no code implementations • 26 Apr 2021 • Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan
As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially.
1 code implementation • 29 Mar 2021 • Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan
A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures.
no code implementations • 10 Jan 2021 • Andrew Churcher, Rehmat Ullah, Jawad Ahmad, Sadaqat ur Rehman, Fawad Masood, Mandar Gogate, Fehaid Alqahtani, Boubakr Nour, William J. Buchanan
Based on several parameters such as accuracy, precision, recall, F1 score, and log loss, we experimentally compared the aforementioned ML algorithms.
no code implementations • 15 Dec 2020 • Simon R. Davies, Richard Macfarlane, William J. Buchanan
The resulting generated timelines provided a excellent way to visualise the behaviour of the ransomware and the encryption key management practices it employed, and from a forensic investigation and possible mitigation point of view, when the encryption keys are in memory.
Cryptography and Security E.3; K.6.5
1 code implementation • 3 Jun 2020 • Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan
Privacy-preserving techniques distribute computation in order to ensure that data remains in the control of the owner while learning takes place.
no code implementations • 1 Jun 2020 • Sebastian Müller, Andreas Penzkofer, Bartosz Kuśmierz, Darcy Camargo, William J. Buchanan
The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure.
Distributed, Parallel, and Cluster Computing
1 code implementation • 13 May 2020 • Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate.