Research Publications
Research Publications (Conferences, Journals and Books)
2025
- Yumlembam, R., Issac, B., Jacob, S. M., Yang, L., & Krishnan, D. (2025). Insider threat detection using GCN and Bi-LSTM with explicit and implicit graph representations. IEEE Transactions on Artificial Intelligence. Accepted/In press.
- Yumlembam, R., Issac, B., Aslam, N., Kollonoor Babu, E., Collyer, J., & Kennedy, F. (2025). Detection of AI-generated images using combined uncertainty measures and particle swarm optimised rejection mechanism. Scientific Reports. 15, 44021, 28 pages. https://www.nature.com/articles/s41598-025-28572-8
- Yumlembam, R., Issac, B., & Jacob, S. M. (2025). Enhancing Decision-Making in Windows PE Malware Classification During Dataset Shifts with Uncertainty Estimation, Knowledge-Based System, Elsevier, ISSN 1872-7409. https://www.sciencedirect.com/science/article/pii/S0950705125017629
- Kabuye, H., Issac, B., Yumlembam, R., & Neera, J. (2025). Explainable and Uncertainty Aware AI-based Ransomware Detection. IEEE Access, 1–1. https://doi.org/10.1109/access.2025.3581424
- Pirbhulal, S., Abie, H., & Muzammal, M. (2025). AD-5GIoT: AI-based anomaly detection system for 5G-IoT networks. In Proceedings of the IEEE International Conference on Communications (ICC), Montreal, Canada (To appear).
- Kaur, A., Valizadeh, N., Nandan, D., Szydlo, T., Rajasekaran, J. R. K., et al. (2025). Cybersecurity challenges in the EV charging ecosystem. ACM Computing Surveys. https://dl.acm.org/doi/10.1145/3735662
- Rajasekaran, J. R. K., Natarajan, B., & Jiang, J. (2025). Online bad data detection in compressed sensing-based distribution system state estimation. IEEE Transactions on Smart Grid. https://ieeexplore.ieee.org/document/10943257
- Gómez, Y., Branley-Bell, D., Briggs, P., & Vila, J. (2025). Cyberinsurance adoption strategies and security of online behaviour: an experimental study. Behaviour & Information Technology, 44(6), 1169–1182. https://doi.org/10.1080/0144929X.2025.2467891
- Jahankhani, H. & Issac, B. as Editors (2025). Cybersecurity and Human Capabilities Through Symbiotic Artificial Intelligence, Proceedings of the 16th International Conference on Global Security, Safety and Sustainability, Advanced Sciences and Technologies for Security Applications (series), In SpringerLink. Springer Nature Switzerland, Volume/Edtion 1, ISBN: 978-3-031-82030-4, 676 pages, https://link.springer.com/book/9783031820304
- Issac, B., Fryer, K., & Jacob, S. M. (2025). Flow-based Detection of Botnets through Bio-inspired Optimisation of Machine Learning. Proceedings of the 16th International Conference on Global Security, Safety and Sustainability, Advanced Sciences and Technologies for Security Applications (series), In SpringerLink. Springer Nature Switzerland, 621-676, https://link.springer.com/chapter/10.1007/978-3-031-82031-1_31
2024
- Neera, J., Chen, X., Aslam, N. & Issac, B. (2024). A trustworthy and untraceable centralised payment protocol for mobile payment. ACM Transactions on Privacy and Security, ISSN: 2471-2566, pp. 1-29.
- Yumlembam, R., Issac, B., Jacob, S. M. & Yang, L. (2024). Comprehensive botnet detection by mitigating adversarial attacks: Navigating the subtleties of perturbation distances and fortifying predictions with conformal layers. Information Fusion, Elsevier, ISSN: 1872-6305.
- Ahmed, Z., Issac, B. & Das, S. (2024). Ok-NB: An enhanced OPTICS and k-naive Bayes classifier for imbalance classification with overlapping. IEEE Access, ISSN: 2169-3536, pp. 1-19. DOI: 10.1109/ACCESS.2024.3391749.
- Tirulo, A., Chauhan, S. & Issac, B. (2024). Ensemble LOF-based detection of false data injection in smart grid demand response system. Computers and Electrical Engineering, 116, 109188. ISSN: 0045-7906.
- Randhawa, R., Aslam, N., Alauthman, M., Khalid, M., & Rafiq, H. (2024). Deep reinforcement learning-based evasion generative adversarial network for botnet detection. Future Generation Computer Systems.
