Skip to main content

Research Repository

Advanced Search

All Outputs (4)

A system dynamics approach to evaluate advanced persistent threat vectors. (2023)
Journal Article
NICHO, M., MCDERMOTT, C.D., FAKHRY, H. and GIRIJA, S. 2023. A system dynamics approach to evaluate advanced persistent threat vectors. International journal of information security and privacy [online], 17(1), pages 1-23. Available from: https://doi.org/10.4018/IJISP.324064

Cyber-attacks targeting high-profile entities are focused, persistent, and employ common vectors with varying levels of sophistication to exploit social-technical vulnerabilities. Advanced persistent threats (APTs) deploy zero-day malware against suc... Read More about A system dynamics approach to evaluate advanced persistent threat vectors..

A crime scene reconstruction for digital forensic analysis: an SUV case study. (2023)
Journal Article
NICHO, M., ALBLOOKI, M., ALMUTIWEI, S., MCDERMOTT, C.D. and ILESANMI, O. 2023. A crime scene reconstruction for digital forensic analysis: an SUV case study. International journal of digital crime and forensics [online], 15(1), 327358. Available from: https://doi.org/10.4018/IJDCF.327358

The abundance of digital data within modern vehicles makes digital vehicle forensics (DVF) a promising subfield of digital forensics (DF), with significant potential for investigations. In this research, the authors apply DVF methodology to a SUV, si... Read More about A crime scene reconstruction for digital forensic analysis: an SUV case study..

Evaluating awareness and perception of botnet activity within consumer Internet-of-Things (IoT) networks. (2019)
Journal Article
MCDERMOTT, C.D., ISAACS, J.P. and PETROVSKI, A.V. 2019. Evaluating awareness and perception of botnet activity within consumer Internet-of-Things (IoT) networks. Informatics [online], 6(1), article 8. Available from: https://doi.org/10.3390/informatics6010008

The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices, has led to the production of swathes of insecure Internet-connected devices. Many can be exploited and leveraged to perform large-scale attacks on the Intern... Read More about Evaluating awareness and perception of botnet activity within consumer Internet-of-Things (IoT) networks..

Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. (2017)
Journal Article
MCDERMOTT, C.D. and PETROVSKI, A. 2017. Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. International journal of computer networks and communications [online], 9(4), pages 45-56. Available from: https://doi.org/10.5121/ijcnc.2017.9404

Wireless Sensor Networks (WSNs) have become a key technology for the IoT and despite obvious benefits, challenges still exist regarding security. As more devices are connected to the internet, new cyber attacks are emerging which join well-known atta... Read More about Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks..