Skip to main content

Research Repository

Advanced Search

All Outputs (50)

Machine Learning for Smart Healthcare Management Using IoT (2024)
Book Chapter
Yigit, Y., Duran, K., Moradpoor, N., Maglaras, L., Van Huynh, N., & Canberk, B. (2024). Machine Learning for Smart Healthcare Management Using IoT. In IoT and ML for Information Management: A Smart Healthcare Perspective (135-166). Springer. https://doi.org/10.1007/978-981-97-5624-7_4

This chapter explores the significant impact of Machine Learning (ML) and the Internet of Things (IoT) on smart healthcare management, marking a new era of innovation with enhanced patient care and health outcomes. The fusion of IoT devices for real-... Read More about Machine Learning for Smart Healthcare Management Using IoT.

Towards a Cyberbullying Detection Approach: Fine-Tuned Contrastive Self- Supervised Learning for Data Augmentation (2024)
Journal Article
Alharigy, L., Alnuaim, H., Moradpoor, N., & Tan, T. (online). Towards a Cyberbullying Detection Approach: Fine-Tuned Contrastive Self- Supervised Learning for Data Augmentation. International Journal of Data Science and Analytics, https://doi.org/10.1007/s41060-024-00607-9

Cyberbullying on social media platforms is pervasive and challenging to detect due to linguistic subtleties and the need for extensive data annotation. We introduce a Deep Contrastive Self-Supervised Learning (DCSSL) model that integrates a Natural L... Read More about Towards a Cyberbullying Detection Approach: Fine-Tuned Contrastive Self- Supervised Learning for Data Augmentation.

APOLLO: A Proximity-Oriented, Low-Layer Orchestration Algorithm for Resources Optimization in Mist Computing (2024)
Journal Article
Babaghayou, M., Chaib, N., Maglaras, L., Yigit, Y., Amine Ferrag, M., Marsh, C., & Moradpoor, N. (online). APOLLO: A Proximity-Oriented, Low-Layer Orchestration Algorithm for Resources Optimization in Mist Computing. Wireless Networks, https://doi.org/10.1007/s11276-024-03791-5

The fusion of satellite technologies with the Internet of Things (IoT) has propelled the evolution of mobile computing, ushering in novel communication paradigms and data management strategies. Within this landscape, the efficient management of compu... Read More about APOLLO: A Proximity-Oriented, Low-Layer Orchestration Algorithm for Resources Optimization in Mist Computing.

A Blockchain-based two Factor Honeytoken Authentication System (2023)
Presentation / Conference Contribution
Papaspirou, V., Maglaras, L., Kantzavelou, I., Moradpoor, N., & Katsikas, S. (2023, September). A Blockchain-based two Factor Honeytoken Authentication System . Poster presented at 28th European Symposium on Research in Computer Security (ESORICS), The Hague

This paper extends and advances our recently introduced two-factor Honeytoken authentication method by incorporating blockchain technology. This novel approach strengthens the authentication method, preventing various attacks, including tampering att... Read More about A Blockchain-based two Factor Honeytoken Authentication System.

A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks (2023)
Journal Article
Khan, N. W., Alshehri, M. S., Khan, M. A., Almakdi, S., Moradpoor, N., Alazeb, A., Ullah, S., Naz, N., & Ahmad, J. (2023). A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks. Mathematical Biosciences and Engineering, 20(8), 13491-13520. https://doi.org/10.3934/mbe.2023602

The Internet of Things (IoT) is a rapidly evolving technology with a wide range of potential applications, but the security of IoT networks remains a major concern. The existing system needs improvement in detecting intrusions in IoT networks. Severa... Read More about A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks.

Building Towards Automated Cyberbullying Detection: A Comparative Analysis (2022)
Journal Article
Al Harigy, L. M., Al Nuaim, H. A., Moradpoor, N., & Tan, Z. (2022). Building Towards Automated Cyberbullying Detection: A Comparative Analysis. Computational Intelligence and Neuroscience, 2022, Article 4794227. https://doi.org/10.1155/2022/4794227

The increased use of social media between digitally anonymous users, sharing their thoughts and opinions, can facilitate participation and collaboration. However, it’s this anonymity feature which gives users freedom of speech and allows them to cond... Read More about Building Towards Automated Cyberbullying Detection: A Comparative Analysis.

Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System   (2021)
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Tan, Z. (2021). Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System  . Ad hoc networks, 120, Article 102590. https://doi.org/10.1016/j.adhoc.2021.102590

Industrial Control Systems (ICS) are hardware, network, and software, upon which a facility depends to allow daily operations to function. In most cases society takes the operation of such systems, for example public transport, tap water or electrici... Read More about Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System  .

Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems (2021)
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Porcel-Bustamante, J. (2021). Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems. Symmetry, 13(3), Article 519. https://doi.org/10.3390/sym13030519

Industrial Control Systems are an essential part of our daily lives and can be found in industries such as oil, utilities, and manufacturing. Rapid growth in technology has introduced industrial components with network capabilities that allow them to... Read More about Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems.

Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset (2020)
Journal Article
Moradpoor, N., & Hall, A. (2020). Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset. International Journal of Cyber Warfare and Terrorism, 10(2), https://doi.org/10.4018/IJCWT.2020040101

An insider threat can take on many forms and fall under different categories. This includes: malicious insider, careless/unaware/uneducated/naïve employee, and third-party contractor. A malicious insider, which can be a criminal agent recruited as a... Read More about Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset.

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset (2020)
Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020). Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, Article 2804291. https://doi.org/10.1155/2020/2804291

One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategies and network topology. On the other hand, detecting a combination of attac... Read More about Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset.

PLC Memory Attack Detection and Response in a Clean Water Supply System (2019)
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019). PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003

Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens tend to take modern-day conveniences such as trains, planes or tap water fo... Read More about PLC Memory Attack Detection and Response in a Clean Water Supply System.

Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases (2018)
Presentation / Conference Contribution
Clavie, B., & Moradpoor, N. (2018, May). Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. Poster presented at 10th ACM Conference on Web Science, Amsterdam

This article explores a perceived bias between two British reddit communities dedicated to discussing British politics.We analyse the popular sources favoured by each community and study semantic indicators that would be indicative of a bias. Althoug... Read More about Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases.

A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks (2017)
Journal Article
Sheykhkanloo, N. M. (2017). A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks. International Journal of Cyber Warfare and Terrorism, 7(2), 16-41. https://doi.org/10.4018/ijcwt.2017040102

Structured Query Language injection (SQLi) attack is a code injection technique where hackers inject SQL commands into a database via a vulnerable web application. Injected SQL commands can modify the back-end SQL database and thus compromise the sec... Read More about A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks.

Introduction to Security Onion (2016)
Presentation / Conference Contribution
Heenan, R., & Moradpoor, N. (2016, May). Introduction to Security Onion. Paper presented at Post Graduate Cyber Security (PGCS) symposium

Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis. This includes... Read More about Introduction to Security Onion.

A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks (2015)
Journal Article
Moradpoor Sheykhkanloo, N. (2015). A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(6), 1443-1453

Thousands of organisations store important and confidential information related to them, their customers, and their business partners in databases all across the world. The stored data ranges from less sensitive (e.g. first name, last name, date of b... Read More about A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks.

PGCert-2014 Academic Paper and Pedagogy model outline (2014)
Presentation / Conference Contribution
Sheykhkanloo, N. M. (2014, October). PGCert-2014 Academic Paper and Pedagogy model outline. Paper presented at Teaching and Learning Enhancement Conference

This paper aims to explore the development of the Abertay Graduate Attributes (AGAs) into one of the computing modules, Issues in Network Security, for third year digital forensic students in school of Science Engineering and Technology (SET) at Univ... Read More about PGCert-2014 Academic Paper and Pedagogy model outline.

IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks (2013)
Journal Article
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013). IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks. Optical Switching and Networking, 10(4), 439-457. https://doi.org/10.1016/j.osn.2013.08.003

Optical and wireless technology integration has been proposed as one of the most promising nominees for the next-generation broadband access networks for quite some time. Integration scheme merges the high-speed and high-capacity of the optical netwo... Read More about IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks.

Interleaved Polling with Adaptive Cycle Time (IPACT) Implementations Using OPNET (2011)
Presentation / Conference Contribution
Moradpoor‫, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2011). Interleaved Polling with Adaptive Cycle Time (IPACT) Implementations Using OPNET.

The Ethernet Passive Optical Network (EPON) has been
considered as one of the most promising candidates for the nextgeneration
optical access solutions. In EPON, which is also
referred as the Time-Division-Multiplexed PON, upstream fibre
is share... Read More about Interleaved Polling with Adaptive Cycle Time (IPACT) Implementations Using OPNET.

Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs) (2010)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., Sivalingam, K., & Madras, I. (2010, December). Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs). Paper presented at OPNETWORK 2010

Ethernet Passive Optical Network (EPON) has been considered for access networks for quite some time to provide high-speed and high-capacity services. As a novel type of network, EPON presents many challenges so one main aim of this paper is to provid... Read More about Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs).

The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System
Presentation / Conference Contribution
Moradpoor, N., Maglaras, L., Abah, E., & Robles-Durazno, A. (2023, June). The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System. Presented at 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Pafos, Cyprus

The protection of Critical National Infrastructure is extremely important due to nations being dependent on their operation and steadiness. Any disturbance to this infrastructure could have a devastating consequence on physical security, economic wel... Read More about The Threat of Adversarial Attacks Against Machine Learning-based Anomaly Detection Approach in a Clean Water Treatment System.