All Stories

  1. A survey of deep learning for face presentation attack detection
  2. A Systematic Literature Review of Simulated Cyber Attacks on Vehicles and Urban Traffic Control
  3. A contextual framework to standardise the communication of machine learning cyber security characteristics
  4. Large Models for Machine Monitoring and Fault Diagnostics: Opportunities, Challenges and Future Direction
  5. Splitting frequency behavior of wireless power transfer for eddy current testing applications
  6. Offender Characterization and Prediction: A Case Study of the Kingdom of Bahrain
  7. Using computational systematic social observation to identify environmental correlates of fear of crime
  8. Using Computational Systematic Social Observation to Identify Environmental Correlates of Fear of Crime
  9. Channel state information based physical layer authentication for Wi‐Fi sensing systems using deep learning in Internet of things networks
  10. Using Computational Systematic Social Observation to Identify Environmental Correlates of Fear of Crime
  11. An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks
  12. The Emerging Challenges of Wearable Biometric Cryptosystems
  13. Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach
  14. The role of Artificial Intelligence in digital forensics: Case studies and future directions
  15. A Survey on Factors Preventing the Adoption of Automated Software Testing: A Principal Component Analysis Approach
  16. A Novel Image Casting and Fusion for Identifying Individuals at Risk of Alzheimer’s Disease Using MRI and PET Imaging
  17. Cybersecurity Education and Awareness Among Parents and Teachers: A Survey of Bahrain
  18. Deception in Autonomous Transport Systems
  19. Detecting Abnormal Vehicle Behavior: A Clustering-Based Approach
  20. Introduction
  21. The Connected and Autonomous Vehicle Trade-Off: Functional Benefits versus Security Risks
  22. The Use of GPS Spoofing Attacks in Location Deception
  23. Towards compliance-based inspection modelling
  24. Keyhole Porosity Identification and Localization via X-Ray Imaging With YOLO
  25. Information Difference of Transfer Entropies between Head Motion and Eye Movement Indicates a Proxy of Driving
  26. Comparison of deep learning classification models for facial image age estimation in digital forensic investigations
  27. Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach
  28. Classifying Participant Standing and Sitting Postures Using Channel State Information
  29. One Bus is All it Takes: The Impact of Cyber Attacks in Customised Bus Services
  30. A Survey on Factors Preventing the Adoption of Automated Software Testing: A Principle Component Analysis Approach
  31. Automated Planning to Prioritise Digital Forensics Investigation Cases Containing Indecent Images of Children
  32. Repetition and Template Generalisability for Instance-Based Keystroke Biometric Systems
  33. A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats
  34. Exudate Regeneration for Automated Exudate Detection in Retinal Fundus Images
  35. On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security
  36. A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective
  37. A Layer-Wise Surface Deformation Defect Detection by Convolutional Neural Networks in Laser Powder-Bed Fusion Images
  38. Eye movement based information system indicates human behavior in virtual driving
  39. An empirical analysis of keystroke dynamics in passwords: A longitudinal study
  40. The deceitful Connected and Autonomous Vehicle: Defining the concept, contextualising its dimensions and proposing mitigation policies
  41. Identifying high-risk over-entitlement in access control policies using fuzzy logic
  42. Robust data expansion for optimised modelling using adaptive neuro-fuzzy inference systems
  43. A Case Study of Using Machine Learning Techniques for COVID-19 Diagnosis
  44. Biometric Systems Utilising Health Data from Wearable Devices
  45. A Jensen-Shannon Divergence Driven Metric of Visual Scanning Efficiency Indicates Performance of Virtual Driving
  46. Analysis of security and privacy challenges for DNA-genomics applications and databases
  47. Transfer Entropy Based Causality From Head Motion To Eye Movement
  48. Password policy characteristics and keystroke biometric authentication
  49. OCEAN: A Non-Conventional Parameter Free Clustering Algorithm Using Relative Densities of Categories
  50. New Measures of Visual Scanning Efficiency and Cognitive Effort
  51. Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach
  52. Built environment attributes and crime: an automated machine learning approach
  53. Simultaneous Constant Velocity Measurement of the Motion Errors of Linear Axes
  54. Digital Forensics
  55. Low-cost fitness and activity trackers for biometric authentication
  56. Hardware-based cyber threats: attack vectors and defence techniques
  57. Discovering and utilising expert knowledge from security event logs
  58. TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks
  59. Towards Automating Crime Prevention through Environmental Design (CPTED) Analysis to Predict Burglary
  60. Creeper: a tool for detecting permission creep in file system access controls
  61. Exploiting automated planning for efficient centralized vehicle routing and mitigating congestion in urban road networks
  62. Classifying Ransomware Using Machine Learning Algorithms
  63. Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach
  64. Adaptive decision support for suggesting a machine tool maintenance strategy
  65. Identifying irregularities in security event logs through an object-based Chi-squared test of independence
  66. GraphBAD: A general technique for anomaly detection in security information and event management
  67. Guide to Vulnerability Analysis for Computer Networks and Systems
  68. Review into State of the Art of Vulnerability Assessment using Artificial Intelligence
  69. Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study
  70. Identifying File Interaction Patterns in Ransomware Behaviour
  71. A Multi-layered Cloud Protection Framework
  72. Causal Connections Mining Within Security Event Logs
  73. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges
  74. A Hybrid Approach to Process Planning: The Urban Traffic Controller Example
  75. Use of access control to minimise ransomware impact
  76. On the Exploitation of Automated Planning for Reducing Machine Tools Energy Consumption between Manufacturing Operations
  77. Security auditing in the fog
  78. Correlation and convolution filtering and image processing for pitch evaluation of 2D micro- and nano-scale gratings and lattices
  79. Edge Influence Computation in Dynamic Graphs
  80. Improved machine tool linear axis calibration through continuous motion data capture
  81. Efficient computation of distance labeling for decremental updates in large dynamic graphs
  82. Identification of irregularities and allocation suggestion of relative file system permissions
  83. Auditing file system permissions using association rule mining
  84. Multi-objective optimisation of machine tool error mapping using automated planning
  85. Automated planning to minimise uncertainty of machine tool calibration
  86. A method for rapid detection and evaluation of position errors of patterns of small holes on complex curved and freeform surfaces
  87. The role of measurement and modelling of machine tools in improving product quality
  88. Automatic planning for machine tool calibration: A case study
  89. THE USE OF CRYPTOGRAPHIC PRINCIPLES WITHIN METROLOGY SOFTWARE