Skip to main content

Research Repository

Advanced Search

Outputs (69)

Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI. (2024)
Journal Article
SENANAYAKE, J., KALUTARAGE, H., PETROVSKI, A., PIRAS, L. and AL-KADRI, M.O. 2024. Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI. Journal of information security and applications [online], 82, article number 103741. Available from: https://doi.org/10.1016/j.jisa.2024.103741

Ensuring strict adherence to security during the phases of Android app development is essential, primarily due to the prevalent issue of apps being released without adequate security measures in place. While a few automated tools are employed to redu... Read More about Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI..

Gated recurrent unit autoencoder for fault detection in penicillin fermentation process. (2023)
Conference Proceeding
PETROVSKI, A., ARIFEEN, M. and PETROVSKI, S. 2023. Gated recurrent unit autoencoder for fault detection in penicillin fermentation process. In Kovalev, S., Kotenko, I. and Sukhanov, A. (eds.) Proceedings of the 7th Intelligent information technologies for industry international scientific conference 2023 (IITI'23), 20-25 September 2023, St. Petersburg, Russia, volume 1. Lecture notes in networks and systems (LNNS), 776. Cham: Springer [online], pages 86-95. Available from: https://doi.org/10.1007/978-3-031-43789-2_8

The penicillin fermentation process is a fed-batch system to generate industrial-scale penicillin for antibiotic production. Any fault in the fermentation tank can lead to low-quality penicillin products, which may cause a severe impact on final anti... Read More about Gated recurrent unit autoencoder for fault detection in penicillin fermentation process..

Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system. (2023)
Journal Article
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and MADZUDZO, G. 2023. Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system. Journal of information security and applications [online], 77, article number 103570. Available from: https://doi.org/10.1016/j.jisa.2023.103570

Modern automobiles are equipped with a large number of electronic control units (ECUs) to provide safe driver assistance and comfortable services. The controller area network (CAN) provides near real-time data transmission between ECUs with adequate... Read More about Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system..

Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. (2023)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PIRAS, L. and PETROVSKI, A. 2023. Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. In De Capitani di Vimercati, S. and Samarati, P. (eds.) Proceedings of the 20th International conference on security and cryptography, 10-12 July 2023, Rome, Italy, volume 1. Setúbal: SciTePress [online], pages 659-666. Available from: https://doi.org/10.5220/0012060400003555

Ensuring the security of Android applications is a vital and intricate aspect requiring careful consideration during development. Unfortunately, many apps are published without sufficient security measures, possibly due to a lack of early vulnerabili... Read More about Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models..

Android code vulnerabilities early detection using AI-powered ACVED plugin. (2023)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2023. Android code vulnerabilities early detection using AI-powered ACVED plugin. In Atluri, V. and Ferrara, A.L. (eds.) Data and applications security and privacy XXXVII; proceedings of the 37th annual IFIP WG (International Federation for Information Processing Working Group) 11.3 Data and applications security and privacy 2023 (DBSec 2023), 19-21 July 2023, Sophia-Antipolis, France. Lecture notes in computer science (LNCS), 13942. Cham: Springer [online], pages 339-357. Available from: https://doi.org/10.1007/978-3-031-37586-6_20

During Android application development, ensuring adequate security is a crucial and intricate aspect. However, many applications are released without adequate security measures due to the lack of vulnerability identification and code verification at... Read More about Android code vulnerabilities early detection using AI-powered ACVED plugin..

A multi-objective evolutionary approach to discover explainability trade-offs when using linear regression to effectively model the dynamic thermal behaviour of electrical machines. (2023)
Journal Article
BANDA, T.M., ZĂVOIANU, A.-C., PETROVSKI, A., WÖCKINGER, D. and BRAMERDORFER, G. 2024. A multi-objective evolutionary approach to discover explainability trade-offs when using linear regression to effectively model the dynamic thermal behaviour of electrical machines. ACM transactions on evolutionary learning and optimization [online], 4(1), article number 3. Available from: https://doi.org/10.1145/3597618

Modelling and controlling heat transfer in rotating electrical machines is very important as it enables the design of assemblies (e.g., motors) that are efficient and durable under multiple operational scenarios. To address the challenge of deriving... Read More about A multi-objective evolutionary approach to discover explainability trade-offs when using linear regression to effectively model the dynamic thermal behaviour of electrical machines..

CBANet: an end-to-end cross band 2-D attention network for hyperspectral change detection in remote sensing. (2023)
Journal Article
LI, Y., REN, J., YAN, Y., LIU, Q., MA, P., PETROVSKI, A. and SUN, H. 2023. CBANet: an end-to-end cross band 2-D attention network for hyperspectral change detection in remote sensing. IEEE transactions on geoscience and remote sensing [online], 61, 5513011. Available from: https://doi.org/10.1109/TGRS.2023.3276589

As a fundamental task in remote sensing observation of the earth, change detection using hyperspectral images (HSI) features high accuracy due to the combination of the rich spectral and spatial information, especially for identifying land-cover vari... Read More about CBANet: an end-to-end cross band 2-D attention network for hyperspectral change detection in remote sensing..

Advanced persistent threats detection based on deep learning approach. (2023)
Conference Proceeding
EKE, H.N. and PETROVSKI, A. 2023. Advanced persistent threats detection based on deep learning approach. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber physical systems international conference 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], pages 1-10. Available from: https://doi.org/10.1109/ICPS58381.2023.10128062

Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navigates around defenses, breach netw... Read More about Advanced persistent threats detection based on deep learning approach..

