Centre for Cyber Security, Communications and Network Research (CSCAN)
CSCAN publications
Vranopoulos G, Clarke N & Atkinson S2022'Addressing big data variety using an automated approach for data characterization'Journal Of Big Data9,(1), DOIOpen access
Alobaidi H, Clarke N, Li F & AbdulrahmanAlruban2021'Real-World Smartphone-based Gait Recognition'Computers and Security113,, DOIOpen access
Craven MJ & Woodward JR2021'Evolution of group-theoretic cryptology attacks using hyper-heuristics'Journal of Mathematical Cryptology16,(1)49-63, DOIOpen access
Asad H2021'Dynamical Analysis of Diversity in Rule-Based Open Source Network Intrusion Detection Systems'Empirical Software Engineering: an international journal27,(4), DOIOpen access
Bakhshi T & Ghita B2021'Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning'Security and Communication Networks2021,1-16, DOIOpen access
Furnell S & Clarke N2021Human Aspects of Information Security and Assurance 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings.Springer
Santos N, Younis W, Ghita B & Masala G2021'Enhancing Medical Data Security on Public Cloud'2021 IEEE International Conference on Cyber Security and Resilience (CSR)7-/-0/20217-/-0/2021IEEE, DOI
Kuzminykh I, Ghita B, Sokolov V & Bakhshi T2021'Information Security Risk Assessment'Encyclopedia1,(3)602-617, DOIOpen access
Tam K, Hopcraft R, Crichton T & Jones K2021'The potential mental health effects of remote control in an autonomous maritime world'Journal of International Maritime Safety, Environmental Affairs, and Shipping5,(2)51-66, DOIOpen access
Tam K, Moara-Nkwe K & Jones K2021'A Conceptual Cyber-Risk Assessment of Port Infastructure'World of Shipping Portugal, An International Research Conference on Maritime AffairsOpen access
Clarke N2021'Frictionless User Authentication'in Jajodia S; Samarati P; Yung MEncyclopedia of Cryptography, Security and PrivacySpringer, DOI
Bakhshi T & Ghita B2021'Perspectives on Auditing and Regulatory Compliance in Blockchain Transactions'Trust Models for Next-Generation Blockchain EcosystemsSpringer International Publishing37-65, DOIOpen access
Dobric D, Pech A, Ghita B & Wennekers T2021'Improved HTM Spatial Pooler with Homeostatic Plasticity Control'10th International Conference on Pattern Recognition Applications and Methods2-/-0/20212-/-0/2021SCITEPRESS - Science and Technology Publications, DOIOpen access
Brown R, Bendiab G, Shiaeles S & Ghita B2021'A Novel Multimodal Biometric Authentication System Using Machine Learning and Blockchain'Springer International Publishing31-46, DOIOpen access
Kuzminykh I, Ghita B & Silonosov A2021'On Keystroke Pattern Variability in Virtual Desktop Infrastructure'Publishing House Helvetica (Publications)238-248, DOIOpen access
Kuzminykh I, Ghita B & Shiaeles S2020'Comparative Analysis of Cryptographic Key Management Systems'Springer International Publishing80-94, DOIOpen access
TajDini M, Sokolov V, Kuzminykh I, Shiaeles S & Ghita B2020'Wireless Sensors for Brain Activity—A Survey'Electronics9,(12)2092-2092, DOIOpen access
Kuzminykh I, Ghita B & Silonosov A2020'Impact of Network and Host Characteristics on the Keystroke Pattern in
Remote Desktop Sessions'CoRRAuthor SiteOpen access
DesLauriers J, Kiss T, Ariyattu RC, Dang H, Ullah A, Bowden J, Krefting D, Pierantoni G & Terstyanszky G2020'Cloud apps to‐go: Cloud portability with TOSCA and MiCADO'Wiley, DOI
Barakabitze AA, Mkwawa I-H, Hines A, Sun L & Ifeachor E2020'QoEMultiSDN: Management of Multimedia Services using MPTCP/SR in Softwarized and Virtualized Networks'IEEE Access1-1, DOIOpen access
Dobric D, Pech A, Ghita B & Wennekers T2020'On the Relationship Between Input Sparsity and Noise Robustness in Hierarchical Temporal Memory Spatial Pooler'ESSE 2020: 2020 European Symposium on Software EngineeringACM, DOIOpen access
Ali M, Shiaeles S, Bendiab G & Ghita B2020'MALGRA: Machine Learning and N-Gram Malware Feature Extraction and Detection System'Electronics9,(11)1777-1777, DOIOpen access
Dalezios N, Shiaeles S, Kolokotronis N & Ghita B2020'Digital forensics cloud log unification: Implementing CADF in Apache CloudStack'Journal of Information Security and Applications54,102555-102555, DOIOpen access
Naqvi B, Clarke N & Porras J2020'Incorporating the Human Facet of Security in Developing Systems and
Services'Information and Computer Security, DOIOpen access
Clarke N & Furnell S2020Human Aspects of Information Security and Assurance 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings.Springer
Alotaibi F, Clarke N & Furnell S2020'A novel approach for improving information security management and awareness for home environments'Information and Computer Security, DOIOpen access