- Jahankhani, H. (2024). Cybersecurity challenges in the age of AI, space communications and cyborgs. In: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, Springer.
- Jahankhani, H., Kendzierskyj, S., Pournouri, S. & Pozza, M. A. (2024). Space governance: Challenges, threats, and countermeasures. Space Law and Policy Series, Springer.
- Jahankhani, H., Kendzierskyj, S., Pournouri, S. & Pozza, M. A. (2024). Space law principles and sustainable measures. Space Law and Policy Series, Springer.
- Jahankhani, H., Bowen, G., Sharif, S. & Hussien, O. (2024). Cybersecurity and artificial intelligence: Transformational strategies and disruptive innovation. Advanced Sciences and Technologies for Security Applications, Springer.
- Bessant, C. (2024). Will domestic abuse protection notices and orders improve victim protection and assure the United Kingdom’s compliance with the Istanbul Convention? In: M. Burton, V. Bettinson, K. Richardson & A. Speed, eds. Research Handbook on Domestic Violence and Abuse. Edward Elgar Publishing.
- Bessant, C. (2024). School social media use and its impact upon children’s rights to privacy and autonomy. Special Issue of Computers and Education Open: Datafied by Default: Examining the Intersect Between Children’s Digital Rights and Education. DOI: https://doi.org/10.1016/j.caeo.2024.100185.
- Bessant, C. & Allsopp, R. (2024). Data-driven decision-making beyond COVID-19: Incorporating the voice of the child. In: C. Redhead & M. Smallman, eds. Governance, Democracy and Ethics in Crisis Decision-Making: The Pandemic and Beyond. Manchester University Press.
- Bessant, C. (2024). Parental approaches to protecting children from online harm: Trust, protectionism or dialogue. In: E. Setty, F. Gordon & E. Nottingham, eds. Children, Young People and Online Harms: Conceptualisations, Experiences and Responses. Palgrave Macmillan.
- Manoli, A., Dixon, K. & Antonopoulos, G. (2024). Football fan tokens as a mode of “serious leisure”: Unveiling the dual essence of identity and investment. Leisure Studies.
- Campana, P. & Antonopoulos, G. (2024). A relational approach to organised crime: Introduction to the special issue on crime and networks. Trends in Organized Crime.
- L’Hoiry, X., Moretti, A. & Antonopoulos, G. (2024). Identifying sex trafficking in Adult Services Websites: An exploratory study with a British police force. Trends in Organized Crime.
- L’Hoiry, X., Moretti, A. & Antonopoulos, G. (2024). Human trafficking, sexual exploitation and digital technologies. Trends in Organized Crime.
- Carrapico, H. & Christou, G., (2024). All in this together? Communities of practice in UK-EU cybersecurity relations post-Brexit and differentiated re-engagement. Journal of Common Market Studies.
- Farrand, B., Carrapico, H. & Turobov, A., (2024). The new geopolitics of EU cybersecurity: Security, economy and sovereignty. International Affairs, 100(6), pp. 2379–2397.
- Carrapico, H. & Farrand, B., (2024). Cybersecurity trends in the European Union: Regulatory mercantilism and the digitalisation of geopolitics. Journal of Common Market Studies Annual Review. DOI: https://onlinelibrary.wiley.com/doi/full/10.1111/jcms.13654.
- Briddick, C., Briggs, P., & Nicholson, J. (2024, June 11). Using breach and attack demonstrations to explain spear phishing attacks to young adults. In Information Security Education – Challenges in the Digital Age (WISE 2024). Cham, Switzerland: Springer.
-
Bates, E., Neave, N., Dodd, A., & Hamilton, C. (2024). The role of emotional regulation, executive functioning, and aggression in hoarding behaviours. Journal of Obsessive-Compulsive and Related Disorders.
-
Murphy-Morgan, C., Hodgson, P., Pollet, T., & Neave, N. (2024). “Making it easier to live, you know?” A qualitative study of the impact of hoarding behaviours and social networks on older people’s supported housing decisions. Health and Social Care in the Community.
2023
-
Ketsbaia, L., Issac, B., Chen, X. & Jacob, S. M. (2023). A multi-stage machine learning and fuzzy approach to cyber-hate detection. IEEE Access, IEEE, ISSN 2169-3536.
-
Sharma, R. K., Issac, B., Xin, Q., Gadekallu, T. R. & Nath, K. (2023). Plant and salamander inspired network attack detection and data recovery model. Internet of Things, Sensors, ISSN 1424-8220.
