Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges S Parkinson, P Ward, K Wilson, J Miller IEEE Transactions on Intelligent Transportation Systems, 2017 | 426 | 2017 |
Fog computing security: a review of current applications and security solutions S Khan, S Parkinson, Y Qin Journal of Cloud Computing 6 (1), 1-22, 2017 | 359 | 2017 |
Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach N Liu, A Nikitas, S Parkinson Transportation research part F: traffic psychology and behaviour 75, 66-86, 2020 | 66 | 2020 |
Biometric systems utilising health data from wearable devices: applications and future challenges in computer security S Khan, S Parkinson, L Grant, N Liu, S Mcguire ACM Computing Surveys (CSUR) 53 (4), 1-29, 2020 | 41 | 2020 |
Auditing file system permissions using association rule mining S Parkinson, V Somaraki, R Ward Expert Systems with Applications 55, 274-283, 2016 | 40 | 2016 |
TrustVote: Privacy-preserving node ranking in vehicular networks MA Azad, S Bag, S Parkinson, F Hao IEEE Internet of Things Journal 6 (4), 5878-5891, 2018 | 35 | 2018 |
The application of automated planning to machine tool calibration S Parkinson, A Longstaff, A Crampton, P Gregory Proceedings of the International Conference on Automated Planning and …, 2012 | 35 | 2012 |
Knowledge Engineering Tools in Planning: State-of-the-art and Future Challenges MMS Shah, L Chrpa, F Jimoh, D Kitchin, TL McCluskey, S Parkinson, ... Knowledge Engineering for Planning and Scheduling, 53, 2013 | 32 | 2013 |
Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach S Khan, S Parkinson Expert Systems with Applications 113, 116-127, 2018 | 25 | 2018 |
Rapid Evidence Assessment: Quantifying Online Facilitated Child Sexual Abuse: Report for the Independent Inquiry into Child Sexual Abuse N Wager, B Gallagher, R Armitage, M Rogerson, K Christmann, ... Home Office, 2018 | 23 | 2018 |
Improved machine tool linear axis calibration through continuous motion data capture JE Miller, AP Longstaff, S Parkinson, S Fletcher Precision Engineering 47, 249-260, 2017 | 21 | 2017 |
Discovering and utilising expert knowledge from security event logs S Khan, S Parkinson Journal of Information Security and Applications 48, 102375, 2019 | 20 | 2019 |
Review into state of the art of vulnerability assessment using artificial intelligence S Khan, S Parkinson Guide to Vulnerability Analysis for Computer Networks and Systems: An …, 2018 | 20 | 2018 |
The role of measurement and modelling of machine tools in improving product quality AP Longstaff, S Fletcher, S Parkinson, A Myers International Journal of Metrology and Quality Engineering 4 (3), 177-184, 2013 | 19 | 2013 |
Automatic planning for machine tool calibration: A case study S Parkinson, AP Longstaff, S Fletcher, A Crampton, P Gregory Expert Systems with Applications 39 (13), 11367-11377, 2012 | 19 | 2012 |
Efficient computation of distance labeling for decremental updates in large dynamic graphs Y Qin, QZ Sheng, NJG Falkner, L Yao, S Parkinson World Wide Web 20, 915-937, 2017 | 18 | 2017 |
Use of access control to minimise ransomware impact S Parkinson Network Security 2017 (7), 5-8, 2017 | 17 | 2017 |
Adaptive decision support for suggesting a machine tool maintenance strategy: from reactive to preventative A Shagluf, S Parkinson, AP Longstaff, S Fletcher Journal of Quality in Maintenance Engineering 24 (3), 376-399, 2018 | 15 | 2018 |
Digital forensics: challenges and opportunities for future studies R Montasari, R Hill, S Parkinson, P Peltola, A Hosseinian-Far, ... International Journal of Organizational and Collective Intelligence (IJOCI …, 2020 | 14 | 2020 |
Multi-objective optimisation of machine tool error mapping using automated planning S Parkinson, AP Longstaff Expert Systems with Applications 42 (6), 3005-3015, 2015 | 14 | 2015 |