A taxonomy of network threats and the effect of current datasets on intrusion detection systems H Hindy, D Brosset, E Bayne, AK Seeam, C Tachtatzis, R Atkinson, ... IEEE Access 8, 104650-104675, 2020 | 290* | 2020 |
Utilising deep learning techniques for effective zero-day attack detection H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens Electronics 9 (10), 1684, 2020 | 87 | 2020 |
Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-IDS2020 dataset) H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens Selected Papers from the 12th International Networking Conference: INC 2020 …, 2021 | 85* | 2021 |
A primer on emergency occupational licensing reforms for combating COVID-19 E Bayne, C Norris, E Timmons Mercatus Special Edition Policy Brief, 2020 | 33 | 2020 |
Improving SIEM for critical SCADA water infrastructures using machine learning H Hindy, D Brosset, E Bayne, A Seeam, X Bellekens Computer Security: ESORICS 2018 International Workshops, CyberICPS 2018 and …, 2019 | 31 | 2019 |
Machine learning based iot intrusion detection system: An mqtt case study H Hindy, E Bayne, M Bures, R Atkinson, C Tachtatzis, X Bellekens arXiv preprint arXiv:2006.15340, 24-52, 2020 | 24 | 2020 |
A taxonomy of malicious traffic for intrusion detection systems H Hindy, E Hodo, E Bayne, A Seeam, R Atkinson, X Bellekens 2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018 | 16 | 2018 |
OpenForensics: A digital forensics GPU pattern matching approach for the 21st century E Bayne, RI Ferguson, AT Sampson Digital Investigation 24, S29-S37, 2018 | 11 | 2018 |
Developing a Siamese network for intrusion detection systems H Hindy, C Tachtatzis, R Atkinson, E Bayne, X Bellekens Proceedings of the 1st Workshop on Machine Learning and Systems, 120-126, 2021 | 7 | 2021 |
Investigation into the security and privacy of iOS VPN applications J Wilson, D McLuskie, E Bayne Proceedings of the 15th International Conference on Availability …, 2020 | 4 | 2020 |
Investigating visualisation techniques for rapid triage of digital forensic evidence G Hales, E Bayne HCI for Cybersecurity, Privacy and Trust: First International Conference …, 2019 | 4 | 2019 |
Utilising flow aggregation to classify benign imitating attacks H Hindy, R Atkinson, C Tachtatzis, E Bayne, M Bures, X Bellekens Sensors 21 (5), 1761, 2021 | 3 | 2021 |
Introducing a new data set on municipal-level occupational regulation D Carpenter, K Sweetland, E Vargo, E Bayne Journal of Entrepreneurship and Public Policy 10 (2), 143-155, 2021 | 2 | 2021 |
Near-Ultrasonic Covert Channels Using Software-Defined Radio Techniques R Sherry, E Bayne, D McLuskie Proceedings of the International Conference on Cybersecurity, Situational …, 2023 | 1 | 2023 |
Accelerating digital forensic searching through GPGPU parallel processing techniques E Bayne Abertay University, 2017 | 1 | 2017 |
Using multiple GPUs to accelerate string searching for digital forensic analysis E Bayne, RI Ferguson, AT Sampson, JP Isaacs 11th International Conference on Systematic Approaches to Digital Forensic …, 2016 | 1 | 2016 |
OpenCL Acceleration of Digital Forensic Methods E Bayne, RI Ferguson, J Isaacs Cyberforensics 2014, 50-57, 2014 | | 2014 |