-
Yumlembam, R., Issac, B., Yang, L. & Jacob, S. M. (2023). Android malware classification and optimisation based on BM25 score of Android API. In: Proceedings of the Seventh IEEE International Workshop on the Security, Privacy, and Digital Forensics of Mobile Systems and Networks (MobiSec 2023): In conjunction with IEEE International Conference on Computer Communications, INFOCOM 2023, New York, USA, May 2023, pp. 1-6.
-
Akbari, Y., Almaadeed, S., Elharrouss, O., Ottakath, N. & Khelifi, F. (2023). Hierarchical deep learning approach using fusion layer for source camera model identification based on video taken by smartphone. Expert Systems with Applications.
-
Akbari, Y., Najeeb, A., Al-Maadeed, S., Elharrouss, O., Khelifi, F. & Lawgaly, A. (2023). A new dataset for forged smartphone videos detection: Description and analysis. IEEE Access.
-
Ottakath, N., Akbari, Y., Almaadeed, S., Bouridane, A. & Khelifi, F. (2023). Exploring classification models for video source device identification: A study of CNN-SVM and Softmax classifier. In: International Symposium on Networks, Computers and Communications, Piscataway, US, IEEE.
-
Joinson, A. N., Dixon, M., Coventry, L. & Briggs, P. (2023). Development of a new ‘human cyber-resilience scale’. Journal of Cybersecurity, 9(1), tyad007.
-
Oswald, M., Calder, M. & Janjeva, A. (2023). Privacy intrusion and national security in the age of AI: Assessing proportionality of automated analytics. CETaS Research Reports.
-
Chitare, N., Coventry, L. & Nicholson, J. (2023). “It may take ages”: Understanding human-centred lateral phishing attack detection in organisations. In: European Symposium on Security and Privacy.
-
Nicholson, J., Dele Ajayi, O., Fasae, K. & Alese, B. (2023). Friendly folk advice: Exploring cybersecurity information sharing in Nigeria. In: IFIP Conference on Human-Computer Interaction.
-
Morrison, B., Nicholson, J., Coventry, L., & Briggs, P. (2023, September 6–8). Recognising diversity in older adults’ cybersecurity needs. In ACM International Conference on Information Technology for Social Good (GoodIT ’23), Lisbon, Portugal. New York, NY, USA: ACM.
-
Rajasekaran, J., Natarajan, B., & Pahwa, A. (2023). Modified matrix completion-based detection of stealthy data manipulation attacks in low observable distribution systems. IEEE Transactions on Smart Grid.
-
Neera, J., Chen, X., Aslam, N., Wang, K. & Shu, Z. (2023). Private and utility-enhanced recommendations with local differential privacy and Gaussian mixture model. IEEE Transactions on Knowledge and Data Engineering, 35(4), pp. 4151-4163. DOI: 10.1109/TKDE.2021.3126577.
2022
-
Yumlembam, R., Issac, B., Jacob, S. M. & Yang, L. (2022). IoT-based Android malware detection using graph neural network with adversarial defence. IEEE Internet of Things Journal, IEEE, ISSN 2327-4662.
-
Rafiq, H., Aslam, N., Aleem, M., Issac, B. & Randhawa, R. H. (2022). AndroMalPack: Enhancing the ML-based malware classification by detection and removal of repacked apps for Android systems. Scientific Reports, Springer Nature, pp. 1-22, ISSN 2045-2322.
-
Rafiq, H., Aslam, N., Issac, B. & Randhawa, R. H., (2022). An investigation on fragility of machine learning classifiers in Android malware detection. In: IEEE INFOCOM 2022 – IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), New York, NY, USA, pp. 1-6. DOI: 10.1109/INFOCOMWKSHPS54753.2022.9798161.
-
Branley-Bell, D., Coventry, L., Dixon, M., Joinson, A. & Briggs, P. (2022). Exploring age and gender differences in ICT cybersecurity behaviour. Human Behavior and Emerging Technologies.
-
Branley-Bell, D., Coventry, L. & Briggs, P. (2022). Cyber insurance from the stakeholder’s perspective: A qualitative analysis of barriers and facilitators to adoption. In: 2022 European Symposium on Usable Security (EuroUSEC 2022), Karlsruhe, Germany. ACM, New York, USA. DOI: 10.1145/3549015.355420.
-
Coventry, L., Sillence, S., Brown, R., Branley-Bell, D., et al. (2022). Situation critical: Intensive cybersecurity care needed. Lecture Notes in Computer Science.
