All Stories

  1. A survey of deep learning for face presentation attack detection
  2. Event Log Correlation for Multi‐Step Attack Detection
  3. A Survey on Quantum Optimisation in Transportation and Logistics
  4. A Systematic Literature Review of Simulated Cyber Attacks on Vehicles and Urban Traffic Control
  5. A contextual framework to standardise the communication of machine learning cyber security characteristics
  6. Characterizing High-order Interactions between Eye Movement and Head Motion Variables in Augmented Reality-based Navigation Experience
  7. Computational Measures of Gaze Behavior Using the Concept of Situational Awareness
  8. Large Models for Machine Monitoring and Fault Diagnostics: Opportunities, Challenges and Future Direction
  9. Splitting frequency behavior of wireless power transfer for eddy current testing applications
  10. Offender Characterization and Prediction: A Case Study of the Kingdom of Bahrain
  11. A Review on Multi-Step Attack Detection
  12. Unified Digital Twin Approach for Energy Grid Condition and Cybersecurity Monitoring
  13. Using computational systematic social observation to identify environmental correlates of fear of crime
  14. Using Computational Systematic Social Observation to Identify Environmental Correlates of Fear of Crime
  15. Channel state information based physical layer authentication for Wi‐Fi sensing systems using deep learning in Internet of things networks
  16. Using Computational Systematic Social Observation to Identify Environmental Correlates of Fear of Crime
  17. An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks
  18. The Emerging Challenges of Wearable Biometric Cryptosystems
  19. Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach
  20. The role of Artificial Intelligence in digital forensics: Case studies and future directions
  21. A Survey on Factors Preventing the Adoption of Automated Software Testing: A Principal Component Analysis Approach
  22. A Novel Image Casting and Fusion for Identifying Individuals at Risk of Alzheimer’s Disease Using MRI and PET Imaging
  23. Cybersecurity Education and Awareness Among Parents and Teachers: A Survey of Bahrain
  24. Deception in Autonomous Transport Systems
  25. Detecting Abnormal Vehicle Behavior: A Clustering-Based Approach
  26. Introduction
  27. The Connected and Autonomous Vehicle Trade-Off: Functional Benefits versus Security Risks
  28. The Use of GPS Spoofing Attacks in Location Deception
  29. Towards compliance-based inspection modelling
  30. Keyhole Porosity Identification and Localization via X-Ray Imaging With YOLO
  31. Information Difference of Transfer Entropies between Head Motion and Eye Movement Indicates a Proxy of Driving
  32. Comparison of deep learning classification models for facial image age estimation in digital forensic investigations
  33. Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach
  34. Classifying Participant Standing and Sitting Postures Using Channel State Information
  35. One Bus is All it Takes: The Impact of Cyber Attacks in Customised Bus Services
  36. A Survey on Factors Preventing the Adoption of Automated Software Testing: A Principle Component Analysis Approach
  37. Automated Planning to Prioritise Digital Forensics Investigation Cases Containing Indecent Images of Children
  38. Repetition and Template Generalisability for Instance-Based Keystroke Biometric Systems
  39. A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats
  40. Exudate Regeneration for Automated Exudate Detection in Retinal Fundus Images
  41. On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security
  42. A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective
  43. A Layer-Wise Surface Deformation Defect Detection by Convolutional Neural Networks in Laser Powder-Bed Fusion Images
  44. Eye movement based information system indicates human behavior in virtual driving
  45. An empirical analysis of keystroke dynamics in passwords: A longitudinal study
  46. The deceitful Connected and Autonomous Vehicle: Defining the concept, contextualising its dimensions and proposing mitigation policies
  47. Identifying high-risk over-entitlement in access control policies using fuzzy logic
  48. Robust data expansion for optimised modelling using adaptive neuro-fuzzy inference systems
  49. A Case Study of Using Machine Learning Techniques for COVID-19 Diagnosis
  50. Biometric Systems Utilising Health Data from Wearable Devices
  51. A Jensen-Shannon Divergence Driven Metric of Visual Scanning Efficiency Indicates Performance of Virtual Driving
  52. Analysis of security and privacy challenges for DNA-genomics applications and databases
  53. Transfer Entropy Based Causality From Head Motion To Eye Movement
  54. Password policy characteristics and keystroke biometric authentication
  55. OCEAN: A Non-Conventional Parameter Free Clustering Algorithm Using Relative Densities of Categories
  56. New Measures of Visual Scanning Efficiency and Cognitive Effort
  57. Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach
  58. Built environment attributes and crime: an automated machine learning approach
  59. Simultaneous Constant Velocity Measurement of the Motion Errors of Linear Axes
  60. Digital Forensics
  61. Low-cost fitness and activity trackers for biometric authentication
  62. Hardware-based cyber threats: attack vectors and defence techniques
  63. Discovering and utilising expert knowledge from security event logs
  64. TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks
  65. Towards Automating Crime Prevention through Environmental Design (CPTED) Analysis to Predict Burglary
  66. Creeper: a tool for detecting permission creep in file system access controls
  67. Exploiting automated planning for efficient centralized vehicle routing and mitigating congestion in urban road networks
  68. Classifying Ransomware Using Machine Learning Algorithms
  69. Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach
  70. Adaptive decision support for suggesting a machine tool maintenance strategy
  71. Identifying irregularities in security event logs through an object-based Chi-squared test of independence
  72. GraphBAD: A general technique for anomaly detection in security information and event management
  73. Guide to Vulnerability Analysis for Computer Networks and Systems
  74. Review into State of the Art of Vulnerability Assessment using Artificial Intelligence
  75. Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study
  76. Identifying File Interaction Patterns in Ransomware Behaviour
  77. A Multi-layered Cloud Protection Framework
  78. Causal Connections Mining Within Security Event Logs
  79. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges
  80. A Hybrid Approach to Process Planning: The Urban Traffic Controller Example
  81. Use of access control to minimise ransomware impact
  82. On the Exploitation of Automated Planning for Reducing Machine Tools Energy Consumption between Manufacturing Operations
  83. Security auditing in the fog
  84. Correlation and convolution filtering and image processing for pitch evaluation of 2D micro- and nano-scale gratings and lattices
  85. Edge Influence Computation in Dynamic Graphs
  86. Improved machine tool linear axis calibration through continuous motion data capture
  87. Efficient computation of distance labeling for decremental updates in large dynamic graphs
  88. Identification of irregularities and allocation suggestion of relative file system permissions
  89. Auditing file system permissions using association rule mining
  90. Multi-objective optimisation of machine tool error mapping using automated planning
  91. Automated planning to minimise uncertainty of machine tool calibration
  92. A method for rapid detection and evaluation of position errors of patterns of small holes on complex curved and freeform surfaces
  93. The role of measurement and modelling of machine tools in improving product quality
  94. Automatic planning for machine tool calibration: A case study
  95. THE USE OF CRYPTOGRAPHIC PRINCIPLES WITHIN METROLOGY SOFTWARE