Skip to main content

Research Repository

Advanced Search

All Outputs (526)

A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. (2022)
Conference Proceeding
ALKUBAISY, D., PIRAS, L., AL-OBEIDALLAH, M.G., COX, K. and MOURATIDIS, H. 2022. A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. In Ali, R., Kaindl, H. and Maciaszek, L.A. (eds.). Evaluation of novel approaches to software engineering: revised selected papers from 16th International conference on Evaluation of novel approaches to software engineering 2021 (ENASE 2021), 26-27 April 2021, [virtual conference]. Communications in computer and information science, 1556. Cham: Springer [online], pages 67-87. Available from: https://doi.org/10.1007/978-3-030-96648-5_4

Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineer... Read More about A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design..

Integrated design framework for facilitating systems-theoretic process analysis. (2022)
Conference Proceeding
ALTAF, A., FAILY, S., DOGAN, H., THRON, E. and MYLONAS, A. 2022. Integrated design framework for facilitating systems-theoretic process analysis. In Katsikas, S., Lambrinoudakis, C., Cuppens, N. et al (eds.) Computer security: 26th European symposium on research in computer security (ESORICS 2021) international workshops: selected papers from 7th workshop on the security of industrial control systems of cyber-physical systems (CyberICPS 2021), co-located with SECPRE, ADIoT, SPOSE, CPS4CIP, CDT and SECOMANE, 4-8 October 2021, Darmstadt, Germany. Lecture notes in computer science (LNCS), 13106. Cham: Springer [online], pages 58-73. Available from: https://doi.org/10.1007/978-3-030-95484-0_4

Systems-Theoretic Process Analysis (STPA) helps mitigate identified safety hazards leading to unfortunate situations. Usually, a systematic step-by-step approach is followed by safety experts irrespective of any software based tool-support, but ident... Read More about Integrated design framework for facilitating systems-theoretic process analysis..

Cybersecurity user requirements analysis: the ECHO approach. (2022)
Conference Proceeding
KATOS, V., KI-ARIES, D., FAILY, S., GENCHEV, A., BOZHILOVA, M. and STOIANOV, N. 2022. Cybersecurity user requirements analysis: the ECHO approach. In: Shkarlet, S., Morozov, A., Palagin, A., Vinnikov, D., Stoianov, N., Zhelezniak, M. and Kazymyr, V. (eds.) Mathematical modeling and simulation of systems: selected papers from the proceedings of the 16th International scientific-practical conference on mathematical modeling and simulation of systems (MODS 2021), 28 June - 1 July 2021, Chernihiv, Ukraine. Lecture notes in networks and systems, 344. Cham: Springer [online], pages 405-421. Available from: https://link.springer.com/book/9783030899011

Cyber defense requires research and investment in advanced technological solution as well as in the development of effective methods and tools for identifying cyber threats and risks. This implies a need for a well-defined process for user requiremen... Read More about Cybersecurity user requirements analysis: the ECHO approach..

AI and cybersecurity 2021: proceedings of the 2021 Workshop on AI and cybersecurity (AI-Cybersec 2021) (2021)
Conference Proceeding
SANI, S. and KALUTARAGE, H. (eds.) 2021. AI and cybersecurity 2021: proceedings of the 2021 Workshop on AI and cybersecurity (AI-Cybersec 2021), co-located with the 41st Specialist Group on Artificial Intelligence international conference on artificial intelligence (SGAI 2021), 14 December 2021, [virtual event]. CEUR workshop proceedings, 3125. Aachen: CEUR-WS [online]. Available from: https://ceur-ws.org/Vol-3125/

This volume consists of the papers that were presented at the 1st International Workshop on Artificial Intelligence and Cyber Security, co-located with the 41st SGAI International Conference on Artificial Intelligence (AI-2021) on December 14th, 2021... Read More about AI and cybersecurity 2021: proceedings of the 2021 Workshop on AI and cybersecurity (AI-Cybersec 2021).

Use-case informed task analysis for secure and usable design solutions in rail. (2021)
Conference Proceeding
ALTAF, A., FAILY, S., DOGAN, H., MYLONAS, A. and THRON, E. 2021. Use-case informed task analysis for secure and usable design solutions in rail. In Percia, D.D., Mermoud, A. and Maillart, T. (eds.). Critical information infrastructures security: revised selected papers of 16th international conference on Critical information infrastructures security 2021 (CRITIS 2021), 27-29 September 2021, Lausanne, Switzerland. Lecture notes in computer science, 13139. Cham: Springer [online], pages 168-185. Available from: https://doi.org/10.1007/978-3-030-93200-8_10

Meeting secure and usable design goals needs the combined effort of safety, security and human factors experts. Human factors experts rely on a combination of cognitive and hierarchical task analysis techniques to support their work. We present an ap... Read More about Use-case informed task analysis for secure and usable design solutions in rail..

