ma. Security Concerns in Cloud Computing. The Fourth International Conference on Computational and Information Sciences, Chongqing, China, August 2012.

Abdullah Alabdulatif, Xiaoqi Ma and Lars Nolle. A Framework for Cryptographic Protocol Analysis Using Linear Temporal Logic. International Conference on Information Society (i-Society 2012), London, UK, June 2012.

New traffic message delivery algorithm for a novel VANET architecture. Li Y, Peytchev E, ICWMC 2012 The Eighth International Conference on Wireless and Mobile Communications, 25-28 June 2012, Venice, Italy, 395-401, ISBN: 978-1-61208-203-5

KANJO, E., 2012. Tools and architectural support for mobile phone based crowd control systems. Network Protocols and Algorithms, 4 (3), pp. 4-14. ISSN 1943-3581

KANJO, E., PLATZER, E. and KITTL, C., 2012. Viral message passing framework for crowd and sensor applications. In: Fourth International Conference on Networked Digital Technologies, Dubai, 2012, Dubai.

KANJO, E., PLATZER, E. and KITTL, C., 2012. ViralNet: a way to make short-range messages instantly viral. In: ICICS '12: 3rd International Conference on Information and Communication Systems, Jordan 2012, Jordan.

MA, X., 2012. Security concerns in cloud computing. In: The Fourth International Conference on Computational and Information Sciences, Chongqing, China, August 2012, Chongqing, China.

ALABDULATIF, A., MA, X. and NOLLE, L., 2012. A framework for cryptographic protocol analysis using linear temporal logic. In: International Conference on Information Society (i-Society 2012), London, June 2012, London.

2011

LEE, K., KAUFMANN, N. and BUSS, G., 2011. Trust issues in Web service mash-ups. First Monday, 16 (8). ISSN 1396-0466

ISIAQ, S.O., OSMAN, T. and PEYTCHEV, E., 2011. Managing contextual information in semantically-driven temporal information systems. In: 2011 UkSim 13th International Conference on Computer Modelling and Simulation (UKSim), Cambridge, United Kingdom, 30 March 2011. IEEE, pp. 451-456. ISBN 9781612847054

Wakeman, I., Light, A., Robinson, J., Chalmers, D., Basu, A. (2011) Deploying Pervasive Advertising in a Farmers' Market. Chapter in Pervasive Advertising and Shopping, Springer HCI Series (2011)

Appiah, Kofi and Hunter, Andrew and Waltham, Christopher (2011) Low-power and efficient ambient assistive care system for elders. In: Proceedings of CVPR 2011 (The Seventh IEEE Embedded Computer Vision Workshop), 20-25th June 2011, Colorado Springs

Xiaoqi Ma. Database Deductive Access Control. Journal of Computers, Vol 6, No 5, pp 1024-1031, 2011.

Xiaoqi Ma. Resisting Tracker Attacks By Query Terms Analysis. Key Engineering Materials, Vol 450, pp 385-388, 2011.

ISIAQ, S.O., OSMAN, T. and PEYTCHEV, E., 2011. Managing contextual information in semantically-driven temporal information systems. In: 2011 UkSim 13th International Conference on Computer Modelling and Simulation (UKSim), Cambridge, United Kingdom, 30 March 2011. IEEE, pp. 451-456. ISBN 9781612847054

2010

Robinson, J., Wakeman, I., Chalmers, D., Horsfall, B. Trust and the Internet of Things. (2010) Proceedings of the International Workshop on Trusted Communications in Decentralised Computing, Morioka, Japan.

Wakeman, I., Light, A., Robinson, J., Chalmers, D., Basu, A. (2010) Bringing the Virtual to the Farmers' Market: Designing for Trust in Pervasive Computing Systems. Proceedings of the Fourth IFIPTM International Conference on Trust Management, Morioka, Japan.