Bayesian optimized autoencoder for predictive maintenance of smart packaging machines. (2023)
Conference Proceeding
ARIFEEN, M. and PETROVSKI, A. 2023. Bayesian optimized autoencoder for predictive maintenance of smart packaging machines. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber-physical systems 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], 10128064. Available from: https://doi.org/10.1109/icps58381.2023.10128064

Smart packaging machines incorporate various components (blades, motors, films) to accomplish the packaging process and are involved in almost all types of the manufacturing industry. Proper maintenance and monitoring of the components over time can... Read More about Bayesian optimized autoencoder for predictive maintenance of smart packaging machines..

Ensemble common features technique for lightweight intrusion detection in industrial control system. (2023)
Conference Proceeding
OTOKWALA, U.J. and PETROVSKI, A. 2023. Ensemble common features technique for lightweight intrusion detection in industrial control system. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber-physical systems 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], 10128040. Available from: https://doi.org/10.1109/icps58381.2023.10128040

The integration of the Industrial Control System (ICS) with corporate intranets and the internet has exposed the previously isolated SCADA system to a wide range of cyber-attacks. Interestingly, the vulnerabilities in the Modbus protocol, with which... Read More about Ensemble common features technique for lightweight intrusion detection in industrial control system..

AI-based intrusion detection systems for in-vehicle networks: a survey. (2023)
Journal Article
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A., MADZUDZO, G. and CHEAH, M. 2023. Al-based intrusion detection systems for in-vehicle networks: a survey. ACM computing survey [online], 55(11), article no. 237, pages 1-40. Available from: https://doi.org/10.1145/3570954

The Controller Area Network (CAN) is the most widely used in-vehicle communication protocol, which still lacks the implementation of suitable security mechanisms such as message authentication and encryption. This makes the CAN bus vulnerable to nume... Read More about AI-based intrusion detection systems for in-vehicle networks: a survey..

Android source code vulnerability detection: a systematic literature review. (2023)
Journal Article
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2023. Android source code vulnerability detection: a systematic literature review. ACM computing surveys [online], 55(9), article 187, pages 1-37. Available from: https://doi.org/10.1145/3556974

The use of mobile devices is rising daily in this technological era. A continuous and increasing number of mobile applications are constantly offered on mobile marketplaces to fulfil the needs of smartphone users. Many Android applications do not add... Read More about Android source code vulnerability detection: a systematic literature review..

Topology for preserving feature correlation in tabular synthetic data. (2022)
Conference Proceeding
ARIFEEN, M. and PETROVSKI, A. 2022. Topology for preserving feature correlation in tabular synthetic data. In Proceedings of the 15th IEEE (Institute of Electrical and Electronics Engineers) International conference on security of information and networks 2022 (SINCONF 2022), 11-13 November 2022, Sousse, Tunisia. Piscataway: IEEE [online], pages 61-66. Available from: https://doi.org/10.1109/SIN56466.2022.9970505

Tabular synthetic data generating models based on Generative Adversarial Network (GAN) show significant contributions to enhancing the performance of deep learning models by providing a sufficient amount of training data. However, the existing GAN-ba... Read More about Topology for preserving feature correlation in tabular synthetic data..

Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. [Dataset] (2022)
Dataset
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PIRAS, L. and PETROVSKI, A. 2023. Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models [Dataset]. Hosted on GitHub (online). Available from: https://github.com/softwaresec-labs/LVDAndro

Many of the Android apps get published without appropriate security considerations, possibly due to not verifying code or not identifying vulnerabilities at the early stages of development. This can be overcome by using an AI based model trained on a... Read More about Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. [Dataset].

Framework for detecting APTs based on steps analysis and correlation. (2022)
Book Chapter
EKE, H.N., PETROVSKI, A., AHRIZ, H. and AL-KADRI, M.O. 2022. Framework for detecting APTs based on steps analysis and correlation. In Abbaszadeh, M. and Zemouche, A. (eds.) Security and resilience in cyber-physical systems: detection, estimation and control. Cham: Springer [online], chapter 6, pages 119-147. Available from: https://doi.org/10.1007/978-3-030-97166-3_6

An advanced persistent threatAdvanced persistent threat, (APTAPT), is an attack that uses multiple attack behavior to penetrate a system, achieve specifically targeted and highly valuable goals within a system. This type of attack has presented an in... Read More about Framework for detecting APTs based on steps analysis and correlation..

Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security. (2022)
Conference Proceeding
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., MADZUDZO, G. and PETROVSKI, A.V. 2022. Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security. In Jančárková, T., Visky, G. and Winther, I. (eds.). Proceedings of 14th International conference on Cyber conflict 2022 (CyCon 2022): keep moving, 31 May - 3 June 2022, Tallinn, Estonia. Tallinn: CCDCOE, pages 309-330. Hosted on IEEE Xplore [online]. Available from: https://doi.org/10.23919/CyCon55549.2022.9811048

The growth of information technologies has driven the development of the transportation sector, including connected and autonomous vehicles. Due to its communication capabilities, the controller area network (CAN) is the most widely used in-vehicle c... Read More about Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security..

Developing secured android applications by mitigating code vulnerabilities with machine learning. (2022)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2022. Developing secured android applications by mitigating code vulnerabilities with machine learning. In ASIA CCS '22: proceedings of the 17th ACM (Association for Computing Machinery) Asia conference on computer and communications security 2022 (ASIA CCS 2022), 30 May - 3 June 2022, Nagasaki, Japan. New York: ACM [online], pages 1255-1257. Available from: https://doi.org/10.1145/3488932.3527290

Mobile application developers sometimes might not be serious about source code security and publish apps to the marketplaces. Therefore, it is essential to have a fully automated security solutions generator to integrate security-by-design into the d... Read More about Developing secured android applications by mitigating code vulnerabilities with machine learning..

