Skip to main content

Research Repository

Advanced Search

Outputs (412)

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples (2020)
Presentation / Conference Contribution
Babaagba, K., Tan, Z., & Hart, E. (2020, July). Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. Presented at The 2020 IEEE Congress on Evolutionary Computation (IEEE CEC 2020), Glasgow, UK

Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this, we explore whether machine-learning models can be improved by augmenting t... Read More about Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples.

DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption (2020)
Journal Article
Khan, J. S., Boulila, W., Ahmad, J., Rubaiee, S., Rehman, A. U., Alroobaea, R., & Buchanan, W. J. (2020). DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption. IEEE Access, 8, 159732-159744. https://doi.org/10.1109/access.2020.3020917

Visual selective image encryption can both improve the efficiency of the image encryption algorithm and reduce the frequency and severity of attacks against data. In this article, a new form of encryption is proposed based on keys derived from Deoxyri... Read More about DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption.

Evaluation of Ensemble Learning for Android Malware Family Identification (2020)
Journal Article
Wylie, J., Tan, Z., Al-Dubai, A., & Wang, J. (2020). Evaluation of Ensemble Learning for Android Malware Family Identification. Journal of Guangzhou University (Natural Science Edition), 19(4), 28-41

Every Android malware sample generally belongs to a specific family that performs a similar set of actions and characteristics. Having the ability to effectively identify Android malware families can assist in addressing the damage caused by malware.... Read More about Evaluation of Ensemble Learning for Android Malware Family Identification.

Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment (2020)
Journal Article
Zhao, L., Huang, H., Su, C., Ding, S., Huang, H., Tan, Z., & Li, Z. (2021). Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment. IEEE Internet of Things Journal, 8(5), 3211-3223. https://doi.org/10.1109/jiot.2020.3019732

Device-free localization (DFL) locates targets without equipping with wireless devices or tag under the Internet-of-Things (IoT) architectures. As an emerging technology, DFL has spawned extensive applications in IoT environment, such as intrusion de... Read More about Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment.

FPDP: Flexible Privacy-preserving Data Publishing Scheme for Smart Agriculture (2020)
Journal Article
Song, J., Zhong, Q., Su, C., Tan, Z., & Liu, Y. (2021). FPDP: Flexible Privacy-preserving Data Publishing Scheme for Smart Agriculture. IEEE Sensors Journal, 21(16), 17430-17438. https://doi.org/10.1109/JSEN.2020.3017695

Food security is a global concern. Benefit from the development of 5G, IoT is used in agriculture to help the farmers to maintain and improve productivity. It not only enables the customers, both at home and abroad, to become more informed about the... Read More about FPDP: Flexible Privacy-preserving Data Publishing Scheme for Smart Agriculture.

Trust-based Ecosystem to Combat Fake News (2020)
Presentation / Conference Contribution
Jaroucheh, Z., Alissa, M., & Buchanan, W. J. (2020, May). Trust-based Ecosystem to Combat Fake News. Presented at 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada

The growing spread of misinformation and dis-information has grave political, social, ethical, and privacy implications for society. Therefore, there is an ethical need to combat the flow of fake news. This paper attempts to resolves some of the aspe... Read More about Trust-based Ecosystem to Combat Fake News.

Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution (2020)
Journal Article
Qayyum, A., Ahmad, J., Boulila, W., Rubaiee, S., Arshad, Masood, F., Khan, F., & Buchanan, W. J. (2020). Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution. IEEE Access, 8, 140876-140895. https://doi.org/10.1109/access.2020.3012912

The evolution of wireless and mobile communication from 0G to the upcoming 5G gives riseto data sharing through the Internet. This data transfer via open public networks are susceptible to severaltypes of attacks. Encryption is a method that can prot... Read More about Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution.

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment (2020)
Presentation / Conference Contribution
Chacon, J., Mckeown, S., & Macfarlane, R. (2020, June). Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. Presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020), Dublin, Ireland

Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature-and anomaly-based intrusion detection approaches. Deception techniques such as decoy objects, often called honey items, may be deploye... Read More about Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment.

Decentralized Accessibility of e-commerce Products through Blockchain Technology (2020)
Journal Article
Kumar, G., Saha, R., Buchanan, W. J., Geetha, G., Thomas, R., Rai, M. K., Kim, T., & Alazab, M. (2020). Decentralized Accessibility of e-commerce Products through Blockchain Technology. Sustainable Cities and Society, 62, Article 102361. https://doi.org/10.1016/j.scs.2020.102361

A distributed and transparent ledger system is considered for various \textit{e}-commerce products including health medicines, electronics, security appliances, food products and many more to ensure technological and e-commerce sustainability. This s... Read More about Decentralized Accessibility of e-commerce Products through Blockchain Technology.

