9 results

Developing Visualisations to Enhance an Insider Threat Product: A Case Study

Conference Proceeding
Graham, M., Kukla, R., Mandrychenko, O., Hart, D., & Kennedy, J. (2021)
Developing Visualisations to Enhance an Insider Threat Product: A Case Study. In 2021 IEEE Symposium on Visualization for Cyber Security (VizSec) (47-57). https://doi.org/10.1109/VizSec53666.2021.00011
This paper describes the process of developing data visualisations to enhance a commercial software platform for combating insider threat, whose existing UI, while perfectly f...

Security, privacy and safety evaluation of dynamic and static fleets of drones

Conference Proceeding
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017)
Security, privacy and safety evaluation of dynamic and static fleets of drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),https://doi.org/10.1109/dasc.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...

Developing Visualisations to Enhance an Insider Threat Product: A Case Study

Presentation / Conference
Graham, M. (2021, October)
Developing Visualisations to Enhance an Insider Threat Product: A Case Study. Presented at 18th IEEE Symposium on Visualization for Cyber Security, New Orleans, USA [Online]
This paper describes the process of developing data visualisations to enhance a commercial software platform for combating insider threat, whose existing UI, while perfectly f...

Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns

Conference Proceeding
Mcneill, M., Lawson, A., Raeside, R., & Peisl, T. (2018)
Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns. In Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018)https://doi.org/10.14236/ewic/HCI2018.127
Creating a good crowdfunding campaign is difficult. By understanding why people contribute to crowdfunding campaigns we can make campaigns better and raise more money. Crowdfu...

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites

Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2020)
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. In Applications of Evolutionary Computation. EvoApplications 2020. , (117-132). https://doi.org/10.1007/978-3-030-43722-0_8
In the field of metamorphic malware detection, training a detection model with malware samples that reflect potential mutants of the malware is crucial in developing a model r...

2-Dimensional Outline Shape Representation for Generative Design with Evolutionary Algorithms

Conference Proceeding
Lapok, P., Lawson, A., & Paechter, B. (2019)
2-Dimensional Outline Shape Representation for Generative Design with Evolutionary Algorithms. In H. Rodrigues, J. Herskovits, C. Mota Soares, A. Araújo, J. Guedes, J. Folgado, …J. Madeira (Eds.), EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization, (926-937). https://doi.org/10.1007/978-3-319-97773-7_80
In this paper, we investigate the ability of genetic representation methods to describe two-dimensional outline shapes, in order to use them in a generative design system. A s...

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples

Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (2020)
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. https://doi.org/10.1109/CEC48606.2020.9185668
Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this,...

Multiple traffic signal control using a genetic algorithm

Conference Proceeding
Kalganova, T., Russell, G., & Cumming, A. (1999)
Multiple traffic signal control using a genetic algorithm. In A. Dobnikar, N. C. Steele, D. W. Pearson, & R. F. Albrecht (Eds.), Artificial Neural Nets and Genetic Algorithms, 220-228. https://doi.org/10.1007/978-3-7091-6384-9_38
Optimising traffic signal timings for a multiple-junction road network is a difficult but important problem. The essential difficulty of this problem is that the traffic signa...

Student behaviour in a flexible learning course framework.

Conference Proceeding
Russell, G. & Cumming, A. (2010)
Student behaviour in a flexible learning course framework. In Proceedings of the IADIS International Conference on e-Learning, 181-188. ISBN 978-972-8939-38-0
Flexible learning approaches to education are important in modern Universities. Students should be able to choose how they will study their courses, and educators should be pr...