A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic
Presentation / Conference
Haynes, D., & Salzano, R. (2022, April)
A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic. Paper presented at ASIS&T Global 24-hour Conference, 2022, Online
Universities in the UK responded to the COVID-19 pandemic by moving teaching to an online environment and requiring staff to work from home, as far as possible. Researchers fa...
Developing Visualisations to Enhance an Insider Threat Product: A Case Study
Presentation / Conference
Graham, M. (2021, October)
Developing Visualisations to Enhance an Insider Threat Product: A Case Study. Presented at 18th IEEE Symposium on Visualization for Cyber Security, New Orleans, USA [Online]
This paper describes the process of developing data visualisations to enhance a commercial software platform for combating insider threat, whose existing UI, while perfectly f...
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure
Presentation / Conference
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October)
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online
Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine ...
Practical defences against model inversion attacks for split neural networks
Presentation / Conference
Titcombe, T., Hall, A. J., Papadopoulos, P., & Romanini, D. (2021, May)
Practical defences against model inversion attacks for split neural networks. Paper presented at ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021), Online
We describe a threat model under which a split network-based federated learning system is susceptible to a model inversion attack by a malicious computational server. We demon...
PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN
Presentation / Conference
Romanini, D., Hall, A. J., Papadopoulos, P., Titcombe, T., Ismail, A., Cebere, T., …Hoeh, M. A. (2021, May)
PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN. Poster presented at ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021), Online
We introduce PyVertical, a framework supporting vertical federated learning using split neural networks. The proposed framework allows a data scientist to train neural network...
Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning
Presentation / Conference
Angelou, N., Benaissa, A., Cebere, B., Clark, W., Hall, A. J., Hoeh, M. A., …Titcombe, T. (2020, December)
Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning. Poster presented at NeurIPS 2020 Workshop on Privacy Preserving Machine Learning (PPML 2020), Online
We present a multi-language, cross-platform, open-source library for asymmetric private set intersection (PSI) and PSI-Cardinality (PSI-C). Our protocol combines traditional D...
The Importance of Authenticity in Cyber Security Training and Education
Presentation / Conference
Macfarlane, R., & Mata de Acuna, J. (2019, November)
The Importance of Authenticity in Cyber Security Training and Education. Presented at JISC Security Conference, Newcastle, England
The knowledge gap between academy and industry is a challenging issue that educators face every day. In the field of cyber security, it is important that students understand t...
Cloud Computing & Cyber Security
Presentation / Conference
Manoussos, B. (2018, April)
Cloud Computing & Cyber Security. Presented at The Law Society of Scotland - Law & Technology Roadshow, Glasgow
Presentation on Cloud Computing and Cyber Security in relation to Law Firms in Scotland.
Blockchain and Git repositories for sticky policies protected OOXML.
Presentation / Conference
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November)
Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This wor...
Secure and Scalable Identity Management for the Aviation Industry
Presentation / Conference
Kintis, P., Kountouras, A., Pitropakis, N., Dagon, D., Antonakakis, M., Markou, C., & Buchner, P. (2017, May)
Secure and Scalable Identity Management for the Aviation Industry
No abstract available.