Publications

CSCAN publications

  • Vranopoulos G, Clarke N & Atkinson S 2022 'Addressing big data variety using an automated approach for data characterization' Journal Of Big Data 9, (1) , DOI Open access
  • Alobaidi H, Clarke N, Li F & AbdulrahmanAlruban 2021 'Real-World Smartphone-based Gait Recognition' Computers and Security 113, , DOI Open access
  • Craven MJ & Woodward JR 2021 'Evolution of group-theoretic cryptology attacks using hyper-heuristics' Journal of Mathematical Cryptology 16, (1) 49-63 , DOI Open access
  • Asad H 2021 'Dynamical Analysis of Diversity in Rule-Based Open Source Network Intrusion Detection Systems' Empirical Software Engineering: an international journal 27, (4) , DOI Open access
  • Bakhshi T & Ghita B 2021 'Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning' Security and Communication Networks 2021, 1-16 , DOI Open access
  • Furnell S & Clarke N 2021 Human Aspects of Information Security and Assurance 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Springer
  • Santos N, Younis W, Ghita B & Masala G 2021 'Enhancing Medical Data Security on Public Cloud' 2021 IEEE International Conference on Cyber Security and Resilience (CSR) 7-/-0/2021 7-/-0/2021 IEEE , DOI
  • Kuzminykh I, Ghita B, Sokolov V & Bakhshi T 2021 'Information Security Risk Assessment' Encyclopedia 1, (3) 602-617 , DOI Open access
  • Tam K, Hopcraft R, Crichton T & Jones K 2021 'The potential mental health effects of remote control in an autonomous maritime world' Journal of International Maritime Safety, Environmental Affairs, and Shipping 5, (2) 51-66 , DOI Open access
  • Tam K, Moara-Nkwe K & Jones K 2021 'A Conceptual Cyber-Risk Assessment of Port Infastructure' World of Shipping Portugal, An International Research Conference on Maritime Affairs Open access
  • Clarke N 2021 'Frictionless User Authentication' in Jajodia S; Samarati P; Yung M Encyclopedia of Cryptography, Security and Privacy Springer , DOI
  • Bakhshi T & Ghita B 2021 'Perspectives on Auditing and Regulatory Compliance in Blockchain Transactions' Trust Models for Next-Generation Blockchain Ecosystems Springer International Publishing 37-65 , DOI
  • Dobric D, Pech A, Ghita B & Wennekers T 2021 'Improved HTM Spatial Pooler with Homeostatic Plasticity Control' 10th International Conference on Pattern Recognition Applications and Methods 2-/-0/2021 2-/-0/2021 SCITEPRESS - Science and Technology Publications , DOI Open access
  • Brown R, Bendiab G, Shiaeles S & Ghita B 2021 'A Novel Multimodal Biometric Authentication System Using Machine Learning and Blockchain' Springer International Publishing 31-46 , DOI Open access
  • Kuzminykh I, Ghita B & Silonosov A 2021 'On Keystroke Pattern Variability in Virtual Desktop Infrastructure' Publishing House Helvetica (Publications) 238-248 , DOI
  • Kuzminykh I, Ghita B & Shiaeles S 2020 'Comparative Analysis of Cryptographic Key Management Systems' Springer International Publishing 80-94 , DOI Open access
  • TajDini M, Sokolov V, Kuzminykh I, Shiaeles S & Ghita B 2020 'Wireless Sensors for Brain Activity—A Survey' Electronics 9, (12) 2092-2092 , DOI Open access
  • Kuzminykh I, Ghita B & Silonosov A 2020 'Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions' CoRR Author Site Open access
  • Kuzminykh I, Ghita B & Such JM 2020 'The Challenges with Internet of Things for Business' Author Site Open access
  • DesLauriers J, Kiss T, Ariyattu RC, Dang H, Ullah A, Bowden J, Krefting D, Pierantoni G & Terstyanszky G 2020 'Cloud apps to‐go: Cloud portability with TOSCA and MiCADO' Wiley , DOI
  • Barakabitze AA, Mkwawa I-H, Hines A, Sun L & Ifeachor E 2020 'QoEMultiSDN: Management of Multimedia Services using MPTCP/SR in Softwarized and Virtualized Networks' IEEE Access 1-1 , DOI Open access
  • Dobric D, Pech A, Ghita B & Wennekers T 2020 'On the Relationship Between Input Sparsity and Noise Robustness in Hierarchical Temporal Memory Spatial Pooler' ESSE 2020: 2020 European Symposium on Software Engineering ACM , DOI Open access
  • Ali M, Shiaeles S, Bendiab G & Ghita B 2020 'MALGRA: Machine Learning and N-Gram Malware Feature Extraction and Detection System' Electronics 9, (11) 1777-1777 , DOI Open access
  • Dalezios N, Shiaeles S, Kolokotronis N & Ghita B 2020 'Digital forensics cloud log unification: Implementing CADF in Apache CloudStack' Journal of Information Security and Applications 54, 102555-102555 , DOI Open access
  • Naqvi B, Clarke N & Porras J 2020 'Incorporating the Human Facet of Security in Developing Systems and Services' Information and Computer Security , DOI Open access
  • Clarke N & Furnell S 2020 Human Aspects of Information Security and Assurance 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings. Springer
  • Alotaibi F, Clarke N & Furnell S 2020 'A novel approach for improving information security management and awareness for home environments' Information and Computer Security , DOI Open access
