2025
Offender Characterization and Prediction: A Case Study of the Kingdom of Bahrain.
IEEE Access, 2025
2024
The Emerging Challenges of Wearable Biometric Cryptosystems.
Cryptogr., September, 2024
Information Difference of Transfer Entropies between Head Motion and Eye Movement Indicates a Proxy of Driving.
Entropy, January, 2024
Cognitive Effort Measures Driven by Fixation Induced Retinal Flow in Visual Scanning Behavior during Virtual Driving.
CoRR, 2024
Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach.
Comput. Secur., 2024
A Novel Image Casting and Fusion for Identifying Individuals at Risk of Alzheimer's Disease Using MRI and PET Imaging.
IEEE Access, 2024
Cybersecurity Education and Awareness Among Parents and Teachers: A Survey of Bahrain.
IEEE Access, 2024
Keyhole Porosity Identification and Localization via X-Ray Imaging With YOLO.
IEEE Access, 2024
2023
Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach.
Expert Syst. Appl., December, 2023
Comparison of deep learning classification models for facial image age estimation in digital forensic investigations.
Forensic Sci. Int. Digit. Investig., December, 2023
An empirical analysis of keystroke dynamics in passwords: A longitudinal study.
IET Biom., January, 2023
A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective.
ACM Comput. Surv., 2023
A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats.
IEEE Access, 2023
Exudate Regeneration for Automated Exudate Detection in Retinal Fundus Images.
IEEE Access, 2023
One Bus is All it Takes: The Impact of Cyber Attacks in Customised Bus Services.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023
Automated Planning to Prioritise Digital Forensics Investigation Cases Containing Indecent Images of Children.
Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, 2023
2022
Robust data expansion for optimised modelling using adaptive neuro-fuzzy inference systems.
Expert Syst. Appl., 2022
Identifying high-risk over-entitlement in access control policies using fuzzy logic.
Cybersecur., 2022
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.
Proceedings of the Ubiquitous Security - Second International Conference, 2022
2021
Analysis of security and privacy challenges for DNA-genomics applications and databases.
J. Biomed. Informatics, 2021
OCEAN: A Non-Conventional Parameter Free Clustering Algorithm Using Relative Densities of Categories.
Int. J. Pattern Recognit. Artif. Intell., 2021
Password policy characteristics and keystroke biometric authentication.
IET Biom., 2021
Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security.
ACM Comput. Surv., 2021
A Jensen-Shannon Divergence Driven Metric of Visual Scanning Efficiency Indicates Performance of Virtual Driving.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
2020
Digital Forensics: Challenges and Opportunities for Future Studies.
Int. J. Organ. Collect. Intell., 2020
Hardware-based cyber threats: attack vectors and defence techniques.
Int. J. Electron. Secur. Digit. Forensics, 2020
Simultaneous Constant Velocity Measurement of the Motion Errors of Linear Axes.
Int. J. Autom. Technol., 2020
Low-cost fitness and activity trackers for biometric authentication.
J. Cybersecur., 2020
2019
Discovering and utilising expert knowledge from security event logs.
J. Inf. Secur. Appl., 2019
TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks.
IEEE Internet Things J., 2019
<i>Creeper</i>: a tool for detecting permission creep in file system access controls.
Cybersecur., 2019
Exploiting automated planning for efficient centralized vehicle routing and mitigating congestion in urban road networks.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Classifying Ransomware Using Machine Learning Algorithms.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019
Towards Automating Crime Prevention through Environmental Design (CPTED) Analysis to Predict Burglary.
Proceedings of the Twenty-Ninth International Conference on Automated Planning and Scheduling, 2019
2018
Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Review into State of the Art of Vulnerability Assessment using Artificial Intelligence.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Identifying File Interaction Patterns in Ransomware Behaviour.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Identifying irregularities in security event logs through an object-based Chi-squared test of independence.
J. Inf. Secur. Appl., 2018
Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach.
Expert Syst. Appl., 2018
GraphBAD: A general technique for anomaly detection in security information and event management.
Concurr. Comput. Pract. Exp., 2018
2017
Efficient computation of distance labeling for decremental updates in large dynamic graphs.
World Wide Web, 2017
Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges.
IEEE Trans. Intell. Transp. Syst., 2017
Use of access control to minimise ransomware impact.
Netw. Secur., 2017
A Hybrid Approach to Process Planning: The Urban Traffic Controller Example.
J. Comput. Sci., 2017
Fog computing security: a review of current applications and security solutions.
J. Cloud Comput., 2017
A Multi-layered Cloud Protection Framework.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017
Causal Connections Mining Within Security Event Logs.
Proceedings of the Knowledge Capture Conference, 2017
Security auditing in the fog.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Edge Influence Computation in Dynamic Graphs.
Proceedings of the Database Systems for Advanced Applications, 2017
On the Exploitation of Automated Planning for Reducing Machine Tools Energy Consumption between Manufacturing Operations.
Proceedings of the Twenty-Seventh International Conference on Automated Planning and Scheduling, 2017
Towards A Multi-Tiered Knowledge-Based System for Autonomous Cloud Security Auditing.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
Identification of irregularities and allocation suggestion of relative file system permissions.
J. Inf. Secur. Appl., 2016
Auditing file system permissions using association rule mining.
Expert Syst. Appl., 2016
Climate and human development impacts on municipal water demand: A spatially-explicit global modeling framework.
Environ. Model. Softw., 2016
2015
Multi-objective optimisation of machine tool error mapping using automated planning.
Expert Syst. Appl., 2015
2014
Automated planning to minimise uncertainty of machine tool calibration.
Eng. Appl. Artif. Intell., 2014
Automated Planning for Multi-Objective Machine Tool Calibration: Optimising Makespan and Measurement Uncertainty.
Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014
2013
A Novel Software Tool for Analysing NT File System Permissions.
CoRR, 2013
2012
Automatic planning for machine tool calibration: A case study.
Expert Syst. Appl., 2012
A test bed for self-regulating distribution systems: Modeling integrated renewable energy and demand response in the GridLAB-D/MATLAB environment.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012
The Application of Automated Planning to Machine Tool Calibration.
Proceedings of the Twenty-Second International Conference on Automated Planning and Scheduling, 2012
2011
Energy efficient communication networks design for demand response in smart grid.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011
Representing the process of machine tool calibration on first-order logic.
Proceedings of the 17th International Conference on Automation and Computing, 2011
1993
Sensing Surface Shape by Touch.
Proceedings of the 1993 IEEE International Conference on Robotics and Automation, 1993