[HTML][HTML] Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach

O Alshaikh, S Parkinson, S Khan - Computers & Security, 2024 - Elsevier
Abstract Machine learning (ML) utilisation has achieved a vast global impact. This is evident
in the cybersecurity sector, where ML has wide-ranging applications, such as identifying and …

[HTML][HTML] Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach

S Khan, S Parkinson, C Murphy - Expert Systems with Applications, 2023 - Elsevier
Event logs are a powerful source of digital evidence as they contain detailed information
about activities performed on a computer. Forensic investigation of the event logs is a …

[HTML][HTML] Quantifying the spatiotemporal characteristics of multi-dimensional karst ecosystem stability with Landsat time series in southwest China

Z Huang, X Liu, Q Yang, Y Meng, L Zhu… - International Journal of …, 2021 - Elsevier
Large-scale quantification of ecosystem stability in multiple dimensions is crucial to
understanding underlying ecological processes and informing ecological management …

The Emerging Challenges of Wearable Biometric Cryptosystems

KA Ajlan, T Alsboui, O Alshaikh, I Inuwa-Dute, S Khan… - Cryptography, 2024 - mdpi.com
Cryptographic key generation and data encryption and decryption using wearable biometric
technologies is an emerging research area with significant potential for authentication and …

Built environment attributes and crime: an automated machine learning approach

K Dakin, W **e, S Parkinson, S Khan, L Monchuk… - Crime Science, 2020 - Springer
This paper presents the development of an automated machine learning approach to gain
an understanding of the built environment and its relationship to crime. This involves the …

Optimization of rural settlement distributions based on the ecological security pattern: A case study of Da'an City in Jilin Province of China

J Yin, H Li, D Wang, S Liu - Chinese Geographical Science, 2020 - Springer
Following the trends of Chinese rural transformation development, and the sustainable
development goals for resources and environment, reasonable arranging the potential …

An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks

M Roopak, S Parkinson, GY Tian, Y Ran, S Khan… - IET …, 2024 - Wiley Online Library
The authors introduce an unsupervised Intrusion Detection System designed to detect zero‐
day distributed denial of service (DDoS) attacks in Internet of Things (IoT) networks. This …

Identifying high-risk over-entitlement in access control policies using fuzzy logic

S Parkinson, S Khana - Cybersecurity, 2022 - Springer
Analysing access control policies is an essential process for ensuring over-prescribed
permissions are identified and removed. This is a time-consuming and knowledge-intensive …

Using computational systematic social observation to identify environmental correlates of fear of crime

R Solymosi, S Parkinson, A Pődör, S Khan, M Khan - Crime Science, 2024 - Springer
There is great importance in understanding whether people perceive an environment as
safe or unsafe. Perceptions are influenced by the built environment, and through better …

Mechanism the land subsidence from multiple spatial scales and hydrogeological conditions− A case study in Bei**g-Tian**-Heibei, China.

J Han, H Gong, L Guo, X Li, L Zhu, B Chen… - Journal of Hydrology …, 2023 - Elsevier
Abstract Study region Bei**g-Tian**-Hebei (BTH) region, China Study focus BTH has long
been suffering from severe and uneven land subsidence. Finding out the spatial evolution of …