Wakeman, I., Light, A., Robinson, J., Chalmers, D., Basu, A. Deploying Ubiquitous Computing Applications in a Farmers' Market. (2010) In Proceedings of Pervasive Advertising & Shopping, Helsinki, Finland. 2010.

Lee, Kevin; Murray, David; Hughes, Danny; Joosen, Wouter; ",Extending sensor networks into the cloud using amazon web services, "Networked Embedded Systems for Enterprise Applications (NESEA), 2010 IEEE International Conference on",,,1-7,2010,IEEE

Lee, Kevin; Hughes, Danny; ",System architecture directions for tangible cloud computing, "Cryptography and Network Security, Data Mining and Knowledge Discovery, E-Commerce & Its Applications and Embedded Systems (CDEE), 2010 First ACIS International Symposium on",,,258-262,2010,IEEE

Appiah, Kofi and Hunter, Andrew and Dickinson, Patrick and Meng, Hongying (2010) Accelerated hardware video object segmentation: from foreground detection to connected components labelling. Computer Vision and Image Understanding.

A vehicle-to-vehicle communication protocol for collaborative identification of urban traffic conditions. Risan Ø, Peytchev E, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010, 49, 9, 482-494

Internet-based information flow in mobile systems and their application in traffic monitoring ad hoc networks. Peytchev E, Spasov G, Spasova V, IEEE 52 International Symposium ELMAR-2010, 15-17 September 2010, Zadar Croatia, 265-268, ISBN 978-953-7044-11-4

KHIDER, H., OSMAN, T. and SHERKAT, N., 2010. Attribute-based authorization for grid computing. In: Proceedings of International Conference on Intelligent Systems, Modelling and Simulation. IEEE Computer Society Conference Publishing Services, pp. 71-74. ISBN 9780769539737

THAKKER, D., OSMAN, T., GOHIL, S. and LAKIN, P., 2010. A pragmatic approach to semantic repositories benchmarking. In: L. AROYO, G. ANTONIOU, E. HYVÖNEN, A.T. TEIJE, H. STUCKENSCHMIDT, L. CABRAL and T. TUDORACHE, eds., The semantic web: research and applications. Berlin; Heidelberg: Springer, pp. 379-393. ISBN 9783642134852

KANJO, E., 2010. NoiseSPY: a real-time mobile phone platform for urban noise monitoring and mapping. Mobile Networks and Applications, 15 (4), pp. 562-574. ISSN 1383-469X

2009

Improving Knowledge Handling by Building Intelligent Systems Using Social Agent Modelling. Fayoumi A, Faris H and Grippa F, Fourth International Multi-Conference on Computing in the Global Information Technology, ICCGI '09, 2009, 86-91

Lee, Kevin; Paton, Norman W; Sakellariou, Rizos; Deelman, Ewa; Fernandes, Alvaro AA; Mehta, Gaurang; ",Adaptive workflow processing and execution in pegasus, Concurrency and Computation: Practice and Experience,21,16,1965-1981,2009,Wiley Online Library

Lee, Kevin; Paton, Norman W; Sakellariou, Rizos; Fernandes, Alvaro AA; ",Utility Driven Adaptive Workflow Execution, Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid,,,220-227,2009,IEEE Computer Society

Mathematical justification of a heuristic for statistical correlation of real-life time series. Agafonov E, Burke E, Bargiela A, Peytchev E, European Journal Of Operational Research, 2009, 198 (1), 275-286

OSMAN, T., THAKKER, D. and AL-DABASS, D., 2009. Utilisation of case-based reasoning for semantic web services composition. International Journal of Intelligent Information Technologies, 5 (1), pp. 24-42. ISSN 1548-3657

KANJO, E., BACON, J., ROBERTS, D. and LANDSHOFF, P., 2009. MobSens: making smart phones smarter. IEEE Pervasive Computing, 8 (4), pp. 50-57. ISSN 1536-1268

RUSSELL, D., POWER, D., SLAYMAKER, M., MOSTEFAOUI, G.K., MA, X. and SIMPSON, A., 2009. On the secure sharing of legacy data. In: 6th International Conference onInformation Technology: New Generations (ITNG 2009), Las Vegas, Nevada, 27-29 April 2009, Las Vegas.

