Segui
Nick Savage
Nick Savage
University of Portsmouth
Email verificata su tryhackme.com
Titolo
Citata da
Citata da
Anno
A generic model of 1-60 GHz radio propagation through vegetation-final report
NC Rogers, A Seville, J Richter, D Ndzi, N Savage, R Caldeirinha, ...
Radio Agency, UK 152, 152, 2002
1742002
The tor dark net
GH Owenson, NJ Savage
1282015
Motivation of engineering students in higher education
N Savage, R Birch, E Noussi
Engineering education 6 (2), 39-46, 2011
1282011
Radio wave propagation through vegetation: Factors influencing signal attenuation
N Savage, D Ndzi, A Seville, E Vilar, J Austin
Radio Science 38 (5), 9-1-9-14, 2003
1142003
Deep learning based fusion approach for hate speech detection
Y Zhou, Y Yang, H Liu, X Liu, N Savage
IEEE Access 8, 128923-128929, 2020
1072020
Empirical analysis of tor hidden services
G Owen, N Savage
IET Information Security 10 (3), 113-118, 2016
972016
Energy efficiency in underwater sensor networks: A research review
K Ovaliadis, N Savage, V Kanakaris
Journal of Engineering Science and Technology Review (JESTR) 3 (1), 151-156, 2010
662010
A generic narrowband model for radiowave propagation through vegetation
J Richter, RFS Caldeirinha, MO Al-Nuaimi, A Seville, NC Rogers, ...
2005 IEEE 61st Vehicular Technology Conference 1, 39-43, 2005
482005
Cyberthreat Hunting-Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019
392019
Airborne measurements of trace gases and aerosols over the London metropolitan region
GR McMeeking, M Bart, P Chazette, JM Haywood, JR Hopkins, ...
Atmospheric Chemistry and Physics 12 (11), 5163-5187, 2012
362012
Big data security analysis approach using computational intelligence techniques in R for desktop users
N Naik, P Jenkins, N Savage, V Katos
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
302016
Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis
N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On, K Naik, ...
Complex & Intelligent Systems 7, 687-702, 2021
292021
A novel approach to detect phishing attacks using binary visualisation and machine learning
L Barlow, G Bendiab, S Shiaeles, N Savage
2020 IEEE World Congress on Services (SERVICES), 177-182, 2020
292020
A ransomware detection method using fuzzy hashing for mitigating the risk of occlusion of information systems
N Naik, P Jenkins, N Savage
2019 international symposium on systems engineering (ISSE), 1-6, 2019
292019
Cyberthreat hunting-part 2: Tracking ransomware threat actors using fuzzy hashing and fuzzy c-means clustering
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE international conference on fuzzy systems (FUZZ-IEEE), 1-6, 2019
292019
Fuzzy-import hashing: A static analysis technique for malware detection
N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On
Forensic Science International: Digital Investigation 37, 301139, 2021
282021
Fuzzy-Import Hashing: A malware analysis approach
N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On
2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-8, 2020
262020
Mitigating insider threats using bio-inspired models
A Nicolaou, S Shiaeles, N Savage
Applied Sciences 10 (15), 5046, 2020
252020
A computational intelligence enabled honeypot for chasing ghosts in the wires
N Naik, P Jenkins, N Savage, L Yang
Complex & Intelligent Systems 7 (1), 477-494, 2021
242021
Embedding fuzzy rules with YARA rules for performance optimisation of malware analysis
N Naik, P Jenkins, N Savage, L Yang, K Naik, J Song
2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-7, 2020
242020
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20