A generic model of 1-60 GHz radio propagation through vegetation-final report NC Rogers, A Seville, J Richter, D Ndzi, N Savage, R Caldeirinha, ... Radio Agency, UK 152, 152, 2002 | 174 | 2002 |
The tor dark net GH Owenson, NJ Savage | 128 | 2015 |
Motivation of engineering students in higher education N Savage, R Birch, E Noussi Engineering education 6 (2), 39-46, 2011 | 128 | 2011 |
Radio wave propagation through vegetation: Factors influencing signal attenuation N Savage, D Ndzi, A Seville, E Vilar, J Austin Radio Science 38 (5), 9-1-9-14, 2003 | 114 | 2003 |
Deep learning based fusion approach for hate speech detection Y Zhou, Y Yang, H Liu, X Liu, N Savage IEEE Access 8, 128923-128929, 2020 | 107 | 2020 |
Empirical analysis of tor hidden services G Owen, N Savage IET Information Security 10 (3), 113-118, 2016 | 97 | 2016 |
Energy efficiency in underwater sensor networks: A research review K Ovaliadis, N Savage, V Kanakaris Journal of Engineering Science and Technology Review (JESTR) 3 (1), 151-156, 2010 | 66 | 2010 |
A generic narrowband model for radiowave propagation through vegetation J Richter, RFS Caldeirinha, MO Al-Nuaimi, A Seville, NC Rogers, ... 2005 IEEE 61st Vehicular Technology Conference 1, 39-43, 2005 | 48 | 2005 |
Cyberthreat Hunting-Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules N Naik, P Jenkins, N Savage, L Yang 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019 | 39 | 2019 |
Airborne measurements of trace gases and aerosols over the London metropolitan region GR McMeeking, M Bart, P Chazette, JM Haywood, JR Hopkins, ... Atmospheric Chemistry and Physics 12 (11), 5163-5187, 2012 | 36 | 2012 |
Big data security analysis approach using computational intelligence techniques in R for desktop users N Naik, P Jenkins, N Savage, V Katos 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016 | 30 | 2016 |
Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On, K Naik, ... Complex & Intelligent Systems 7, 687-702, 2021 | 29 | 2021 |
A novel approach to detect phishing attacks using binary visualisation and machine learning L Barlow, G Bendiab, S Shiaeles, N Savage 2020 IEEE World Congress on Services (SERVICES), 177-182, 2020 | 29 | 2020 |
A ransomware detection method using fuzzy hashing for mitigating the risk of occlusion of information systems N Naik, P Jenkins, N Savage 2019 international symposium on systems engineering (ISSE), 1-6, 2019 | 29 | 2019 |
Cyberthreat hunting-part 2: Tracking ransomware threat actors using fuzzy hashing and fuzzy c-means clustering N Naik, P Jenkins, N Savage, L Yang 2019 IEEE international conference on fuzzy systems (FUZZ-IEEE), 1-6, 2019 | 29 | 2019 |
Fuzzy-import hashing: A static analysis technique for malware detection N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On Forensic Science International: Digital Investigation 37, 301139, 2021 | 28 | 2021 |
Fuzzy-Import Hashing: A malware analysis approach N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-8, 2020 | 26 | 2020 |
Mitigating insider threats using bio-inspired models A Nicolaou, S Shiaeles, N Savage Applied Sciences 10 (15), 5046, 2020 | 25 | 2020 |
A computational intelligence enabled honeypot for chasing ghosts in the wires N Naik, P Jenkins, N Savage, L Yang Complex & Intelligent Systems 7 (1), 477-494, 2021 | 24 | 2021 |
Embedding fuzzy rules with YARA rules for performance optimisation of malware analysis N Naik, P Jenkins, N Savage, L Yang, K Naik, J Song 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-7, 2020 | 24 | 2020 |