Skip to main content

Research Repository

Advanced Search

All Outputs (47)

Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification (2022)
Journal Article

Machine learning is key for automated detection of malicious network activity to ensure that computer networks and organizations are protected against cyber security attacks. Recently, there has been growing interest in the domain of adversarial mach... Read More about Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification.

Teaching offensive and defensive cyber security in schools using a Raspberry Pi Cyber Range (2022)
Presentation / Conference Contribution

Computer Science as a subject is now appearing in more school curricula for GCSE and A level, with a growing demand for cyber security to be embedded within this teaching. Yet, teachers face challenges with limited time and resource for preparing pra... Read More about Teaching offensive and defensive cyber security in schools using a Raspberry Pi Cyber Range.

Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey (2022)
Journal Article

Machine learning has become widely adopted as a strategy for dealing with a variety of cybersecurity issues, ranging from insider threat detection to intrusion and malware detection. However, by their very nature, machine learning systems can introdu... Read More about Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey.

"Hacking an IoT Home": New opportunities for cyber security education combining remote learning with cyber-physical systems (2021)
Presentation / Conference Contribution

In March 2020, the COVID-19 pandemic led to a dramatic shift in educational practice, whereby home-schooling and remote working became the norm. Many typical schools outreach projects to encourage uptake of learning cyber security skills therefore we... Read More about "Hacking an IoT Home": New opportunities for cyber security education combining remote learning with cyber-physical systems.

Feature vulnerability and robustness assessment against adversarial machine learning attacks (2021)
Presentation / Conference Contribution

Whilst machine learning has been widely adopted for various domains, it is important to consider how such techniques may be susceptible to malicious users through adversarial attacks. Given a trained classifier, a malicious attack may attempt to craf... Read More about Feature vulnerability and robustness assessment against adversarial machine learning attacks.

The visual design of network data to enhance cyber security awareness of the everyday internet user (2020)
Presentation / Conference Contribution

Technology and the use of online services are very prevalent across much of our everyday lives. As our digital interactions continue to grow, there is a need to improve public awareness of the risks to our personal online privacy and security. Design... Read More about The visual design of network data to enhance cyber security awareness of the everyday internet user.

"What did you say?": Extracting unintentional secrets from predictive text learning systems (2020)
Presentation / Conference Contribution

As a primary form of communication, text is used widely in applications including e-mail conversations, mobile text messaging, chatrooms, and forum discussions. Modern systems include facilities such as predictive text, recently implemented using dee... Read More about "What did you say?": Extracting unintentional secrets from predictive text learning systems.

What makes for effective visualisation in cyber situational awareness for non-expert users? (2019)
Presentation / Conference Contribution

© 2019 IEEE. As cyber threats continue to become more prevalent, there is a need to consider how best we can understand the cyber landscape when acting online, especially so for non-expert users. Satellite navigation systems provide the de facto stan... Read More about What makes for effective visualisation in cyber situational awareness for non-expert users?.

Tools and techniques for improving cyber situational awareness of targeted phishing attacks (2019)
Presentation / Conference Contribution

© 2019 IEEE. Phishing attacks continue to be one of the most common attack vectors used online today to deceive users, such that attackers can obtain unauthorised access or steal sensitive information. Phishing campaigns often vary in their level of... Read More about Tools and techniques for improving cyber situational awareness of targeted phishing attacks.