Carsten Maple

According to our database1, Carsten Maple authored at least 158 papers between 1999 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security.
IEEE Trans. Engineering Management, 2020

Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security".
IEEE Trans. Engineering Management, 2020

Volunteer Computing in Connected Vehicles: Opportunities and Challenges.
IEEE Netw., 2020

Secrecy Outage Analysis for Alamouti Space-Time Block Coded Non-Orthogonal Multiple Access.
IEEE Commun. Lett., 2020

Real-time anomaly detection with superexperts.
CoRR, 2020

Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems.
CoRR, 2020

CyRes - Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract).
CoRR, 2020

Differentially Private Health Tokens for Estimating COVID-19 Risk.
CoRR, 2020

Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic.
CoRR, 2020

Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics.
CoRR, 2020

SecureABC: Secure AntiBody Certificates for COVID-19.
CoRR, 2020

Fogbanks: Future Dynamic Vehicular Fog Banks for Processing, Sensing and Storage in 6G.
CoRR, 2020

Fuzzy Logic-Based Novel Hybrid Fuel Framework for Modern Vehicles.
IEEE Access, 2020

A Novel Fog-Based Multi-Level Energy-Efficient Framework for IoT-Enabled Smart Environments.
IEEE Access, 2020

Towards Energy Efficient Smart Grids Using Bio-Inspired Scheduling Techniques.
IEEE Access, 2020

An Effective Mechanism to Mitigate Real-Time DDoS Attack.
IEEE Access, 2020

Design and Development of Industrial Cyber-Physical System Testbed.
Proceedings of the Advanced, Contemporary Control - Proceedings of KKA 2020, 2020

Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations.
Proceedings of the 16th European Dependable Computing Conference, 2020

2019
A Novel Internet of Things-Enabled Accident Detection and Reporting System for Smart City Environments.
Sensors, 2019

Peer-assisted location authentication and access control for wireless networks.
Internet Technol. Lett., 2019

Hybrid feature selection technique for intrusion detection system.
Int. J. High Perform. Comput. Netw., 2019

Deterrence and prevention-based model to mitigate information security insider threats in organisations.
Future Gener. Comput. Syst., 2019

A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape.
CoRR, 2019

An opportunistic resource management model to overcome resource-constraint in the Internet of Things.
Concurr. Comput. Pract. Exp., 2019

A Novel Bio-Inspired Hybrid Algorithm (NBIHA) for Efficient Resource Management in Fog Computing.
IEEE Access, 2019

Emotion Classification and Crowd Source Sensing; A Lexicon Based Approach.
IEEE Access, 2019

Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities.
IEEE Access, 2019

Intrusion Detection Systems for Intra-Vehicle Networks: A Review.
IEEE Access, 2019

Throughput Aware Authentication Prioritisation for Vehicular Communication Networks.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Shadows Don't Lie: n-Sequence Trajectory Inspection for Misbehaviour Detection and Classification in VANETs.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages.
Proceedings of the Software Engineering and Formal Methods - 17th International Conference, 2019

The impact of decreasing transmit power levels on FlockLab to achieve a sparse network.
Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, 2019

2018
Low Latency Parallel Turbo Decoding Implementation for Future Terrestrial Broadcasting Systems.
IEEE Trans. Broadcast., 2018

Motivation and opportunity based model to reduce information security insider threats in organisations.
J. Inf. Secur. Appl., 2018

Information security collaboration formation in organisations.
IET Inf. Secur., 2018

A Longitudinal Analysis of the Public Perception of the Opportunities and Challenges of the Internet of Things.
CoRR, 2018

Dynamic Route Selection for Vehicular Store-Carry-Forward Networks and Misbehaviour Vehicles Analysis.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Developing Offloading-Enabled Application Development Frameworks for Android Mobile Devices.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Selecting Effective Blockchain Solutions.
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018

2017
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks.
Secur. Commun. Networks, 2017

The internet of things: interaction challenges to meaningful consent at scale.
Interactions, 2017

A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks.
IEEE Access, 2017

CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Data fidelity: Security's soft underbelly.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

A threat based approach to computational offloading for collaborative cruise control.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detection.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