  • Tam K, Moara-Nkwe K & Jones K 2020 'The Use of Cyber Ranges in the Maritime Context' Maritime Technology and Research 3, (1) , DOI Open access
  • Hock D, Kappes M & Ghita B 2020 'Entropy-Based Metrics for Occupancy Detection Using Energy Demand' Entropy 22, (7) 731-731 , DOI Open access
  • Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S 2020 'Blockchain and Trust for Secure, End-User-Based and Decentralized IoT Service Provision' IEEE Access 8, 119961-119979 , DOI Open access
  • Pozdniakov K, Alonso E, Stankovic V, Tam K & Jones K 2020 'Smart Security Audit: Reinforcement Learning with a Deep Neural Network Approximator' IEEE Cyber Science Open access
  • Gantikow H, Reich C, Knahl M & Clarke N 2020 'Rule-Based Security Monitoring of Containerized Environments' Cloud Computing and Services Science 9th International Conference, CLOSER 2019, Heraklion, Crete, Greece, May 2–4, 2019, Revised Selected Papers Springer International Publishing 66-86 , DOI Open access
  • Koutsouvelis V, Shiaeles S, Ghita B & Bendiab G 2020 'Detection of Insider Threats using Artificial Intelligence and Visualisation' 2020 6th IEEE International Conference on Network Softwarization (NetSoft) 6-/-0/2020 7-/-0/2020 IEEE , DOI Open access
  • Reich O, Hubner E, Ghita B, Wagner M & Schafer J 2020 'Performance Evaluation of Bluetooth in a Wireless Body Area Network for Practical Applications' 2020 IEEE 11th Sensor Array and Multichannel Signal Processing Workshop (SAM) 6-/-0/2020 6-/-0/2020 IEEE , DOI Open access
  • Reich O, Hubner E, Ghita B, Wagner M & Schafer J 2020 'Bluetooth Performance Evaluation based on Notify for Real-time Body-Area Sensor Networks' 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0&IoT) 6-/-0/2020 6-/-0/2020 IEEE , DOI Open access
  • Reich O, Hubner E, Ghita B, Wagner MF & Schafer J 2020 'A Survey Investigating the Combination and Number of IMUs on the Human Body Used for Detecting Activities and Human Tracking' 2020 World Conference on Computing and Communication Technologies (WCCCT) 5-/-0/2020 5-/-0/2020 IEEE , DOI Open access
  • Tchinda AP, Frick G, Trick U, Lehmann A & Ghita B 2020 'High Throughput WMN for the Communication in Disaster Scenario' 2020 World Conference on Computing and Communication Technologies (WCCCT) 5-/-0/2020 5-/-0/2020 IEEE , DOI Open access
  • Frick G, Tchinda AP, Trick U, Lehmann A & Ghita B 2020 'Possible Challenges and Appropriate Measures for a Resilient WMN-Based Disaster Network' 2020 World Conference on Computing and Communication Technologies (WCCCT) 5-/-0/2020 5-/-0/2020 IEEE , DOI Open access
  • Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S 2020 'Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service Platforms' Advanced Information Networking and Applications: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020) Springer International Publishing 547-558 , DOI Open access
  • Barakabitze AA, Sun L, Mkwawa I-H & Ifeachor E 2020 'Multipath Protections and Dynamic Link Recovery in Softwarized 5G Networks using Segment Routing' IEEE Globecom 2019, Workshop on FUTURE INTERNET ARCHITECTURE, TECHNOLOGIES AND SERVICES FOR 2030 AND BEYOND , DOI Open access
  • Frimpong E, Bakas A, Dang H-V & Michalas A 2020 'Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices' 5th International Conference on Internet of Things, Big Data and Security 5-/-0/2020 5-/-0/2020 SCITEPRESS - Science and Technology Publications , DOI
  • Bakas A, Dang H-V, Michalas A & Zalitko A 2020 'The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds' IEEE Access 8, 210462-210477 , DOI
  • Dang H-V, Ullah A, Bakas A & Michalas A 2020 'Attribute-Based Symmetric Searchable Encryption' Springer International Publishing 318-336 , DOI
  • Kuzminykh I, Shevchuk D, Shiaeles S & Ghita B 2020 'Audio Interval Retrieval Using Convolutional Neural Networks' Springer International Publishing 229-240 , DOI Open access
  • Shala B, Trick U, Lehmann A, Ghita B & Shiaeles S 2020 'Distributed ledger technology for trust management optimisation in M2M' 93-98 Open access
  • Korek WT, Mendez A, Asad HU, Li W-C & Lone M 2020 'Understanding Human Behaviour in Flight Operation Using Eye-Tracking Technology' Springer International Publishing 304-320 , DOI
  • Hock D, Kappes M & Ghita B 2019 'Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric' Sustainable Energy, Grids and Networks 21, 100290-100290 , DOI Open access
  • Akinsanya OO, Papadaki M & Sun L 2019 'Towards a maturity model for health-care cloud security (M<sup>2</sup>HCS)' Information &amp; Computer Security 28, (3) 321-345 , DOI
  • Alohali M, Clarke N & Furnell S 2019 'Information Security Risk Communication: A User-Centric Approach' 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA) 1-/-1/2019 1-/-1/2019 IEEE , DOI
  • Tam K & Jones K 2019 'MaCRA: a model-based framework for maritime cyber-risk assessment' Wmu Journal of Maritime Affairs , DOI Open access

Select a staff member to see a full list of publications

Core staff