Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Tan, Z. (2021)
Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System . Ad hoc networks, 120, https://doi.org/10.1016/j.adhoc.2021.102590
Industrial Control Systems (ICS) are hardware, network, and software, upon which a facility depends to allow daily operations to function. In most cases society takes the oper...
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset
Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...
PLC Memory Attack Detection and Response in a Clean Water Supply System
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003
Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens ...
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier
Conference Proceeding
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System
Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. In CITT 2018. , (91-103). https://doi.org/10.1007/978-3-030-05532-5_7
Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, s...
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system
Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018)
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)https://doi.org/10.1109/CyberSecPODS.2018.8560683
Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development ov...
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things
Conference Proceeding
Semedo, F., Moradpoor, N., & Rafiq, M. (2018)
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. In SIN '18 Proceedings of the 11th International Conference on Security of Information and Networkshttps://doi.org/10.1145/3264437.3264438
The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Position...
Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases
Conference Proceeding
Clavie, B., & Moradpoor, N. (in press)
Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. In Proceedings of posters presented at 10th ACM Conference on Web Science
This article explores a perceived bias between two British reddit
communities dedicated to discussing British politics.We analyse the
popular sources favoured by each communit...
Insider threat detection using principal component analysis and self-organising map
Conference Proceeding
Moradpoor, N., Brown, M., & Russell, G. (2017)
Insider threat detection using principal component analysis and self-organising map. In 10th International Conference on Security of Information and Networks (SIN 2017)https://doi.org/10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...