Comparative study of malware detection techniques for industrial control systems. (2021)
Conference Proceeding
REID, D., HARRIS, I. and PETROVSKI, A. 2021. Comparative study of malware detection techniques for industrial control systems. In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 19. Available from: https://doi.org/10.1109/SIN54109.2021.9699167

Industrial Control Systems are essential to managing national critical infrastructure, yet the security of these systems historically relies on isolation. The adoption of modern software solutions, and the unique challenges presented by legacy system... Read More about Comparative study of malware detection techniques for industrial control systems..

Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIoT). (2021)
Conference Proceeding
ARIFEEN, M., PETROVSKI, A. and PETROVSKI, S. 2021. Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIot). In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 28. Available from: https://doi.org/10.1109/SIN54109.2021.9699232

The integration of the IoT network with the Operational Technology (OT) network is increasing rapidly. However, this incorporation of IoT devices into the OT network makes the industrial control system vulnerable to various cyber threats. Hacking an... Read More about Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIoT)..

Improving intrusion detection through training data augmentation. (2021)
Conference Proceeding
OTOKWALA, U., PETROVSKI, A. and KALUTARAGE, H. 2021. Improving intrusion detection through training data augmentation. In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 17. Available from: https://doi.org/10.1109/SIN54109.2021.9699293

Imbalanced classes in datasets are common problems often found in security data. Therefore, several strategies like class resampling and cost-sensitive training have been proposed to address it. In this paper, we propose a data augmentation strategy... Read More about Improving intrusion detection through training data augmentation..

Effective detection of cyber attack in a cyber-physical power grid system. (2021)
Conference Proceeding
OTOKWALA, U., PETROVSKI, A. and KALUTARAGE, H. 2021. Effective detection of cyber attack in a cyber-physical power grid system. In Arai, K. (ed) Advances in information and communication: proceedings of Future of information and communication conference (FICC 2021), 29-30 April 2021, Vancouver, Canada. Advances in intelligent systems and computing, 1363. Cham: Springer [online], 1, pages 812-829. Available from: https://doi.org/10.1007/978-3-030-73100-7_57

Advancement in technology and the adoption of smart devices in the operation of power grid systems have made it imperative to ensure adequate protection for the cyber-physical power grid system against cyber-attacks. This is because, contemporary cyb... Read More about Effective detection of cyber attack in a cyber-physical power grid system..

On the class overlap problem in imbalanced data classification. (2020)
Journal Article
VUTTIPITTAYAMONGKOL, P., ELYAN, E. and PETROVSKI, A. 2021. On the class overlap problem in imbalanced data classification. Knowledge-based systems [online], 212, article number 106631. Available from: https://doi.org/10.1016/j.knosys.2020.106631

Class imbalance is an active research area in the machine learning community. However, existing and recent literature showed that class overlap had a higher negative impact on the performance of learning algorithms. This paper provides detailed criti... Read More about On the class overlap problem in imbalanced data classification..

Detection of false command and response injection attacks for cyber physical systems security and resilience. (2020)
Conference Proceeding
EKE, H., PETROVSKI, A. and AHRIZ, H. 2020. Detection of false command and response injection attacks for cyber physical systems security and resilience. In Proceedings of the 13th Security of information and networks international conference 2020 (SIN 2020), 4-7 November 2020, Merkez, Turkey. New York: ACM [online], article number 10, pages 1-8. Available from: https://doi.org/10.1145/3433174.3433615

The operational cyber-physical system (CPS) state, safety and resource availability is impacted by the safety and security measures in place. This paper focused on i) command injection (CI) attack that alters the system behaviour through injection of... Read More about Detection of false command and response injection attacks for cyber physical systems security and resilience..

Detecting malicious signal manipulation in smart grids using intelligent analysis of contextual data. (2020)
Conference Proceeding
MAJDANI, F., BATIK, L., PETROVSKI, A. and PETROVSKI, S. 2020. Detecting malicious signal manipulation in smart grids using intelligent analysis of contextual data. In Proceedings of the 13th Security of information and networks international conference 2020 (SIN 2020), 4-7 November 2020, Merkez, Turkey. New York: ACM [online], article number 4, pages 1-8. Available from: https://doi.org/10.1145/3433174.3433613

This paper looks at potential vulnerabilities of the Smart Grid energy infrastructure to data injection cyber-attacks and the means of addressing these vulnerabilities through intelligent data analysis. Efforts are being made by multiple groups to pr... Read More about Detecting malicious signal manipulation in smart grids using intelligent analysis of contextual data..

Exploring the use of conversational agents to improve cyber situational awareness in the Internet of Things (IoT). (2020)
Thesis
MCDERMOTT, C.D. 2020. Exploring the use of conversational agents to improve cyber situational awareness in the Internet of Things (IoT). Robert Gordon University, PhD thesis. Hosted on OpenAIR [online]. Available from: https://openair.rgu.ac.uk

The Internet of Things (IoT) is an emerging paradigm, which aims to extend the power of the Internet beyond computers and smartphones to a vast and growing range of "things" - devices, processes and environments. The result is an interconnected world... Read More about Exploring the use of conversational agents to improve cyber situational awareness in the Internet of Things (IoT)..

