Centre for Cybersecurity

  • United Kingdom

Research Output

2020
Open Access
File

Built environment attributes and crime: an automated machine learning approach

Dakin, K., Xie, W., Parkinson, S., Khan, S., Monchuk, L. & Pease, K., 8 Jul 2020, In : Crime Science. 9, 1, 17 p., 12.

Research output: Contribution to journalArticle

Open Access

Digital Forensic Investigation of Internet of Things (IoT) Devices

Montasari, R., Jahankhani, H., Hill, R. & Parkinson, S., 2020, 1st ed. Springer Nature Switzerland AG. 335 p. (Advanced Sciences and Technologies for Security Applications)

Research output: Book/ReportBook

Open Access

Low-Cost Fitness and Activity Trackers for Biometric Authentication

Khan, S., Parkinson, S., Liu, N. & Grant, L., 16 Oct 2020, (Accepted/In press) In : Journal of Cybersecurity.

Research output: Contribution to journalArticle

Password Policy Characteristics and Keystroke Biometric Authentication

Parkinson, S., Khan, S., Crampton, A., Xu, Q., Xie, W., Liu, N. & Dakin, K., 8 Oct 2020, (Accepted/In press) In : IET Biometrics.

Research output: Contribution to journalArticle

Open Access
File
2019
Open Access
File

Classifying Ransomware Using Machine Learning Algorithms

Egunjobi, S., Parkinson, S. & Crampton, A., 24 Oct 2019, Intelligent Data Engineering and Automated Learning - IDEAL 2019: 20th International Conference, Manchester, UK, November 14-16, 2019, Proceedings, Part II . Yin, H., Camacho, D., Tino, P., Tallón-Ballesteros, A. J., Menezes, R. & Allmendinger, R. (eds.). Cham: Springer International Publishing, Vol. LNCS11872. p. 45-52 8 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

File

Countermeasures for timing-based side-channel attacks against shared, modern computing hardware

Montasari, R., Hill, R., Hosseinian-far, A. & Montaseri, F., 1 Jul 2019, In : International Journal of Electronic Security and Digital Forensics. 11, 3, p. 294-320 27 p.

Research output: Contribution to journalArticle

Open Access
File

Creeper: a tool for detecting permission creep in file system access controls

Parkinson, S., Khan, S., Bray, J. & Shreef, D., 1 Dec 2019, In : Cybersecurity. 2, 1, 14 p., 14.

Research output: Contribution to journalArticle

Open Access

Digital Forensic Investigation of Social Media, Acquisition and Analysis of Digital Evidence

Montasari, R., Hill, R., Carpenter, V. & Montaseri, F., 2019, In : International Journal of Strategic Engineering (IJoSE) . 2, 1, p. 52-60 9 p.

Research output: Contribution to journalArticle

Discovering and utilising expert knowledge from security event logs

Khan, S. & Parkinson, S., 1 Oct 2019, In : Journal of Information Security and Applications. 48, p. 1-22 22 p., 102375.

Research output: Contribution to journalArticle

Open Access
File
2 Citations (Scopus)

Next-Generation Digital Forensics: Challenges and Future Paradigms

Montasari, R. & Hill, R., 11 Apr 2019, Proceedings of 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability, ICGS3. London: IEEE, p. 205-212 8 p. 8688020

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

The Standardised Digital Forensic Investigation Process Model (SDFIPM)

Montasari, R., Hill, R., Carpenter, V. & Hosseinian-Far, A., 18 Apr 2019, Blockchain and Clinical Trial: Securing Patient Data. Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G. & Al-Khateeb, H. (eds.). 1st ed. Cham: Springer, Cham, p. 169-209 41 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)
Open Access
File
1 Citation (Scopus)
2018

Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?

Montasari, R., Hosseinian-far, A., Hill, R., Montaseri, F., Sharma, M. & Shabbir, S., 24 Apr 2018, In : International Journal of Organizational and Collective Intelligence. 8, 2, p. 32-59 28 p., 3.

Research output: Contribution to journalArticle

Open Access
File

Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study

Khan, S. & Parkinson, S., 5 Sep 2018, Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. Parkinson, S., Crampton, A. & Hill, R. (eds.). Springer, Cham, p. 159-182 (Computer Communications and Networks).

Research output: Chapter in Book/Report/Conference proceedingChapter

Crime Data Mining, Threat Analysis and Prediction

Farsi, M., Daneshkhah, A., Hosseinian Far, A., Chatrabgoun, O. & Montasari, R., 6 Dec 2018, Cyber Criminology. Jahankhani, H. (ed.). 1st ed. Switzerland: Springer International Publishing AG, p. 183-202 20 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

4 Citations (Scopus)
Open Access
File
7 Citations (Scopus)
Open Access
File
4 Citations (Scopus)
Open Access
File
4 Citations (Scopus)

Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments

Montasari, R., Hosseinian-Far, A. & Hill, R., 6 Dec 2018, Cyber Criminology. Jahankhani, H. (ed.). 1st ed. Switzerland: Springer International Publishing AG, p. 71-93 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Review into State of the Art of Vulnerability Assessment using Artificial Intelligence

Khan, S. & Parkinson, S., 9 Oct 2018, Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. Parkinson, S., Crampton, A. & Hill, R. (eds.). 1st ed. Cham: Springer, Cham, p. 3-32 30 p. (Computer Communications and Networks).

Research output: Chapter in Book/Report/Conference proceedingChapter

2017

Edge Influence Computation in Dynamic Graphs

Qin, Y., Sheng, Q. Z., Parkinson, S. & Falkner, N. J. G., 22 Mar 2017, Database Systems for Advanced Applications: 22nd International Conference, DASFAA 2017, Suzhou, China, March 27-30, 2017, Proceedings, Part II. Candan, S., Chen, L., Pedersen, T. B., Chang, L. & Hua, W. (eds.). Springer, Cham, Vol. LNCS 10178. p. 649-660 12 p. (Lecture Notes in Computer Science; vol. 10178).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Towards A Multi-tiered Knowledge-based System for Autonomous Cloud Security Auditing

Khan, S. & Parkinson, S., 21 Mar 2017, Proceedings of the AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS). Association for the Advancement of Artificial Intelligence, p. 187-194 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access