Date


Output Type

Download Available

60 results

A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic

Presentation / Conference
Haynes, D., & Salzano, R. (2022, April)
A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic. Paper presented at ASIS&T Global 24-hour Conference, 2022, Online
Universities in the UK responded to the COVID-19 pandemic by moving teaching to an online environment and requiring staff to work from home, as far as possible. Researchers fa...

Developing Visualisations to Enhance an Insider Threat Product: A Case Study

Presentation / Conference
Graham, M. (2021, October)
Developing Visualisations to Enhance an Insider Threat Product: A Case Study. Presented at 18th IEEE Symposium on Visualization for Cyber Security, New Orleans, USA [Online]
This paper describes the process of developing data visualisations to enhance a commercial software platform for combating insider threat, whose existing UI, while perfectly f...

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

Presentation / Conference
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October)
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online
Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine ...

Practical defences against model inversion attacks for split neural networks

Presentation / Conference
Titcombe, T., Hall, A. J., Papadopoulos, P., & Romanini, D. (2021, May)
Practical defences against model inversion attacks for split neural networks. Paper presented at ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021), Online
We describe a threat model under which a split network-based federated learning system is susceptible to a model inversion attack by a malicious computational server. We demon...

PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN

Presentation / Conference
Romanini, D., Hall, A. J., Papadopoulos, P., Titcombe, T., Ismail, A., Cebere, T., …Hoeh, M. A. (2021, May)
PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN. Poster presented at ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021), Online
We introduce PyVertical, a framework supporting vertical federated learning using split neural networks. The proposed framework allows a data scientist to train neural network...

Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning

Presentation / Conference
Angelou, N., Benaissa, A., Cebere, B., Clark, W., Hall, A. J., Hoeh, M. A., …Titcombe, T. (2020, December)
Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning. Poster presented at NeurIPS 2020 Workshop on Privacy Preserving Machine Learning (PPML 2020), Online
We present a multi-language, cross-platform, open-source library for asymmetric private set intersection (PSI) and PSI-Cardinality (PSI-C). Our protocol combines traditional D...

The Importance of Authenticity in Cyber Security Training and Education

Presentation / Conference
Macfarlane, R., & Mata de Acuna, J. (2019, November)
The Importance of Authenticity in Cyber Security Training and Education. Presented at JISC Security Conference, Newcastle, England
The knowledge gap between academy and industry is a challenging issue that educators face every day. In the field of cyber security, it is important that students understand t...

Cloud Computing & Cyber Security

Presentation / Conference
Manoussos, B. (2018, April)
Cloud Computing & Cyber Security. Presented at The Law Society of Scotland - Law & Technology Roadshow, Glasgow
Presentation on Cloud Computing and Cyber Security in relation to Law Firms in Scotland.

Blockchain and Git repositories for sticky policies protected OOXML.

Presentation / Conference
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November)
Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based Information Rights Management (IRM) model extension with enhanced accountability for both a sticky policy and an attached data. This wor...

Secure and Scalable Identity Management for the Aviation Industry

Presentation / Conference
Kintis, P., Kountouras, A., Pitropakis, N., Dagon, D., Antonakakis, M., Markou, C., & Buchner, P. (2017, May)
Secure and Scalable Identity Management for the Aviation Industry
No abstract available.