Performance Evaluation of a Fragmented Secret Share System
Conference Proceeding
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017)
Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)https://doi.org/10.1109/cybersa.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
A framework for data security in cloud using collaborative intrusion detection scheme
Conference Proceeding
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017)
A framework for data security in cloud using collaborative intrusion detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks. , (188-193). https://doi.org/10.1145/3136825.3136905
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Insider threat detection using principal component analysis and self-organising map
Conference Proceeding
Moradpoor, N., Brown, M., & Russell, G. (2017)
Insider threat detection using principal component analysis and self-organising map. In 10th International Conference on Security of Information and Networks (SIN 2017)https://doi.org/10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis
Conference Proceeding
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017)
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference Proceedingshttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention
Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017)
Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM),https://doi.org/10.23919/INM.2017.7987433
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud
Conference Proceeding
Pitropakis, N., Lyvas, C., & Lambrinoudakis, C. (2017)
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. In C. Becker Westphall, Y. Woo Lee, B. Duncan, R. Ege, A. Olmsted, M. Vassilakopoulos, …S. Katsikas (Eds.), CLOUD COMPUTING 2017 - The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization
The financial crisis made companies around the world search for cheaper and more efficient solutions to cover their needs in terms of computational power and storage. Their qu...
Numerical Encoding to Tame SQL Injection Attacks
Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (in press)
Numerical Encoding to Tame SQL Injection Attacks
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases....
Protecting Documents with Sticky Policies and Identity-Based Encryption
Conference Proceeding
Spyra, G., & Buchanan, W. J. (2016)
Protecting Documents with Sticky Policies and Identity-Based Encryption. In Proceedings of the Future Technologies Conference (FTC) 2016https://doi.org/10.1109/FTC.2016.7821719
Documents are increasingly being held in public cloud-based systems, and there thus increasingly exposed to accesses from malicious entities. This paper focuses on the integra...
Automatically Detecting Fallacies in System Safety Arguments
Conference Proceeding
Yuan, T., Manandhar, S., Kelly, T., & Wells, S. (2016)
Automatically Detecting Fallacies in System Safety Arguments. In Principles and Practice of Multi-Agent Systems. , (47-59). https://doi.org/10.1007/978-3-319-46218-9_4
Safety cases play a significant role in the development of safety-critical systems. The key components in a safety case are safety arguments, that are designated to demonstrat...
U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks
Conference Proceeding
Zeb, K., Saleem, K., Al Muhtadi, J., & Thuemmler, C. (2016)
U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). , (562-567). https://doi.org/10.1109/HealthCom.2016.7749518
Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records...