Skip to main content

Research Repository

Advanced Search

All Outputs (4752)

Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems (2025)
Presentation / Conference Contribution
Korac, S., Maglaras, L., Moradpoor, N., Kioskli, K., Buchanan, W., & Canberk, B. (2025, June). Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems. Presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

Ransomware has been predominantly a threat to Windows systems. But, Linux systems became interesting for cybercriminals and this trend is expected to continue. This endangers IoT ecosystems, whereas many IoT systems are based on Linux (e.g. cloud inf... Read More about Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems.

Exploring DTrace as an Incident Response Tool for Unix Systems (2025)
Presentation / Conference Contribution
Duin, J., Mckeown, S., & Abubakar, M. (2024, June). Exploring DTrace as an Incident Response Tool for Unix Systems. Presented at Cyber Science 2024, Edinburgh, Scotland

Critical National Infrastructure (CNI) is often the target of sophisticated and sustained cyber attacks perpetrated by advanced threat actors with considerable resources. These attacks can lead to interruptions in core services such as energy and wat... Read More about Exploring DTrace as an Incident Response Tool for Unix Systems.

Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0 (2025)
Presentation / Conference Contribution
Connell, J., Kasimatis, D., Papadopoulos, P., Buchanan, W. J., Sarigiannidis, P., & Pitropakis, N. (2024, June). Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0. Presented at International Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2024), Edinburgh, UK

Recent instances have brought to light the inherent vulnerability of the manufacturing sector to cyber security threats, particularly within the food and beverage industries. With the rapid adoption of Industry 4.0, supply chains are exposed to an ex... Read More about Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0.

vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election (2025)
Presentation / Conference Contribution
Elnour, S., Buchanan, W. J., Keating, P., Abubakar, M., & Elnour, S. (2024, June). vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election. Presented at Cyber Science 2024, Edinburgh

The vSPACE experimental proof-of-concept (PoC) on a TrueElect extended protocol presents a novel approach to secure, private, and scalable elections, extending the TrueElect and other related protocols with the integration of Self-Sovereign Identity... Read More about vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election.

Design and Validation of Data Glove with Flex Sensor and 9-Axis IMU to Assess Hand Dexterity (2025)
Presentation / Conference Contribution
Islam, I., Yu, H., & See, C. H. (2025, June). Design and Validation of Data Glove with Flex Sensor and 9-Axis IMU to Assess Hand Dexterity. Presented at 16th International Conference on Software, Knowledge, Information Management & Applications (SKIMA), Paisley, Scotland

Hand-motion detection technology has seen a rise in popularity over the years, due to the advancement of virtual reality (VR) technology and robotics. The medical industry has also shown interest in the technology for its ability to help detect hand... Read More about Design and Validation of Data Glove with Flex Sensor and 9-Axis IMU to Assess Hand Dexterity.

Algorithm Selection with Probing Trajectories: Benchmarking the Choice of Classifier Model (2025)
Presentation / Conference Contribution
Renau, Q., & Hart, E. (2025, April). Algorithm Selection with Probing Trajectories: Benchmarking the Choice of Classifier Model. Presented at EvoSTAR 2025, Trieste, Italy

Recent approaches to training algorithm selectors in the black-box optimisation domain have advocated for the use of training data that is 'algorithm-centric' in order to encapsulate information about how an algorithm performs on an instance, rather... Read More about Algorithm Selection with Probing Trajectories: Benchmarking the Choice of Classifier Model.

Stalling in Space: Attractor Analysis for any Algorithm (2025)
Presentation / Conference Contribution
Thomson, S. L., Renau, Q., Vermetten, D., Hart, E., van Stein, N., & Kononova, A. V. (2025, April). Stalling in Space: Attractor Analysis for any Algorithm. Paper presented at EvoStar 2025, Trieste, Italy

Network-based representations of fitness landscapes have grown in popularity in the past decade; this is probably because of growing interest in explainability for optimisation algorithms. Local optima networks (LONs) have been especially dominant in... Read More about Stalling in Space: Attractor Analysis for any Algorithm.

Into the Black Box: Mining Variable Importance with XAI (2025)
Presentation / Conference Contribution
Hunter, K., Thomson, S. L., & Hart, E. (2025, April). Into the Black Box: Mining Variable Importance with XAI. Presented at Evostar 2025, Trieste, Italy

Recent works have shown that the idea of mining search spaces to train machine learning models can facilitate increasing understanding of variable importance in optimisation problems. However , so far, the problems studied have typically either been... Read More about Into the Black Box: Mining Variable Importance with XAI.

Beyond the Hype: Benchmarking LLM-Evolved Heuristics for Bin Packing (2025)
Presentation / Conference Contribution
Sim, K., Hart, E., & Renau, Q. (2025, April). Beyond the Hype: Benchmarking LLM-Evolved Heuristics for Bin Packing. Presented at EvoSTAR 2025, Trieste, Italy

Coupling Large Language Models (LLMs) with Evolutionary Algorithms has recently shown significant promise as a technique to design new heuristics that outperform existing methods, particularly in the field of combinatorial optimisation. An escalating... Read More about Beyond the Hype: Benchmarking LLM-Evolved Heuristics for Bin Packing.

Promoting digital literacy, online safety, and Information Security Awareness (ISA) in the Scottish public sector: A thematic content analysis of cyber resilience frameworks (2025)
Presentation / Conference Contribution
Ovie, C., Haynes, D., & Cruickshank, P. (2025, June). Promoting digital literacy, online safety, and Information Security Awareness (ISA) in the Scottish public sector: A thematic content analysis of cyber resilience frameworks. Presented at 16th International Conference on Software, Knowledge, Information Management & Applications (SKIMA), Paisley, Scotland

This study investigates the promotion of digital literacy, online safety, and Information Security Awareness (ISA) among Scottish public sector employees by analysing policy frameworks. This paper compares the Scottish Public Sector Cyber Resilience... Read More about Promoting digital literacy, online safety, and Information Security Awareness (ISA) in the Scottish public sector: A thematic content analysis of cyber resilience frameworks.

A novel Ultra-wideband all-metal Vivaldi Antenna Phased Array Feeds Research on FAST Telescope (2025)
Presentation / Conference Contribution
Ma, Y., See, C. H., Yu, J., & Hua, Q. (2025, August). A novel Ultra-wideband all-metal Vivaldi Antenna Phased Array Feeds Research on FAST Telescope. Presented at URSI AP-RASC 2025, Sydney, Australia

An ultra-wideband 7 * 8 Vivaldi antenna array design is simulated and optimized, and a 1 * 7 experimental prototype unit is produced in this paper. In the design process, all-metal Vivaldi antenna structure has been adopted, the feeding part is fed b... Read More about A novel Ultra-wideband all-metal Vivaldi Antenna Phased Array Feeds Research on FAST Telescope.

ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality (2025)
Presentation / Conference Contribution
Alsop, H., Alsop, D., Solomon, J., Aumento, L., Butters, M., Millar, C., Maglaras, L., Yigit, Y., Moradpoor, N., & Canberk, B. (2025, June). ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality. Poster presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

End-to-end encryption (E2EE) ensures that only the intended recipient(s) can read messages. Popular instant messaging (IM) applications such as Signal, WhatsApp, Apple's iMessage, and Telegram claim to offer E2EE. However, client-side scanning (CSS)... Read More about ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality.

Public libraries, participative research and the user-led development of digital literacies (2025)
Presentation / Conference Contribution
Feeney, D., Ryan, F. V., Brazier, D., & Webster, G. (2025, April). Public libraries, participative research and the user-led development of digital literacies. Poster presented at LILAC: The Information Literacy Conference, Cardiff University, Wales

A digital-first world requires digital skillsets adequate to participate in it, meaning that those without such skills risk being left behind in an age of almost-compulsory computing. Deficits in digital literacy competencies thus have detrimental re... Read More about Public libraries, participative research and the user-led development of digital literacies.

Geotechnical seismic isolation technology with rubber- soil trenches for earthquake resilience of existing structures (2025)
Presentation / Conference Contribution
Bernal-Sanchez, J., McDougall, J., Barreto, D., Dimitriadi, V., Tsang, H., Pitilakis, D., Anastasiadis, A., & Leak, J. (2025, May). Geotechnical seismic isolation technology with rubber- soil trenches for earthquake resilience of existing structures. Presented at 2025 International Workshop in Engineering Research Infrastructures for European Synergies (ERIES-IW2025), Lisbon, Portugal

This study investigates the feasibility of using Rubber-Soil mixtures (RSm) trenches as a Geotechnical Seismic Isolation (GSI) technology to mitigate earthquake-induced ground motions and enhance the resilience of existing structures. While previous... Read More about Geotechnical seismic isolation technology with rubber- soil trenches for earthquake resilience of existing structures.

Exploring the relationship between listener receptivity and source of music recommendations (2025)
Presentation / Conference Contribution
Vargheese, J. P., Wilson, M., Stephen, K., Salzano, R., & Brazier, D. (2025, April). Exploring the relationship between listener receptivity and source of music recommendations. Presented at The 47th European Conference on Information Retrieval, Lucca, Tuscany

Music recommender systems are utilised by many music streaming platforms to provide new artist and song recommendations on a person-alised basis to listeners. By applying dynamic data modelling techniques, music recommender systems add to the current... Read More about Exploring the relationship between listener receptivity and source of music recommendations.

Exploring Dataset Diversity For GenAI Image Inpainting Localisation In Digital Forensics (2025)
Presentation / Conference Contribution
Thomson, M., McKeown, S., Macfarlane, R., & Leimich, P. (2025, April). Exploring Dataset Diversity For GenAI Image Inpainting Localisation In Digital Forensics. Presented at The Digital Forensics Research Conference Europe (DFRWS EU 2025) Digital Forensics Doctoral Symposium (DFDS), Brno, Czech Republic

Generative Artificial Intelligence (GenAI) has significantly increased the sophistication and ease of image tampering techniques, posing challenges for digital forensics in identifying manipulated images. A lack of dataset standardisation hinders the... Read More about Exploring Dataset Diversity For GenAI Image Inpainting Localisation In Digital Forensics.

Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware (2025)
Presentation / Conference Contribution
Babaagba, K. O., Wylie, J., Ayodele, M., & Tan, Z. (2024, September). Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware. Presented at 29th European Symposium on Research in Computer Security - SECAI, Bydgoszcz, Poland

The rise of metamorphic malware, a dangerous type of malware, has sparked growing research interest due to its increasing attacks on information assets and computer networks. Sophos’ recent threat report reveals that 94% of malware targeting organiza... Read More about Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware.