Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Items where Author is "Shone, N"

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | No Grouping
Number of items: 23.

Article

Nguyen, VQ, Ngo, LT, Nguyen, LM, Nguyen, VH and Shone, N (2024) Deep clustering hierarchical latent representation for anomaly-based cyber-attack detection. Knowledge-Based Systems, 301. pp. 1-20. ISSN 0950-7051

Nguyen, MT, Nguyen, VH and Shone, N (2023) Using deep graph learning to improve dynamic analysis-based malware detection in PE Files. Journal of Computer Virology and Hacking Techniques.

Hurst, W, Tekinerdogan, B, Alskaif, T, Boddy, A and Shone, N (2022) Securing electronic health records against insider-threats: A supervised machine learning approach. Smart Health, 26. p. 100354. ISSN 2352-6483

Edussuriya, C, Vithanage, K, Bandara, N, Alawatugoda, J, Sandirigama, M, Jayasinghe, U, Shone, N and Lee, GM (2020) BAT: block analytics tool integrated with blockchain based IoT platform. Electronics, 9 (9). ISSN 2079-9292

Hurst, W, Montañez, CAC and Shone, N (2020) Time-Pattern Profiling from Smart Meter Data to Detect Outliers in Energy Consumption. IoT, 1 (1). pp. 92-108. ISSN 2624-831X

Hurst, W, Curbelo Montañez, CA, Shone, N and Al-Jumeily, D (2020) An Ensemble Detection Model using Multinomial Classification of Stochastic Gas Smart Meter Data to Improve Wellbeing Monitoring in Smart Cities. IEEE Access, 8. pp. 7877-7898. ISSN 2169-3536

Shone, N, Tran Nguyen, N, Vu Dinh, P and Shi, Q (2018) A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2 (1). ISSN 2471-285X

Hurst, W, Shone, N, Shi, Q and Bazli, B (2017) Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research. International Journal On Advances in Security, 10 (1&2). pp. 114-125. ISSN 1942-2636

Conference or Workshop Item

Nguyen, VQ, Ngo, TL, Nguyen, LM, Nguyen, VH and Shone, N (2024) Deep Nested Clustering Auto-Encoder for Anomaly-Based Network Intrusion Detection. In: 2023 RIVF International Conference on Computing and Communication Technologies (RIVF) . pp. 289-294. (2023 RIVF IEEE International Conference on Computing and Communication Technologies, 23-25th December 2023, Hanoi, Vietnam).

Ninh, TP, Hung Nguyen, V, Shone, N and Babenko, M (2022) Function Exclusion in Automated Security Patch Testing Using Chopped Symbolic Execution. In: 2021 18th NAFOSTED Conference on Information and Computer Science (NICS) . (2021 8th NAFOSTED Conference on Information and Computer Science (NICS), 21 December 2021 - 22 December 2021, Hanoi, Vietnam).

Quan, NV, Nguyen, VH, Cao, VL, Le-Khac, N-A and Shone, N (2022) A Robust PCA Feature Selection to Assist Deep Clustering Autoencoder-Based Network Anomaly Detection. In: 20218th NAFOSTED Conference on Information and Computer Science (NICS) . (2021 8th NAFOSTED Conference on Information and Computer Science (NICS) (NICS’21), 21 December 2021 - 22 December 2021, Hanoi, Vietnam).

Vu Dinh, P, Shone, N, Phan Huy, D, Shi, Q, Nguyen Viet, H and Tran Nguyen, N (2019) Behaviour-aware Malware Classification: Dynamic Feature Selection. In: 2019 11th International Conference on Knowledge and Systems Engineering (KSE) . (11th International Conference on Knowledge and Systems Engineering (KSE), 24 October 2019 - 26 October 2019, Da Namg, Vietnam).

Hurst, W, Shone, N and Tully, D (2019) Investigations into the Development of a Knowledge Transfer Platform for Business. In: 2019 5th International Conference on Information Management (ICIM) . (The 5th IEEE International Conference on Information Management (ICIM2019), 24 March 2019 - 28 March 2019, Cambridge).

Nguyen Viet, H, Nguyen Van, Q, Thi Trang, LL and Shone, N (2018) Using Deep Learning Model for Network Scanning Detection. In: Proceedings of the 4th International Conference on Frontiers of Educational Technologies (18). pp. 117-121. (ICFET '18 Proceedings of the 4th International Conference on Frontiers of Educational Technologies, 25 June 2018 - 27 June 2018, Moscow, Russian Federation).

Vu Dinh, P, Tran Nguyen, N, Shone, N, Mac Dermott, AM and Shi, Q (2017) Deep Learning Combined with De - noising Data for Network Intrusion Detection. In: 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES) . (Intelligent and Evolutionary Systems (IES 2017), 15 November 2017 - 17 November 2017, Hanoi, Vietnam).

Hurst, W, Shone, N, El Rhalibi, A, Happe, A, Kotze, B and Duncan, B (2017) Advancing the Micro-CI Testbed for IoT Cyber-Security Research and Education. In: Think Mind . pp. 129-134. (CLOUD COMPUTING 2017 : The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 19 February 2017 - 23 February 2017, Athens, Greece).

Hurst, W, Shone, N, Shi, Q and Bazli, B (2016) MICRO-CI: A Testbed for Cyber-Security Research. In: EMERGING 2016: The Eighth International Conference on Emerging Networks and Systems Intelligence . pp. 17-22. (The Eighth International Conference on Emerging Networks and Systems Intelligence, 09 October 2016 - 12 October 2016, Venice, Italy).

Panton, T, Llewellyn-Jones, D, Shone, N and Hashem Eiza, M (2016) Secure Proximity-Based Identity Pairing using an Untrusted Signalling Service. In: 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) . (The 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), 09 January 2016 - 12 January 2016, Las Vegas, US).

Hashem Eiza, M, Randles, M, Johnson, P, Shone, N, Pang, J and Bhih, A (2015) Rail Internet of Things: An Architectural Platform and Assured Requirements Model. In: 15th IEEE International Conference on Computer and Information Technology (CIT-2015) . pp. 364-370. (15th IEEE International Conference on Computer and Information Technology (CIT-2015), 26th - 28th October 2015, Liverpool).

Shone, N, Dobbins, C, Hurst, W and Shi, Q (2015) Digital Memories Based Mobile User Authentication for IoT. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) . pp. 1796-1802. (13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15), 26th - 28th October 2015, Liverpool, UK).

Hurst, W, Shone, N and Monnet, Q (2015) Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures. In: 13th IEEE International Conference on Dependable, Autonomic and Secure Computing . pp. 1697-1702. (13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015), 26 October 2015 - 28 October 2015, Liverpool, UK).

Latham, K, Hurst, W, Shone, N, El Rhalibi, A and Pan, Z A Case Study on the Advantages of 3D Walkthroughs over Photo Stitching Techniques. In: IEEE International Conference on Virtual Reality and Visualization (ICVRV 2016), 24 September 2016 - 26 September 2016, Hangzhou, China. (Unpublished)

Thesis

Shone, N (2014) Detecting Misbehaviour in a Complex System-of-Systems Environment. Doctoral thesis, Liverpool John Moores University.

This list was generated on Tue Nov 26 20:46:11 2024 UTC.