2016
Re-thinking threat intelligence.
Proceedings of the 2016 International Conference on Cyber Conflict, 2016

Incremental information gain analysis of input attribute impact on RBF-kernel SVM spam detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

2015
Self-IQ-Demodulation Based Compensation Scheme of Frequency-Dependent IQ Imbalance for Wideband Direct-Conversion Transmitters.
IEEE Trans. Broadcast., 2015

Can a Mobile Game Teach Computer Users to Thwart Phishing Attacks?
CoRR, 2015

A New Approach for Selecting Informative Features For Text Classification.
Proceedings of the LWA 2015 Workshops: KDML, 2015

A Machine Learning Framework to Detect and Document Text-Based Cyberstalking.
Proceedings of the LWA 2015 Workshops: KDML, 2015

A hybrid approach to combat email-based cyberstalking.
Proceedings of the Fourth International Conference on Future Generation Communication Technology (FGCT 2015), 2015

Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks.
Proceedings of the Fourth International Conference on Cyber Security, 2015

2014
K-Order Surrounding Roadmaps Path Planner for Robot Path Planning.
J. Intell. Robotic Syst., 2014

Taxonomy of optimisation techniques and applications.
Int. J. Comput. Appl. Technol., 2014

Erratum to: An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks.
Int. J. Autom. Comput., 2014

Dynamic user equipment-based hysteresis-adjusting algorithm in LTE femtocell networks.
IET Commun., 2014

Low cost estimation of IQ imbalance for direct conversion transmitters.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2014

2013
Integrated Sensing Techniques for Assistive Chairs: A Survey towards Sit-to-Stand Problems.
Int. J. Intell. Mechatronics Robotics, 2013

Localization in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013

An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks.
Int. J. Autom. Comput., 2013

Real-time compliance control of an assistive joint using QNX operating system.
Int. J. Autom. Comput., 2013

A hybrid swarm intelligence algorithm for multiuser scheduling in HSDPA.
Appl. Soft Comput., 2013

Human interaction based Robot Self-Learning approach for generic skill learning in domestic environment.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Control channel etiquettes: Implementation and evaluation of a hybrid approach for cognitive radio networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Silicon wafer modification by laser interference.
Proceedings of the 8th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2013

A novel symmetric key cryptographic authentication for cooperative communication in cognitive radio networks.
Proceedings of the 2013 19th International Conference on Automation and Computing, 2013

Cognitive radio networks for Internet of Things: Applications, challenges and future.
Proceedings of the 2013 19th International Conference on Automation and Computing, 2013

Challenges in mobile localisation in wireless sensor networks for disaster scenarios.
Proceedings of the 2013 19th International Conference on Automation and Computing, 2013

Three-dimensional localisation for wireless sensor networks using probabilistic fuzzy logic.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

Subspace-based SNR estimator for OFDM system under different channel conditions.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2013

2012
Implementation and Co-Simulation of Hybrid Pilot-Aided Channel Estimation With Decision Feedback Equalizer for OFDM Systems.
IEEE Trans. Broadcast., 2012

Cyberstalking in the UK: Analysis and Recommendations.
Int. J. Distributed Syst. Technol., 2012

Optimal Placement of the Wind Generators in the Medium Voltage Power Grid.
Int. J. Distributed Syst. Technol., 2012

Trust Issues on Crowd-Sourcing Methods for Urban Environmental Monitoring.
Int. J. Distributed Syst. Technol., 2012

A Survey of Localization in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2012

Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls.
IET Inf. Secur., 2012

A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem.
Decis. Support Syst., 2012

Bayesian Assessment of Newborn Brain Maturity from Two-Channel Sleep Electroencephalograms.
Comput. Math. Methods Medicine, 2012

Fuzzy optimisation based symbolic grounding for service robots.
Proceedings of the 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2012

Fuzzy logic based symbolic grounding for best grasp pose for homecare robotics.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

Classification of multi-channels SEMG signals using wavelet and neural networks on assistive robot.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

Case study: Laser nanoscale manufacturing (LaserNaMi).
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

A multi-objective genetic algorithm for minimising network security risk and cost.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

Case study: Multi-role shadow robotic system for independent living.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

Bid writing: Is project management different? What is appropriate?
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

Bid writing: EU project impact.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