A holistic approach to assessment of value of information (VOI) with fuzzy data and decision criteria. (2020)
Journal Article
VILELA, M., OLUYEMI, G. and PETROVSKI, A. 2020. A holistic approach to assessment of value of information (VOI) with fuzzy data and decision criteria. Decision making: applications in management and engineering [online], 3(2), pages 97-118. Available from: https://doi.org/10.31181/dmame2003097v

Classical decision and value of information theories have been applied in the oil and gas industry from the 1960s with partial success. In this research, we identify that the classical theory of value of information has weaknesses related with optima... Read More about A holistic approach to assessment of value of information (VOI) with fuzzy data and decision criteria..

Handling minority class problem in threats detection based on heterogeneous ensemble learning approach. (2020)
Journal Article
EKE, H., PETROVSKI, A. and AHRIZ, H. 2020. Handling minority class problem in threats detection based on heterogeneous ensemble learning approach. International journal of systems and software security and protection [online], 13(3), pages 13-37. Available from: https://doi.org/10.4018/IJSSSP.2020070102

Multiclass problem, such as detecting multi-steps behaviour of Advanced Persistent Threats (APTs) have been a major global challenge, due to their capability to navigates around defenses and to evade detection for a prolonged period of time. Targeted... Read More about Handling minority class problem in threats detection based on heterogeneous ensemble learning approach..

Sensitivity analysis applied to fuzzy inference on the value of information in the oil and gas industry. (2020)
Journal Article
VILELA, M., OLUYEMI, G. and PETROVSKI, A. 2020. Sensitivity analysis applied to fuzzy inference on the value of information in the oil and gas industry. International journal of applied decision sciences [online], 13(3), pages 344-362. Available from: https://doi.org/10.1504/IJADS.2020.10026404

Value of information is a widely accepted methodology for evaluating the need to acquire new data in the oil and gas industry. In the conventional approach to estimating the value of information, the outcomes of a project assessment relate to the dec... Read More about Sensitivity analysis applied to fuzzy inference on the value of information in the oil and gas industry..

Automated anomaly recognition in real time data streams for oil and gas industry. (2020)
Thesis
MAJDANI SHABESTARI, F. 2020. Automated anomaly recognition in real time data streams for oil and gas industry. Robert Gordon University [online], PhD thesis. Available from: https://openair.rgu.ac.uk

There is a growing demand for computer-assisted real-time anomaly detection - from the identification of suspicious activities in cyber security, to the monitoring of engineering data for various applications across the oil and gas, automotive and ot... Read More about Automated anomaly recognition in real time data streams for oil and gas industry..

A holistic approach to assessment of value of information (VOI) with fuzzy data and decision criteria. [Thesis] (2019)
Thesis
VILELA IBARRA, M.J. 2019. A holistic approach to assessment of value of information (VOI) with fuzzy data and decision criteria. Robert Gordon University [online], PhD thesis. Available from: https://openair.rgu.ac.uk

The research presented in this thesis integrates theories and techniques from statistical analysis and artificial intelligence, to develop a more coherent, robust and complete methodology for assessing the value of acquiring new information in the co... Read More about A holistic approach to assessment of value of information (VOI) with fuzzy data and decision criteria. [Thesis].

Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. (2019)
Conference Proceeding
ZAKARIYYA, I., AL-KADRI, M.O., KALUTARGE, H. and PETROVSKI, A. 2019. Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. In Obaidat, M. and Samarati, P. (eds.) Proceedings of the 16th International security and cryptography conference (SECRYPT 2019), co-located with the 16th International joint conference on e-business and telecommunications (ICETE 2019), 26-28 July 2019, Prague, Czech Republic. Setúbal, Portugal: SciTePress [online], 2, pages 523-528. Available from: https://doi.org/10.5220/0008119205230528.

Using Machine Learning (ML) for Internet of Things (IoT) security monitoring is a challenge. This is due to their resource constraint nature that limits the deployment of resource-hungry monitoring algorithms. Therefore, the aim of this paper is to i... Read More about Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm..

The use of machine learning algorithms for detecting advanced persistent threats. (2019)
Conference Proceeding
EKE, H.N., PETROVSKI, A. and AHRIZ, H. 2019. The use of machine learning algorithms for detecting advanced persistent threats. In Makarevich, O., Babenko, L., Anikeev, M., Elci, A. and Shahriar, H. (eds.). Proceedings of the 12th Security of information and networks international conference 2019 (SIN 2019), 12-15 September 2019, Sochi, Russia. New York: ACM [online], article No. 5. Available from: https://doi.org/10.1145/3357613.3357618

Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. Due to their capability to navigates around defenses and to evade detection for a prolonged period of... Read More about The use of machine learning algorithms for detecting advanced persistent threats..

Fuzzy logic applied to value of information assessment in oil and gas projects. (2019)
Journal Article
VILELA, M., OLUYEMI, G. and PETROVSKI, A. 2019. Fuzzy logic applied to value of information assessment in oil and gas projects. Petroleum science [online], 16(5), pages 1208-1220. Available from: https://doi.org/10.1007/s12182-019-0348-0

The concept of value of information (VOI) has been widely used in the oil industry when making decisions on the acquisition of new data sets for the development and operation of oil fields. The classical approach to VOI assumes that the outcome of th... Read More about Fuzzy logic applied to value of information assessment in oil and gas projects..

A fuzzy inference system applied to value of information assessment for oil and gas industry. (2019)
Journal Article
VILELA, M., OLUYEMI, G. and PETROVSKI, A. 2019. A fuzzy inference system applied to value of information assessment for oil and gas industry. Decision making: applications in management and engineering [online], 2(2), pages 1-18. Available from: https:// doi.org/10.31181/dmame1902001v

Value of information is a widely accepted methodology for evaluating the need to acquire new data in the oil and gas industry. In the conventional approach to estimating the value of information, the outcomes of a project assessment relate to the dec... Read More about A fuzzy inference system applied to value of information assessment for oil and gas industry..

