Iot forensics: Challenges for the ioa era A MacDermott, T Baker, Q Shi 2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018 | 128 | 2018 |
CTRUST: A dynamic trust model for collaborative applications in the Internet of Things AA Adewuyi, H Cheng, Q Shi, J Cao, Á MacDermott, X Wang IEEE Internet of Things Journal 6 (3), 5432-5445, 2019 | 94 | 2019 |
A secure fog‐based platform for SCADA‐based IoT critical infrastructure T Baker, M Asim, A MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ... Software: Practice and Experience 50 (5), 503-518, 2020 | 81 | 2020 |
TrustChain: A privacy preserving blockchain with edge computing U Jayasinghe, GM Lee, Á MacDermott, WS Rhee Wireless Communications and Mobile Computing 2019 (1), 2014697, 2019 | 70 | 2019 |
Securing things in the healthcare internet of things Á MacDermott, P Kendrick, I Idowu, M Ashall, Q Shi 2019 Global IoT Summit (GIoTS), 1-6, 2019 | 34 | 2019 |
Drone forensics: A case study on DJI phantom 4 F Iqbal, S Alam, A Kazim, Á MacDermott 2019 IEEE/ACS 16th International conference on computer systems and …, 2019 | 28 | 2019 |
Forensic analysis of wearable devices: Fitbit, Garmin and HETP Watches A MacDermott, S Lea, F Iqbal, I Idowu, B Shah 2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019 | 27 | 2019 |
A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models A Akinbi, Á MacDermott, AM Ismael Forensic Science International: Digital Investigation 42, 301470, 2022 | 24 | 2022 |
The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics Á MacDermott, T Baker, P Buck, F Iqbal, Q Shi International Journal of Digital Crime and Forensics (IJDCF) 12 (1), 1-13, 2020 | 24 | 2020 |
Recurrent neural networks in medical data analysis and classifications H Al-Askar, N Radi, Á MacDermott Applied Computing in Medicine and Health, 147-165, 2016 | 22 | 2016 |
Collaborative intrusion detection in federated cloud environments AM Mac Dermott, Q Shi, K Kifayat Journal of Computer Sciences and Applications 3 (3A), 10-20, 2015 | 20 | 2015 |
Intrusion detection for critical infrastructure protection Á MacDermott, Q Shi, M Merabti, K Kifayat 13th Annual Postgraduate Symposium on Convergence of Telecommunications …, 2012 | 19 | 2012 |
Drone forensics: A case study of digital forensic investigations conducted on common drone models K Al-Room, F Iqbal, T Baker, B Shah, B Yankson, A MacDermott, ... International Journal of Digital Crime and Forensics (IJDCF) 13 (1), 1-25, 2021 | 16 | 2021 |
Digital forensic acquisition and analysis of discord applications M Motyliński, Á MacDermott, F Iqbal, M Hussain, S Aleem 2020 international conference on communications, computing, cybersecurity …, 2020 | 16 | 2020 |
Deep learning combined with de-noising data for network intrusion detection PV Dinh, TN Ngoc, N Shone, Á MacDermott, Q Shi 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems …, 2017 | 16 | 2017 |
Protecting critical infrastructure services in the cloud environment Á MacDermott, Q Shi, M Merabti, K Kifayat Proceedings of the 12th European Conference on Information Warfare and …, 2013 | 13 | 2013 |
The development of fraud detection systems for detection of potentially fraudulent applications D Al-Jumeily, A Hussain, Á MacDermott, H Tawfik, G Seeckts, J Lunn 2015 International Conference on Developments of E-Systems Engineering (DeSE …, 2015 | 12 | 2015 |
Hosting critical infrastructure services in the cloud environment considerations Á MacDermott, Q Shi, M Merabti, K Kifayat International Journal of Critical Infrastructures 11 (4), 365-381, 2015 | 12 | 2015 |
Considering an elastic scaling model for cloud security Á MacDermott, Q Shi, M Merabti, K Kifiyat 8th International Conference for Internet Technology and Secured …, 2013 | 12 | 2013 |
A GPU-based machine learning approach for detection of botnet attacks M Motylinski, Á MacDermott, F Iqbal, B Shah Computers & Security 123, 102918, 2022 | 11 | 2022 |