Research explorer tool

22 results

Insider threat detection using principal component analysis and self-organising map

Conference Proceeding
Moradpoor, N., Brown, M., & Russell, G. (2017)
Insider threat detection using principal component analysis and self-organising map. In 10th International Conference on Security of Information and Networks (SIN 2017)https://doi.org/10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...

Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases

Conference Proceeding
Clavie, B., & Moradpoor, N. (in press)
Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. In Proceedings of posters presented at 10th ACM Conference on Web Science
This article explores a perceived bias between two British reddit communities dedicated to discussing British politics.We analyse the popular sources favoured by each communit...

Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs)

Presentation / Conference
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., Sivalingam, K., & Madras, I. (2010, December)
Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs). Paper presented at OPNETWORK 2010
Ethernet Passive Optical Network (EPON) has been considered for access networks for quite some time to provide high-speed and high-capacity services. As a novel type of networ...

An Inter-channel and Intra-channel Dynamic Wavelength/Bandwidth Allocation Algorithm for Integrated Hybrid PON with Wireless Technologies for Next Generation Broadband Access Networks

Conference Proceeding
Moradpoor, N., Parr, G., Mcclean, S., & Scotney, B. (2013)
An Inter-channel and Intra-channel Dynamic Wavelength/Bandwidth Allocation Algorithm for Integrated Hybrid PON with Wireless Technologies for Next Generation Broadband Access Networks. In AFIN 2013, 9-14
Optical and wireless technology integration schemes merge the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of wi...

Real-Time Data Analytics in Support of Network Resource Management Protocols

Conference Proceeding
Moradpoor‫, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2009)
Real-Time Data Analytics in Support of Network Resource Management Protocols. In Proceedings of 10th PGNET
Communications Networks Resource Management (RM) functions such as dynamic and static resource usage monitoring, real time resource reservation as well as advance resource res...

A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks

Journal Article
Moradpoor Sheykhkanloo, N. (2015)
A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(6), 1443-1453
Thousands of organisations store important and confidential information related to them, their customers, and their business partners in databases all across the world. The st...

SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques

Conference Proceeding
Sheykhkanloo, N. M. (2015)
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques. In SIN '15 Proceedings of the 8th International Conference on Security of Information and Networkshttps://doi.org/10.1145/2799979.2800011
Structured Query Language injection (SQLi) attack is a code injection technique where malicious SQL statements are inserted into a given SQL database by simply using a web bro...

Employing Neural Networks for the Detection of SQL Injection Attack

Conference Proceeding
Sheykhkanloo, N. M. (2013)
Employing Neural Networks for the Detection of SQL Injection Attack. In SIN '14 Proceedings of the 7th International Conference on Security of Information and Networksdoi:10.1145/2659651.2659675
Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into the SQL database by simply using web browse...

A semi-independent structure for the architectural design of the converged scenario for integrated hybrid PON with wireless technologies for next generation broadband access networks

Conference Proceeding
Moradpoor, N. (2014)
A semi-independent structure for the architectural design of the converged scenario for integrated hybrid PON with wireless technologies for next generation broadband access networks. In Proceedings of the 2013 2nd International Workshop on Optical Wireless Communications (IWOW)doi:10.1109/iwow.2013.6777781
Optical and wireless technology integration schemes merge the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of wi...

A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks

Conference Proceeding
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013)
A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks. In 2013 5th Proceedings of the Computer Science and Electronic Engineering Conference (CEEC 2013)doi:10.1109/ceec.2013.6659439
Optical and wireless integration scheme merges the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of the wireless ...
5 results

The truth about cybersecurity in 7 words (poster competition for women in cybersecurity)

2017 - 2017
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Morgan Stanley: Security Analytics for Insider Threat Monitoring

2017 - 2017
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Funder: Data Lab | Value: £19,974

The truth about cybersecurity in 7 words – 2018 (poster competition in cybersecurity)

2018 - 2018
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Critical Infrastructure Protection & ICT Gender Equality (Women in IT) Guest Speaker's Travel Grant

2018 - 2018
1st event: a speaker for the Cyber Security Conference (Critical Infrastructure Protection) (200 words): Industrial Control Systems(ICS) are widely used in critical infrastructure such as nuclear pow...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £600

Post Graduate Cyber Security (PGCS) symposium

2016 - 2016
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £800