2024
Privacy, Human Rights, and Web 3.0.
Proceedings of the ITU Kaleidoscope 2024: Innovation and Digital Transformation for a Sustainable World, 2024
Adaptive Defence of the Internet of Things (IoT) using the Belief-Desire-Intention (BDI) Model for Social Robots.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Virtual reality forensics: Forensic analysis of Meta Quest 2.
Forensic Sci. Int. Digit. Investig., December, 2023
Forensic analysis of ephemeral messaging applications: Disappearing messages or evidential data?
Forensic Sci. Int. Digit. Investig., September, 2023
2022
Using deep learning to detect social media 'trolls'.
Digit. Investig., 2022
A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models.
Digit. Investig., 2022
A GPU-based machine learning approach for detection of botnet attacks.
Comput. Secur., 2022
2021
Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2021
Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models.
Int. J. Digit. Crime Forensics, 2021
Forensic Analysis of Fitbit Versa: Android vs iOS.
Proceedings of the IEEE Security and Privacy Workshops, 2021
Forensic Analysis of Microsoft Teams: Investigating Memory, Disk and Network.
Proceedings of the Science and Technologies for Smart Cities, 2021
Discord Server Forensics: Analysis and Extraction of Digital Evidence.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021
2020
A secure fog-based platform for SCADA-based IoT critical infrastructure.
Softw. Pract. Exp., 2020
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics.
Int. J. Digit. Crime Forensics, 2020
Privacy Preserving Issues in the Dynamic Internet of Things (IoT).
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Digital Forensic Acquisition and Analysis of Discord Applications.
Proceedings of the International Conference on Communications, 2020
2019
TrustChain: A Privacy Preserving Blockchain with Edge Computing.
Wirel. Commun. Mob. Comput., 2019
CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things.
IEEE Internet Things J., 2019
Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Securing Things in the Healthcare Internet of Things.
Proceedings of the 2019 Global IoT Summit, 2019
Drone Forensics: A Case Study on DJI Phantom 4.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019
2018
Iot Forensics: Challenges for the Ioa Era.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Trust-Based Data Controller for Personal Information Management.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018
2017
Collaborative intrusion detection in federated cloud environments using Dempster-Shafer theory of evidence.
PhD thesis, 2017
Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017
2016
Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: The West European and the Russian Views.
Int. J. Cyber Warf. Terror., 2016
2015
Evaluating the effects of cascading failures in a network of critical infrastructures.
Int. J. Syst. Syst. Eng., 2015
Hosting critical infrastructure services in the cloud environment considerations.
Int. J. Crit. Infrastructures, 2015
Methods and techniques to support the development of fraud detection system.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2015
Improving the barrier of communication between healthcare professionals and their patients using a Prescription Tracking System.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2015
Detecting Intrusions in Federated Cloud Environments Using Security as a Service.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
A Methodology to Develop Dynamic Cost-Centric Risk Impact Metrics.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
A Selective Regression Testing Approach for Composite Web Services.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
The Development of Fraud Detection Systems for Detection of Potentially Fraudulent Applications.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
Improving Communication between Healthcare Professionals and Their Patients through a Prescription Tracking System.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
2014
Simulating Critical Infrastructure Cascading Failure.
Proceedings of the UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 2014
2013
Considering an elastic scaling model for cloud Security.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013