Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases
Clavie, B., & Moradpoor, N. (in press)
Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. In Proceedings of posters presented at 10th ACM Conference on Web Science
This article explores a perceived bias between two British reddit
communities dedicated to discussing British politics.We analyse the
popular sources favoured by each communit...
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 89-98. https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., …Tripathi, S. S. (2018)
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760
Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to ...
Sub-file Hashing Strategies for Fast Contraband Detection
McKeown, S., Russell, G., & Leimich, P. (2018)
Sub-file Hashing Strategies for Fast Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560680
Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for man...
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection
McKeown, S., Russell, G., & Leimich, P. (2018)
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560671
Cloud based storage is increasing in popularity, with
large volumes of data being stored remotely. Digital forensics
investigators examining such systems remotely are limited ...
Applications of Blockchain Within Healthcare.
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018)
Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today,
There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical traci...
Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain
Buchanan, B., & Naqvi, N. (2018)
Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain. The Journal of the British Blockchain Association, 1(1), 1-4
A blockchain enabled 'Digital Single Economy " can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a tru...
Detection of Algorithmically Generated Malicious Domain
Agyepong, E., Buchanan, W., & Jones, K. (2018)
Detection of Algorithmically Generated Malicious Domain. In CS & IT-CSCP 2018, (13-32). https://doi.org/10.5121/csit.2018.80802
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persist...
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
Barrowclough, J. P., & Asif, R. (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...
Privacy Parameter Variation using RAPPOR on a Malware Dataset
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018)
Privacy Parameter Variation using RAPPOR on a Malware Dataset. In Proceedings of 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), 8. doi:10.1109/TrustCom/BigDataSE.2018.00133
Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of...