Research explorer tool

Date


People

Output Type

Download Available

Library Of Congress

Dewey Decimal

773 results

Privacy-preserving Surveillance Methods using Homomorphic Encryption

Conference Proceeding
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020)
Privacy-preserving Surveillance Methods using Homomorphic Encryption. https://doi.org/10.5220/0008864902400248
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encrypt...

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach

Conference Proceeding
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020)
Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. https://doi.org/10.5220/0008902202890298
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high ...

Athos: An Extensible DSL for Model Driven Traffic and Transport Simulation

Conference Proceeding
Hoffmann, B., Urquhart, N., Chalmers, K., & Guckert, M. (2020)
Athos: An Extensible DSL for Model Driven Traffic and Transport Simulation
Multi-agent systems may be considered appropriate tools for simulating complex systems such as those based around traffic and transportation networks. Modelling traffic partic...

High Performance Metasurface-Based On-Chip Antenna for Terahertz Integrated Circuits

Conference Proceeding
Alibakhshikenari, M., Virdee, B. S., See, C. H., A. Abd-Alhameed, R., Falcone, F., & Limiti, E. (in press)
High Performance Metasurface-Based On-Chip Antenna for Terahertz Integrated Circuits

Using Amazon Alexa APIs as a Source of Digital Evidence

Conference Proceeding
Krueger, C., & Mckeown, S. (2020)
Using Amazon Alexa APIs as a Source of Digital Evidence. https://doi.org/10.1109/CyberSecurity49315.2020.9138849
With the release of Amazon Alexa and the first Amazon Echo device, the company revolutionised the smart home. It allowed their users to communicate with, and control, their sm...

Forensic Considerations for the High Efficiency Image File Format (HEIF)

Conference Proceeding
Mckeown, S., & Russell, G. (2020)
Forensic Considerations for the High Efficiency Image File Format (HEIF). https://doi.org/10.1109/CyberSecurity49315.2020.9138890
The High Efficiency File Format (HEIF) was adopted by Apple in 2017 as their favoured means of capturing images from their camera application, with Android devices such as the...

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment

Conference Proceeding
Chacon, J., Mckeown, S., & Macfarlane, R. (2020)
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. https://doi.org/10.1109/CyberSecurity49315.2020.9138859
Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature-and anomaly-based intrusion detection approaches. Deception...

Speculative and Critical Design in Education: Practice and Perspectives

Conference Proceeding
Helgason, I., Smyth, M., Encinas, E., & Mitrović, I. (2020)
Speculative and Critical Design in Education: Practice and Perspectives. https://doi.org/10.1145/3393914.3395907
This full-day, interdisciplinary workshop will address the use of Speculative and Critical Design (SCD), Design Fiction, and related practices, including those that use provoc...

Ethnographic Fictions: Research for Speculative Design

Conference Proceeding
Helgason, I., & Smyth, M. (2020)
Ethnographic Fictions: Research for Speculative Design. https://doi.org/10.1145/3393914.3395872
Ethnographically informed research that investigates people's lived experiences, emotions, attitudes and behaviours inevitably draws primarily on current and past situations. ...

Computing degree apprenticeships: An opportunity to address gender imbalance in the IT sector?

Conference Proceeding
Smith, S., Taylor-Smith, E., Fabian, K., Barr, M., Berg, T., Cutting, D., …Zarb, M. (in press)
Computing degree apprenticeships: An opportunity to address gender imbalance in the IT sector?
This paper explores the potential for new work-based apprenticeship degrees to encourage more women into computing degrees and the IT sector. In the UK, women are currently un...