Evaluating awareness and perception of botnet activity within consumer Internet-of-Things (IoT) networks. (2019)
Journal Article
MCDERMOTT, C.D., ISAACS, J.P. and PETROVSKI, A.V. 2019. Evaluating awareness and perception of botnet activity within consumer Internet-of-Things (IoT) networks. Informatics [online], 6(1), article 8. Available from: https://doi.org/10.3390/informatics6010008

The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices, has led to the production of swathes of insecure Internet-connected devices. Many can be exploited and leveraged to perform large-scale attacks on the Intern... Read More about Evaluating awareness and perception of botnet activity within consumer Internet-of-Things (IoT) networks..

Optimal deployment of components of cloud-hosted application for guaranteeing multitenancy isolation. (2019)
Journal Article
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2019. Optimal deployment of components of cloud-hosted application for guaranteeing multitenancy isolation. Journal of cloud computing [online], 8, article 1. Available from: https://doi.org/10.1186/s13677-018-0124-5

One of the challenges of deploying multitenant cloud-hosted services that are designed to use (or be integrated with) several components is how to implement the required degree of isolation between the components when there is a change in the workloa... Read More about Optimal deployment of components of cloud-hosted application for guaranteeing multitenancy isolation..

Degrees of tenant isolation for cloud-hosted software services: a cross-case analysis. (2018)
Journal Article
OCHEI, L.C., BASS, J.M. and PETROVSKI, A. 2018. Degrees of tenant isolation for cloud-hosted software services: a cross-case analysis. Journal of cloud computing [online], 7, article ID 22. Available from: https://doi.org/10.1186/s13677-018-0121-8

A challenge, when implementing multi-tenancy in a cloud-hosted software service, is how to ensure that the performance and resource consumption of one tenant does not adversely affect other tenants. Software designers and architects must achieve an o... Read More about Degrees of tenant isolation for cloud-hosted software services: a cross-case analysis..

Ranking of geostatistical models and uncertainty quantification using signal detection principle (SDP). (2018)
Journal Article
ANI, M., OLUYEMI, G., PETROVSKI, A. and REZAEI-GOMARI, S. 2019. Ranking of geostatistical models and uncertainty quantification using signal detection principle (SDP). Journal of petroleum science and engineering [online], 174, pages 833-843. Available from: https://doi.org/10.1016/j.petrol.2018.11.024

The selection of an optimal model from a set of multiple realizations for dynamic reservoir modelling and production forecasts has been a persistent issue for reservoir modelers and decision makers. Current evidence has shown that many presumably goo... Read More about Ranking of geostatistical models and uncertainty quantification using signal detection principle (SDP)..

Overlap-based undersampling for improving imbalanced data classification. (2018)
Conference Proceeding
VUTTIPITTAYAMONGKOL, P., ELYAN, E., PETROVSKI, A. and JAYNE, C. 2018. Overlap-based undersampling for improving imbalanced data classification. In Yin, H., Camacho, D., Novais, P. and Tallón-Ballesteros, A. (eds.) Intelligent data engineering and automated learning: proceedings of the 19th International intelligent data engineering and automated learning conference (IDEAL 2018), 21-23 November 2018, Madrid, Spain. Lecture notes in computer science, 11341. Cham: Springer [online], pages 689-697. Available from: https://doi.org/10.1007/978-3-030-03493-1_72

Classification of imbalanced data remains an important field in machine learning. Several methods have been proposed to address the class imbalance problem including data resampling, adaptive learning and cost adjusting algorithms. Data resampling me... Read More about Overlap-based undersampling for improving imbalanced data classification..

A framework for achieving the required degree of multitenancy isolation for deploying components of a cloud-hosted service. (2018)
Journal Article
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2018. A framework for achieving the required degree of multitenancy isolation for deploying components of a cloud-hosted service. International journal of cloud computing [online], 7(3-4), pages 248-281. Available from: https://doi.org/10.1504/IJCC.2018.095396

Multitenancy allows multiple tenants to access a single instance of a cloud offering. While several approaches exist for implementing multitenancy, little attention has been paid to implementing the required degree of isolation since there are varyin... Read More about A framework for achieving the required degree of multitenancy isolation for deploying components of a cloud-hosted service..

Generic application of deep learning framework for real-time engineering data analysis. (2018)
Conference Proceeding
MAJDANI, F., PETROVSKI, A. and PETROVSKI, S. 2018. Generic application of deep learning framework for real-time engineering data analysis. In Proceedings of the 2018 International joint conference on neural networks (IJCNN 2018), 8-13 July 2018, Rio de Janeiro, Brazil. Piscataway, NJ: IEEE [online], article number 8489356. Available from: https://doi.org/10.1109/IJCNN.2018.8489356

The need for computer-assisted real-time anomaly detection in engineering data used for condition monitoring is apparent in various applications, including the oil and gas, automotive industries and many other engineering domains. To reduce the relia... Read More about Generic application of deep learning framework for real-time engineering data analysis..

Botnet detection in the Internet of Things using deep learning approaches. (2018)
Conference Proceeding
MCDERMOTT, C.D., MAJDANI, F. and PETROVSKI, A.V. 2018. Botnet detection in the Internet of Things using deep learning approaches. In Proceedings of the 2018 International joint conference on neural networks (IJCNN 2018), 8-13 July 2018, Rio de Janeiro, Brazil. Piscataway, NJ: IEEE [online], article number 8489489. Available from: https://doi.org/10.1109/IJCNN.2018.8489489

The recent growth of the Internet of Things (IoT) has resulted in a rise in IoT based DDoS attacks. This paper presents a solution to the detection of botnet activity within consumer IoT devices and networks. A novel application of Deep Learning is u... Read More about Botnet detection in the Internet of Things using deep learning approaches..

