Research explorer tool

9 results

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications,
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet

Conference Proceeding
Paulin, A., & Thuemmler, C. (2016)
Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom),, (245-248). https://doi.org/10.1109/HealthCom.2016.7749462
This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in tw...

Embedding programming skills to support the student journey in networking, security and digital forensics.

Presentation / Conference
Lawson, A., & Macfarlane, R. (2014, April)
Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey, University of Edinburgh, Edinburgh
The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in acade...

The impact of routing schemes on group communication throughput in scalable networks.

Conference Proceeding
Al-Dubai, A. (2008)
The impact of routing schemes on group communication throughput in scalable networks. In Proceedings of the 2008 IEEE international parallel & distributed processing symposium, 1-8. https://doi.org/10.1109/IPDPS.2008.4536490
Multicast communication has been a major avenue for many studies in interconnection networks. However, such a communication pattern has been studied under either limited opera...

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data

Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...

Investigating false positive reduction in HTTP via procedure analysis.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
Investigating false positive reduction in HTTP via procedure analysis. https://doi.org/10.1109/ICNS.2006.65
This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection sys...

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging.

Conference Proceeding
Graves, J., Buchanan, W. J., Saliou, L. & Old, L. J. (2006)
Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. ISBN 1905305206
Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers ...

Analysis of an agent-based metric-driven for ad-hoc, on-demand routing.

Journal Article
Buchanan, W. J., Migas, N., Sinclair, G., & McArtney, K. (2006)
Analysis of an agent-based metric-driven for ad-hoc, on-demand routing. Ad hoc networks, 4(2), 146-167. https://doi.org/10.1016/j.adhoc.2004.04.009
Ad-hoc networks could bring many benefits over traditional, fixed networks. Unfortunately, they have many difficulties, including the selection of the optimal route, the avail...

Lightweight threads for portable software

Conference Proceeding
Russell, G. (1992)
Lightweight threads for portable software. In Proceedings of the UKUUG/SUKUG
No abstract available.