2008

Basu, A., Wakeman, I., Chalmers, D., & Robinson, J. (2008) A Behavioural Model for Client Reputation. In Proceedings of Workshop on Trust In Mobile Environments (TIME 2008). Trondheim, Norway.

Robinson, J., Wakeman, I., Chalmers, D., & Basu, A. (2008) The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications. In IFIP International Federation for Information Processing. Volume 263. Trust Management II. Karabulut, Y., Mitchell, J., Herrmann, P., Damsgaard Jensen, C. Boston, Springer, pp. 183-197.

Robinson, J., Wakeman, I., & Chalmers, D. (2008) Composing Software Services in the Pervasive Computing Environment: Languages or APIs? Journal of Pervasive and Mobile Computing, 4(4), pp. 481-505.

KANJO, E. and LANDSHOFF, P., 2008. Fresh: CellID based mobile forum for community environmental awareness. In: Ubicomp Conference, Workshop on Ubiquitous Sustainability: Citizen Science. & Activism, Seoul, 2008, Seoul.

KANJO, E., 2008. Cambridge Mobile Urban Sensing (CamMobSens). Sensor Review, 28 (3). ISSN 0260-2288

KANJO, E., BENFORD, S., PAXTON, M., CHAMBERLAIN, A., STANTON FRASER, D., WOODGATE, D., CRELLIN, D. and WOOLARD, A., 2008. MobGeoSen: facilitating personal geosensor data collection and visualization using mobile phones. Personal and Ubiquitous Computing, 12 (8), pp. 599-607. ISSN 1617-4909

KANJO, E., HAYES, M., SIMMONS, M. and LANDSHOFF, P., 2008. Scalable mobile sensing system. In: UK e-Science All Hands Conference, Edinburgh, 2008, Edinburgh.

SIMPSON, A., POWER, D., RUSSELL, D., SLAYMAKER, M., MOSTEFAOUI, G.K., MA, X. and WILSON, G., 2008. A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries. In: Proceedings of HealthGrid 2008, Chicago.

MA, X. and CHENG, X., 2008. Verifying security protocols by knowledge analysis. International Journal of Security and Networks, 3 (3), pp. 183-192.

MA, X., CHENG, X., HUANG, S. and CHENG, M., 2008. Mechanical verification of cryptographic protocols. In: S. HUANG, D. MACCALLUM and D.Z. DU, eds., Network security. Springer.

2007

Lee, Kevin; Sakellariou, Rizos; Paton, Norman W; Fernandes, Alvaro AA; ",Workflow adaptation as an autonomic computing problem, Proceedings of the 2nd workshop on Workflows in support of large-scale science,,,29-34,2007,ACM

ADAMCZYK, P., HAMILTON, K., CHAMBERLAIN, A., BENFORD, S., TANDAVANITJ, N., OLDROYD, A., HARTMAN, K., LONDON, K., SRISKANDARAJAH, S., KANJO, E., LANSHOFF, P., SEZAKI, K., KONOMI, S., NIAZI, M.A., AHMAD, H.F., MIRZA, F., ALI, A., ROUSSOS, G., PAPADOGKONAS, D. and LEVENE, M., 2007. Urban computing and mobile devices. IEEE Distributed Systems Online, 8 (7), p. 2. ISSN 1541-4922

OSMAN, T., THAKKER, D. and AL-DABASS, D., 2007. Web services hybrid dynamic composition models for the enterprise. In: W. LAM and V. SHANKARARAMAN, eds., Enterprise architecture and integration: methods, implementation and technologies. Idea Group Inc., pp. 225-239. ISBN 1591408873

OSMAN, T., THAKKER, D., SCHAEFER, G. and LAKIN, P., 2007. An integrative semantic framework for image annotation and retrieval. In: The 2007 IEEE/WIC/ACM International Conference on Web Intelligence, Fremont, CA, November 2007. IEEE, pp. 366-373. ISBN 9780769530260

WOODLAND, D., FRASER, S., KANJO, E., PAXTON, M. and BENFORD, S., 2007. Mobile (phone)s in schools: reflections on an exercise in participatory design with children in the wild. In: The Tenth European Conference on Computer Supported Cooperative Work (ECSCW), 2007.