2011
Managing threats by the use of visualisation techniques.
Int. J. Space Based Situated Comput., 2011

Towards a corporate governance trust agent scoring model for collaborative virtual organisations.
Int. J. Grid Util. Comput., 2011

Defining Minimum Requirements of Inter-Collaborated Nodes by Measuring the Weight of Node Interactions.
Int. J. Distributed Syst. Technol., 2011

Genetic algorithm based solution to dead-end problems in robot navigation.
Int. J. Comput. Appl. Technol., 2011

Guaranteeing the timely transmission of periodic messages with arbitrary deadline constraints using the timed token media access control protocol.
IET Commun., 2011

A novel hybrid tabu search approach to container loading.
Comput. Oper. Res., 2011

A Theoretical Framework for Addressing Trust in Open Pervasive Networks.
Proceedings of the PECCS 2011, 2011

An On-line Distributed Induction Motor Monitoring System Based-on ARM and CAN Bus.
Proceedings of the Sixth International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2011), 2011

Optimal Placement of the Wind Generators in the Medium Voltage Power Grid.
Proceedings of the Sixth International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2011), 2011

Optimal Placement of Wind Generators in Medium Voltage Power Grids - Investigations of Genetic Algorithm.
Proceedings of the Sixth International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2011), 2011

Toward optimal multi-objective models of network security: Survey.
Proceedings of the 17th International Conference on Automation and Computing, 2011

Localisation algorithm in wireless sensor networks.
Proceedings of the 17th International Conference on Automation and Computing, 2011

Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET.
Proceedings of the 2011 Frontiers of Information Technology, 2011

2010
Modelling Self-Led Trust Value Management in Grid and Service Oriented Infrastructures: A Graph Theoretic Social Network Mediated Approach.
Int. J. Syst. Serv. Oriented Eng., 2010

A novel lifecycle model for Web-based application development in small and medium enterprises.
Int. J. Autom. Comput., 2010

Feature Importance in Bayesian Assessment of Newborn Brain Maturity from EEG
CoRR, 2010

An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes.
Proceedings of the SIGMAP 2010, 2010

Infinite Alphabet Passwords - A Unified Model for a Class of Authentication Systems.
Proceedings of the SECRYPT 2010, 2010

A Visualisation Technique for the Identification of Security Threats in Networked Systems.
Proceedings of the 14th International Conference on Information Visualisation, 2010

The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Towards decentralized grid agent models for continuous resource discovery of interoperable grid Virtual Organisations.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

A High-Level Semiotic Trust Agent Scoring Model for Collaborative Virtual Organsations.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss.
Proceedings of the ARES 2010, 2010

A Resource Discovery Architecture of Loosely Coupled Grid Inter-cooperated Virtual Organisations Using Mobile Agents and Neural Networks.
Proceedings of the 3PGCIC 2010, 2010

2009
Guaranteeing hard real-time traffic with legitimately short deadlines with the timed token protocol.
Comput. Stand. Interfaces, 2009

Musipass: authenticating me softly with "my" song.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

A dynamically adaptive, dimensionalised, experience feedback mechanism within second life.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009

2008
Comparing Robustness of Pairwise and Multiclass Neural-Network Systems for Face Recognition.
EURASIP J. Adv. Signal Process., 2008

Web Application Development Lifecycle for Small Medium-Sized Enterprises (SMEs) (Short Paper).
Proceedings of the Eighth International Conference on Quality Software, 2008

An Evolutionary-Based Approach to Learning Multiple Decision Models from Underrepresented Data.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Active Robot Learning for Building Up High-Order Beliefs.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Reliability, Availability and Security of Wireless Networks in the Community.
Informatica (Slovenia), 2007

UMTS base station location planning: a mathematical model and heuristic optimisation algorithms.
IET Commun., 2007

Comparing Robustness of Pairwise and Multiclass Neural-Network Systems for Face Recognition
CoRR, 2007

The Bayesian Decision Tree Technique Using an Adaptive Sampling Scheme.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

A New Scheme for Deniable/Repudiable Authentication.
Proceedings of the Computer Algebra in Scientific Computing, 10th International Workshop, 2007

2006
Enriching the Object-Oriented Paradigm via Shadows in the Context of Mathematics.
J. Object Technol., 2006

Preparing computing students for culturally diverse e-mediated IT projects.
Interact. Technol. Smart Educ., 2006

Creating a Forest of Binary Search Trees for a Multiprocessor System.
Proceedings of the Fifth International Conference on Parallel Computing in Electrical Engineering (PARELEC 2006), 2006

Maintaining a Random Binary Search Tree Dynamically.
Proceedings of the 10th International Conference on Information Visualisation, 2006

A Graph Theoretic Framework for Trust - From Local to Global.
Proceedings of the 10th International Conference on Information Visualisation, 2006

Using A Bayesian Averaging Model for Estimating the Reliability of Decisions in Multimodal Biometrics.
Proceedings of the The First International Conference on Availability, 2006

The Usability and Practicality of Biometric Authentication in the Workplace.
Proceedings of the The First International Conference on Availability, 2006

Choosing the Right Wireless LAN Security Protocol for the Home and Business User.
Proceedings of the The First International Conference on Availability, 2006

A Lightweight Model of Trust Propagation in a Multi-Client Network Environment: To What Extent Does Experience Matter?.
Proceedings of the The First International Conference on Availability, 2006

2005
A Novel Efficient Algorithm for Determining Maximum Common Subgraphs.
Proceedings of the 9th International Conference on Information Visualisation, 2005

A Novel Scalable Parallel Algorithm for Finding Optimal Paths over Heterogeneous Terrain.
Proceedings of the 9th International Conference on Information Visualisation, 2005

Sitecam: A Multimedia Tool for the Exploration of Construction Environments.
Proceedings of the 9th International Conference on Information Visualisation, 2005

2004
Parallel Genetic Algorithms for Third Generation Mobile Network Planning.
Proceedings of the 2004 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2004), 2004

A Three-dimensional Object Similarity Test Using Graph Matching Techniques.
Proceedings of the 8th International Conference on Information Visualisation, 2004

The Use of Multiple Co-ordinated Views in Three-dimensional Virtual Environments.
Proceedings of the 8th International Conference on Information Visualisation, 2004

2003
Prediction of Malignant Melanoma Incidence.
Proceedings of the IASTED International Conference on Modelling and Simulation (MS 2003), 2003

A Visual Formalism for Graphical User Interfaces based on State Transition Diagrams.
Proceedings of the Seventh International Conference on Information Visualization, 2003

A Generic Visualisation and Editing Tool for Hierarchical and Object-Oriented Systems.
Proceedings of the Seventh International Conference on Information Visualization, 2003

Determining Candidate Binding Site Locations Using Conserved Features.
Proceedings of the Seventh International Conference on Information Visualization, 2003

Planarity Testing for Graphs Represented by A Rotation Scheme.
Proceedings of the Seventh International Conference on Information Visualization, 2003

A Graph Drawing Algorithm for Spherical Pictures.
Proceedings of the Seventh International Conference on Information Visualization, 2003

Geometric Desing and Space Planning Using the Marching Squares and Marching Cube Algorithms.
Proceedings of the 2003 International Conference on Geometric Modeling and Graphics, 2003

Task Scheduling for Jobs of a Non-constant Workload over a Heterogeneous Network.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

2002
Parallel Solutions of Large Dense Linear Systems Using MPI.
Proceedings of the 2002 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2002), 2002

A Framework for and Implementation of Intelligent Task Distribution.
Proceedings of the 2002 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2002), 2002

Determining Roots of Real-Valued Functions of a Single Variable over a Distributed Network.
Proceedings of the 2002 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2002), 2002

A Boundary Representation and Comparison Technique for Two-Dimensional Objects.
Proceedings of the International Conference on Information Visualisation, 2002

2001
A Boundary Representation Technique for Three-Dimensional Objects.
Proceedings of the International Conference on Information Visualisation, 2001

Finding and Characterising Candidate Binding Sites.
Proceedings of the International Conference on Information Visualisation, 2001

2000
Co-Planar Shape-Fitting Using the Rotating Squares Algorithm.
Proceedings of the International Conference on Information Visualisation, 2000

1999
Solving Hamiltonian systems arising from ODE eigenproblems.
Numer. Algorithms, 1999


  Loading...