CSCAN publications
-
2023 'Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats' IFIP International Symposium on Human Aspects of Information Security & Assurance 7-/-0/2023 7-/-0/2023 Springer Publisher Site , DOI Open access
-
2022 'Addressing big data variety using an automated approach for data characterization' Journal Of Big Data 9, (1) , DOI Open access
-
-
2021 'Evolution of group-theoretic cryptology attacks using hyper-heuristics' Journal of Mathematical Cryptology 16, (1) 49-63 , DOI Open access
-
2021 'Dynamical Analysis of Diversity in Rule-Based Open Source Network Intrusion Detection Systems' Empirical Software Engineering: an international journal 27, (4) , DOI Open access
-
2021 'The potential mental health effects of remote control in an autonomous maritime world' Journal of International Maritime Safety, Environmental Affairs, and Shipping 5, (2) 51-66 , DOI Open access
-
-
2020 'QoEMultiSDN: Management of Multimedia Services using MPTCP/SR in Softwarized and Virtualized Networks' IEEE Access 1-1 , DOI Open access
-
2020 'Incorporating the Human Facet of Security in Developing Systems and Services' Information and Computer Security , DOI Open access
-
2020 'A novel approach for improving information security management and awareness for home environments' Information and Computer Security , DOI Open access
-
2019 'Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric' Sustainable Energy, Grids and Networks 21, 100290-100290 , DOI Open access
-
2019 'Information Security Risk Communication: A User-Centric Approach' 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA) 1-/-1/2019 1-/-1/2019 IEEE Publisher Site , DOI
-
2019 'MaCRA: a model-based framework for maritime cyber-risk assessment' Wmu Journal of Maritime Affairs , DOI Open access
-
2017 'Internet risks for children: Parents' perceptions and attitudes: An investigative study of the Saudi Context' 2017 Internet Technologies and Applications (ITA) IEEE , DOI Open access
-
2017 'Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks' Ad Hoc Networks 63, 62-78 , DOI Open access
-
2017 'Signals of opportunity geolocation methods for urban and indoor environments' Annals of Telecommunications 72, (3-4) 145-155 , DOI Open access
-
2016 'On Internet Traffic Classification: A Two-Phased Machine Learning Approach' Journal of Computer Networks and Communications 2016, 0-0 , DOI Open access
-
2016 'A parallel evolutionary approach to solving systems of equations in polycyclic groups' Groups Complexity Cryptology 8, (2) Publisher Site , DOI Open access
-
2015 'Multi-user indoor ultra-wideband wireless communication using polyphase spreading sequences' IET COMMUNICATIONS 9, (5) 585-595 , DOI Open access
-
2014 'End-to-middle-to-end solution for IMS media plane security' Electronic Commerce Research , DOI Open access
-
2014 'On the Minimum/Stopping Distance of Array Low-Density Parity-Check Codes' IEEE Transactions on Information Theory 60, (9) 5204-5214 , DOI Open access
-
2013 'Framework for Generic Context- and Policy-Based Traffic Distribution in Heterogeneous Wireless Networks: Black Rider' Barolli L; Xhafa F; Takizawa M; Enokido T; Hsu H-H IEEE Computer Society 534-541 Publisher Site , DOI
-
2013 'Co-operative user identity verification using an Authentication Aura' COMPUTERS & SECURITY 39, 486-502 , DOI
-
2012 'Addendum to "An Efficient Algorithm to Find All Small-Size Stopping Sets of Low-Density Parity-Check Matrices"' IEEE TRANSACTIONS ON INFORMATION THEORY 58, (1) 164-171 , DOI
-
2012 'Validating Cloud Infrastructure Changes by Cloud Audits' 377-384
-
2012 'A novel security architecture for a space-data DTN' Springer Berlin/Heidelberg 342-349
-
2012 'An agent based business aware incident detection system for cloud environments' Journal of Cloud Computing: Advances, Systems and Applications 1, 9-9
-
2012 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 , DOI
-
2012 'Power to the people? The evolving recognition of human aspects of security' Computers & Security
-
2012 'A Response Strategy Model for Intrusion Response Systems' Springer Boston 573-578
-
2012 'Prospects for WLAN in the Evolved Packet Core Environment' Levi A; Badra M; Cesana M; Ghassemian M; Gürbüz Ö; Jabeur N; Klonowski M; Maña A; Sargento S; Zeadally S IEEE 1-5 Publisher Site
-
2012 'Multi-modal Behavioural Biometric Authentication for Mobile Devices' Springer Boston 465-474
-
2012 'Personal knowledge management beyond versioning' 28-28
-
2011 Transparent User Authentication. Springer Verlag
-
2011 'A new service description language as basis for service composition in SIP-based peer-to-peer infrastructures' 1 -8-1 -8 , DOI
-
-
-
2011 'Improving Fairness in Ad Hoc Networks Based on Neighbour’s Transmission Rate' 292-299-292-299
-
2011 'EPS QoS Enforcement on Layer 3 with Diffserv' 199-204-199-204
-
2011 'A New Approach to Model a Formalised Description of a Communication Service for the Purpose of Functional Testing' 262-269-262-269
-
2011 'Discussion on a Framework and its Service Structures for generating JSLEE based Value-Added Services' 169-177-169-177
-
-
2011 'An autonomous agent based incident detection system for cloud environments' 197-204
-
2011 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
-
2011 'Establishing A Personalized Information Security Culture' International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 3, 63-79
-
2011 Transparent user authentication: biometrics, RFID and behavioural profiling [e-book].
-
2011 'Risk assessment for mobile devices' Springer Berlin/Heidelberg 210-221
-
2011 'Improvements to Inter System Handover in the EPC Environment' New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on 1-5
-
2011 'SMS linguistic profiling authentication on mobile device' 224-228
-
2011 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 307-314
Select a staff member to see a full list of publications
Core staff
-
Professor Nathan Clarke
Professor in Cyber Security and Digital Forensics
-
Professor Kevin Jones
Deputy Vice-Chancellor - Research and Innovation
-
Dr Bogdan Ghita
Associate Professor
-
Dr Lingfen Sun
Visiting Associate Professor
-
Dr Shirley Atkinson
Visiting Research Fellow
-
Dr Kimberly Tam
Associate Professor in Cybersecurity
-
Dr Hai-Van Dang
Lecturer in Cyber Security
-
Dr Matthew Craven
Associate Head of School (UG Education)
-
Dr Adrian Ambroze
Associate Professor of Digital Communications Engineering
-
Dr Marco Palomino
Visiting Associate Professor
-
Dr Ji-Jian Chin
Lecturer in Computer Science
-
Dr Rory Hopcraft
Lecturer in Cyber Security
-
Dr Haoyi Wang
Lecturer in Computer Science
-
Dr Muhammad Asad
Lecturer in Computer Science