Skip to main content

Research Repository

Advanced Search

All Outputs (3)

Cyberbullying on social media: definitions, prevalence, and impact challenges. (2024)
Journal Article
RAY, G., MCDERMOTT, C.D. and NICHO, M. 2024. Cyberbullying on social media: definitions, prevalence, and impact challenges. Journal of cybersecurity [online], 10(1), article number tyae026. Available from: https://doi.org/10.1093/cybsec/tyae026

Cyberbullying on social media is a significant public health concern. This paper systematically reviews the existing literature on cyberbullying to provide a clearer understanding of how it is defined and reported in terms of prevalence and impact. U... Read More about Cyberbullying on social media: definitions, prevalence, and impact challenges..

Securing underwater wireless communication with frequency-hopping spread spectrum. (2024)
Presentation / Conference Contribution
RAHMAN, K.U., FOUGH, N., MCDERMOTT, C.D., SUNDAS, R., BAIG, N. and KANNAN, S. 2024. Securing underwater wireless communication with frequency-hopping spread spectrum. In Proceedings of the 2024 IEEE (Institute of Electrical and Electronics Engineers) International workshop on Metrology for the sea; learning to measure sea health parameters (IEEE MetroSea 2024), 14-16 October 2024, Portorose, Slovenia. Piscataway: IEEE [online], pages 266-271. Available from: https://doi.org/10.1109/metrosea62823.2024.10765656

The significance of subsea communication has increased substantially, with growing interest in replacing wired communication with wireless alternatives. However, subsea communication faces several challenges due to the harsh environment, including hi... Read More about Securing underwater wireless communication with frequency-hopping spread spectrum..

Enhancing the construction of attacker personas in cybersecurity software designs using case law-based facts. [Preprint] (2024)
Preprint / Working Paper
ILESANMI, O., FAILY, S., NICHO, M. and MCDERMOTT, C. 2024. Enhancing the construction of attacker personas in cybersecurity software designs using case law-based facts. [Preprint]. Hosted on SSRN [online]. Available from: https://doi.org/10.2139/ssrn.4812698

Thwarting potential attackers is always at the heart of cybersecurity software designs. This interdisciplinary paper in computing science and law investigates the possibility of building attacker personas through reliance on case law facts. To combat... Read More about Enhancing the construction of attacker personas in cybersecurity software designs using case law-based facts. [Preprint].