Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges S Parkinson, P Ward, K Wilson, J Miller IEEE Transactions on Intelligent Transportation Systems, 2017 | 554 | 2017 |
Fog computing security: a review of current applications and security solutions S Khan, S Parkinson, Y Qin Journal of Cloud Computing 6, 1-22, 2017 | 451 | 2017 |
Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach N Liu, A Nikitas, S Parkinson Transportation research part F: traffic psychology and behaviour 75, 66-86, 2020 | 140 | 2020 |
Biometric systems utilising health data from wearable devices: applications and future challenges in computer security S Khan, S Parkinson, L Grant, N Liu, S Mcguire ACM Computing Surveys (CSUR) 53 (4), 1-29, 2020 | 72 | 2020 |
TrustVote: Privacy-preserving node ranking in vehicular networks MA Azad, S Bag, S Parkinson, F Hao IEEE Internet of Things Journal 6 (4), 5878-5891, 2018 | 49 | 2018 |
Auditing file system permissions using association rule mining S Parkinson, V Somaraki, R Ward Expert Systems with Applications 55, 274-283, 2016 | 44 | 2016 |
Review into state of the art of vulnerability assessment using artificial intelligence S Khan, S Parkinson Guide to Vulnerability Analysis for Computer Networks and Systems: An …, 2018 | 39 | 2018 |
The application of automated planning to machine tool calibration S Parkinson, A Longstaff, A Crampton, P Gregory Proceedings of the International Conference on Automated Planning and …, 2012 | 37 | 2012 |
Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach S Khan, S Parkinson Expert Systems with Applications 113, 116-127, 2018 | 35 | 2018 |
Rapid Evidence Assessment: Quantifying Online Facilitated Child Sexual Abuse: Report for the Independent Inquiry into Child Sexual Abuse N Wager, B Gallagher, R Armitage, M Rogerson, K Christmann, ... Independent Inquiry into Child Sexual Abuse, 2018 | 33 | 2018 |
Knowledge Engineering Tools in Planning: State-of-the-art and Future Challenges MMS Shah, L Chrpa, F Jimoh, D Kitchin, TL McCluskey, S Parkinson, ... Knowledge Engineering for Planning and Scheduling, 53, 2013 | 33 | 2013 |
Analysis of security and privacy challenges for DNA-genomics applications and databases S Arshad, J Arshad, MM Khan, S Parkinson Journal of Biomedical Informatics 119, 103815, 2021 | 26 | 2021 |
Password policy characteristics and keystroke biometric authentication S Parkinson, S Khan, A Crampton, Q Xu, W Xie, N Liu, K Dakin IET Biometrics 10 (2), 163-178, 2021 | 26 | 2021 |
Discovering and utilising expert knowledge from security event logs S Khan, S Parkinson Journal of Information Security and Applications 48, 102375, 2019 | 25 | 2019 |
The deceitful connected and autonomous vehicle: defining the concept, contextualising its dimensions and proposing mitigation policies A Nikitas, S Parkinson, M Vallati Transport policy 122, 1-10, 2022 | 24 | 2022 |
Use of access control to minimise ransomware impact S Parkinson Network Security 2017 (7), 5-8, 2017 | 24 | 2017 |
A survey on empirical security analysis of access-control systems: a real-world perspective S Parkinson, S Khan ACM Computing Surveys 55 (6), 1-28, 2022 | 23 | 2022 |
Improved machine tool linear axis calibration through continuous motion data capture JE Miller, AP Longstaff, S Parkinson, S Fletcher Precision Engineering 47, 249-260, 2017 | 23 | 2017 |
Digital forensics: challenges and opportunities for future studies R Montasari, R Hill, S Parkinson, P Peltola, A Hosseinian-Far, ... International Journal of Organizational and Collective Intelligence (IJOCI …, 2020 | 22 | 2020 |
Efficient computation of distance labeling for decremental updates in large dynamic graphs Y Qin, QZ Sheng, NJG Falkner, L Yao, S Parkinson World Wide Web 20, 915-937, 2017 | 22 | 2017 |