39 results

Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario

Conference Proceeding
Adesanya, O. M., Moradpoor, N., Maglaras, L., Lim, I. S., & Ferrag, M. A. (in press)
Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario.

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records

Conference Proceeding
Noyon, M. S. I., Moradpoor, N., Maglaras, L., & Ahmad, J. (in press)
Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.

Reliability Analysis of Fault Tolerant Memory Systems

Conference Proceeding
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023)
Reliability Analysis of Fault Tolerant Memory Systems. In 2023 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). https://doi.org/10.1109/SEEDA-CECNSM61561.2023.10470763
This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The...

Machine Learning for Smart Healthcare Management Using IoT

Book Chapter
Yigit, Y., Duran, K., Moradpoor, N., Maglaras, L., Van Huynh, N., & Canberk, B. (in press)
Machine Learning for Smart Healthcare Management Using IoT. In IoT and ML for Information Management: A Smart Healthcare Perspective. Springer
The convergence of Machine Learning (ML) and the Internet of Things (IoT) has brought about a paradigm shift in healthcare, ushering in a new era of intelligent healthcare man...

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis

Conference Proceeding
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (in press)
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. In 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)

Deep Pre-Trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach With Augmented Datasets

Conference Proceeding
Alharigy, L., Alnuaim, H., & Moradpoor, N. (in press)
Deep Pre-Trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach With Augmented Datasets.

Building Towards Automated Cyberbullying Detection: A Comparative Analysis

Journal Article
Al Harigy, L. M., Al Nuaim, H. A., Moradpoor, N., & Tan, Z. (2022)
Building Towards Automated Cyberbullying Detection: A Comparative Analysis. Computational Intelligence and Neuroscience, 2022, Article 4794227. https://doi.org/10.1155/2022/4794227
The increased use of social media between digitally anonymous users, sharing their thoughts and opinions, can facilitate participation and collaboration. However, it’s this an...

Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain

Conference Proceeding
Moradpoor, N., Barati, M., Robles-Durazno, A., Abah, E., & McWhinnie, J. (in press)
Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain.
The protection of critical national Infrastructures such as drinking water, gas, and electricity is extremely important as nations are dependent on their operation and steadin...

Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles

Conference Proceeding
Cutajar, O., Moradpoor, N., & Jaroucheh, Z. (2021)
Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699326
In a perfect world, coordination and cooperation across distributed autonomous systems would be a trivial task. However, incomplete information, malicious actors and real-worl...

VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems

Conference Proceeding
Robles Durazno, A., Moradpoor, N., McWhinnie, J., & Porcel-Bustamante, J. (2021)
VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699375
The rapid development of technology during the last decades has led to the integration of the network capabilities in the devices that are essential in the operation of Indust...
6 results

SICSA Research Theme Event for IEEE DSC 2022

2021 - 2022
The IEEE Conference on Dependable and Secure Computing seeks papers, posters, and experiences for presenting innovative research results, solutions, and new challenges in the field of dependable and s...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £2,000

Critical Infrastructure Protection & ICT Gender Equality (Women in IT) Guest Speaker's Travel Grant

2018 - 2018
1st event: a speaker for the Cyber Security Conference (Critical Infrastructure Protection) (200 words): Industrial Control Systems(ICS) are widely used in critical infrastructure such as nuclear pow...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £600

The truth about cybersecurity in 7 words – 2018 (poster competition in cybersecurity)

2018 - 2018
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

The truth about cybersecurity in 7 words (poster competition for women in cybersecurity)

2017 - 2017
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Morgan Stanley: Security Analytics for Insider Threat Monitoring

2017 - 2017
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Funder: Data Lab | Value: £19,974

Post Graduate Cyber Security (PGCS) symposium

2016 - 2016
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £800
9 results

Privacy and Security

2023 - date
Huda Aljalaoud | Director of Studies: Dr Kia Dashtipour

Project Outline of Smart Attack Detection and Mitigation for Autonomous Core Networks Using Digital Twin

2023 - date
Yagmur Yigit | Director of Studies: Prof Leandros Maglaras | Second Supervisor: Prof Berk Canberk

An AI-based Biometrics Facial Recognition Continuous Authentication Framework and Protocols for Shoulder Surfing Attacks

2023 - date
Nida Zeeshan | Director of Studies: Dr Zeeshan Siddiqui | Second Supervisor: Dr Naghmeh Moradpoor Sheykhkanloo

Improving presence through selective attention and psycho-acoustic led auditory feedback for multi-user virtual reality application

2022 - date
Steven McSeveney | Director of Studies: Dr Babis Koniaris | Second Supervisor: Dr Iain McGregor

Career information literacy and the decision-making behaviours of young people

2020 - date
Marina Milosheva | Director of Studies: Dr Peter Cruickshank | Second Supervisor: Prof Peter Robertson

Cyberbullying detection approach using pre-trained models and contrastive self-supervised learning for data augmentation

2019 - date
Lulwah Alharigy | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: Dr Thomas Tan

Blockchain-based Authentication and Access Control Mechanism for Internet of Things (IoT)

2018 - date
Mwrwan Abubakar | Director of Studies: Dr Zakwan Jaroucheh | Second Supervisor: Prof Ahmed Al-Dubai

Cloud controlled driverless vehicles a novel approach to optimize traffic throughput

2018 - date
Nasr Mohamed | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Prof Wafaa Saleh

Industrial control systems cybersecurity analysis and countermeasures

2017 - 2021
Andres Santiago Robles Durazno | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: James McWhinnie

Date


Date