A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic
Presentation / Conference
Haynes, D., & Salzano, R. (2022, April)
A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic. Paper presented at ASIS&T Global 24-hour Conference, 2022, Online
Universities in the UK responded to the COVID-19 pandemic by moving teaching to an online environment and requiring staff to work from home, as far as possible. Researchers fa...
Understanding Personal Online Risk To Individuals Via Ontology Development
Conference Proceeding
Haynes, D. (2020)
Understanding Personal Online Risk To Individuals Via Ontology Development. In Knowledge Organization at the Interface: Proceedings of the Sixteenth International ISKO Conference, 2020, Aalborg, Denmark (171-180). https://doi.org/10.5771/9783956507762-171
The concept of risk is widely misunderstood because of the different contexts in which it is used. This paper describes the development of an ontology of risk as a way of bett...
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining
Journal Article
Cha, S., Wang, H., Tan, Z., Joung, Y., Tseng, Y., & Yeh, K. (2020)
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining. IEEE Transactions on Emerging Topics in Computational Intelligence, 4(5), 641-652. https://doi.org/10.1109/tetci.2019.2938547
Intelligence mining is one of the most promising technologies for effectively extracting intelligence (and knowledge) to enhance the quality of decision-making. In Taiwan, the...
GCHQ Cyber Zone at Cheltenham Science Festival (Curator)
Exhibition / Performance
Kerr, G. GCHQ Cyber Zone at Cheltenham Science Festival (Curator)
[https://issuu.com/cheltenhamfestivals/docs/science_festival_2019_brochure]. 4 June 2019 - 9 June 2019. (Unpublished
Step into a fascinating digital world…come into the GCHQ Cyber Zone and see what it’s like to be a code cracker, ethical hacker and cyber security expert. Escape to cyber spac...
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
Journal Article
Barrowclough, J. P., & Asif, R. (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment
Journal Article
Asif, R., & Buchanan, W. J. (2017)
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847
There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile...
Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption
Conference Proceeding
Asif, R., & Buchanan, W. J. (2017)
Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification bu...
Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts
Conference Proceeding
McKeown, S., Maxwell, D., Azzopardi, L., & Glisson, W. B. (2014)
Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts. In IIiX '14: Proceedings of the 5th Information Interaction in Context Symposium, (175-184). https://doi.org/10.1145/2637002.2637023
The Internet and the World Wide Web have become integral parts of the lives of many modern individuals, enabling almost instantaneous communication, sharing and broadcasting o...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...