-
Dixon, M., Nicholson, J., Branley-Bell, D., Briggs, P. & Coventry, L. (2022). Holding your hand on the danger button: Observing user phish detection strategies across mobile and desktop. Proceedings of the ACM on Human-Computer Interaction, 6.
-
Jeyamohan, N., Chen, X., Aslam, N., Issac, B. & O’Brien, E. (2022). A local differential privacy-based hybrid recommendation model with BERT and matrix factorization. In: Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022), Lisbon, Portugal, July 2022, pp. 1-8.
-
Perera, K., Khelifi, F. & Belatreche, A. (2022). A filtering method for SIFT-based palm vein recognition. In: 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Piscataway, NJ, IEEE.
-
Brahimi, T., Khelifi, F., Laouir, F. & Kacha, A. (2022). A new, enhanced EZW image codec with subband classification. Multimedia Systems.
-
Peyret, R., AlSaeed, D., Khelifi, F., Al-Ghreimil, N., Al-Baity, H. & Bouridane, A. (2022). Convolutional neural network–based automatic classification of colorectal and prostate tumor biopsies using multispectral imagery: System development study. JMIR Bioinformatics and Biotechnology.
-
Akbari, Y., Almaadeed, S., Elharrouss, O., Khelifi, F. & Lawgaly, A. (2022). Digital forensic analysis for source video identification: A survey. Forensic Science International.
-
Mareen, H., Van Wallendael, G., Lambert, P. & Khelifi, F. (2022). Fast and blind detection of rate-distortion-preserving video watermarks. In: ARES ’22, New York, NY, USA, ACM.
-
Rajasekaran, R., Sikdar, B., & Kundur, D. (2022). Electromagnetic transients-based detection of data manipulation attacks in three phase radial distribution networks. IEEE Transactions on Industry Applications.
-
R., J., Natarajan, B., & Pahwa, A. (2022). Neumann series-based voltage sensitivity analysis for three phase distribution systems. IEEE Transactions on Power Systems
2021
- Branley-Bell, D., Coventry, L. & Sillence, S. (2021). Promoting cybersecurity culture change in healthcare. In: The 14th PETRA Conference. DOI: 10.1145/3453892.3461622.
- Nicholson, J., Terry, J., Beckett, H., & Kumar, P. (2021, October 11). Understanding young people’s experiences of cybersecurity. In EuroUSEC ’21. New York, NY, USA: ACM.
-
Montasari, R., Jahankhani, H., Hill, R. & Parkinson, S. (2021). Digital forensic investigation of Internet of Things (IoT) devices. Advanced Sciences and Technologies for Security Applications, Springer.
-
Montasari, R. & Jahankhani, H. (2021). Artificial intelligence in cybersecurity: Impact and implications. Advanced Sciences and Technologies for Security Applications, Springer.
-
Nicholson, J., Morrison, B., Dixon, M., Holt, J., Coventry, L., & McGlasson, J. (2021, May 6). Training and embedding cybersecurity guardians in older communities. In CHI ’21. New York, NY, USA: ACM.
-
Jahankhani, H., Kendzierskyj, S. & Akhgar, B. (2021). Emerging security technologies to challenge pandemics. Advanced Sciences and Technologies for Security Applications, Springer.
-
Jahankhani, H., Jamal, A. & Lawson, S. (2021). Cybersecurity, privacy and freedom protection in the connected world. In: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, Springer.
-
Branley-Bell, D., Coventry, L., Gómez, Y., Vila, J. & Briggs, P. (2021). Developing and validating a behavioural model of cyberinsurance adoption. Sustainability, 13, p. 9528.
-
Naik, N., Jenkins, P., Savage, N., Yang, L., Boongoen, T. & Iam-On, N. (2021). Fuzzy-import hashing: A static analysis technique for malware detection. Forensic Science International: Digital Investigation, 37, p. 301139.
-
Morrison, B., Coventry, L. & Briggs, P. (2021). How do older adults feel about engaging with cybersecurity? Human Behavior and Emerging Technologies, 3(5), pp. 1033-1049.
-
Montasari, R., Jahankhani, H. & Al-Khateeb, H. (2021). Challenges in the IoT and smart environments: A practitioners’ guide to security, ethics and criminal threats. Springer.
-
Bellini, R., Dell, N., Whitty, M., Bhattacharya, D., Wall, D. & Briggs, P. (2021). Crime and/or punishment: Joining the dots between crime, legality and HCI. In: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-8.
