ISRG Banner

Publications


Below you will find a list of publications and conference presentations to date for the University of South Wales Information Security Research Group. Our team comprises of both full-time Lecturing and PhD colleagues. 

  • K. Mahmud, M. Usman, M. A. Sindhu, A. Jolfaei and G. Srivastava, Closing the Loop in Feedback Driven Learning Environments Using Trust Decision Making and Utility Theory, IEEE Transactions on Emerging Topics in Computational Intelligence, April 2020 (accepted).
  • A. Hameed, M. Usman and O. Maqbool, Privacy Preserved Ranking of Industrial Sensing Services Using Topological Information, EEE Transactions on Industry Applications, March 2020 (in press).
  • A. Irshad, M. Usman, S. A. Chaudhry, H. Naqvi and M. Shafiq, A provably secure and efficient authenticated key agreement scheme for Energy Internet based Vehicle-to-Grid technology framework , IEEE Transactions on Industry Applications, January 2020 (in press).
  • Elmisery A.M., Sertovic M. (2020), Privacy Preserving Threat Hunting in Smart Home Environments. In: Anbar M., Abdullah N., Manickam S. (eds) Advances in Cyber Security. ACeS 2019. Communications in Computer and Information Science, vol 1132. Springer, Singapore. Available at: https://doi.org/10.1007/978-981-15-2693-0_8
  • Johnson, C. & Davies, R. (2020), Using digital forensic techniques to identify contract cheating: A case studyJournal of Academic Ethics, Springer. Available at: https://doi.org/10.1007/s10805-019-09358-w
  • Davies, G. & Smith, K. (2019), The Feasibility of Creating a Universal Digital Forensics Framework. Forensic, Legal & Investigative Sciences. 5. 1-9. 10.24966/FLIS-733X/100027. 
  • Davies, G. (2019), Bypassing vehicle infotainment security, Paper presentation at BSides Cymru 2019, Cardiff
  • Davies, R., Miknis, M. & Johnson, C. (2019), Improving the Learner Lifecycle through Technology Paper presented at HEA STEM Conference 2019, Birmingham, United Kingdom, 30/01/19 - 31/01/19.
  • Davies, R. & Whitter-Jones, J. (2019), Interactive environment for learning programming, Paper presented at HEA STEM Conference 2019, Birmingham, United Kingdom, 30/01/19 - 31/01/19, APA.
  • Johnson, C. (2019). University of South Wales national cyber security academy – creating cyber graduates who can ‘hit the ground running’: an innovative project based approach. Higher Education Pedagogies, Taylor & Francis, Available at:  https://doi.org/10.1080/23752696.2019.1605837
  • Johnson, A., Davies, R., (2019). Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods, in: 2019 7th International Symposium on Digital Forensics and Security (ISDFS) 10-12 June 2019., Published 11th July 2019 IEEE, pp. 1–6. doi:10.1109/ISDFS.2019.8757547 Link: https://ieeexplore.ieee.org/document/8757547
  • Johnson, C. & Davies, R. (in press), Using digital forensic techniques to identify contract cheating: A case study, Journal of Academic Ethics, Accepted for publication
  • Perera, A. (2019), Experience of Phishing in W(h)ales, Paper presentation at BSides Cymru 2019, Cardiff
  • Whitter-Jones, J. (2019), Security Operations - Technology and Architecture, Infosecurity Magazine, Available at: https://www.infosecurity-magazine.com/next-gen-infosec/security-operations-technology
  • Whitter-Jones, J. (2019), Security Operations - The Human Element, Infosecurity Magazine, Available at: https://www.infosecurity-magazine.com/next-gen-infosec/security-operations-technology
  • B. Ghaleb, A. Al-Dubai, E. Ekonomou, M. Qasem, and L. Mackenzie “DAO Insider Attack in RPL based Networks” IEEE Communications Letters 2019 
  • Ghaleb, B., Al-Dubai, A., Romdhani, I., Qasem, M., “Load-balancing and Stability Aware Objective Function (LBSA)” at Standard Draft Internet Engineering Task Force (IETF), 2019. https://tools.ietf.org/html/draft-baraq-roll-lbsa-00 
  • Davies, R., Wilson, I. & Ware, J. (2018), Stereoscopic Human Detection in a Natural Environment, Annals of Emerging Technologies in Computing, vol 2, no. 2, pp. 15.
  • Davies, G. (2018), Cloud Data Forensics: UK Best Practice, Paper presented at College of Policing and The Investigator National Digital Media Investigator’s (DMI) Conference 2018, Towcester, United Kingdom, 21/11/18 - 22/11/18. 
