Skip to main content

and
  1. Article

    Open Access

    Leveraging siamese networks for one-shot intrusion detection model

    The use of supervised Machine Learning (ML) to enhance Intrusion Detection Systems (IDS) has been the subject of significant research. Supervised ML is based upon learning by example, demanding significant vol...

    Hanan Hindy, Christos Tachtatzis in Journal of Intelligent Information Systems (2023)

  2. No Access

    Chapter and Conference Paper

    Designing a New Search Space for Multivariate Time-Series Neural Architecture Search

    With the rise of edge computing and the Internet of Things (IoT), there is an increasing demand for models with low memory footprints. These models must be adaptable to embedded system applications, while bein...

    Christopher MacKinnon, Robert Atkinson in Advanced Analytics and Learning on Temporal Data (2023)

  3. No Access

    Chapter and Conference Paper

    Interoperability and Integration Testing Methods for IoT Systems: A Systematic Map** Study

    The recent active development of Internet of Things (IoT) solutions in various domains has led to an increased demand for security, safety, and reliability of these systems. Security and data privacy are curre...

    Miroslav Bures, Matej Klima, Vaclav Rechtberger in Software Engineering and Formal Methods (2020)

  4. Chapter and Conference Paper

    From Cyber-Security Deception to Manipulation and Gratification Through Gamification

    With the ever growing networking capabilities an...

    Xavier Bellekens, Gayan Jayasekara, Hanan Hindy in HCI for Cybersecurity, Privacy and Trust (2019)

  5. Chapter and Conference Paper

    Comparative Study of Laptops and Touch-Screen PCs for Searching on the Web

    This study compares the use of a laptop versus a touch-screen PC to perform web-based information search tasks. Thirty-six participants took part in a lab-based experiment. They were asked to use either a lapt...

    Nicolas Debue, Cécile van de Leemput in Engineering Psychology and Cognitive Ergon… (2018)

  6. No Access

    Chapter and Conference Paper

    Assessment of Effective Radiated Power of the Partial Discharge Emulator Source

    Two effective partial discharge (PD) measurement techniques are used; a galvanic contact measurement technique similar to the IEC 60270 standard measurement and free-space radiometric (FSR) measurement. Severa...

    Adel Jaber, Pavlos Lazaridis, Bahghtar Saeed, Yong Zhang in Wireless and Satellite Systems (2017)

  7. No Access

    Chapter and Conference Paper

    Investigating the Utility of Eye-Tracking Information on Affect and Reasoning for User Modeling

    We investigate the utility of an eye tracker for providing information on users’ affect and reasoning. To do so, we conducted a user study, results from which show that users’ pupillary responses differ signif...

    Kasia Muldner, Robert Christopherson in User Modeling, Adaptation, and Personaliza… (2009)

  8. No Access

    Chapter and Conference Paper

    An Evaluation of Intelligent Reading Tutors

    Reading comprehension is a very important life skill, yet millions of Americans are functionally illiterate. Technology can help, but most computer-based training programs for reading skills fall short in thei...

    Sowmya Ramachandran, Robert Atkinson in Intelligent Tutoring Systems (2008)