2006

PEYTCHEV, E., OSMAN, T., AL-DABASS, D., THOMAS, M. and HI, S., 2006. Communication technologies for collaborative sensing and control in vehicular ad-hoc networks. In: 8th International Conference on Advanced Communication Technology - Toward the Era of Ubiquitous Networks and Societies, Ministry of Information and Communication, Phoenix Park, South Korea, 20-22 February 2006. ISBN 8955191294

Lee, Kevin; Coulson, Geoffrey; ",Supporting runtime reconfiguration on network processors, Journal of Interconnection Networks,7,04,475-492,2006,World Scientific

MA, X. and CHENG, X., 2006. Syntax, semantics and type theory of a security protocol verification framework. In: IEEE SMC UK-RI Conference on Advances in Cybernetic Systems 2006, Sheffield, September 2006, Sheffield.

MA, X., MCCRINDLE, R. and CHENG, X., 2006. Verifying and fixing password authenticationprotocol. In: Proceedings of the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Network, and Parallel/Distributed Computing (SNPD 2006) and the 2nd ACIS International Workshop on Self-Assembling Wireless Networks (SAWN 2006), Las Vegas.

2005

ZHI, S., THOMAS, M., PEYTCHEV, E., OSMAN, T. and AL-DABASS, D., 2005. Embedded communication and java technologies for traffic information in vehicular ad hoc networks. In: M.H. HAMZA, P. PRAPINMONKOLKARN and T. ANGKAEW, eds., International Conference on Networks and Communication Systems (NCS2005), Krabi, Thailand, 18 April, 2005. ISBN 088986490X

OSMAN, T. and PEYTCHEV, E., 2005. An agent-based approach to open-access transportation telematics applications. In: Proceedings of UKSIM 2003. Nottingham: United Kingdom Simulation Society, pp. 225-230. ISBN 1842330888

KHALIL, M., PEYTCHEV, E. and AL-DABASS, D., 2005. A computing environment for urban traffic systems. In: IEEE 7th International Conference on Advanced Communication Technology, Phoenix Park, Korea, 21 February 2005. pp. 807-812. ISBN 8955191243

ZHI, S., OSMAN, T., PEYTCHEV, E. and AL-DABASS, D., 2005. A review of communication and Java technologies in the ATTAIN project. In: 2004 IEEE International Conference on Networking, Sensing and Control, Taipei, Taiwan, 21 March, 2004. pp. 1400-1405. ISBN 0790381939

OSMAN, T., SERRA, M., DELODE, O., PEYTCHEV, E. and HUET, T., 2005. An integrative framework for traffic telematics web services. Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, pp. 375-380. ISSN 1027-2666

MA, X. and CHENG, X., 2005. Formal verification of merchant registration phase of SET protocol. In: Proceedings of the 11th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2005), Sheffield.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Knowledge based approach for mechanical lyverifying security protocols. In: The Nineteenth International Joint Conference on Artificial Intelligence (IJCAI 2005), Edinburgh, Scotland, 30 July - 5 August 2005, Edinburgh.

CHENG, X., MA, X., CHENG, M. and HUANG, S.C.H., 2005. Proving secure properties of cryptographic protocols. In: 24th IEEE International Performance Computing and Communications Conference (IPCCC 2005), Phoenix, Arizona, 7-9 April 2005, Phoenix, Arizona.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Secrecy proofs of SET purchase request phase. In: Proceedings of the 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Verifying cardholder registration phase in SET protocol. In: Proceedings of the 2005 IEEE SMC UK-RI Conference on Applied Cybernetics (AC2005), London.

