Date


People

Download Available

Dewey Decimal

1538 results

Privacy-preserving Surveillance Methods using Homomorphic Encryption

Conference Proceeding
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020)
Privacy-preserving Surveillance Methods using Homomorphic Encryption. In ICISSP: Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (240-248). https://doi.org/10.5220/0008864902400248
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encrypt...

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach

Conference Proceeding
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020)
Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. In Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (289-298). https://doi.org/10.5220/0008902202890298
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high ...

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Props Alive: A Framework for Augmented Reality Stop Motion Animation

Conference Proceeding
Casas, L., Kosek, M., & Mitchell, K. (2020)
Props Alive: A Framework for Augmented Reality Stop Motion Animation. In 2017 IEEE 10th Workshop on Software Engineering and Architectures for Realtime Interactive Systems (SEARIS)https://doi.org/10.1109/SEARIS41720.2017.9183487
Stop motion animation evolved in the early days of cinema with the aim to create an illusion of movement with static puppets posed manually each frame. Current stop motion mov...

Exploring coupled images fusion based on joint tensor decomposition

Journal Article
Lu, L., Ren, X., Yeh, K., Tan, Z., & Chanussot, J. (2020)
Exploring coupled images fusion based on joint tensor decomposition. Human-Centric Computing and Information Sciences, 10, https://doi.org/10.1186/s13673-020-00215-z
Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion al...

Trust-aware and Cooperative Routing Protocol for IoT Security

Journal Article
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020)
Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, https://doi.org/10.1016/j.jisa.2020.102467
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification prov...

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset

Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...

BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN

Conference Proceeding
Boukria, S., Guerroumi, M., & Romdhani, I. (2020)
BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN. In 2019 IEEE Symposium on Computers and Communications (ISCC) (1034-1039). https://doi.org/10.1109/ISCC47284.2019.8969780
Software Defined Networking (SDN) technology increases the evolution of Internet and network development. SDN, with its logical centralization of controllers and global networ...

Using MAP-Elites to support policy making around Workforce Scheduling and Routing

Journal Article
Urquhart, N., Hart, E., & Hutcheson, W. (2020)
Using MAP-Elites to support policy making around Workforce Scheduling and Routing. Automatisierungstechnik, 68(2), https://doi.org/10.1515/auto-2019-0107
English abstract: Algorithms such as MAP-Elites provide a means of allowing users to explore a solution space by returning an archive of high-performing solutions. Such an arc...

An authentication protocol based on chaos and zero knowledge proof

Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020)
An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authentica...