Skip to main content

Research Repository

Advanced Search

Outputs (3)

Towards a conversational agent for threat detection in the internet of things. (2019)
Conference Proceeding
MCDERMOTT, C.D., JEANNELLE, B. and ISAACS, J.P. 2019. Towards a conversational agent for threat detection in the internet of things. In Proceedings of the 2019 International Cyber science on cyber situational awareness, data analytics and assessment (Cyber SA): pioneering research and innovation in cyber situational awareness, 3-4 June 2019, Oxford, UK. Piscataway: IEEE [online], chapter 6. Available from: https://doi.org/10.1109/CyberSA.2019.8899580

A conversational agent to detect anomalous traffic in consumer IoT networks is presented. The agent accepts two inputs in the form of user speech received by Amazon Alexa enabled devices, and classified IDS logs stored in a DynamoDB Table. Aural anal... Read More about Towards a conversational agent for threat detection in the internet of things..

Data stream mining: methods and challenges for handling concept drift. (2019)
Journal Article
WARES, S., ISAACS, J. and ELYAN, E. 2019. Data stream mining: methods and challenges for handling concept drift. SN applied sciences [online], 1(11), article ID 1412. Available from: https://doi.org/10.1007/s42452-019-1433-0

Mining and analysing streaming data is crucial for many applications, and this area of research has gained extensive attention over the past decade. However, there are several inherent problems that continue to challenge the hardware and the state-of... Read More about Data stream mining: methods and challenges for handling concept drift..

Evaluating awareness and perception of botnet activity within consumer Internet-of-Things (IoT) networks. (2019)
Journal Article
MCDERMOTT, C.D., ISAACS, J.P. and PETROVSKI, A.V. 2019. Evaluating awareness and perception of botnet activity within consumer Internet-of-Things (IoT) networks. Informatics [online], 6(1), article 8. Available from: https://doi.org/10.3390/informatics6010008

The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices, has led to the production of swathes of insecure Internet-connected devices. Many can be exploited and leveraged to perform large-scale attacks on the Intern... Read More about Evaluating awareness and perception of botnet activity within consumer Internet-of-Things (IoT) networks..