Professional (re)accreditation: Future proofing the MSc Human Resource Management
Presentation / Conference Contribution
Gerard, L., & McLean, L. (2025, April)
Professional (re)accreditation: Future proofing the MSc Human Resource Management. Presented at Employability Symposium 2025: 1, 2,3 Es: 'It's a easy as A,B,C (or is it?), Online
The MSc in Human Resource Management at Âé¶¹ÉçÇø offers a model of how academic institutions can maintain relevance and quality in professional education by...
The social conception of space of birth according to women with positive birth experiences: A trans-European study
Journal Article
Kuipers, Y. J., Thomson, G., van Beeck, E., Hresanová, E., Goberna-Tricas, J., Rodriguez Martin, S., Cuker, S. R., Chudaska, L., Waldner, I., Zenzmaier, C., & Leinweber, J. (2025)
The social conception of space of birth according to women with positive birth experiences: A trans-European study. Women and Birth, 38(3), Article 101916. https://doi.org/10.1016/j.wombi.2025.101916
Background
The social space of birth—the birth environment, its occupants, and the human activities taking place—is interconnected with birth experiences.
Aim
To investigate h...
Binius Zero-Knowledge Proofs Meet Multi-Layer Bloom Filters: A Secure and Efficient Protocol for Federated Learning in Autonomous Vehicle Networks
Presentation / Conference Contribution
Andriambelo, H., & Moradpoor, N. (2025, June)
Binius Zero-Knowledge Proofs Meet Multi-Layer Bloom Filters: A Secure and Efficient Protocol for Federated Learning in Autonomous Vehicle Networks. Presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy
We present a secure and efficient federated learning protocol for autonomous vehicles that resists data leaks, redundancy, and adversarial attacks. Our system combines fast ze...
Influence, Innovations and Infrastructure: reflections on emerging police strategies in techno-social contexts
Presentation / Conference Contribution
Horgan, S. (2025, April)
Influence, Innovations and Infrastructure: reflections on emerging police strategies in techno-social contexts. Presented at Maynooth University School of Law and Criminology Research Seminar Series, Maynooth University, Ireland
Three decades of technological transformation has created exciting opportunities and insidious challenges for public policing. While globalised bulk cybercrime frustrates conv...
The care experience of people with diagnosed or suspected dementia living in prison: A case study approach
Journal Article
MacRae, R., Chalmers, N., Tolson, D., Taylor, J., Anderson, K., Thomson, L., & Russ, T. (online)
The care experience of people with diagnosed or suspected dementia living in prison: A case study approach. Dementia, https://doi.org/10.1177/14713012251338873
Complex health and social care needs of people living in prison with diagnosed or suspected dementia is a growing concern for prisons and prison healthcare staff. The literatu...
Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach
Journal Article
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2025)
Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach. Electronics, 14(9), Article 1800. https://doi.org/10.3390/electronics14091800
This paper presents a novel forensic watermarking method for digital evidence distribution in non-cloud environments. The approach addresses the critical need for the secure s...
Algorithm Explainability for Malware Evolution with Search Trajectory Networks
Presentation / Conference Contribution
Babaagba, K., Murali, R., & Thomson, S. L. (2025, July)
Algorithm Explainability for Malware Evolution with Search Trajectory Networks. Presented at GECCO 2025: The Genetic and Evolutionary Computation Conference, Málaga, Spain
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems
Presentation / Conference Contribution
Korac, S., Maglaras, L., Moradpoor, N., Kioskli, K., Buchanan, W., & Canberk, B. (2025, June)
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems. Presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy
Ransomware has been predominantly a threat to Windows systems. But, Linux systems became interesting for cybercriminals and this trend is expected to continue. This endangers ...
An Overview of THz Antenna Design for 5G/6G Wireless Communications
Book Chapter
Basherlou, H. J., Odiamenhi, M., Parchin, N. O., See, C. H., & Shen, M. (2025)
An Overview of THz Antenna Design for 5G/6G Wireless Communications. In Advanced Wireless Communications and Mobile Networks - Current Status and Future Directions. InTech. https://doi.org/10.5772/intechopen.1010047
The rapid evolution of wireless communication technologies has spurred significant interest in terahertz (THz) frequencies as a key enabler for next-generation 5G and 6G wirel...
Accessibility and Inclusivity in AI-Powered Personalized Learning
Book Chapter
Yadav, R., Yadav, M., Huzooree, G., Najeeb, A., & Ranasinghe, A. (2025)
Accessibility and Inclusivity in AI-Powered Personalized Learning. In L. Kyei-Blankson, & E. Ntuli (Eds.), Transformative AI Practices for Personalized Learning Strategies (47-68). IGI Global. https://doi.org/10.4018/979-8-3693-8744-3.ch003
AI-powered personalized learning holds the potential to revolutionize education by tailoring content to meet the diverse needs of learners. However, for such systems to be tru...