Testing And Hardening IoT Devices Against the Mirai Botnet (2020)
Presentation / Conference Contribution
Kelly, C., Pitropakis, N., McKeown, S., & Lambrinoudakis, C. (2020, June). Testing And Hardening IoT Devices Against the Mirai Botnet. Presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020), Dublin, Ireland

A large majority of cheap Internet of Things (IoT) devices that arrive brand new, and are configured with out-of-the-box settings, are not being properly secured by the manufactures, and are vulnerable to existing malware lurking on the Internet. Amo... Read More about Testing And Hardening IoT Devices Against the Mirai Botnet.

Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation (2020)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2020). Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation. Forensic Science International: Digital Investigation, 33, Article 300979. https://doi.org/10.1016/j.fsidi.2020.300979

Ransomware continues to grow in both scale, cost, complexity and impact since its initial discovery nearly 30 years ago. Security practitioners are engaged in a continual "arms race" with the ransomware developers attempting to defend their digital i... Read More about Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation.

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure (2020)
Journal Article
Kim, T., Kumar, G., Saha, R., Alazab, M., Buchanan, W. J., Rai, M. K., Geetha, G., & Thomas, R. (2020). CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure. IEEE Access, 8, 94748-94756. https://doi.org/10.1109/access.2020.2995443

The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of problems related to security. Cryptographic processes, more precisely the signatures and the keys, increase and generate an overhead on the network resource... Read More about CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.

A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption (2020)
Journal Article
Kumar, G., Rai, M., Saha, R., Buchanan, W. J., Thomas, R., Geetha, G., Kim, T., & Rodrigues, J. (2020). A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption. IEEE Transactions on Vehicular Technology, 69(7), 7707-7722. https://doi.org/10.1109/tvt.2020.2989817

The present world of vehicle technology is inclined to develop Electric Vehicles (EVs) with various optimized features. These vehicles need frequent charging which takes a longer time to charge up. Therefore, scheduling of vehicles in charging statio... Read More about A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption.

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites (2020)
Presentation / Conference Contribution
Babaagba, K. O., Tan, Z., & Hart, E. (2020, April). Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. Presented at EvoStar 2020, Seville, Spain

In the field of metamorphic malware detection, training a detection model with malware samples that reflect potential mutants of the malware is crucial in developing a model resistant to future attacks. In this paper, we use a Multi-dimensional Archi... Read More about Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites.

Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication (2020)
Journal Article
Aziz Shah, S., Ahmad, J., Tahir, A., Ahmed, F., Russell, G., Shah, S. Y., Buchanan, W., & Abbasi, Q. H. (2020). Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication. Micromachines, 11(4), Article 379. https://doi.org/10.3390/mi11040379

Nano-scaled structures, wireless sensing, wearable devices, and wireless communications systems are anticipated to support the development of new next-generation technologies in the near future. Exponential rise in future Radio-Frequency (RF) sensing... Read More about Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication.

Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things (2020)
Journal Article
Tang, K., Tang, W., Luo, E., Tan, Z., Meng, W., & Qi, L. (2020). Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things. Security and Communication Networks, 2020, Article 7542726. https://doi.org/10.1155/2020/7542726

In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these systems, a primary transmitter (PT) will transmit its sensitive medical informa... Read More about Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things.

Scenario-based creation and digital investigation of ethereum ERC20 tokens (2020)
Journal Article
Dyson, S. F., Buchanan, W. J., & Bell, L. (2020). Scenario-based creation and digital investigation of ethereum ERC20 tokens. Digital Investigation, 32, Article 200894. https://doi.org/10.1016/j.fsidi.2019.200894

This paper examines the Ethereum network in the context of an investigation. The validation of data sources is achieved through different client software on both the Ropsten network and the live block-chain. New scenarios are also used test common pa... Read More about Scenario-based creation and digital investigation of ethereum ERC20 tokens.

An authentication protocol based on chaos and zero knowledge proof (2020)
Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020). An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3

Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocki... Read More about An authentication protocol based on chaos and zero knowledge proof.

Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems (2020)
Journal Article
Mckeown, S., Russell, G., & Leimich, P. (2020). Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems. Journal of Digital Forensics, Security and Law, 14(3), Article 1

A common investigative task is to identify known contraband images on a device, which typically involves calculating cryptographic hashes for all the files on a disk and checking these against a database of known contraband. However, modern drives ar... Read More about Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems.