Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
Conference Proceeding
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022)
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP (551-561). https://doi.org/10.5220/0010903000003120
Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on ...
Developing a Digital ForensicsTerminology Using Natural Language Processing
Conference Proceeding
Le Gall, M., Cole, C., Haynes, D., & Nic Daeid, N. (2022)
Developing a Digital ForensicsTerminology Using Natural Language Processing. In M. Lykke, T. Svarre, D. Haynes, M. Skov, M. Thellesfsen, & D. Martinez-Avila (Eds.), Knowledge Organization across Disciplines, Domains, Services and Technologies: Proceedings of the Seventeenth International ISKO Conference (173-186
Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle
Conference Proceeding
Cunningham, S., & Mcgregor, I. (2022)
Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle. In AM '22: Audio Mostly 2022
Foley artistry is an essential part of the audio post-production process for film, television, games, and animation. By extension, it is as crucial in emergent media such as v...
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract)
Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022)
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8
Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detect...
Generating real-time detailed ground visualisations from sparse aerial point clouds
Conference Proceeding
Murray, A., Mitchell, S., Bradley, A., Waite, E., Ross, C., Jamrozy, J., & Mitchell, K. (in press)
Generating real-time detailed ground visualisations from sparse aerial point clouds.
Our new scheme provides a both texture-less and mesh-less framework, which affords memory efficient, flexible level of detail and visibility optimizations for rendering scener...
A Quantitative Field Study of a Persuasive Security Technology in the Wild
Conference Proceeding
Vargheese, J. P., Collinson, M., & Masthoff, J. (2022)
A Quantitative Field Study of a Persuasive Security Technology in the Wild. In Social Informatics: 13th International Conference, SocInfo 2022, Glasgow, UK, October 19–21, 2022, Proceedings (211-232). https://doi.org/10.1007/978-3-031-19097-1_13
Persuasive techniques and persuasive technologies have been suggested as a means to improve user cybersecurity behaviour, but there have been few quantitative studies in this ...
Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures
Conference Proceeding
Zheng, C., Zhen, C., Xie, H., & Yang, S. (2022)
Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures. In 2022 IEEE Conference on Dependable and Secure Computing (DSC). https://doi.org/10.1109/dsc54232.2022.9888828
Reinforcement Learning (RL) is one of the most popular methods for solving complex sequential decision-making problems. Deep RL needs careful sensing of the environment, selec...
A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling
Conference Proceeding
Turnbull, L., Tan, Z., & Babaagba, K. (2022)
A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. In 2022 IEEE Conference on Dependable and Secure Computing (DSC). https://doi.org/10.1109/DSC54232.2022.9888906
Malicious software trends show a persistent yearly increase in volume and cost impact. More than 350,000 new malicious or unwanted programs that target various technologies we...
Deep Pre-Trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach With Augmented Datasets
Conference Proceeding
Alharigy, L., Alnuaim, H., & Moradpoor, N. (in press)
Deep Pre-Trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach With Augmented Datasets.
Data-Driven Innovation for Sustainable Creative Practice
Conference Proceeding
Lechelt, S., Panneels, I., & Helgason, I. (in press)
Data-Driven Innovation for Sustainable Creative Practice. In Proceedings of the 35th International BCS Human Computer Interaction Conference
Lechelt, S, Panneels, I & Helgason, I. 2022, Data-Driven Innovation for Sustainable Creative Practice. in Proceedings of the 35th International BCS Human Computer Interaction ...