Teaching through a global pandemic: educational landscapes before, during and after COVID-19. (2021)
Conference Proceeding
SIEGEL, A.A., ZARB, M., ALSHAIGY, B., BLANCHARD, J., CRICK, T., GLASSEY, R., HOTT, J.R., LATULIPE, C., RIEDESEL, C., SENAPATHI, M., SIMON and WILLIAMS, D. 2021. Teaching through a global pandemic: educational landscapes before, during and after COVID-19. In ITiCSE-WGR '21: proceedings of the 26th ACM (Association for Computing Machinery) conference Working group reports on Innovation and technology in computer science education 2021, June 26 - July 1 2021, [virtual conference]. New York: ACM [online], pages 1-25. Available from: https://doi.org/10.1145/3502870.3506565

The coronavirus (COVID-19) pandemic has forced an unprecedented global shift within higher education in how instructors communicate with and educate students. This necessary paradigm shift has compelled educators to take a critical look at their teac... Read More about Teaching through a global pandemic: educational landscapes before, during and after COVID-19..

Streaming multi-layer ensemble selection using dynamic genetic algorithm. (2021)
Conference Proceeding
LUONG, A.V., NGUYEN, T.T. and LIEW, A.W.-C. 2021. Streaming multi-layer ensemble selection using dynamic genetic algorithm. In Zhou, J., Salvado, O., Sohel, F., Borges, P. and Wang, S. (eds.). Proceedings of 2021 Digital image computing: techniques and applications (DICTA 2021), 29 November - 1 December 2021, Gold Coast, Australia. Piscataway: IEEE [online], article 9647220. Available from: https://doi.org/10.1109/dicta52665.2021.9647220

In this study, we introduce a novel framework for non-stationary data stream classification problems by modifying the Genetic Algorithm to search for the optimal configuration of a streaming multi-layer ensemble. We aim to connect the two sub-fields... Read More about Streaming multi-layer ensemble selection using dynamic genetic algorithm..

DisCERN: discovering counterfactual explanations using relevance features from neighbourhoods. (2021)
Conference Proceeding
WIRATUNGA, N., WIJEKOON, A., NKISI-ORJI, I., MARTIN, K., PALIHAWADANA, C. and CORSAR, D. 2021. DisCERN: discovering counterfactual explanations using relevance features from neighbourhoods. In Proceedings of 33rd IEEE (Institute of Electrical and Electronics Engineers) International conference on tools with artificial intelligence 2021 (ICTAI 2021), 1-3 November 2021, Washington, USA [virtual conference]. Piscataway: IEEE [online], pages 1466-1473. Available from: https://doi.org/10.1109/ICTAI52525.2021.00233

Counterfactual explanations focus on 'actionable knowledge' to help end-users understand how a machine learning outcome could be changed to a more desirable outcome. For this purpose a counterfactual explainer needs to discover input dependencies tha... Read More about DisCERN: discovering counterfactual explanations using relevance features from neighbourhoods..

Why don't you tell me what I need to know? Self-flipped classroom and students' personal epistemology. (2021)
Conference Proceeding
DANIELS, M., CAJANDER, A., MCDERMOTT, R., VASILCHEKO, A. and GOLAY, D. 2021. Why don't you tell me what I need to know? Self-flipped classroom and students' personal epistemology. In Proceedings of 2021 IEEE (Institute of Electrical and Electronics Engineers) Frontiers in education conference (FIE 2021), 13-16 October 2021, Lincoln, USA [virtual conference]. Piscataway: IEEE [online], article 9637355. Available from: https://doi.org/10.1109/FIE49875.2021.9637355

This is a full research paper addressing the crucial element of understanding students when creating learning environments. It is for instance important to be aware of how students appreciate our way of teaching and to consider consequences of studen... Read More about Why don't you tell me what I need to know? Self-flipped classroom and students' personal epistemology..

