Skip to main content

Research Repository

Advanced Search

Outputs (32)

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis (2024)
Presentation / Conference Contribution
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (2023, November). Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. Presented at IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMDAD) 2023, Edinburgh

An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case (2024)
Presentation / Conference Contribution
Onyeashie, B., Leimich, P., McKeown, S., & Russell, G. (2023, August). An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case. Presented at EAI BDTA 2023 - 13th EAI International Conference on Big Data Technologies and Applications, Edinburgh

This paper presents a decentralised framework for sharing and managing evidence that uses smart lockers, blockchain technology, and the InterPlanetary File System (IPFS). The system incorporates Hyperledger Fabric blockchain for immutability and tamp... Read More about An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case.

A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence (2024)
Presentation / Conference Contribution
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2023, August). A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence. Presented at EAI BDTA 2023 - 13th EAI International Conference on Big Data Technologies and Applications, Edinburgh, UK

The effective management of digital evidence is critical to modern forensic investigations. However, traditional evidence management approaches are often prone to security and integrity issues. In recent years, the use of blockchain technology has em... Read More about A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence.

Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features (2020)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2020, July). Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features. Presented at International Joint Conference on Neural Networks (IJCNN 2020), Glasgow, UK

Industrial Control Systems have become a priority domain for cybersecurity practitioners due to the number of cyber-attacks against those systems has increased over the past few years. This paper proposes a real-time anomaly intrusion detector for a... Read More about Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features.

Forensic Considerations for the High Efficiency Image File Format (HEIF) (2020)
Presentation / Conference Contribution
Mckeown, S., & Russell, G. (2020). Forensic Considerations for the High Efficiency Image File Format (HEIF). . https://doi.org/10.1109/CyberSecurity49315.2020.9138890

The High Efficiency File Format (HEIF) was adopted by Apple in 2017 as their favoured means of capturing images from their camera application, with Android devices such as the Galaxy S10 providing support more recently. The format is positioned to re... Read More about Forensic Considerations for the High Efficiency Image File Format (HEIF).

5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum (2020)
Presentation / Conference Contribution
Khan, J. S., Tahir, A., Ahmad, J., Shah, S. A., Abbasi, Q. H., Russell, G., & Buchanan, W. (2020, July). 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum. Presented at 2020 Computing Conference, London

Freezing of gait (FOG) is one of the most incapacitating and disconcerting symptom in Parkinson's disease (PD). FOG is the result of neural control disorder and motor impairments, which severely impedes forward locomotion. This paper presents the exp... Read More about 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum.

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels (2019)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2019, July). WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels. Presented at 15th IEEE International Conference on Control & Automation (ICCA), Edinburgh, Scotland

Industrial Control Systems (ICS) have faced a growing number of threats over the past few years. Reliance on isolated controls networks or air-gapped computers is no longer a feasible solution when it comes to protecting ICS. It is because the new ar... Read More about WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels.

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2018, August). Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. Presented at The 4th International Conference on Technology Trends, Babahoyo, Ecuador

Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, such as programmable logic controllers (PLC), networking devices, and actua... Read More about Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System.

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018, June). A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. Presented at Cyber Security 2018: 2018 International Conference on Cyber Security and Protection of Digital Services, Glasgow, United Kingdom

Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development over time have improved their components including operating system platforms... Read More about A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.

Reducing the Impact of Network Bottlenecks on Remote Contraband Detection (2018)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2018, June). Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. Presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018), Glasgow, UK

Cloud based storage is increasing in popularity, with large volumes of data being stored remotely. Digital forensics investigators examining such systems remotely are limited by bandwidth constraints when accessing this kind of data using traditi... Read More about Reducing the Impact of Network Bottlenecks on Remote Contraband Detection.