  • Johnson, C. & Reddy, M. (2018) The Student Voice, What We Know About the Students’ Perspective of Academic Integrity, Towards consistency and transparency in academic integrity. Razı, S., Glendinnig, I. & Foltýnek, T. (eds.). Berlin: Peter Lang, p. 17-31(book chapter), Available at: https://www.peterlang.com/abstract/9783631781593/xhtml/fm_cover.xhtml
  • Johnson, C. (2018), University of South Wales is closing the Skills Gap, Available at: https://www.computing.co.uk/ctg/news/3062542/university-of-south-wales-is-closing-the-skills-gap-say-it-professionals
  • Burnap, P., Cherdantseva, Y., Blyth, A., Eden, P., Jones, K., Soulsby, H. & Stoddart, K. (2017), Determining and Sharing Risk Data in Distributed Interdependent Systems, Computer, vol 50, no. 4, pp. 72-79. DOI: 10.1109/MC.2017.108
  • Davies, G. (2017),'Cyber investigations: digital forensics & automobile electronics II, Paper presented at 3rd International Conference and Exhibition on Automobile Engineering, Berlin, Germany, 28/09/17 - 29/09/17.
  • Eden, P., Blyth, A., Jones, K., Soulsby, H., Cherdantseva, Y., Burnap, P. & Stoddart, K. (2017), SCADA System Forensic Analysis Within IIoT. in L Thames & D Schaefer (eds), Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. 1st edn, Springer Series in Advanced Manufacturing , Springer Nature, pp. 73-101. DOI: 10.1007/978-3-319-50660-9_4
  • Johnson, C. (2017), Collaborative technologies, higher order thinking and self-sufficient learning: A case study of adult learners, In : Alt J Research in Learning Technology. 25, 17 p., 1981, Available at: https://doi.org/10.25304/rlt.v25.1981
  • Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., J. Hou, R. Jadhav “Load Balancing Objective Function in RPL” at Standard Draft (accepted to be adopted) in the Internet Engineering TaskForce (IETF)100 Singapore, 2017. 
  • Ghaleb, B., Al-Dubai, A., Romdhani, I., Qasem, M., “Drizzle Algorithm” at Standard Draft Internet Engineering Task Force (IETF), 2017. 
  • Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. & Stoddart, K. (2016), A review of cyber security risk assessment methods for SCADA systems, Computers and Security, vol 56, pp. 1-27. DOI: 10.1016/j.cose.2015.09.009
  • Davies, G. (2016), Cyber forensics & automobile electronics, Paper presented at 2nd International Conference and Exhibition on Automobile Engineering, December 01-02, 2016 Valencia, Spain, Theme: Exploring Advances in Automobile Engineering, 1/12/16, . DOI: 10.4172/2167-7670.C1.004
  • Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H. & Stoddart, K. (2016), Forensic Readiness for SCADA/ICS Incident Response. in Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016. ICS-CSR '16, BCS Learning Development Ltd., Swindon, UK, pp. 1-9, 4th International Symposium for ICS & SCADA Cyber Security Research 2016, Belfast, United Kingdom, 23/08/16. DOI: 10.14236/ewic/ICS2016.16
  • Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H. & Stoddart, K. (2016), A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure. in E Rome, M Theocharidou & S Wolthusen (eds), Critical Information Infrastructures Security: 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers., Chapter 3, Lecture Notes in Computer Science, vol. 9578, SPRINGER-VERLAG LONDON LTD, pp. 27-39. DOI: 10.1007/978-3-319-33331-1_3
  • Miknis, M., Ware, J., Davies, R. & Plassmann, P. (2016), Efficient Point Cloud Pre-processing using The Point Cloud Library, International Journal of Image Processing, vol 10, no. 2, pp. 63-72.
  • Moos, J., Davies, G., Lewis, E., Williams, N., Gichohi, B., Lane, R. & Bellamy, A. (2016), Digital Forensics for Automobile Systems: The Challenges and a Call to Arms, Forensic Science International, vol 1, no. 1. https://medwinpublishers.com/IJFSC/IJFSC16000101.php?id=25
  • Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., “A New Efficient Objective Function for Routing in Internet of Things Paradigm”, in IEEE Conference on Standards for Communications & Networking (IEEE CSCN 16) and 5G summit, Berlin, Germany, 2016. 
  • Ghaleb, B., Al-Dubai, A., Ekonomou, E., Paechter, B., Qasem, M.,” Trickle-Plus: Elastic Trickle Algorithm for Low-Power Networks and Internet of Things” IEEE WCNC, Qatar, 2016. 
  • Yassien, M. B., Abuein, Q., Bani Amer, A., Qasem, M., “An Energy-efficient Technique for Constrained Application Protocol of Internet of Things" IEEE International Conference on Internet of Things and Pervasive Systems, Agadir, Morocco, 2016. 
