Adversarial feature selection against evasion attacks

F Zhang, PPK Chan, B Biggio… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Pattern recognition and machine learning techniques have been increasingly adopted in
adversarial settings such as spam, intrusion, and malware detection, although their security …

Exploiting innocuous activity for correlating users across sites

O Goga, H Lei, SHK Parthasarathi, G Friedland… - Proceedings of the …, 2013 - dl.acm.org
We study how potential attackers can identify accounts on different social network sites that
all belong to the same user, exploiting only innocuous activity that inherently comes with …

Cyber security data sources for dynamic network research

AD Kent - Dynamic Networks and Cyber-Security, 2016 - World Scientific
The importance of using real-world data to enable and validate dynamic network research
for the purposes of cyber security cannot be understated. Unfortunately, the use of real-world …

Spam filtering for short messages in adversarial environment

PPK Chan, C Yang, DS Yeung, WWY Ng - Neurocomputing, 2015 - Elsevier
The unsolicited bulk messages are widespread in the applications of short messages.
Although the existing spam filters have satisfying performance, they are facing the challenge …

Data provenance in security and privacy

B Pan, N Stakhanova, S Ray - ACM Computing Surveys, 2023 - dl.acm.org
Provenance information corresponds to essential metadata that describes the entities, users,
and processes involved in the history and evolution of a data object. The benefits of tracking …

Categorised ethical guidelines for large scale mobile HCI

D McMillan, A Morrison, M Chalmers - Proceedings of the SIGCHI …, 2013 - dl.acm.org
The recent rise in large scale trials of mobile software using'app stores' has moved current
researcher practice beyond available ethical guidelines. By surveying this recent and …

Cybersecurity in the electricity sector

R Leszczyna - Managing Critical Infrastructure”, Editura Springer …, 2019 - Springer
We are witnessing the transformation of the electricity sector into its new, enhanced
incarnation associated with the concepts of the smart grid or the Internet of Energy. The …

Threat intelligence platform for the energy sector

R Leszczyna, MR Wróbel - Software: Practice and Experience, 2019 - Wiley Online Library
In recent years, critical infrastructures and power systems in particular have been subjected
to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A …

Towards a granular computing framework for multiple aspect trajectory representation and privacy preservation: Research challenges and opportunities

ZC Dagdia, V Bogorny - 17th CONFERENCE ON COMPUTER …, 2022 - hal.uvsq.fr
In recent years, there has been a lot of research on trajectory data analysis and mining.
Despite the fact that trajectories are multidimensional data characterized by the spatial, the …

Developing novel solutions to realise the European energy–information sharing & analysis centre

R Leszczyna, T Wallis, MR Wróbel - Decision Support Systems, 2019 - Elsevier
For more effective decision making in preparation for and response to cyberevents in the
energy sector, multilevel situation awareness, from technical to strategic is essential. With an …