Zobrazeno 1 - 10
of 482
pro vyhledávání: '"Burnap, P"'
While new technologies are expected to revolutionise and become game-changers in improving the efficiencies and practises of our daily lives, it is also critical to investigate and understand the barriers and opportunities faced by their adopters. Su
Externí odkaz:
http://arxiv.org/abs/2402.01670
Topic modelling is a text mining technique for identifying salient themes from a number of documents. The output is commonly a set of topics consisting of isolated tokens that often co-occur in such documents. Manual effort is often associated with i
Externí odkaz:
http://arxiv.org/abs/2401.12990
Analysing malware is important to understand how malicious software works and to develop appropriate detection and prevention methods. Dynamic analysis can overcome evasion techniques commonly used to bypass static analysis and provide insights into
Externí odkaz:
http://arxiv.org/abs/2310.18165
Autor:
Lachlan P. Deimel, Lucile Moynié, Guoxuan Sun, Viliyana Lewis, Abigail Turner, Charles J. Buchanan, Sean A. Burnap, Mikhail Kutuzov, Carolin M. Kobras, Yana Demyanenko, Shabaz Mohammed, Mathew Stracy, Weston B. Struwe, Andrew J. Baldwin, James Naismith, Benjamin G. Davis, Quentin J. Sattentau
Publikováno v:
Nature Communications, Vol 15, Iss 1, Pp 1-12 (2024)
Abstract Many archetypal and emerging classes of small-molecule therapeutics form covalent protein adducts. In vivo, both the resulting conjugates and their off-target side-conjugates have the potential to elicit antibodies, with implications for all
Externí odkaz:
https://doaj.org/article/cfce8b6432ac440bba75dc9b6023863a
Within recent times, cybercriminals have curated a variety of organised and resolute cyber attacks within a range of cyber systems, leading to consequential ramifications to private and governmental institutions. Current security-based automation and
Externí odkaz:
http://arxiv.org/abs/2303.04926
Autor:
Pete Burnap, Eirini Anthi, Philipp Reineckea, Lowri Williams, Fengnian Cao, Rakan Aldmoura, Kevin Jones
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 4, Iss 2, Pp 340-356 (2024)
Traditionally, cyber risk assessment considers system-level risk separately from individual component-level risk, i.e., devices, data, people. This separation prevents effective impact assessment where attack intelligence for a specific device can be
Externí odkaz:
https://doaj.org/article/0dc2cbfb33ea4b73bf773811ee63b3a7
To enable quantitative risk assessment of uncontrollable risk states in complex and coupled IoT systems, a new epistemological equation is designed and tested though comparative and empirical analysis. The comparative analysis is conducted on nationa
Externí odkaz:
http://arxiv.org/abs/2212.08141
Publikováno v:
Frontiers in the Internet of Things, Vol 3 (2024)
Due to an increase in the number of attacks on Industrial Control Systems (ICS), the security of these systems is now of paramount concern. Many solutions have been proposed to defend such systems, particularly those adopting Machine Learning (ML). T
Externí odkaz:
https://doaj.org/article/f07d648b169241e8a12904809d7873bc
Autor:
Lachlan P. Deimel, Lucile Moynié, Guoxuan Sun, Viliyana Lewis, Abigail Turner, Charles J. Buchanan, Sean A. Burnap, Mikhail Kutuzov, Carolin M. Kobras, Yana Demyanenko, Shabaz Mohammed, Mathew Stracy, Weston B. Struwe, Andrew J. Baldwin, James Naismith, Benjamin G. Davis, Quentin J. Sattentau
Publikováno v:
Nature Communications, Vol 15, Iss 1, Pp 1-2 (2024)
Externí odkaz:
https://doaj.org/article/836c4e00b4f84b94874a2256fdbc25ff
Publikováno v:
ACM Transactions on Cyber-Physical Systems 2022
The offshore oil and gas industry has recently been going through a digitalisation drive, with use of `smart' equipment using technologies like the Industrial Internet of Things (IIoT) and Industrial Cyber-Physical Systems (ICPS). There has also been
Externí odkaz:
http://arxiv.org/abs/2202.12179