Abstract is missing.
- Blockchain as a Tool for Financial Transparency in Development AidAnita Collins, Hamid Jahankhani. [doi]
- Hidden Protocol Strengthening with Random Sentences as Cryptographic NoncesMartin J. Tunnicliffe, Omego Obinna, Eckhard Pflügel. [doi]
- AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising PlatformsJoseph Waldu Woensdregt, Haider M. Al-Khateeb, Gregory Epiphaniou, Hamid Jahankhani. [doi]
- Practical Cybersecurity for Digital TrainsGeorge Copeland, John McCarthy. [doi]
- Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart WorkplaceGabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Gregory Epiphaniou, Jon Cosson, Hamid Jahankhani, Prashant Pillai. [doi]
- Encryption of Text File Using a User Controlled Automatically-Generated KeyHalima Abdul Halime Shnishah, David Mulvaney. [doi]
- A Feasibility Study on Machine Learning Techniques for APT Detection and Protection in VANETsSergio De Abreu. [doi]
- AI: The Cyber-Physical Project Manager and their Digital TwinLiam Odell, Hamid Jahankhani. [doi]
- An Investigatory Project on the Anonymity of Blockchain and CryptocurrenciesJacopo Semeraro. [doi]
- Circle of Trust: A High Volume, Energy Efficient, Stake Blind and High Attack Tolerant Blockchain Consensus ProtocolRahul Ravindran. [doi]
- A Novel Framework for Identification of Critical Business ProcessesYousuf AlBlooshi, Amin Hosseinian Far. [doi]
- Email Verification Fake or Genuine?William Jahankhani, Liang Chen. [doi]
- dAppER: Decentralised Application for Examination ReviewIan Mitchell, Sukhvinder Hara, M. Sheriff. [doi]
- Ransomware Impact to SCADA Systems and its Scope to Critical InfrastructureJaime Ibarra Jimenez, Usman Javed Butt, Anh Do, Hamid Jahankhani, Arshad Jamal. [doi]
- Can Future Smart Cities Powered by 100% Renewables and Made Cyber Secured-A Analytical ApproachMohamed Shaik Honnurvali, Naren Gupta, Keng Goh, Tariq Umar, Adnan Kabbani, Needa Nazecma. [doi]
- An Approach to Identify Risk Based Human Behaviour Profiling within an Office EnvironmentJon Cosson, Haider Alhateeb. [doi]
- Investigating Data Exfiltration in DNS Over HTTPS QueriesDavid A. E. Haddon, Haider Alkhateeb. [doi]
- Study of the Means of Online Payment in the Portuguese PopulationNuno Castro, Henrique M. Dinis Santos, Vítor J. Sá, Maria José Magalhães. [doi]
- Taxonomy of Threat Categorization and Threat Intelligence PlatformAhuokpeme Chibueze Brendan, John McCarthy. [doi]
- Categorization of Threats and their Impacts on Critical National Infrastructure SystemsAnh Do, John McCarthy. [doi]
- Group-Based Key Exchange for Medical IoT Device-to-Device Communication (D2D) Combining Secret Sharing and Physical Layer Key ExchangeUzma Mustafa, Nada Philip. [doi]
- Hybrid Cybersecurity Framework for the Internet of Medical Things (IOMT)Danisa Nkomo, Ray Brown. [doi]
- The Role of Blockchain in Supporting Critical National InfrastructureStefan Kendzierskyj, Hamid Jahankhani. [doi]
- A Novel Privacy Framework for Secure M-Health Applications: The Case of the GDPRUzma Mustafa, Eckhard Pflügel, Nada Philip. [doi]
- Hacking NHS Pacemakers: A Feasibility StudyJake L. Beavers, Michael Faulks, Jims Marchang. [doi]
- A Conceptual Model to Predict Social Engineering VictimsSamar Muslah Albladi, George R. S. Weir. [doi]
- Secure Social Media Spaces for Communities of Vulnerable PeopleElias Pimenidis, Nikolaos Polatidis. [doi]
- AutoEncoded Domains with Mean Activation for DGA Botnet DetectionBinay Dahal, Yoohwan Kim. [doi]
- A Comparative Study of Machine Learning Approaches for Handwriter IdentificationAmal Durou, Somaya Al-Máadeed, Ibrahim Aref, Ahmed Bouridane, Mosa Elbendak. [doi]
- Identifying Vulnerabilities Using Internet-Wide Scanning DataJamie O'Hare, Rich Macfarlane, Owen Lo. [doi]
- A Study on Keyword Analytics as a Precursor to Machine Learning to Evaluate Radicalisation on Social MediaNishan Chelvachandran, Hamid Jahankhani. [doi]
- eHealth: Challenges Far Integrating BlockChain within HealthcareTariq Abdullah, Andrew Jones. [doi]
- "Privacy by Design" Governance Framework to Achieve Privacy Assurance of Personal Health Information (PHI) Processed by IoT-based Telemedicine Devices and Applications Within Healthcare ServicesJaime Ibarra Jimenez, Hamid Jahankhani. [doi]
- Web Accessibility Adoption Framework (WAAF) for Businesses and Web ProfessionalsAsifa Shad, Tariq Abdullah, Usman Butt. [doi]
- Management Versus Technical Perspectives on ThreatsYvan Da Silva Ramos, John McCarthy. [doi]
- Data Mining Metrics to Identify and Evaluate Potential Radicalisation Through Social MediaNishan Chelvachandran, Hamid Jahankhani. [doi]
- Security Perceptions in Cloud-Based e-Govemment ServicesAbeer Alkhwaldi, Mumtaz Kamala, Rami Qahwaji. [doi]
- Ethical Considerations of People with Autistic Spectrum DisorderJohn Goldie, Hamid Jahankhani. [doi]
- Retail Industry Gift Card Hacking Technique ChallengesJabran Riaz. [doi]
- A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon in a Networked Computing EnvironmentThomas Welsh. [doi]
- FoRCE (Forensic Recovery of Cloud Evidence): A Digital Cloud Forensics FrameworkStephen S. Sampana. [doi]
- An Investigation of Using Classification Techniques in Prediction of Type of Targets in Cyber AttacksSina Pournouri, Shahrzad Zargari, Babak Akhgar. [doi]
- Security and Privacy Issues for Business Intelligence in lOTMohan Krishna Kagita. [doi]
- An Examination into the Level of Training, Education and Awareness Among Officers in Tackling Cybercrime within the Metropolitan Police ServiceHoman Forouzan, Hamid Jahankhani. [doi]
- Cybersecurity and Law in Israel - A Case StudyJoseph Zernik. [doi]
- A Study of the UK Undergraduate Computer Science Curriculum: A Vision of CybersecurityRodrigo Ruiz. [doi]
- Preparing 11- 17 Years Old Girls to Become Cyber Security Experts in the FutureGrace Adedotun-Ogundeji, Hamid Jahankhani. [doi]
- BRT - (Blockchain Relevance Theory): A Theoretical Framework for Blockchain & DLT in Cyber Security Using CISv7 ControlsBharat Manya. [doi]
- Behavioural Biometrics Authentication Tested Using EyeWriter TechnologyBobby L. Tait. [doi]
- Comparative Analysis of a Deep Convolutional Neural Network for Source Camera IdentificationFarah Ahmed, Fouad Khelifi, Ashref Lawgaly, Ahmed Bouridane. [doi]
- Blockchain as an Efficient and Alternative Mechanism for Strengthening and Securing the Privacy of Healthcare Patient and Clinical Research DataStefan Kendzierskyj, Hamid Jahankhani. [doi]
- Next-Generation Digital Forensics: Challenges and Future ParadigmsReza Montasari, Richard Hill. [doi]
- The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc NetworkFiras Hazzaa, Sufian Yousef, Nada H. Ali, Erika Sanchez. [doi]
- The Internet of Things: Implications for Consumer Privacy & SecuritySherese Bishop. [doi]
- Ransomware Threat and its Impact on SCADAUsman Javed Butt, Maysam Abbod, Anzor Lors, Hamid Jahankhani, Arshad Jamal, Arvind Kumar. [doi]