Gordon Russell

Orcid: 0000-0002-3589-3051

Affiliations:
  • Edinburgh Napier University, United Kingdom


According to our database1, Gordon Russell authored at least 36 papers between 1986 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks.
Proceedings of the 2024 4th International Conference on Robotics and Control Engineering, 2024

2023
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case.
Proceedings of the Big Data Technologies and Applications, 2023

A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence.
Proceedings of the Big Data Technologies and Applications, 2023

2021
Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems.
Symmetry, 2021

Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system.
Ad Hoc Networks, 2021

2020
5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum.
Proceedings of the Intelligent Computing, 2020

Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Forensic Considerations for the High Efficiency Image File Format (HEIF).
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
Deriving ChaCha20 key streams from targeted memory analysis.
J. Inf. Secur. Appl., 2019

PLC memory attack detection and response in a clean water supply system.
Int. J. Crit. Infrastructure Prot., 2019

Decrypting live SSH traffic in virtual environments.
Digit. Investig., 2019

Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge.
CoRR, 2019

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels<sup>*</sup>.
Proceedings of the 15th IEEE International Conference on Control and Automation, 2019

2018
Fingerprinting JPEGs With Optimised Huffman Tables.
J. Digit. Forensics Secur. Law, 2018

Machine learning and semantic analysis of in-game chat for cyberbullying.
Comput. Secur., 2018

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Sub-file Hashing Strategies for Fast Contraband Detection.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Reducing the Impact of Network Bottlenecks on Remote Contraband Detection.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

2017
Insider threat detection using principal component analysis and self-organising map.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Performance evaluation of a fragmented secret share system.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
IEEE Trans. Cybern., 2016

2015
The Future Internet: A World of Secret Shares.
Future Internet, 2015

RESCUE: Resilient Secret Sharing Cloud-Based Architecture.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Secret shares to protect health records in Cloud-based infrastructures.
Proceedings of the 17th International Conference on E-health Networking, 2015

Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2012
Security Issues of a Publicly Accessible Cloud Computing Infrastructure.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2007
SQL hacks - tips and tools for digging into your data.
O'Reilly, ISBN: 978-0-596-52799-0, 2007

2004
Improving the Student Learning Experience for SQL Using Automatic Marking.
Proceedings of the Cognition and Exploratory Learning in Digital Age (CELDA'04), 2004

A Universal Character Model and Ontology of Defined Terms for Taxonomic Description.
Proceedings of the Data Integration in the Life Sciences, First International Workshop, 2004

1999
Multiple Traffic Signal Control Using A Genetic Algorithm.
Proceedings of the International Conference on Artificial Neural Nets and Genetic Algorithms, 1999

1994
DAIS: An Object-Addressed Processor Cache.
Proceedings of the Persistent Object Systems, 1994

1993
Shifting register windows.
IEEE Micro, 1993

Architectures for persistence.
Microprocess. Microsystems, 1993

1989
Advanced simulation and test methodologies for VLSI design.
Van Nostrand Reinhold, ISBN: 978-0-7476-0001-5, 1989

1986
Design for testability - a review of advanced methods.
Microprocess. Microsystems, 1986


  Loading...