CHENG, X., HE, X., MA, X., ZHOU, D., DUAN, P. and ZHONG, S., 2005. An agent based education resource purvey system. In: The 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China, 15-19 December 2005, Xi'an, China.

CHENG, X., MA, X., WANG, L. and ZHONG, S., 2005. A mobile agent based spam filter system. In: The 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China, 15-19 December 2005, Xi'an, China.

HE, R., ZHONG, S., CHENG, X. and MA, X., 2005. A personalised search engine for Chinese educational resources. In: Proceedings of the 2005 IEEE SMC UK-RI Conference on Applied Cybernetics (AC2005), London.

MA, X. and CHENG, X., 2005. Formal verification of merchant registration phase of SETProtocol. International Journal of Automation and Computing, 2005 (2), pp. 155-162.

MA, X. and CHENG, X., 2005. Verifying cryptographic protocols. IEEE Journal of Intelligent Cybernetic Systems, 2005 (1).

CHENG, X., HE, X., MA, X., ZHOU, D., DUAN, P. and ZHONG, S., 2005. An agent based education resource purvey system. Lecture Notes in Computer Science, 3801, pp. 381-386. ISSN 0302-9743

CHENG, X., MA, X., WANG, L. and ZHONG, S., 2005. A mobile agent based spam filter system. Lecture Notes in Computer Science, 3801, pp. 422-427. ISSN 0302-9743

2004

Robinson, J., Wakeman, I., & Owen, T. (2004) Scooby: Middleware for Service Composition in Pervasive Computing. In Proceedings of the 2nd International Workshop on Middleware for Pervasive and Ad-Hoc Computing, 2004, Toronto, Canada. New York, ACM, pp. 161-166.

THOMAS, M., PEYTCHEV, E. and AL-DABASS, D., 2004. Auto-sensing and distribution of traffic information in vehicular ad hoc networks. International Journal of Simulation Systems, Science & Technology, 5 (34), pp. 59-63. ISSN 1473-804X (online), 1473-8081 (print)

BILCHEV, G., MARSTON, D., HRISTOV, N., PEYTCHEV, E. and WALL, N., 2004. Traffimatics - intelligent co-operative vehicle highway systems. Bt Technology Journal, 22 (3), pp. 73-83. ISSN 1358-3948

THOMAS, M., PEYTCHEV, E. and AL-DABASS, D., 2004. Auto-sensing and distribution of traffic information in vehicular ad hoc networks. In: Conference proceedings of the UK Simulation Society. pp. 124-128. ISBN 1842330993

KANJO, E., ASTHEIMER, P. and MARSHAL, I., 2004. Supporting face-to-face communications through interactive toys space. In: IEEE ICTTA, IEEE International Conference on Information & Communication Technologies: From Theory to Applications, 2004.

TIEYING LU, K., ASTHEIMER, P., KANJO, E. and REN, J., 2004. Vision-based innovative network games. In: (ADCOG) 3rd International Conference on Application and Development of Computer Games, Hong-Kong, 2004, Hong Kong.

MA, X., YE, Y. and SUN, Y., 2004. An implementation of resource reservation schemein real-time operating system. Journal of the Graduate School of the Chinese Academy of Sciences, 21 (1), pp. 113-118.

MA, X., 2004. Free software and open source movement. Kunming: Yunnan University Press.

SUN, P., MA, X., CHENG, X., YU, X. and ZHONG, S., 2004. Knowledge management for e-learning system. In: Proceedings of the 10th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2004), Liverpool.

MA, X. and CHENG, X., 2004. Verifying cryptographic protocols. In: Proceedings of the IEEESMC UK-RI 3rd Conference on Intelligent Cybernetic Systems (ICS'04), Londonderry.

HE, X., MA, X., CHENG, X., YU, X. and ZHONG, S., 2004. A mobile agent based intrusion detection system. In: Proceedings of the 10th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2004), Liverpool.