  • Akarawita, I.U., Perera Kotte Liyanage, A. & Atukorale, A. (2015), ANDROPHSY–Forensic Framework for Android. in 15th International Conference on Advances in ICT for Emerging Regions (ICTer2015): Conference Proceedings 24th and 25th of August 2015, BMISCH, Colombo, SRI Lanka . Institute of Electrical and Electronics Engineers, pp. 250-258, 2015 Fifteenth International Conference on Advances in ICT for Emerging Regions , Colombo, Sri Lanka, 24/08/15. DOI: 10.1109/ICTER.2015.7377696
  • Davies, R., Wilson, I. & Ware, A. (2015), Stereoscopic Disparity Generation Reduction using a Dilated Laplacian Approach. in P Liatsis, A Uus & S Miah (eds), 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015). International Conference on Systems Signal and Image Processing, Publ by IEEE, pp. 101-104, 22nd International Conference on Systems, Signals and Image Processing (IWSSIP), London, 10/09/15. DOI: 10.1109/IWSSIP.2015.7314187
  • Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H. & Stoddart, K. (2015), A Forensic Taxonomy of SCADA Systems and Approach to Incident Response. in Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015. ICS-CSR '15, BCS Learning Development Ltd., Swindon, UK, pp. 42-51, 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, Ingolstadt, Germany, 17/09/15. DOI: 10.14236/ewic/ICS2015.5
  • Miknis, M., Davies, R., Plassmann, .P. & Ware, A. (2015), Near real-time point cloud processing using the PCL. in P Liatsis, A Uus & S Miah (eds), 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015). International Conference on Systems Signal and Image Processing, Publ by IEEE, pp. 153-156, 22nd International Conference on Systems, Signals and Image Processing (IWSSIP), London, 10/09/15. DOI: 10.1109/IWSSIP.2015.7314200
  • Qasem, M., Al-Dubai, A., Romdhani, I., Yassien, M., “ATP: Adaptive Tuning Protocol for Service Discovery in Wireless Sensor Networks”, ACM, Istanbul, Turkey, 2015. 
  • Qasem, M., Al-Dubai, A., Romdhani, I., Yassien, M., “A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things” 14th IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), Liverpool, UK, 2015. 
  • Qasem, M., Altawssi, H., Yassien, M. B., Al-Dubai, A., “Performance Evaluation of RPL Objective Functions” 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), Liverpool, UK, 2015. 
  • Davies, G. (2014), 'Hardware Forensics' Paper presented at Security Forum 2014, Austria, 9/04/14 - 10/04/14
  • Eshaftri, M., Essa, A., Qasem, M., Romdhani, I., Al-Dubai, A. (2014). “Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks”. In: International Conference on Advanced Networking 2014. IEEE. 
  • Davies, G. (2013), Manipulation of hard drive firmware to conceal entire partitions, Digital Investigation. 
  • Wilson, I., Davies, R. & Stanton, N. (2013), A Genetic Algorithm based solution to the Teaching Assignment Problem, International Journal of Computer Applications, vol 81, no. 19, pp. 1-6. DOI: 10.5120/14268-0056
  • Blyth, A., Sutherland, I. & Davies, G. (2011), Malware and Steganography in Hard Disk Firmware, Journal in Computer Virology, vol 7, no. 3, pp. 215 - 219. DOI: 10.1007/s11416-010-0149-x
  • Sutherland, I. & Davies, G. (2010), Hard Disk Storage: Data Leakage. in J Demergis (ed.), Proceedings of the 9th European Conference on Information Warfare and Security: Hosted by strategy international.org and the Department of Applied Informatics; University of Macedonia, Thessaloniki, Greece, 1-2 July 2010. 9th European Conference on Information Warfare and Security, 1/02/10.
  • Sutherland, I. & Davies, G. (2010), Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice. in Annual ADFSL Conference on Digital Forensics, Security and Law: St. Paul, Minnesota, May 19-21, 2010 . Scholarly Comms, The 2010 ADFSL Conference on Digital Forensics, Security and Law , 19/05/10.
  • Sutherland, I. & Davies, G. (2010), Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice. in Annual ADFSL Conference on Digital Forensics, Security and Law: St. Paul, Minnesota, May 19-21, 2010 . Scholarly Comms, The 2010 ADFSL Conference on Digital Forensics, Security and Law , 19/05/10.
  • Sutherland, I., Jones, A., Davies, G., Dardick, G., Valli, C. & Dabibi, G. (2010), The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. in Proceedings of the 8th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, November 30th 2010. 8th Australian Digital Forensics Conference , 28/11/10.
  • Xynos, K., Blyth, A., Sutherland, I., Harries, S. & Davies, G. (2010), Xbox 360: a digital forensic investigation of the hard disk drive, Digital Investigation, vol 6, no. 3-4, pp. 104 - 111. DOI: 10.1016/j.diin.2010.02.004
  • Blyth, A., Sutherland, I., Davies, G. & Pringle, P. (2009), The Impact of Hard Disk Firmware Steganography on Computer Forensics, Journal of Digital Forensics, Security and Law, vol 4, no. 2.
  • Davies, G. (2009), The 2008 analysis of information remaining on disks offered for sale on the second hand market, Journal of Digital Forensics, Security and Law.