Context, competency and authenticity in STEM education. (2021)
Conference Proceeding
MCDERMOTT, R. and DANIELS, M. 2021. Context, competency and authenticity in STEM education. In Proceedings of 2021 IEEE (Institute of Electrical and Electronics Engineers) Frontiers in education conference (FIE 2021), 13-16 October 2021, Lincoln, USA [virtual conference]. Piscataway: IEEE [online], article 9637197. Available from: https://doi.org/10.1109/FIE49875.2021.9637197

This Research Full Paper presents work which links a consideration of the concept of context with that of learning competency and that of educational authenticity in STEM subjects. The word 'context' is very familiar in both everyday language and in... Read More about Context, competency and authenticity in STEM education..

Improving intrusion detection through training data augmentation. (2021)
Conference Proceeding
OTOKWALA, U., PETROVSKI, A. and KALUTARAGE, H. 2021. Improving intrusion detection through training data augmentation. In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 17. Available from: https://doi.org/10.1109/SIN54109.2021.9699293

Imbalanced classes in datasets are common problems often found in security data. Therefore, several strategies like class resampling and cost-sensitive training have been proposed to address it. In this paper, we propose a data augmentation strategy... Read More about Improving intrusion detection through training data augmentation..

Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIoT). (2021)
Conference Proceeding
ARIFEEN, M., PETROVSKI, A. and PETROVSKI, S. 2021. Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIot). In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 28. Available from: https://doi.org/10.1109/SIN54109.2021.9699232

The integration of the IoT network with the Operational Technology (OT) network is increasing rapidly. However, this incorporation of IoT devices into the OT network makes the industrial control system vulnerable to various cyber threats. Hacking an... Read More about Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIoT)..

Comparative study of malware detection techniques for industrial control systems. (2021)
Conference Proceeding
REID, D., HARRIS, I. and PETROVSKI, A. 2021. Comparative study of malware detection techniques for industrial control systems. In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 19. Available from: https://doi.org/10.1109/SIN54109.2021.9699167

Industrial Control Systems are essential to managing national critical infrastructure, yet the security of these systems historically relies on isolation. The adoption of modern software solutions, and the unique challenges presented by legacy system... Read More about Comparative study of malware detection techniques for industrial control systems..

Reasoning with counterfactual explanations for code vulnerability detection and correction. (2021)
Conference Proceeding
WIJEKOON, A. and WIRATUNGA, N. 2021. Reasoning with counterfactual explanations for code vulnerability detection and correction. In Sani, S. and Kalutarage, H. (eds.) AI and cybersecurity 2021: proceedings of the 2021 Workshop on AI and cybersecurity (AI-Cybersec 2021), co-located with the 41st Specialist Group on Artificial Intelligence international conference on artificial intelligence (SGAI 2021), 14 December 2021, [virtual event]. CEUR workshop proceedings, 3125. Aachen: CEUR-WS [online], pages 1-13. Available from: http://ceur-ws.org/Vol-3125/paper1.pdf

Counterfactual explanations highlight "actionable knowledge" which helps the end-users to understand how a machine learning outcome could be changed to a more desirable outcome. In code vulnerability detection, understanding these "actionable" correc... Read More about Reasoning with counterfactual explanations for code vulnerability detection and correction..

Memory efficient federated deep learning for intrusion detection in IoT networks. (2021)
Conference Proceeding
ZAKARIYYA, A. KALUTARAGE, H. and AL-KADRI, M.O. 2021. Memory efficient federated deep learning for intrusion detection in IoT networks. In Sani, S. and Kalutarage, H. (eds.) AI and cybersecurity 2021: proceedings of the 2021 Workshop on AI and cybersecurity (AI-Cybersec 2021), co-located with the 41st Specialist Group on Artificial Intelligence international conference on artificial intelligence (SGAI 2021), 14 December 2021, [virtual event]. CEUR workshop proceedings, 3125. Aachen: CEUR-WS [online], pages 85-99. Available from: http://ceur-ws.org/Vol-3125/paper7.pdf

Deep Neural Networks (DNNs) methods are widely proposed for cyber security monitoring. However, training DNNs requires a lot of computational resources. This restricts direct deployment of DNNs to resource-constrained environments like the Internet o... Read More about Memory efficient federated deep learning for intrusion detection in IoT networks..

