publications
Publications in reversed chronological order
2025
2024
- Privacy-preserving intrusion detection in software-defined VANET using federated learning with BERTarXiv preprint arXiv:2401.07343, 2024
- Cyber Funfair: Creating Immersive and Educational Experiences for Teaching Cyber Physical Systems SecurityIn SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
- Vulnerability detection through machine learning-based fuzzing: A systematic reviewComputers & Security, 2024
- Improving Search Space Analysis of Fuzzing Mutators Using Cryptographic StructuresIn Proceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2023), 2024
- Digital twins of cyber physical systems in smart manufacturing for threat simulation and detection with deep learning for time series classificationIn 29th International Conference on Automation and Computing (ICAC2024), University of Sunderland, UK, 2024
- Analyst-driven XAI for time series forecasting: Analytics for telecoms maintenanceIn ACM 9th International Conference on Machine Learning Technologies (ICMLT) 2024, 2024
- Evaluating data distribution strategies in federated learning: A trade-off analysis between privacy and performance for IoT securityIn Proceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2023), 2024
- Cyber security unplugged: Teaching security management through immersive gameplayIn Advances in Teaching and Learning for Cyber Security Education, 2024
- Privacy-Based Triage of Suspicious Activity Reports Using Offline Large Language ModelsIn Advancements in Cyber Crime Investigations and Modern Data Analytics, 2024
2023
- Federated Learning: Data Privacy and Cyber Security in Edge-Based Machine LearningIn Data Protection in a Post-Pandemic Society, 2023
- Longitudinal Risk-based Security Assessment of Docker Software Container ImagesComputers and Security, 2023
2022
- Investigating Malware Propagation and Behaviour Using System and Network Pixel-Based VisualisationSN Computer Science, 2022
- OGMA: visualisation for software container security analysis and automated remediationIn 2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022
- Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber RangeIn Colloquium on Information Systems Security Education (CISSE), 2022
- Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classificationJournal of Information Security and Applications, 2022
- Interactive cyber-physical system hacking: Engaging students early using ScalextricIn Colloquium on Information Systems Security Education (CISSE), 2022
2021
- Deep Learning-Based Security Behaviour Analysis in IoT Environments: A SurveySecurity and communication Networks, 2021
- Feature vulnerability and robustness assessment against adversarial machine learning attacksIn 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2021
- “Hacking an IoT Home”: New opportunities for cyber security education combining remote learning with cyber-physical systemsIn 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2021
- Unsupervised one-class learning for anomaly detection on home IoT network devicesIn 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2021
2020
- The visual design of network data to enhance cyber security awareness of the everyday internet userIn 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2020
- Shouting Through Letterboxes: A study on attack susceptibility of voice assistantsIn 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020
- “What did you say?”: Extracting unintentional secrets from predictive text learning systemsIn 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020
2019
- What makes for effective visualisation in cyber situational awareness for non-expert users?In International conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2019
- Venue2vec: An efficient embedding model for fine-grained user location prediction in geo-social networksIEEE Systems Journal, 2019
- Tools and techniques for improving cyber situational awareness of targeted phishing attacksIn International conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2019
- Efficient and interpretable real-time malware detection using random-forestIn International conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2019
2018
- Predicting the occurrence of world news events using recurrent neural networks and auto-regressive moving average modelsIn Advances in Computational Intelligence Systems: Contributions Presented at the 17th UK Workshop on Computational Intelligence, September 6-8, 2017, Cardiff, UK, 2018
- Visualising state space representations of LSTM networksIn Workshop on Visualization for AI Explainability (VISxAI), 2018
- Predicting user confidence during visual decision makingACM Transactions on Interactive Intelligent Systems (TiiS), 2018
2017
- Human-machine decision support systems for insider threat detectionData Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, 2017
- RicherPicture: Semi-automated cyber defence using context-aware data analyticsIn 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017
2016
- Automated registration of multimodal optic disc images: clinical assessment of alignment accuracyJournal of Glaucoma, 2016
- Enhancing cyber situation awareness for non-expert users using visual analyticsIn 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016
- Glyph visualization: A fail-safe design scheme based on quasi-hamming distancesIEEE computer graphics and applications, 2016
- Visual Analytics for Non-Expert Users in Cyber Situation AwarenessInt. J. Cyber Situational Aware., 2016
2015
- Glyph sorting: Interactive visualization for multi-dimensional dataInformation Visualization, 2015
-
- Knowledge-assisted ranking: A visual analytic application for sports event dataIEEE Computer Graphics and Applications, 2015
- Visualizing the insider threat: challenges and tools for identifying malicious user activityIn 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 2015
- Caught in the act of an insider attack: detection and assessment of insider threatIn 2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015
- Feature neighbourhood mutual information for multi-modal image registration: an application to eye fundus imagingPattern Recognition, 2015
- Automated insider threat detection system using user and role-based profile assessmentIEEE Systems Journal, 2015
2014
- Systematic snooker skills test to analyze player performanceInternational Journal of Sports Science & Coaching, 2014
- Reflecting on the ability of enterprise security policy to address accidental insider threatIn 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014
- Understanding insider threat: A framework for characterising attacksIn 2014 IEEE security and privacy workshops, 2014
- A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approachesIn Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings 2, 2014
- Deep Focus: Increasing User" Depth of Field" to Improve Threat Detection (Oxford workshop poster)2014
2013
- Force-directed parallel coordinatesIn 2013 17th International Conference on Information Visualisation, 2013
- Transformation of an uncertain video search pipeline to a sketch-based visual analytics loopIEEE transactions on Visualization and Computer Graphics, 2013
- Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimationComputerized Medical Imaging and Graphics, 2013
-
- Video Visualization2013
2012
- Visualizing multiple error-sensitivity fields for single camera positioningComputing and Visualization in Science, 2012
- MatchPad: interactive glyph-based visualization for real-time sports performance analysisIn Computer graphics forum, 2012
2011
- From Video to Animated 3D Reconstruction: A Computer Graphics Application for Snooker Skills Training.In Eurographics (Posters), 2011
- Intelligent filtering by semantic importance for single-view 3D reconstruction from Snooker videoIn 2011 18th IEEE international conference on image processing, 2011
- Hierarchical event selection for video storyboards with a case study on snooker video visualizationIEEE Transactions on Visualization and Computer Graphics, 2011
2010
- Multimodal retinal imaging: Improving accuracy and efficiency of image registration using Mutual InformationCardiff University (United Kingdom), 2010
2009
- A robust solution to multi-modal image registration by combining mutual information with multi-scale derivativesIn Medical Image Computing and Computer-Assisted Intervention–MICCAI 2009: 12th International Conference, London, UK, September 20-24, 2009, Proceedings, Part I 12, 2009
- Non-rigid elastic registration of retinal images using local window mutual informationProc. Med. Image Understand. Anal. (MIUA 2009), 2009
2008
2007
- Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram ruleProc. Med. Image Understand. Anal. (MIUA 2007), 2007