Áine MacDermott

Orcid: 0000-0001-8939-4664

Affiliations:
  • Liverpool John Moores University, Liverpool, UK


According to our database1, Áine MacDermott authored at least 38 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adaptive Defence of the Internet of Things (IoT) using the Belief-Desire-Intention (BDI) Model for Social Robots.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Virtual reality forensics: Forensic analysis of Meta Quest 2.
Forensic Sci. Int. Digit. Investig., December, 2023

Forensic analysis of ephemeral messaging applications: Disappearing messages or evidential data?
Forensic Sci. Int. Digit. Investig., September, 2023

2022
Using deep learning to detect social media 'trolls'.
Digit. Investig., 2022

A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models.
Digit. Investig., 2022

A GPU-based machine learning approach for detection of botnet attacks.
Comput. Secur., 2022

2021
Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models.
Int. J. Digit. Crime Forensics, 2021

Forensic Analysis of Fitbit Versa: Android vs iOS.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Forensic Analysis of Microsoft Teams: Investigating Memory, Disk and Network.
Proceedings of the Science and Technologies for Smart Cities, 2021

Discord Server Forensics: Analysis and Extraction of Digital Evidence.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

2020
A secure fog-based platform for SCADA-based IoT critical infrastructure.
Softw. Pract. Exp., 2020

The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics.
Int. J. Digit. Crime Forensics, 2020

Privacy Preserving Issues in the Dynamic Internet of Things (IoT).
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Digital Forensic Acquisition and Analysis of Discord Applications.
Proceedings of the International Conference on Communications, 2020

2019
TrustChain: A Privacy Preserving Blockchain with Edge Computing.
Wirel. Commun. Mob. Comput., 2019

CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things.
IEEE Internet Things J., 2019

Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Securing Things in the Healthcare Internet of Things.
Proceedings of the 2019 Global IoT Summit, 2019

Drone Forensics: A Case Study on DJI Phantom 4.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Iot Forensics: Challenges for the Ioa Era.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Trust-Based Data Controller for Personal Information Management.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

2017
Collaborative intrusion detection in federated cloud environments using Dempster-Shafer theory of evidence.
PhD thesis, 2017

Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

2016
Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: The West European and the Russian Views.
Int. J. Cyber Warf. Terror., 2016

2015
Evaluating the effects of cascading failures in a network of critical infrastructures.
Int. J. Syst. Syst. Eng., 2015

Hosting critical infrastructure services in the cloud environment considerations.
Int. J. Crit. Infrastructures, 2015

Methods and techniques to support the development of fraud detection system.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2015

Improving the barrier of communication between healthcare professionals and their patients using a Prescription Tracking System.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2015

Detecting Intrusions in Federated Cloud Environments Using Security as a Service.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

A Methodology to Develop Dynamic Cost-Centric Risk Impact Metrics.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

A Selective Regression Testing Approach for Composite Web Services.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

The Development of Fraud Detection Systems for Detection of Potentially Fraudulent Applications.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

Improving Communication between Healthcare Professionals and Their Patients through a Prescription Tracking System.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

2014
Simulating Critical Infrastructure Cascading Failure.
Proceedings of the UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 2014

2013
Considering an elastic scaling model for cloud Security.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013


  Loading...