Theo dõi
Aine MacDermott
Aine MacDermott
Senior Lecturer
Email được xác minh tại ljmu.ac.uk
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Iot forensics: Challenges for the ioa era
A MacDermott, T Baker, Q Shi
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
1272018
CTRUST: A dynamic trust model for collaborative applications in the Internet of Things
AA Adewuyi, H Cheng, Q Shi, J Cao, Á MacDermott, X Wang
IEEE Internet of Things Journal 6 (3), 5432-5445, 2019
922019
A secure fog‐based platform for SCADA‐based IoT critical infrastructure
T Baker, M Asim, Á MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ...
Software: Practice and Experience 50 (5), 503-518, 2020
802020
TrustChain: A privacy preserving blockchain with edge computing
U Jayasinghe, GM Lee, Á MacDermott, WS Rhee
Wireless Communications and Mobile Computing 2019, 2019
692019
Securing things in the healthcare internet of things
Á MacDermott, P Kendrick, I Idowu, M Ashall, Q Shi
2019 Global IoT Summit (GIoTS), 1-6, 2019
352019
Forensic analysis of wearable devices: Fitbit, Garmin and HETP Watches
A MacDermott, S Lea, F Iqbal, I Idowu, B Shah
2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019
272019
Drone forensics: A case study on DJI phantom 4
F Iqbal, S Alam, A Kazim, Á MacDermott
2019 IEEE/ACS 16th International conference on computer systems and …, 2019
252019
The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics
Á MacDermott, T Baker, P Buck, F Iqbal, Q Shi
International Journal of Digital Crime and Forensics (IJDCF) 12 (1), 1-13, 2020
242020
A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models
A Akinbi, Á MacDermott, AM Ismael
Forensic Science International: Digital Investigation 42, 301470, 2022
212022
Collaborative intrusion detection in federated cloud environments
AM Mac Dermott, Q Shi, K Kifayat
Journal of Computer Sciences and Applications 3 (3A), 10-20, 2015
202015
Recurrent neural networks in medical data analysis and classifications
H Al-Askar, N Radi, Á MacDermott
Applied Computing in Medicine and Health, 147-165, 2016
192016
Intrusion detection for critical infrastructure protection
Á MacDermott, Q Shi, M Merabti, K Kifayat
13th Annual Postgraduate Symposium on Convergence of Telecommunications …, 2012
192012
Deep learning combined with de-noising data for network intrusion detection
PV Dinh, TN Ngoc, N Shone, Á MacDermott, Q Shi
2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems …, 2017
162017
Digital forensic acquisition and analysis of discord applications
M Motyliński, Á MacDermott, F Iqbal, M Hussain, S Aleem
2020 international conference on communications, computing, cybersecurity …, 2020
152020
Drone forensics: A case study of digital forensic investigations conducted on common drone models
K Al-Room, F Iqbal, T Baker, B Shah, B Yankson, A MacDermott, ...
International Journal of Digital Crime and Forensics (IJDCF) 13 (1), 1-25, 2021
142021
Protecting critical infrastructure services in the cloud environment
Á MacDermott, Q Shi, M Merabti, K Kifayat
Proceedings of the 12th European Conference on Information Warfare and …, 2013
132013
The development of fraud detection systems for detection of potentially fraudulent applications
D Al-Jumeily, A Hussain, Á MacDermott, H Tawfik, G Seeckts, J Lunn
2015 International Conference on Developments of E-Systems Engineering (DeSE …, 2015
122015
Hosting critical infrastructure services in the cloud environment considerations
Á MacDermott, Q Shi, M Merabti, K Kifayat
International Journal of Critical Infrastructures 11 (4), 365-381, 2015
122015
Considering an elastic scaling model for cloud security
Á MacDermott, Q Shi, M Merabti, K Kifiyat
8th International Conference for Internet Technology and Secured …, 2013
122013
Security as a Service for a Cloud Federation
A MacDermott, Q Shi, M Merabti, K Kifayat
The 15th Post Graduate Symposium on the Convergence of Telecommunications …, 2014
112014
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20