publications
Publications in reversed chronological order
2026
2025
2024
- Privacy-preserving intrusion detection in software-defined VANET using federated learning with BERTarXiv preprint arXiv:2401.07343, 2024
-
Improving Search Space Analysis of Fuzzing Mutators Using Cryptographic StructuresIn Proceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2023), 2024 -
Digital twins of cyber physical systems in smart manufacturing for threat simulation and detection with deep learning for time series classificationIn 29th International Conference on Automation and Computing (ICAC2024), University of Sunderland, UK, 2024 -
Analyst-driven XAI for time series forecasting: Analytics for telecoms maintenanceIn ACM 9th International Conference on Machine Learning Technologies (ICMLT) 2024, 2024 -
Evaluating data distribution strategies in federated learning: A trade-off analysis between privacy and performance for IoT securityIn Proceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2023), 2024
2023
- Federated Learning: Data Privacy and Cyber Security in Edge-Based Machine LearningIn Data Protection in a Post-Pandemic Society, 2023
2022
-
Investigating Malware Propagation and Behaviour Using System and Network Pixel-Based VisualisationSN Computer Science, 2022 -
OGMA: visualisation for software container security analysis and automated remediationIn 2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022 -
Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber RangeIn Colloquium on Information Systems Security Education (CISSE), 2022 -
Interactive cyber-physical system hacking: Engaging students early using ScalextricIn Colloquium on Information Systems Security Education (CISSE), 2022
2021
-
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A SurveySecurity and communication Networks, 2021 -
Feature vulnerability and robustness assessment against adversarial machine learning attacksIn 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2021 -
“Hacking an IoT Home”: New opportunities for cyber security education combining remote learning with cyber-physical systemsIn 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2021 -
Unsupervised one-class learning for anomaly detection on home IoT network devicesIn 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2021
2020
- The visual design of network data to enhance cyber security awareness of the everyday internet userIn 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2020
- Shouting Through Letterboxes: A study on attack susceptibility of voice assistantsIn 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020
- “What did you say?”: Extracting unintentional secrets from predictive text learning systemsIn 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020
2019
- Efficient and interpretable real-time malware detection using random-forestIn International conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2019
2018
- Visualising state space representations of LSTM networksIn Workshop on Visualization for AI Explainability (VISxAI), 2018
- Predicting user confidence during visual decision makingACM Transactions on Interactive Intelligent Systems (TiiS), 2018
2017
- RicherPicture: Semi-automated cyber defence using context-aware data analyticsIn 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017
2016
- Glyph visualization: A fail-safe design scheme based on quasi-hamming distancesIEEE computer graphics and applications, 2016
- Visual Analytics for Non-Expert Users in Cyber Situation AwarenessInt. J. Cyber Situational Aware., 2016
2015
- Caught in the act of an insider attack: detection and assessment of insider threatIn 2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015
- Feature neighbourhood mutual information for multi-modal image registration: an application to eye fundus imagingPattern Recognition, 2015
- Automated insider threat detection system using user and role-based profile assessmentIEEE Systems Journal, 2015
2014
- A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approachesIn Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings 2, 2014
- Deep Focus: Increasing User" Depth of Field" to Improve Threat Detection (Oxford workshop poster)2014
2013
- Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimationComputerized Medical Imaging and Graphics, 2013
-
- Video Visualization2013
2012
2011
- Intelligent filtering by semantic importance for single-view 3D reconstruction from Snooker videoIn 2011 18th IEEE international conference on image processing, 2011
- Hierarchical event selection for video storyboards with a case study on snooker video visualizationIEEE Transactions on Visualization and Computer Graphics, 2011
2010
2009
- Non-rigid elastic registration of retinal images using local window mutual informationProc. Med. Image Understand. Anal. (MIUA 2009), 2009