Fuzzy data analysis methodology for the assessment of value of information in the oil and gas industry. (2018)
Conference Proceeding
VILELA, M., OLUYEMI, G. and PETROVSKI, A. 2018. Fuzzy data analysis methodology for the assessment of value of information in the oil and gas industry. In Proceedings of the 2018 IEEE international conference on fuzzy systems (FUZZ-IEEE 2018), 8-13 July 2018, Rio de Janeiro, Brazil. Piscataway, NJ: IEEE [online], article ID 8491628. Available from: https://doi.org/10.1109/FUZZ-IEEE.2018.8491628

To manage uncertainty in reservoir development projects, the Value of Information is one of the main factors on which the decision is based to determine whether it is necessary to acquire additional data. However, subsurface data is not always precis... Read More about Fuzzy data analysis methodology for the assessment of value of information in the oil and gas industry..

Evolutionary computation for optimal component deployment with multitenancy isolation in cloud-hosted applications. (2018)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2018. Evolutionary computation for optimal component deployment with multitenancy isolation in cloud-hosted applications. In Proceedings of the 2018 IEEE international symposium on innovations in intelligent systems and applications (INISTA 2018), 3-5 July 2018, Thessaloniki, Greece. New York: IEEE [online], article ID 8466315. Available from: https://doi.org/10.1109/INISTA.2018.8466315

A multitenant cloud-application that is designed to use several components needs to implement the required degree of isolation between the components when the workload changes. The highest degree of isolation results in high resource consumption and... Read More about Evolutionary computation for optimal component deployment with multitenancy isolation in cloud-hosted applications..

Towards situational awareness of botnet activity in the Internet of Things (2018)
Conference Proceeding
MCDERMOTT, C.D., PETROVSKI, A.V. and MAJDANI, F. 2018. Towards situational awareness of botnet activity in the Internet of Things. In Proceedings of the 2018 International conference on cyber situational awareness, data analytics and assessment (Cyber SA 2018): cyber situation awareness as a tool for analysis and insight, 11-12 June 2018, Glasgow, UK. Piscataway: IEEE [online], article number 8551408. Available from: https://doi.org/10.1109/CyberSA.2018.8551408

An IoT botnet detection model is designed to detect anomalous attack traffic utilised by the mirai botnet malware. The model uses a novel application of Deep Bidirectional Long Short Term Memory based Recurrent Neural Network (BLSTMRNN), in conjuncti... Read More about Towards situational awareness of botnet activity in the Internet of Things.

Evolving ANN-based sensors for a context-aware cyber physical system of an offshore gas turbine. (2017)
Journal Article
MAJDANI, F., PETROVSKI, A. and DOOLAN, D. 2017. Evolving ANN-based sensors for a context-aware cyber physical system of an offshore gas turbine. Evolving systems [online], 9(2), pages 119-133. Available from: https://doi.org/10.1007/s12530-017-9206-8

An adaptive multi-tiered framework, that can be utilised for designing a context-aware cyber physical system to carry out smart data acquisition and processing, while minimising the amount of necessary human intervention is proposed and applied. The... Read More about Evolving ANN-based sensors for a context-aware cyber physical system of an offshore gas turbine..

Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. (2017)
Journal Article
MCDERMOTT, C.D. and PETROVSKI, A. 2017. Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. International journal of computer networks and communications [online], 9(4), pages 45-56. Available from: https://doi.org/10.5121/ijcnc.2017.9404

Wireless Sensor Networks (WSNs) have become a key technology for the IoT and despite obvious benefits, challenges still exist regarding security. As more devices are connected to the internet, new cyber attacks are emerging which join well-known atta... Read More about Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks..

A framework for unsupervised change detection in activity recognition. (2017)
Journal Article
BASHIR, S.A., PETROVSKI, A. and DOOLAN, D. 2017. A framework for unsupervised change detection in activity recognition. International journal of pervasive computing and communications [online], 13(2), pages 157-175. Available from: https://doi.org/10.1108/IJPCC-03-2017-0027

Purpose - This purpose of this paper is to develop a change detection technique for activity recognition model. The approach aims to detect changes in the initial accuracy of the model after training and when the model is deployed for recognizing new... Read More about A framework for unsupervised change detection in activity recognition..

Architecting the deployment of cloud-hosted services for guaranteeing multitenancy isolation. (2017)
Thesis
OCHEI, L.C. 2017. Architecting the deployment of cloud-hosted services for guaranteeing multitenancy isolation. Robert Gordon University, PhD thesis.

In recent years, software tools used for Global Software Development (GSD) processes (e.g., continuous integration, version control and bug tracking) are increasingly being deployed in the cloud to serve multiple users. Multitenancy is an important a... Read More about Architecting the deployment of cloud-hosted services for guaranteeing multitenancy isolation..

Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance. (2016)
Conference Proceeding
PETROVSKI, A., RATTADILOK, P. and PETROVSKII, S. 2016. Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 161-175. Available from: https://doi.org/10.1007/978-3-319-44188-7_12 161-175. Available from: https://doi.org/10.1007/978-3-319-44188-7_12

An adaptive framework for building intelligent measurement systems has been proposed in the paper and tested on simulated traffic surveillance data. The use of the framework enables making intelligent decisions related to the presence of anomalies in... Read More about Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance..

Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment. (2016)
Conference Proceeding
MAJDANI, F., PETROVSKI, A. and DOOLAN, D. 2016. Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 198-210. Available from: https://doi.org/10.1007/978-3-319-44188-7_15

An adaptive multi-tiered framework, which can be utilised for designing a context-aware cyber physical system is proposed and applied within the context of assuring offshore asset integrity. Adaptability is achieved through the combined use of machin... Read More about Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment..

Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system. (2016)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2016. Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system. In Zhang, J., Miller, J.A. and Xu, X. (eds.) Proceedings of the 13th Institute of Electrical and Electronics Engineers (IEEE) International services computing conference 2016 (SCC 2016), 27 June - 2 July 2016, San Francisco, USA. Piscataway: IEEE [online], pages 379-386. Available from: https://doi.org/10.1109/SCC.2016.56

Implementing the required degree of isolation between tenants is one of the significant challenges for deploying a multitenant application on the cloud. This paper applies COMITRE (Component-based approach to multitenancy isolation through request re... Read More about Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system..

Clustering and nearest neighbour based classification approach for mobile activity recognition. (2016)
Journal Article
BASHIR, S.A., DOOLAN, D.C. and PETROVSKI, A. 2016. Clustering and nearest neighbour based classification approach for mobile activity recognition. Journal of mobile multimedia [online], 12(1-2), pages 110-124. Available from: https://journals.riverpublishers.com/index.php/JMM/article/view/4487

We present a hybridized algorithm based on clustering and nearest neighbour classifier for mobile activity recognition. The algorithm transforms a training dataset into a more compact and reduced representative set that lessens the computational cost... Read More about Clustering and nearest neighbour based classification approach for mobile activity recognition..

The effect of window length on accuracy of smartphone-based activity recognition. (2016)
Journal Article
BASHIR, S.A., DOOLAN, D.C. and PETROVSKI, A. 2016. The effect of window length on accuracy of smartphone-based activity recognition. IAENG international journal of computer science [online], 43(1), pages 126-136. Available from: http://www.iaeng.org/IJCS/issues_v43/issue_1/IJCS_43_1_15.pdf

One of the main approaches for personalization of activity recognition is the generation of the classification model from user annotated data on mobile itself. However, giving the resource constraints on such devices there is a need to examine the ef... Read More about The effect of window length on accuracy of smartphone-based activity recognition..

Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). (2015)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2015. Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). In Proceedings of the 2015 International Information Society conference 2015 (i-Society 2015), 9-11 November 2015, London, UK. Piscataway: IEEE [online], pages 59-66. Available from: https://doi.org/10.1109/i-Society.2015.7366859

One of the key concerns of implementing multitenancy (i.e., serving multiple tenants with a single instance of an application) on the cloud is how to enable the required degree of isolation between tenants, so that the required performance of one ten... Read More about Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS)..

ClusterNN: a hybrid classification approach to mobile activity recognition. (2015)
Conference Proceeding
BASHIR, S., DOOLAN, D. and PETROVSKI, A. 2015. ClusterNN: a hybrid classification approach to mobile activity recognition. In Chen, L.L., Steinbauer, M., Khalil, I. and Anderst-Kotsis, G. (eds.) Proceedings of the 13th International advances in mobile computing and multimedia conference (MoMM 2015), 11-13 December 2015, Brussels, Belguim. New York: ACM [online], pages 263-267. Available from: https://doi.org/10.1145/2837126.2837140

Mobile activity recognition from sensor data is based on supervised learning algorithms. Many algorithms have been proposed for this task. One of such algorithms is the K-nearest neighbour (KNN) algorithm. However, since KNN is an instance based algo... Read More about ClusterNN: a hybrid classification approach to mobile activity recognition..

Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools. (2015)
Conference Proceeding
OCHEI, L.C., BASS, J.M. and PETROVSKI, A. 2015. Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools. In Proceedings of the 2015 International conference on cloud and autonomic computing (ICCAC 2015), 21-25 September 2015, Boston, USA. Piscataway: IEEE [online], pages 101-112. Available from: https://doi.org/10.1109/ICCAC.2015.17

Multitenancy is an essential cloud computing property where a single instance of an application serves multiple tenants. Multitenancy introduces significant challenges when deploying application components to the cloud due to the demand for different... Read More about Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools..

Designing a context-aware cyber physical system for detecting security threats in motor vehicles. (2015)
Conference Proceeding
PETROVSKI, A., RATTADILOK, P. and PETROVSKI, S. 2015. Designing a context-aware cyber physical system for detecting security threats in motor vehicles. In Proceedings of the 8th International conference on security of information and networks (SIN'15), 8-10 September 2015, Sochi, Russia. New York: ACM [online], pages 267-270. Available from: https://doi.org/10.1145/2799979.2800029

An adaptive multi-tiered framework, which can be utilised for designing a context-aware cyber physical system is proposed in the paper and is applied within the context of providing data availability by monitoring electromagnetic interference. The ad... Read More about Designing a context-aware cyber physical system for detecting security threats in motor vehicles..

Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS). (2015)
Journal Article
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2015. Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS). International journal of intelligent computing research [online], 6(3), pages 601-612. Available from: https://doi.org/10.20533/ijicr.2042.4655.2015.0075

When implementing multitenancy for cloud-hosted applications, one of the main challenges to overcome is how to enable the required degree of isolation between tenants so that the required performance, resource utilization, and access privileges of on... Read More about Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS)..

Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence. (2014)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2014. Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence. In Proceedings of the 2014 IEEE symposium on evolving and autonomous learning systems (EALS 2014), part of the 2014 IEEE symposium series on computational intelligence (SSCI 2014), 9-12 December 2014, Orlando, USA. New York: IEEE [online], article number 7009508, pages 87-94. Available from: https://doi.org/10.1109/EALS.2014.7009508

A generic framework for evolving and autonomously controlled systems has been developed and evaluated in this paper. A three-phase approach aimed at identification, classification of anomalous data and at prediction of its consequences is applied to... Read More about Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence..

Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence. (2014)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2014. Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence. In Proceedings of the 2014 IEEE symposium on computational intelligence in control and automation (CICA 2014), part of the 2014 IEEE symposium series on computational intelligence (SSCI 2014), 9-12 December 2014, Orlando, USA. New York: IEEE [online], article number 7013256, pages 229-236. Available from: https://doi.org/10.1109/CICA.2014.7013256

An adaptive inferential measurement framework for control and automation systems has been proposed in the paper and tested on simulated traffic surveillance data. The use of the framework enables making inferences related to the presence of anomalies... Read More about Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence..

Multi-objective particle swarm optimisation: methods and applications. (2014)
Thesis
AL MOUBAYED, N. 2014. Multi-objective particle swarm optimisation: methods and applications. Robert Gordon University, PhD thesis.

Solving real life optimisation problems is a challenging engineering venture. Since the early days of research on optimisation it was realised that many problems do not simply have one optimisation objective. This led to the development of multi-obje... Read More about Multi-objective particle swarm optimisation: methods and applications..

Anomaly monitoring framework based on intelligent data analysis. (2013)
Conference Proceeding
RATTADILOK, P., PETROVSKI, A. and PETROVSKI, S. 2013. Anomaly monitoring framework based on intelligent data analysis. In Yin, H., Tang, K., Gao, Y., Klawonn, F., Lee, M., Weise, T., Li, B. and Yao, X. (eds.) Proceedings of the 14th International conference on intelligent data engineering and automated learning (IDEAL 2013), 20-23 October 2013, Hefei, China. Lecture notes in computer science, 8206. Berlin: Springer [online], pages 134-141. Available from: https://doi.org/10.1007/978-3-642-41278-3_17

Real-time data processing has become an increasingly important challenge as the need for faster analysis of big data widely manifests itself. In this research, several Computational Intelligence methods have been applied for identifying possible anom... Read More about Anomaly monitoring framework based on intelligent data analysis..

Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning. (2013)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2013. Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning. In Proceedings of the 2013 IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (CIVEMSA 2013), 15-17 July 2013, Milan, Italy. New York: IEEE [online], article number 6617402, pages 93-98. Available from: https://doi.org/10.1109/CIVEMSA.2013.6617402

The paper proposes a generic approach to building inferential measurement systems. The large amount of data needed to be acquired and processed by such systems necessitates the use of machine learning techniques. In this study, an inferential measure... Read More about Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning..

Probabilistic modelling of oil rig drilling operations for business decision support: a real world application of Bayesian networks and computational intelligence. (2013)
Thesis
FOURNIER, F.A. 2013. Probabilistic modelling of oil rig drilling operations for business decision support: a real world application of Bayesian networks and computational intelligence. Robert Gordon University [online], PhD thesis. Available from: https://openair.rgu.ac.uk

This work investigates the use of evolved Bayesian networks learning algorithms based on computational intelligence meta-heuristic algorithms. These algorithms are applied to a new domain provided by the exclusive data, available to this project from... Read More about Probabilistic modelling of oil rig drilling operations for business decision support: a real world application of Bayesian networks and computational intelligence..

Statistical optimisation and tuning of GA factors. (2005)
Conference Proceeding
PETROVSKI, A., BROWNLEE, A. and MCCALL, J. 2005. Statistical optimisation and tuning of GA factors. In Proceedings of the 2005 IEEE congress on evolutionary computation (CEC 2005), 2-5 September 2005, Edinburgh, UK. New York: IEEE [online], volume 1, article number 1554759, pages 758-764. Available from: https://doi.org/10.1109/CEC.2005.1554759

This paper presents a practical methodology of improving the efficiency of Genetic Algorithms through tuning the factors significantly affecting GA performance. This methodology is based on the methods of statistical inference and has been successful... Read More about Statistical optimisation and tuning of GA factors..

Multi-objective optimisation of cancer chemotherapy using evolutionary algorithms. (2001)
Conference Proceeding
PETROVSKI, A. and MCCALL, J. 2001. Multi-objective optimisation of cancer chemotherapy using evolutionary algorithms. In Zitzler, E., Thiele, L., Deb, K., Coello Coello, C.A. and Corne, D. (eds.) Proceedings of the 1st International conference on evolutionary multi-criterion optimization (EMO 2001), 7-9 March 2001, Zurich, Switzerland. Lecture notes in computer science, 1993. Berlin: Springer [online], pages 531-545. Available from: https://doi.org/10.1007/3-540-44719-9_37

The main objectives of cancer treatment in general, and of cancer chemotherapy in particular, are to eradicate the tumour and to prolong the patient survival time. Traditionally, treatments are optimised with only one objective in mind. As a result o... Read More about Multi-objective optimisation of cancer chemotherapy using evolutionary algorithms..

An application of genetic algorithms to chemotherapy treatment. (1998)
Thesis
PETROVSKI, A. 1998. An application of genetic algorithms to chemotherapy treatment. Robert Gordon University, PhD thesis.

The present work investigates methods for optimising cancer chemotherapy within the bounds of clinical acceptability and making this optimisation easily accessible to oncologists. Clinical oncologists wish to be able to improve existing treatment reg... Read More about An application of genetic algorithms to chemotherapy treatment..