Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges S Parkinson, P Ward, K Wilson, J Miller IEEE Transactions on Intelligent Transportation Systems, 2017 | 604 | 2017 |
Fog computing security: a review of current applications and security solutions S Khan, S Parkinson, Y Qin Journal of Cloud Computing 6, 1-22, 2017 | 500 | 2017 |
Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach N Liu, A Nikitas, S Parkinson Transportation research part F: traffic psychology and behaviour 75, 66-86, 2020 | 180 | 2020 |
Biometric systems utilising health data from wearable devices: applications and future challenges in computer security S Khan, S Parkinson, L Grant, N Liu, S Mcguire ACM Computing Surveys (CSUR) 53 (4), 1-29, 2020 | 96 | 2020 |
Review into state of the art of vulnerability assessment using artificial intelligence S Khan, S Parkinson Guide to Vulnerability Analysis for Computer Networks and Systems: An …, 2018 | 56 | 2018 |
TrustVote: Privacy-preserving node ranking in vehicular networks MA Azad, S Bag, S Parkinson, F Hao IEEE Internet of Things Journal 6 (4), 5878-5891, 2018 | 52 | 2018 |
Auditing file system permissions using association rule mining S Parkinson, V Somaraki, R Ward Expert Systems with Applications 55, 274-283, 2016 | 45 | 2016 |
The application of automated planning to machine tool calibration S Parkinson, A Longstaff, A Crampton, P Gregory Proceedings of the International Conference on Automated Planning and …, 2012 | 39 | 2012 |
Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach S Khan, S Parkinson Expert Systems with Applications 113, 116-127, 2018 | 37 | 2018 |
Rapid Evidence Assessment: Quantifying Online Facilitated Child Sexual Abuse: Report for the Independent Inquiry into Child Sexual Abuse N Wager, B Gallagher, R Armitage, M Rogerson, K Christmann, ... Independent Inquiry into Child Sexual Abuse, 2018 | 37 | 2018 |
Analysis of security and privacy challenges for DNA-genomics applications and databases S Arshad, J Arshad, MM Khan, S Parkinson Journal of Biomedical Informatics 119, 103815, 2021 | 36 | 2021 |
A survey on the detection and impacts of deepfakes in visual, audio, and textual formats R Mubarak, T Alsboui, O Alshaikh, I Inuwa-Dutse, S Khan, S Parkinson Ieee Access 11, 144497-144529, 2023 | 35 | 2023 |
A survey on empirical security analysis of access-control systems: a real-world perspective S Parkinson, S Khan ACM Computing Surveys 55 (6), 1-28, 2022 | 34 | 2022 |
Knowledge Engineering Tools in Planning: State-of-the-art and Future Challenges MMS Shah, L Chrpa, F Jimoh, D Kitchin, TL McCluskey, S Parkinson, ... Knowledge Engineering for Planning and Scheduling, 53, 2013 | 33 | 2013 |
Password policy characteristics and keystroke biometric authentication S Parkinson, S Khan, A Crampton, Q Xu, W Xie, N Liu, K Dakin IET Biometrics 10 (2), 163-178, 2021 | 29 | 2021 |
Digital forensics: challenges and opportunities for future studies R Montasari, R Hill, S Parkinson, P Peltola, A Hosseinian-Far, ... International Journal of Organizational and Collective Intelligence (IJOCI …, 2020 | 29 | 2020 |
Efficient computation of distance labeling for decremental updates in large dynamic graphs Y Qin, QZ Sheng, NJG Falkner, L Yao, S Parkinson World Wide Web 20, 915-937, 2017 | 28 | 2017 |
Discovering and utilising expert knowledge from security event logs S Khan, S Parkinson Journal of Information Security and Applications 48, 102375, 2019 | 27 | 2019 |
The deceitful connected and autonomous vehicle: defining the concept, contextualising its dimensions and proposing mitigation policies A Nikitas, S Parkinson, M Vallati Transport policy 122, 1-10, 2022 | 26 | 2022 |
Built environment attributes and crime: an automated machine learning approach K Dakin, W Xie, S Parkinson, S Khan, L Monchuk, K Pease Crime Science 9, 1-17, 2020 | 26 | 2020 |