Ethan Bayne
Ethan Bayne
Audit Scotland
Verified email at
Cited by
Cited by
A taxonomy of network threats and the effect of current datasets on intrusion detection systems
H Hindy, D Brosset, E Bayne, AK Seeam, C Tachtatzis, R Atkinson, ...
IEEE Access 8, 104650-104675, 2020
Utilising deep learning techniques for effective zero-day attack detection
H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens
Electronics 9 (10), 1684, 2020
Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-IDS2020 dataset)
H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens
Selected Papers from the 12th International Networking Conference: INC 2020 …, 2021
A primer on emergency occupational licensing reforms for combating COVID-19
E Bayne, C Norris, E Timmons
Mercatus Special Edition Policy Brief, 2020
Improving SIEM for critical SCADA water infrastructures using machine learning
H Hindy, D Brosset, E Bayne, A Seeam, X Bellekens
Computer Security: ESORICS 2018 International Workshops, CyberICPS 2018 and …, 2019
Machine learning based iot intrusion detection system: An mqtt case study
H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens
arXiv preprint arXiv:2006.15340, 24-52, 2020
A taxonomy of malicious traffic for intrusion detection systems
H Hindy, E Hodo, E Bayne, A Seeam, R Atkinson, X Bellekens
2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018
OpenForensics: A digital forensics GPU pattern matching approach for the 21st century
E Bayne, RI Ferguson, AT Sampson
Digital Investigation 24, S29-S37, 2018
Developing a Siamese network for intrusion detection systems
H Hindy, C Tachtatzis, R Atkinson, E Bayne, X Bellekens
Proceedings of the 1st Workshop on Machine Learning and Systems, 120-126, 2021
Investigation into the security and privacy of iOS VPN applications
J Wilson, D McLuskie, E Bayne
Proceedings of the 15th International Conference on Availability …, 2020
Investigating visualisation techniques for rapid triage of digital forensic evidence
G Hales, E Bayne
HCI for Cybersecurity, Privacy and Trust: First International Conference …, 2019
Utilising flow aggregation to classify benign imitating attacks
H Hindy, R Atkinson, C Tachtatzis, E Bayne, M Bures, X Bellekens
Sensors 21 (5), 1761, 2021
Introducing a new data set on municipal-level occupational regulation
D Carpenter, K Sweetland, E Vargo, E Bayne
Journal of Entrepreneurship and Public Policy 10 (2), 143-155, 2021
Near-Ultrasonic Covert Channels Using Software-Defined Radio Techniques
R Sherry, E Bayne, D McLuskie
Proceedings of the International Conference on Cybersecurity, Situational …, 2023
Accelerating digital forensic searching through GPGPU parallel processing techniques
E Bayne
Abertay University, 2017
Using multiple GPUs to accelerate string searching for digital forensic analysis
E Bayne, RI Ferguson, AT Sampson, JP Isaacs
11th International Conference on Systematic Approaches to Digital Forensic …, 2016
OpenCL Acceleration of Digital Forensic Methods
E Bayne, RI Ferguson, J Isaacs
Cyberforensics 2014, 50-57, 2014
The system can't perform the operation now. Try again later.
Articles 1–17