Research explorer tool

22 results

SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques

Conference Proceeding
Sheykhkanloo, N. M. (2015)
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques. In SIN '15 Proceedings of the 8th International Conference on Security of Information and Networkshttps://doi.org/10.1145/2799979.2800011
Structured Query Language injection (SQLi) attack is a code injection technique where malicious SQL statements are inserted into a given SQL database by simply using a web bro...

Employing Neural Networks for the Detection of SQL Injection Attack

Conference Proceeding
Sheykhkanloo, N. M. (2013)
Employing Neural Networks for the Detection of SQL Injection Attack. In SIN '14 Proceedings of the 7th International Conference on Security of Information and Networksdoi:10.1145/2659651.2659675
Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into the SQL database by simply using web browse...

A semi-independent structure for the architectural design of the converged scenario for integrated hybrid PON with wireless technologies for next generation broadband access networks

Conference Proceeding
Moradpoor, N. (2014)
A semi-independent structure for the architectural design of the converged scenario for integrated hybrid PON with wireless technologies for next generation broadband access networks. In Proceedings of the 2013 2nd International Workshop on Optical Wireless Communications (IWOW)doi:10.1109/iwow.2013.6777781
Optical and wireless technology integration schemes merge the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of wi...

A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks

Conference Proceeding
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013)
A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks. In 2013 5th Proceedings of the Computer Science and Electronic Engineering Conference (CEEC 2013)doi:10.1109/ceec.2013.6659439
Optical and wireless integration scheme merges the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of the wireless ...

Hybrid optical and wireless technology integrations for next generation broadband access networks

Conference Proceeding
Owusu, G., Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2011)
Hybrid optical and wireless technology integrations for next generation broadband access networks. In 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM 2011)https://doi.org/10.1109/inm.2011.5990515
Hybrid optical and wireless technology integrations have been considered as one of the most promising candidates for the next generation broadband access networks for quite so...

IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks

Journal Article
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013)
IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks. Optical Switching and Networking, 10(4), 439-457. doi:10.1016/j.osn.2013.08.003
Optical and wireless technology integration has been proposed as one of the most promising nominees for the next-generation broadband access networks for quite some time. Inte...

Employing machine learning techniques for detection and classification of phishing emails

Conference Proceeding
Moradpoor, N., Clavie, B., & Buchanan, B. (2018)
Employing machine learning techniques for detection and classification of phishing emails. In Proceedings of the IEEE Technically Sponsored Computing Conference 2017doi:10.1109/SAI.2017.8252096
A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or d...

Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs)

Presentation / Conference
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., Sivalingam, K., & Madras, I. (2010, December)
Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs). Paper presented at OPNETWORK 2010
Ethernet Passive Optical Network (EPON) has been considered for access networks for quite some time to provide high-speed and high-capacity services. As a novel type of networ...

An Inter-channel and Intra-channel Dynamic Wavelength/Bandwidth Allocation Algorithm for Integrated Hybrid PON with Wireless Technologies for Next Generation Broadband Access Networks

Conference Proceeding
Moradpoor, N., Parr, G., Mcclean, S., & Scotney, B. (2013)
An Inter-channel and Intra-channel Dynamic Wavelength/Bandwidth Allocation Algorithm for Integrated Hybrid PON with Wireless Technologies for Next Generation Broadband Access Networks. In AFIN 2013, 9-14
Optical and wireless technology integration schemes merge the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of wi...

Real-Time Data Analytics in Support of Network Resource Management Protocols

Conference Proceeding
Moradpoor‫, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2009)
Real-Time Data Analytics in Support of Network Resource Management Protocols. In Proceedings of 10th PGNET
Communications Networks Resource Management (RM) functions such as dynamic and static resource usage monitoring, real time resource reservation as well as advance resource res...
5 results

Post Graduate Cyber Security (PGCS) symposium

2016 - 2016
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £800

The truth about cybersecurity in 7 words (poster competition for women in cybersecurity)

2017 - 2017
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Morgan Stanley: Security Analytics for Insider Threat Monitoring

2017 - 2017
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Funder: Data Lab | Value: £19,974

The truth about cybersecurity in 7 words – 2018 (poster competition in cybersecurity)

2018 - 2018
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Critical Infrastructure Protection & ICT Gender Equality (Women in IT) Guest Speaker's Travel Grant

2018 - 2018
1st event: a speaker for the Cyber Security Conference (Critical Infrastructure Protection) (200 words): Industrial Control Systems(ICS) are widely used in critical infrastructure such as nuclear pow...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £600