Zobrazeno 1 - 10
of 164
pro vyhledávání: '"McAuley, Derek"'
Autor:
Perez, Iker, Wong, Jason, Skalski, Piotr, Burrell, Stuart, Mortier, Richard, McAuley, Derek, Sutton, David
Global financial crime activity is driving demand for machine learning solutions in fraud prevention. However, prevention systems are commonly serviced to financial institutions in isolation, and few provisions exist for data sharing due to fears of
Externí odkaz:
http://arxiv.org/abs/2401.02450
Most of the existing models for deploying IoT ecosystem involves the vendor being in the loop of the command and control of IoT devices hence users' privacy and security is one of the main challenges. Despite these concerns, users are often faced wit
Externí odkaz:
http://arxiv.org/abs/2207.08482
Autor:
McAuley, Derek, Chen, Jiahong, Lodge, Tom, Mortier, Richard, Piasecki, Stanislaw, Popescu, Diana Andreea, Urquhart, Lachlan
This chapter draws from across the foregoing chapters discussing many core HDI approaches and disciplinary perspectives to consider the specific application of HDI in home network security. While much work has considered the challenges of securing in
Externí odkaz:
http://arxiv.org/abs/2203.14109
A common approach to securing end-to-end connectivity between devices on the Internet is to utilise a cloud-based intermediary. With this reliance upon a third-party comes a set of security and privacy concerns that are difficult to mitigate. A promi
Externí odkaz:
http://arxiv.org/abs/2203.13540
With hundreds of thousands of individuals using social media to discuss health concerns, sensitive personal data is self-disclosed on these platforms every day. Previous research indicates an understanding of social privacy concerns by patients with
Externí odkaz:
http://arxiv.org/abs/2008.03541
Autor:
Koleini, Masoud, Oviedo, Carlos, McAuley, Derek, Rotsos, Charalampos, Madhavapeddy, Anil, Gazagnaire, Thomas, Skejgstad, Magnus, Mortier, Richard
To date, cloud applications have used datacenter resources through manual configuration and deployment of virtual machines and containers. Current trends see increasing use of microservices, where larger applications are split into many small contain
Externí odkaz:
http://arxiv.org/abs/1902.09636
Autor:
Moore, John, Arcia-Moret, Andrés, Yadav, Poonam, Mortier, Richard, Brown, Anthony, McAuley, Derek, Crabtree, Andy, Greenhalgh, Chris, Haddadi, Hamed, Amar, Yousef
In this paper, we introduce Zest (REST over ZeroMQ), a middleware technology in support of an Internet of Things (IoT). Our work is influenced by the Constrained Application Protocol (CoAP) but emphasises systems that can support fine-grained access
Externí odkaz:
http://arxiv.org/abs/1902.07009
Publikováno v:
British Food Journal, 2022, Vol. 124, Issue 12, pp. 4304-4322.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/BFJ-05-2021-0541
Autor:
Urquhart, Lachlan, McAuley, Derek
Publikováno v:
Computer Law and Security Review, 2018
Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial inter
Externí odkaz:
http://arxiv.org/abs/1801.07207
Publikováno v:
Personal and Ubiquitous Computing, Springer, 2017
There is an increasing role for the IT design community to play in regulation of emerging IT. Article 25 of the EU General Data Protection Regulation (GDPR) 2016 puts this on a strict legal basis by establishing the need for information privacy by de
Externí odkaz:
http://arxiv.org/abs/1801.07189