• University of Huddersfield Queensgate Huddersfield HD1 3DH

    United Kingdom

Accepting PhD Students

  • 119 Citations
  • 3 h-Index
20172020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 119 Citations
  • 3 h-Index
  • 9 Article
  • 4 Conference contribution
  • 2 Chapter
  • 1 Review article
2020
Open Access
File

Built environment attributes and crime: an automated machine learning approach

Dakin, K., Xie, W., Parkinson, S., Khan, S., Monchuk, L. & Pease, K., 8 Jul 2020, In : Crime Science. 9, 1, 17 p., 12.

Research output: Contribution to journalArticle

Open Access

Low-Cost Fitness and Activity Trackers for Biometric Authentication

Khan, S., Parkinson, S., Liu, N. & Grant, L., 16 Oct 2020, (Accepted/In press) In : Journal of Cybersecurity.

Research output: Contribution to journalArticle

Password Policy Characteristics and Keystroke Biometric Authentication

Parkinson, S., Khan, S., Crampton, A., Xu, Q., Xie, W., Liu, N. & Dakin, K., 8 Oct 2020, (Accepted/In press) In : IET Biometrics.

Research output: Contribution to journalArticle

Open Access
File
2019

Creeper: a tool for detecting permission creep in file system access controls

Parkinson, S., Khan, S., Bray, J. & Shreef, D., 1 Dec 2019, In : Cybersecurity. 2, 1, 14 p., 14.

Research output: Contribution to journalArticle

Open Access

Discovering and utilising expert knowledge from security event logs

Khan, S. & Parkinson, S., 1 Oct 2019, In : Journal of Information Security and Applications. 48, p. 1-22 22 p., 102375.

Research output: Contribution to journalArticle

Open Access
File
2 Citations (Scopus)
2018

Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study

Khan, S. & Parkinson, S., 5 Sep 2018, Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. Parkinson, S., Crampton, A. & Hill, R. (eds.). Springer, Cham, p. 159-182 (Computer Communications and Networks).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
File
7 Citations (Scopus)
Open Access
File
4 Citations (Scopus)

Review into State of the Art of Vulnerability Assessment using Artificial Intelligence

Khan, S. & Parkinson, S., 9 Oct 2018, Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. Parkinson, S., Crampton, A. & Hill, R. (eds.). 1st ed. Cham: Springer, Cham, p. 3-32 30 p. (Computer Communications and Networks).

Research output: Chapter in Book/Report/Conference proceedingChapter

2017

A Multi-layered Cloud Protection Framework

Khan, S., Parkinson, S. & Crampton, A., 5 Dec 2017, Proceedings of the 10th International Conference on Utility and Cloud Computing (UCC), (Austin, TX: 5-8 December 2017): Companion Volume for Workshop Materials. Association for Computing Machinery (ACM), p. 233-238 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Causal Connections Mining Within Security Event Logs

Khan, S. & Parkinson, S., 4 Dec 2017, Proceedings of the 9th International Conference on Knowledge Capture (K-CAP), (Austin, TX: 4-6 December 2017). Association for Computing Machinery (ACM), 4 p. 38

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2 Citations (Scopus)

Fog computing security: a review of current applications and security solutions

Khan, S., Parkinson, S. & Qin, Y., 16 Aug 2017, In : Journal of Cloud Computing. 6, 22 p., 19.

Research output: Contribution to journalReview article

Open Access
102 Citations (Scopus)

Security Auditing in the Fog

Parkinson, S., Qin, Y., Khan, S. & Vallati, M., 2017, Proceedings of the Second International Conference on Internet of Things: Data and Cloud Computing (ICC 2017). New York: Association for Computing Machinery (ACM), 9 p. a191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Towards A Multi-tiered Knowledge-based System for Autonomous Cloud Security Auditing

Khan, S. & Parkinson, S., 21 Mar 2017, Proceedings of the AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS). Association for the Advancement of Artificial Intelligence, p. 187-194 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access