Towards explainable metaheuristics: PCA for trajectory mining in evolutionary algorithms. (2021)
Conference Proceeding
FYVIE, M., MCCALL, J.A.W. and CHRISTIE, L.A. 2021. Towards explainable metaheuristics: PCA for trajectory mining in evolutionary algorithms. In Bramer, M. and Ellis, R (eds.) Artificial intelligence XXXVIII: proceedings of 41st British Computer Society's Specialist Group on Artificial Intelligence (SGAI) Artificial intelligence international conference 2021 (AI-2021) (SGAI-AI 2021), 14-16 December 2021, [virtual conference]. Lecture notes in computer science, 13101. Cham: Springer [online], pages 89-102. Available from: https://doi.org/10.1007/978-3-030-91100-3_7

The generation of explanations regarding decisions made by population-based meta-heuristics is often a difficult task due to the nature of the mechanisms employed by these approaches. With the increase in use of these methods for optimisation in indu... Read More about Towards explainable metaheuristics: PCA for trajectory mining in evolutionary algorithms..

Towards machine learning-driven practices for oil and gas decommissioning: introduction of a new offshore pipeline dataset. (2021)
Conference Proceeding
VUTTIPITTAYAMONGKOL, P., TUNG, A. and ELYAN, E. 2021. Towards machine learning-driven practices for oil and gas decommissioning: introduction of a new offshore pipeline dataset. In Proceedings of the 9th International conference on computer and communications management (ICCCM 2021), 16-18 July 2021, [virtual event]. New York: ACM [online], pages 111-116. Available from: https://doi.org/10.1145/3479162.3479179

Thousands of offshore oil and gas structures worldwide are approaching the end of their operating lifespan. Decommissioning processes are expensive and normally take years to finish as various options need to be analysed based on numerous stakeholder... Read More about Towards machine learning-driven practices for oil and gas decommissioning: introduction of a new offshore pipeline dataset..

TrustMod: a trust management module for NS-3 simulator. (2021)
Conference Proceeding
HAJAR, M.S., KALUTARAGE, H. and AL-KADRI, M.O. 2021. TrustMod: a trust management module for NS-3 simulator. In Zhao, L., Kumar, N., Hsu, R.C. and Zou, D. (eds.) Proceedings of 20th IEEE (Institute of Electrical and Electronics Engineers) International conference on Trust, security and privacy in computing and communications 2021 (IEEE TrustCom 2021), 20-21 October 2021, Shenyang, China: [virtual event]. Piscataway: IEEE [online], pages 51-60. Available from: https://doi.org/10.1109/TrustCom53373.2021.00025

Trust management offers a further level of defense against internal attacks in ad hoc networks. Deploying an effective trust management scheme can reinforce the overall network security. Regardless of limitations, however, security researchers often... Read More about TrustMod: a trust management module for NS-3 simulator..

Autonomous CPSoS for cognitive large manufacturing industries. (2021)
Conference Proceeding
SANTOFIMIA, M.J., VILLANUEVA, F.J., CABA, J., FERNANDEZ-BERMEJO, J., DEL TORO, X., WIRATUNGA, N., TRAPERO, J.R., RUBIO, A., SALVADORI, C. and LOPEZ, J.C. 2021. Autonomous CPSoS for cognitive large manufacturing industries. In Proceedings of 47th Institute of Electrical and Electronics Engineers (IEEE) Industrial Electronics Society annual conference 2021 (IECON 2021), 13-16 October 2021, [virtual conference]. Piscataway: IEEE [online], article 9589159. Available from: https://doi.org/10.1109/IECON48115.2021.9589159

The general aim of a cognitive Cyber Physical System of Systems (CPSoS) is to provide managed access to data in a smart fashion such that sensing and actuation capabilities are connected. Whilst there is significant funding and research devoted to th... Read More about Autonomous CPSoS for cognitive large manufacturing industries..

A next-generation telemedicine and health advice system. (2021)
Conference Proceeding
SIDDIQUI, S., HOPGOOD, A., GOOD, A., GEGOV, A., HOSSAIN, E., RAHMAN, W., FERDOUS, R., ARIFEEN, M. and KHAN, Z. 2021. A next-generation telemedicine and health advice system. In Yang, X.-S., Sherratt, S., Dey, N. and Joshi, A. (eds.) Proceedings of sixth International congress on information and communication technology, 25-26 February 2021, London, UK. Lecture notes in networks and systems, 236. Singapore: Springer [online], pages 981-989. Available from: https://doi.org/10.1007/978-981-16-2380-6_87

This project aims to create a real-time health advice platform andtelemedicine system that can reach healthcare providers and healthcare deprived people. A pragmatic approach is being used to understand the research problem of this study, which allow... Read More about A next-generation telemedicine and health advice system..