Skip to main content

Research Repository

Advanced Search

Outputs (33)

Multiple case study approach to identify aggravating variables of insider threats in information systems. (2014)
Journal Article
NICHO, M. and KAMOUN, F. 2014. Multiple case study approach to identify aggravating variables of insider threats in information systems. Communications of the association for information systems [online], 35, Article 18. Available from: http://aisel.aisnet.org/cais/vol35/iss1/18

Malicious insiders present a serious threat to information systems due to privilege of access, knowledge of internal computer resources, and potential threats on the part of disgruntled employees or insiders collaborating with external cybercriminals... Read More about Multiple case study approach to identify aggravating variables of insider threats in information systems..

Fast and efficient palmprint identification of a small sample within a full image. (2014)
Journal Article
MORENO-GARCIA, C.F. and SERRATOSA, F. 2014. Fast and efficient palmprint identification of a small sample within a full image. Computación y sistemas [online], 18(4), pages 683-691. Available from: https://doi.org/10.13053/CyS-18-4-2059

In some fields like forensic research, experts demand that a found sample of an individual can be matched with its full counterpart contained in a database. The found sample may present several characteristics that make this matching more difficult t... Read More about Fast and efficient palmprint identification of a small sample within a full image..

Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project. (2014)
Book Chapter
ATZENI, A., LYLE, J. and FAILY, S. 2014. Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project. In Ruiz-Martinez, A., Marin-Lopez, R. and Pereniguez-Garcia, F. (eds.) Architectures and protocols for secure information technology infrastructures. Hershey: IGI Global [online], chapter 12, pages 310-333. Available from: https://doi.org/10.4018/978-1-4666-4514-1.ch012

The need for integrated cross-platform systems is growing. Such systems can enrich the user experience, but also lead to greater security and privacy concerns than the sum of their existing components. To provide practical insights and suggest viable... Read More about Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project..

Ethical hacking assessment as a vehicle for undergraduate cyber-security education. (2014)
Conference Proceeding
FAILY, S. 2014. Ethical hacking assessment as a vehicle for undergraduate cyber-security education. In Uhomoibhi, J.O., Linecar, P., Barikzai, S., Ross, M. and Staples, G. (eds.) Global issues in IT education: proceedings of the 19th International conference on software process improvement research, education and training (INSPIRE 2014), 15 April 2014, Southampton, UK. Southampton: Solent University, pages 79-90.

The need for cyber security professionals in the UK is growing, motivating the need to introduce cybersecurity at an earlier stage of an undergraduate's education. However, despite on-going interest in cybersecurity pedagogy, there has been comparati... Read More about Ethical hacking assessment as a vehicle for undergraduate cyber-security education..

Engaging stakeholders in security design: an assumption-driven approach. (2014)
Conference Proceeding
FAILY, S. 2014. Engaging stakeholders in security design: an assumption-driven approach. In Clarke, N.L. and Furnell, S.M. (eds.) Proceedings of the 8th International symposium on human aspects of information security and assurance (HAISA 2014), 8-9 July 2014, Plymouth, UK. Plymouth: Plymouth University, pages 21-29.

System stakeholders fail to engage with security until comparatively late in the design and development process. User Experience artefacts like personas and scenarios create this engagement, but creating and contextualising them is difficult without... Read More about Engaging stakeholders in security design: an assumption-driven approach..

Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence. (2014)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2014. Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence. In Proceedings of the 2014 IEEE symposium on computational intelligence in control and automation (CICA 2014), part of the 2014 IEEE symposium series on computational intelligence (SSCI 2014), 9-12 December 2014, Orlando, USA. New York: IEEE [online], article number 7013256, pages 229-236. Available from: https://doi.org/10.1109/CICA.2014.7013256

An adaptive inferential measurement framework for control and automation systems has been proposed in the paper and tested on simulated traffic surveillance data. The use of the framework enables making inferences related to the presence of anomalies... Read More about Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence..

Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence. (2014)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2014. Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence. In Proceedings of the 2014 IEEE symposium on evolving and autonomous learning systems (EALS 2014), part of the 2014 IEEE symposium series on computational intelligence (SSCI 2014), 9-12 December 2014, Orlando, USA. New York: IEEE [online], article number 7009508, pages 87-94. Available from: https://doi.org/10.1109/EALS.2014.7009508

A generic framework for evolving and autonomously controlled systems has been developed and evaluated in this paper. A three-phase approach aimed at identification, classification of anomalous data and at prediction of its consequences is applied to... Read More about Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence..

Finding and resolving security misusability with misusability cases. (2014)
Journal Article
FAILY, S. and FLÉCHAIS, I. 2016. Finding and resolving security misusability with misusability cases. Requirements engineering [online], 21(2), pages 209-223. Available from: https://doi.org/10.1007/s00766-014-0217-8

Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly descr... Read More about Finding and resolving security misusability with misusability cases..

Backchannel chat: peaks and troughs in a Twitter response to three televised debates during the Scottish Independence Referendum campaign 2014. (2014)
Working Paper
PEDERSEN, S., BAXTER, G., BURNETT, S., GOKER, A., CORNEY, D., and MARTIN, C. 2014. Backchannel chat: peaks and troughs in a Twitter response to three televised debates during the Scottish Independence Referendum campaign 2014. Aberdeen Business School working paper series, 7(2).

Social-networking services such as Twitter offer users the potential to participate in public debate. When used whilst watching a television programme, Twitter allows backchannel discussion and debate in real time, which can add a new dimension and p... Read More about Backchannel chat: peaks and troughs in a Twitter response to three televised debates during the Scottish Independence Referendum campaign 2014..

Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems. (2014)
Journal Article
HORSBURGH, B., CRAW, S. and MASSIE, S. 2015. Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems. Artificial intelligence [online], 219, pages 25-39. Available from: https://doi.org/10.1016/j.artint.2014.11.004

Online recommender systems are an important tool that people use to find new music. To generate recommendations, many systems rely on tag representations of music. Such systems however suffer from tag sparsity, whereby tracks lack a strong tag repres... Read More about Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems..