Skip to main content

Research Repository

Advanced Search

Outputs (23)

Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain (2023)
Presentation / Conference Contribution
Moradpoor, N., Barati, M., Robles-Durazno, A., Abah, E., & McWhinnie, J. (2023). Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain. In Proceedings of the International Conference on Cybersecurity, Situational Awaren

The protection of critical national infrastructures such as drinking water, gas, and electricity is extremely important as nations are dependent on their operation and steadiness. However, despite the value of such utilities their security issues hav... Read More about Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain.

Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets (2022)
Presentation / Conference Contribution
Alharigy, L. M., Al-Nuaim, H. A., & Moradpoor, N. (2022). Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets. In 2022 14th International Conference on Computational Intelligence and Communica

Cyberbullying is a widespread problem that has only increased in recent years due to the massive dependence on social media. Although, there are many approaches for detecting cyberbullying they still need to be improved upon for more accurate detecti... Read More about Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets.

VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems (2021)
Presentation / Conference Contribution
Robles Durazno, A., Moradpoor, N., McWhinnie, J., & Porcel-Bustamante, J. (2021). VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems. In 2021 14th International Conference on Security of Information and N

The rapid development of technology during the last decades has led to the integration of the network capabilities in the devices that are essential in the operation of Industrial Control Systems (ICS). Consequently, the attack surface of these asset... Read More about VNWTS: A Virtual Water Chlorination Process for Cybersecurity Analysis of Industrial Control Systems.

Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles (2021)
Presentation / Conference Contribution
Cutajar, O., Moradpoor, N., & Jaroucheh, Z. (2021). Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.969932

In a perfect world, coordination and cooperation across distributed autonomous systems would be a trivial task. However, incomplete information, malicious actors and real-world conditions can provide challenges which bring the trust-worthiness of par... Read More about Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles.

Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features (2020)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2020, July). Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features. Presented at International Joint Conference o

Industrial Control Systems have become a priority domain for cybersecurity practitioners due to the number of cyber-attacks against those systems has increased over the past few years. This paper proposes a real-time anomaly intrusion detector for a... Read More about Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features.

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels (2019)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2019). WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels. In Proceedings of 15th IEEE International Conference on Control & Automati

Industrial Control Systems (ICS) have faced a growing number of threats over the past few years. Reliance on isolated controls networks or air-gapped computers is no longer a feasible solution when it comes to protecting ICS. It is because the new ar... Read More about WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels.

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019). Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. In CITT 2018 (91-103). https://doi.org/10.1007/978-3-030-05532-5_7

Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, such as programmable logic controllers (PLC), networking devices, and actua... Read More about Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System.

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018). A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. In Proceedings of the IEEE International Conference on Cyber Secu

Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development over time have improved their components including operating system platforms... Read More about A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things (2018)
Presentation / Conference Contribution
Semedo, F., Moradpoor, N., & Rafiq, M. (2018, September). Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. Presented at 11th International Conference On Security Of Information and Networks, Cardiff, United Kingdom

The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Positioning devices (GPS) and Local Area Network (LAN) interfaces. Security is by f... Read More about Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things.

Employing machine learning techniques for detection and classification of phishing emails (2018)
Presentation / Conference Contribution
Moradpoor, N., Clavie, B., & Buchanan, B. (2018). Employing machine learning techniques for detection and classification of phishing emails. In Proceedings of the IEEE Technically Sponsored Computing Conference 2017. https://doi.org/10.1109/SAI.2017.8252

A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or downloads malicious software through clicking on malicious links contained i... Read More about Employing machine learning techniques for detection and classification of phishing emails.

Insider threat detection using principal component analysis and self-organising map (2017)
Presentation / Conference Contribution
Moradpoor, N., Brown, M., & Russell, G. (2017). Insider threat detection using principal component analysis and self-organising map. In 10th International Conference on Security of Information and Networks (SIN 2017). https://doi.org/10.1145/3136825.3136

An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data which can damage the employer's marketing position and reputation. In additio... Read More about Insider threat detection using principal component analysis and self-organising map.

A survey of Intrusion Detection System technologies (2016)
Presentation / Conference Contribution
Heenan, R., & Moradpoor, N. (2016). A survey of Intrusion Detection System technologies. In PGCS 2016: The First Post Graduate Cyber Security Symposium – The Cyber Academy

This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting S... Read More about A survey of Intrusion Detection System technologies.

Introduction to Security Onion (2016)
Presentation / Conference Contribution
Heenan, R., & Moradpoor, N. (2016, May). Introduction to Security Onion. Paper presented at Post Graduate Cyber Security (PGCS) symposium

Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis. This includes... Read More about Introduction to Security Onion.

SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques (2015)
Presentation / Conference Contribution
Sheykhkanloo, N. M. (2015). SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques. In SIN '15 Proceedings of the 8th International Conference on Security of Information and Networks. https://doi.org/10.1145/

Structured Query Language injection (SQLi) attack is a code injection technique where malicious SQL statements are inserted into a given SQL database by simply using a web browser. Injected SQL commands can alter the database and thus compromise the... Read More about SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques.

Employing Neural Networks for the Detection of SQL Injection Attack (2014)
Presentation / Conference Contribution
Sheykhkanloo, N. M. (2014, September). Employing Neural Networks for the Detection of SQL Injection Attack. Presented at 7th International Conference on Security of Information and Networks - SIN '14, Glasgow, UK

Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into the SQL database by simply using web browsers. SQLI attack can cause severe damages on a given SQL database such as lo... Read More about Employing Neural Networks for the Detection of SQL Injection Attack.

PGCert-2014 Academic Paper and Pedagogy model outline (2014)
Presentation / Conference Contribution
Sheykhkanloo, N. M. (2014, October). PGCert-2014 Academic Paper and Pedagogy model outline. Paper presented at Teaching and Learning Enhancement Conference

This paper aims to explore the development of the Abertay Graduate Attributes (AGAs) into one of the computing modules, Issues in Network Security, for third year digital forensic students in school of Science Engineering and Technology (SET) at Univ... Read More about PGCert-2014 Academic Paper and Pedagogy model outline.

A semi-independent structure for the architectural design of the converged scenario for integrated hybrid PON with wireless technologies for next generation broadband access networks (2014)
Presentation / Conference Contribution
Moradpoor, N. (2013, October). A semi-independent structure for the architectural design of the converged scenario for integrated hybrid PON with wireless technologies for next generation broadband access networks. Presented at 2013 2nd International Work

Optical and wireless technology integration schemes merge the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of wireless counterparts for Subscriber Stations (SSs). It is also financially v... Read More about A semi-independent structure for the architectural design of the converged scenario for integrated hybrid PON with wireless technologies for next generation broadband access networks.

A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks (2013)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013, September). A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks. Pre

Optical and wireless integration scheme merges the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of the wireless counterparts for the Subscriber Stations (SSs). It is also financially viab... Read More about A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks.

An Inter-channel and Intra-channel Dynamic Wavelength/Bandwidth Allocation Algorithm for Integrated Hybrid PON with Wireless Technologies for Next Generation Broadband Access Networks (2013)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., Mcclean, S., & Scotney, B. (2013, August). An Inter-channel and Intra-channel Dynamic Wavelength/Bandwidth Allocation Algorithm for Integrated Hybrid PON with Wireless Technologies for Next Generation Broadband Access Networks. Pr

Optical and wireless technology integration schemes merge the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of wireless counterparts for Subscriber Stations (SSs). It is also financially v... Read More about An Inter-channel and Intra-channel Dynamic Wavelength/Bandwidth Allocation Algorithm for Integrated Hybrid PON with Wireless Technologies for Next Generation Broadband Access Networks.

Interleaved Polling with Adaptive Cycle Time (IPACT) Implementations Using OPNET (2011)
Presentation / Conference Contribution
Moradpoor‫, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2011). Interleaved Polling with Adaptive Cycle Time (IPACT) Implementations Using OPNET.

The Ethernet Passive Optical Network (EPON) has been considered as one of the most promising candidates for the nextgeneration optical access solutions. In EPON, which is also referred as the Time-Division-Multiplexed PON, upstream fibre is share... Read More about Interleaved Polling with Adaptive Cycle Time (IPACT) Implementations Using OPNET.

Hybrid optical and wireless technology integrations for next generation broadband access networks (2011)
Presentation / Conference Contribution
Owusu, G., Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2011). Hybrid optical and wireless technology integrations for next generation broadband access networks. In 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM 2011)

Hybrid optical and wireless technology integrations have been considered as one of the most promising candidates for the next generation broadband access networks for quite some time. The integration scheme provides the bandwidth advantages of the op... Read More about Hybrid optical and wireless technology integrations for next generation broadband access networks.

Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs) (2010)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., Sivalingam, K., & Madras, I. (2010, December). Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs). Paper presented at OPNETWORK 2010

Ethernet Passive Optical Network (EPON) has been considered for access networks for quite some time to provide high-speed and high-capacity services. As a novel type of network, EPON presents many challenges so one main aim of this paper is to provid... Read More about Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs).

Real-Time Data Analytics in Support of Network Resource Management Protocols (2009)
Presentation / Conference Contribution
Moradpoor‫, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2009). Real-Time Data Analytics in Support of Network Resource Management Protocols. In Proceedings of 10th PGNET

Communications Networks Resource Management (RM) functions such as dynamic and static resource usage monitoring, real time resource reservation as well as advance resource reservation have been widely studied in the past few years. Research has been... Read More about Real-Time Data Analytics in Support of Network Resource Management Protocols.