-
Naik, N., Jenkins, P., Kerby, B., Sloane, J. & Yang, L. (2021). Fuzzy logic-aided intelligent threat detection in Cisco adaptive security appliance 5500 series firewalls. In: 2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
-
Kumar, R., & Sikdar, B. (2021). Detection of stealthy cyber-physical line disconnection attacks in smart grid. IEEE Transactions on Smart Grid.
-
Barraclough, P., Fehringer, G. & Woodward, J. (2021). Intelligent cyber-phishing detection for online users. Computers & Security.
2020
-
Gibson, S., Issac, B., Zhang, L. & Jacob, S. M. (2020). Detecting spam email with machine learning optimized with bio-inspired metaheuristic algorithms. IEEE Access, IEEE, ISSN 2169-3536.
-
Stobbs, J., Issac, B. & Jacob, S. M. (2020). Phishing web page detection using optimised machine learning. In: Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), Guangzhou, China, December 2020.
-
Coventry, L., Branley-Bell, D. & Sillence, S. (2020). Cyber-risk in healthcare: Exploring facilitators and barriers to secure behaviour. Lecture Notes in Computer Science. DOI: 10.1007/978-3-030-50309-3_8.
-
Branley-Bell, D., et al. (2020). User trust & understanding of explainable AI: Exploring algorithm visualisations & user biases. Lecture Notes in Computer Science. DOI: 10.1007/978-3-030-49065-2_27.
-
Labunets, K., Pieters, W., van Eeten, M. & Branley-Bell, D. (2020). The cybersecurity and cyber insurance landscape. In: Insua, D. V., Baylon, C. & Vila, J. (eds.) Security Risk Models for Cyber Insurance.
-
Vila, J., Briggs, P., Branley-Bell, D., et al. (2020). Behavioural issues in cybersecurity. In: Insua, D. V., Baylon, C. & Vila, J. (eds.) Security Risk Models for Cyber Insurance. DOI: 10.1201/9780429329487.
-
Seuchter, S., Beimrohr, V. & Branley-Bell, D. (2020). The crux of cookies consent: A legal and technical analysis of shortcomings of cookie policies in the age of the GDPR. Jusletter IT.
-
Bellini, R., Dell, N., Whitty, M., Bhattacharya, D., Wall, D. & Briggs, P. (2020). Crime and/or punishment: Joining the dots between crime, legality and HCI. In: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-8.
-
Morrison, B. A., Coventry, L. & Briggs, P. (2020). Technological change in the retirement transition and the implications for cybersecurity vulnerability in older adults. Frontiers in Psychology, 11, p. 623.
-
Rodríguez-Priego, N., van Bavel, R., Vila, J. & Briggs, P. (2020). Framing effects on online security behavior. Frontiers in Psychology, 11, p. 2833.
-
Naik, N., Jenkins, P., Savage, N., Yang, L., Naik, K. & Song, J. (2020). Embedding fuzzy rules with YARA rules for performance optimisation of malware analysis. In: 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1-7.
-
Naik, N., Jenkins, P., Savage, N., Yang, L., Naik, K. & Song, J. (2020). Fuzzy hashing aided enhanced YARA rules for malware triaging. In: 2020 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1138-1145.
-
Ahmed, F., Khelifi, F., Lawgaly, A. & Bouridane, A. (2020, August). Temporal image forensic analysis for picture dating with deep learning. In: 2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE), IEEE, pp. 109-114.
-
Ahmed, F., Khelifi, F., Lawgaly, A. & Bouridane, A. (2020, June). The ‘Northumbria temporal image forensics’ database: Description and analysis. In: 2020 7th International Conference on Control, Decision and Information Technologies (CoDIT), IEEE, vol. 1, pp. 982-987.
-
Jahankhani, H. (2020). Cybersecurity practitioner’s guide. World Scientific.
-
Babuta, A., Oswald, M. & Janjeva, A. (2020). Artificial intelligence and UK national security: Policy considerations. RUSI Occasional Paper.
-
Oswald, M. (2020). Technologies in the twilight zone: Early lie detectors, machine learning and reformist legal realism. International Review of Law, Computers & Technology, 34(2), pp. 214-231.
-
Kotsoglou, K. N. & Oswald, M. (2020). The long arm of the algorithm? Automated facial recognition as evidence and trigger for police intervention. Forensic Science International: Synergy, 2, pp. 86-89.
-
Oswald, M. & Farrand, B. (2020). Discursive continuity and change in the time of COVID-19: The case of EU cybersecurity policy. Journal of European Integration, 42(8), pp. 1111-1126.
2019
- Nicholson, J., Coventry, L., & Briggs, P. (2019). “If it’s important it will be a headline”: Cybersecurity information seeking in older adults. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM.
- Ahmed, F., Khelifi, F., Lawgaly, A. & Bouridane, A. (2019). Comparative analysis of a deep convolutional neural network for source camera identification. In: 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), IEEE, pp. 1-6.
-
Khalid, M., Ahmad, F., Arshad, M., Khalid, W., Ahmad, N. & Cao, Y. (2019). E2MR: Energy-efficient multipath routing protocol for underwater wireless sensor networks. IET Networks, 8(5), pp. 321-328.
-
Naik, N., Jenkins, P., Savage, N., Yang, L., Naik, K. & Song, J. (2019). Cyberthreat hunting-part 1: Triaging ransomware using fuzzy hashing, import hashing and YARA rules. In: 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1-6.
-
Yang, L., Li, J., Elisa, N., Prickett, T. & Chao, F. (2019). Towards big data governance in cybersecurity. Data-Enabled Discovery and Applications, 3, pp. 1-12.
-
Yang, L., Elisa, N. & Eliot, N. (2019). Privacy and security aspects of E-government in smart cities. In: Smart Cities Cybersecurity and Privacy, Elsevier, pp. 89-102.
-
Li, J., Qu, Y., Chao, F., Shum, H. P., Ho, E. S. & Yang, L. (2019). Machine learning algorithms for network intrusion detection. In: AI in Cybersecurity, pp. 151-179.
-
van Bavel, R., Rodríguez-Priego, N., Vila, J. & Briggs, P. (2019). Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human-Computer Studies, 123, pp. 29-39.
-
Vassileiadis, N., Couce Vieira, V., […] & Branley-Bell, D. (2019). Supporting cyber-insurance from a behavioural choice perspective. In: Challenges in Cybersecurity and Privacy.
2018
- Shah, S. A. R. & Issac, B. (2018). Performance comparison of intrusion detection systems and application of machine learning to Snort system. Future Generation Computer Systems, Elsevier, Vol. 80, pp. 157-170, ISSN 0167-739X.
-
Khelifi, F. & Bouridane, A. (2018). Perceptual video hashing for content identification and authentication. IEEE Transactions on Circuits and Systems for Video Technology (forthcoming).
-
Zebbiche, K., Khelifi, F. & Loukhaoukha, K. (2018). Robust additive watermark detection in the DTCWT domain. Springer Multimedia Tools and Applications (forthcoming).
-
Khelifi, F., Brahimi, T., Han, J. & Li, X. (2018). Secure and privacy-preserving data sharing in the cloud based on lossless image coding. Elsevier Signal Processing, 148, pp. 91-101.
-
Khelifi, F. (2018). On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain. Elsevier Signal Processing, 143, pp. 336-345.
-
Zebbiche, K., Khelifi, F. & Loukhaoukha, K. (2018). Robust additive watermarking in the DTCWT domain based on perceptual masking. Springer Multimedia Tools and Applications (forthcoming).
-
Wimalasiri, B. & Jeyamohan, N. (2018). An e-passport system with multi-stage authentication: A case study of the security of Sri Lanka’s e-passport. Global Journal of Computer Science and Technology, 18, pp. 14-20.
-
Naik, N., Jenkins, P., Cooke, R. & Yang, L. (2018). Honeypots that bite back: A fuzzy technique for identifying and inhibiting fingerprinting attacks on low interaction honeypots. In: 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1-8.
-
Elisa, N., Yang, L., Chao, F. & Cao, Y. (2018). A framework of blockchain-based secure and privacy-preserving E-government system. Wireless Networks, pp. 1-11.
-
Zuo, Z., Li, J., Yang, L., Anderson, P. & Naik, N. (2018). Grooming detection using fuzzy-rough feature selection and text classification. In: 2018 IEEE World Congress on Computational Intelligence (FUZZ-IEEE), Rio de Janeiro, Brazil.
-
Debashi, M. & Vickers, P. (2018). Sonification of network traffic flow for monitoring and situational awareness. PLoS One, 13(4), pp. 1–31. DOI: https://doi.org/10.1371/journal.pone.0195948.
-
Debashi, M. & Vickers, P. (2018). Sonification of network traffic for detecting and learning about botnet behavior. IEEE Access, 6(1), pp. 33826–33839. DOI: https://doi.org/10.1109/ACCESS.2018.2847349.