Tam K, Moara-Nkwe K & Jones K2020'The Use of Cyber Ranges in the Maritime Context'Maritime Technology and Research3,(1), DOIOpen access
Hock D, Kappes M & Ghita B2020'Entropy-Based Metrics for Occupancy Detection Using Energy Demand'Entropy22,(7)731-731, DOIOpen access
Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S2020'Blockchain and Trust for Secure, End-User-Based and Decentralized IoT Service Provision'IEEE Access8,119961-119979, DOIOpen access
Pozdniakov K, Alonso E, Stankovic V, Tam K & Jones K2020'Smart Security Audit: Reinforcement Learning with a Deep Neural Network Approximator'IEEE Cyber ScienceOpen access
Gantikow H, Reich C, Knahl M & Clarke N2020'Rule-Based Security Monitoring of Containerized Environments'Cloud Computing and Services Science
9th International Conference, CLOSER 2019, Heraklion, Crete, Greece, May 2–4, 2019, Revised Selected PapersSpringer International Publishing66-86, DOIOpen access
Koutsouvelis V, Shiaeles S, Ghita B & Bendiab G2020'Detection of Insider Threats using Artificial Intelligence and Visualisation'2020 6th IEEE International Conference on Network Softwarization (NetSoft)6-/-0/20207-/-0/2020IEEE, DOIOpen access
Reich O, Hubner E, Ghita B, Wagner M & Schafer J2020'Performance Evaluation of Bluetooth in a Wireless Body Area Network for Practical Applications'2020 IEEE 11th Sensor Array and Multichannel Signal Processing Workshop (SAM)6-/-0/20206-/-0/2020IEEE, DOIOpen access
Reich O, Hubner E, Ghita B, Wagner M & Schafer J2020'Bluetooth Performance Evaluation based on Notify for Real-time Body-Area Sensor Networks'2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0&IoT)6-/-0/20206-/-0/2020IEEE, DOIOpen access
Reich O, Hubner E, Ghita B, Wagner MF & Schafer J2020'A Survey Investigating the Combination and Number of IMUs on the Human Body Used for Detecting Activities and Human Tracking'2020 World Conference on Computing and Communication Technologies (WCCCT)5-/-0/20205-/-0/2020IEEE, DOIOpen access
Tchinda AP, Frick G, Trick U, Lehmann A & Ghita B2020'High Throughput WMN for the Communication in Disaster Scenario'2020 World Conference on Computing and Communication Technologies (WCCCT)5-/-0/20205-/-0/2020IEEE, DOIOpen access
Frick G, Tchinda AP, Trick U, Lehmann A & Ghita B2020'Possible Challenges and Appropriate Measures for a Resilient WMN-Based Disaster Network'2020 World Conference on Computing and Communication Technologies (WCCCT)5-/-0/20205-/-0/2020IEEE, DOIOpen access
Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S2020'Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service Platforms'Advanced Information Networking and Applications: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020)Springer International Publishing547-558, DOIOpen access
Barakabitze AA, Sun L, Mkwawa I-H & Ifeachor E2020'Multipath Protections and Dynamic Link Recovery in Softwarized 5G Networks using Segment Routing'IEEE Globecom 2019, Workshop on FUTURE INTERNET ARCHITECTURE, TECHNOLOGIES AND SERVICES FOR 2030 AND BEYOND, DOIOpen access
Frimpong E, Bakas A, Dang H-V & Michalas A2020'Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices'5th International Conference on Internet of Things, Big Data and Security5-/-0/20205-/-0/2020SCITEPRESS - Science and Technology Publications, DOI
Bakas A, Dang H-V, Michalas A & Zalitko A2020'The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds'IEEE Access8,210462-210477, DOI
Dang H-V, Ullah A, Bakas A & Michalas A2020'Attribute-Based Symmetric Searchable Encryption'Springer International Publishing318-336, DOI
Kuzminykh I, Shevchuk D, Shiaeles S & Ghita B2020'Audio Interval Retrieval Using Convolutional Neural Networks'Springer International Publishing229-240, DOIOpen access
Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S2020'Distributed ledger technology for trust management optimisation in M2M'93-98Open access
Korek WT, Mendez A, Asad HU, Li W-C & Lone M2020'Understanding Human Behaviour in Flight Operation Using Eye-Tracking Technology'Springer International Publishing304-320, DOI
Hock D, Kappes M & Ghita B2019'Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric'Sustainable Energy, Grids and Networks21,100290-100290, DOIOpen access
Akinsanya OO, Papadaki M & Sun L2019'Towards a maturity model for health-care cloud security (M<sup>2</sup>HCS)'Information & Computer Security28,(3)321-345, DOI
Alohali M, Clarke N & Furnell S2019'Information Security Risk Communication: A User-Centric Approach'2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)1-/-1/20191-/-1/2019IEEE, DOI
Tam K & Jones K2019'MaCRA: a model-based framework for maritime cyber-risk assessment'Wmu Journal of Maritime Affairs, DOIOpen access
Select a staff member to see a full list of publications