Skip to main content

Research Repository

Advanced Search

All Outputs (2)

Efficient and interpretable real-time malware detection using random-forest (2019)
Conference Proceeding
Mills, A., Spyridopoulos, T., & Legg, P. (2019). Efficient and interpretable real-time malware detection using random-forest. . https://doi.org/10.1109/CyberSA.2019.8899533

© 2019 IEEE. Malicious software, often described as malware, is one of the greatest threats to modern computer systems, and attackers continue to develop more sophisticated methods to access and compromise data and resources. Machine learning methods... Read More about Efficient and interpretable real-time malware detection using random-forest.

A holistic approach for cyber assurance of critical infrastructure with the viable system model (2014)
Conference Proceeding
Spyridopoulos, T., Topa, I. A., Tryfonas, T., & Karyda, M. (2014). A holistic approach for cyber assurance of critical infrastructure with the viable system model. In ICT Systems Security and Privacy Protection (438-445). https://doi.org/10.1007/978-3-642-55415-5_37

© IFIP International Federation for Information Processing 2014. Industrial Control Systems (ICSs) are of the most important components of National Critical Infrastructure. They can provide control capabilities in complex systems of critical importan... Read More about A holistic approach for cyber assurance of critical infrastructure with the viable system model.