53 results

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device

Conference Proceeding
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022)
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP (551-561). https://doi.org/10.5220/0010903000003120
Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on ...

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...

Investigating Machine Learning Attacks on Financial Time Series Models

Journal Article
Gallagher, M., Pitropakis, N., Chrysoulas, C., Papadopoulos, P., Mylonas, A., & Katsikas, S. (2022)
Investigating Machine Learning Attacks on Financial Time Series Models. Computers and Security, 123, https://doi.org/10.1016/j.cose.2022.102933
Machine learning and Artificial Intelligence (AI) already support human decision-making and complement professional roles, and are expected in the future to be sufficiently tr...

DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things

Journal Article
Ahmad, J., Shah, S. A., Latif, S., Ahmed, F., Zou, Z., & Pitropakis, N. (2022)
DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. Journal of King Saud University (Computer and Information Sciences), 34(10), 8112-8121. https://doi.org/10.1016/j.jksuci.2022.07.023
The Industrial Internet of Things (IIoT) is a rapidly emerging technology that increases the efficiency and productivity of industrial environments by integrating smart sensor...

A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering

Journal Article
Ullah, S., Ahmad, J., Khan, M. A., Alkhammash, E. H., Hadjouni, M., Ghadi, Y. Y., …Pitropakis, N. (2022)
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors, 22(10), Article 3607. https://doi.org/10.3390/s22103607
The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent ye...

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map

Journal Article
Alharbi, A. R., Ahmad, J., Arshad, Shaukat, S., Masood, F., Ghadi, Y. Y., …Buchanan, W. J. (2022)
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complexity, 2022, Article 7047282. https://doi.org/10.1155/2022/7047282
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain...

A Smart and Robust Automatic Inspection of Printed Labels Using an Image Hashing Technique

Journal Article
Khan, M. A., Ahmed, F., Khan, M. D., Ahmad, J., Kumar, H., & Pitropakis, N. (2022)
A Smart and Robust Automatic Inspection of Printed Labels Using an Image Hashing Technique. Electronics, 11(6), Article 955. https://doi.org/10.3390/electronics11060955
This work is focused on the development of a smart and automatic inspection system for printed labels. This is a challenging problem to solve since the collected labels are ty...

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022)
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291
E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evo...

HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles

Journal Article
Ullah, S., Khan, M. A., Ahmad, J., Jamal, S. S., e Huma, Z., Hassan, M. T., …Buchanan, W. J. (2022)
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors, 22(4), Article 1340. https://doi.org/10.3390/s22041340
Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that connects smart vehicles to the internet, and vehicles with each other. With the emerg...

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

Conference Proceeding
Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2022)
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. In 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699138
The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up wi...
5 results

TrueDeploy - Scottish Enterprise HGSP Company Creation

2022 - 2024
The way in which we develop, supply, and secure software is often weak and lacks digital trust. The dominance of open-source software and the interconnectedness of software between organisations has r...
Funder: Scottish Enterprise | Value: £198,161

TRUST AND PRIVACY PRESERVING COMPUTING PLATFORM FOR CROSSBORDER FEDERATION OF PERSONAL DATA

2022 - 2025
As we live in a data-driven era, the emergence of interdisciplinary, geographically dispersed, data repositories, is inevitable. The fact that these repositories do not necessarily abide with existing...
Funder: UK Research and Innovation | Value: £310,843

Cyber Hunt

2022 - 2025
Automated Cyberthreat Hunting and Cyber-relevant Incident Response for Critical Infrastructures. CyberHunt will develop highly innovative cybersecurity technologies that can sense, detect, analyse, d...
Funder: The Research Funding Council of Norway | Value: £37,500

TrueDeploy - CyberASAP Phase 1

2022 - 2022
The way in which we develop and supply secure, trusted software is broken. The dominance of open-source software and the interconnectedness of software between organisations has raised cybersecurity r...
Funder: Innovate UK | Value: £31,969

OPTIMSING U>P Security and Anonymised Data Cloud Analysis for Duty of Care and Business Continuity

2020 - 2021
This project will build on the work that has already been done by U>P to develop the MVP (Minimum Viable Product), which delivers people analytics data through active data gathering, and the work done...
Funder: Scottish Funding Council | Value: £15,000

Date