Nick Savage

Affiliations:
  • University of Portsmouth, School of Computing, United Kingdom


According to our database1, Nick Savage authored at least 30 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Fuzzy-import hashing: A static analysis technique for malware detection.
Digit. Investig., 2021

Tools for Network Traffic Generation - A Quantitative Comparison.
CoRR, 2021

CHAINGE: A Blockchain Solution to Automate Payment Detail Updates to Subscription Services.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Data Exfiltration: Methods and Detection Countermeasures.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021


A Distributed Cloud Honeypot Architecture.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Deep Learning Based Fusion Approach for Hate Speech Detection.
IEEE Access, 2020

Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning.
Proceedings of the 2020 IEEE World Congress on Services, 2020

SoMIAP: Social Media Images Analysis and Prediction Framework.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

BotSpot: Deep Learning Classification of Bot Accounts Within Twitter.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

Fuzzy-Import Hashing: A Malware Analysis Approach.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

2019
Augmented YARA Rules Fused With Fuzzy Hashing in Ransomware Triaging.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems.
Proceedings of the International Symposium on Systems Engineering, 2019

Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

2018
Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

2016
Empirical analysis of Tor Hidden Services.
IET Inf. Secur., 2016

Big data security analysis approach using Computational Intelligence techniques in R for desktop users.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

2015
Arguments For Anonymity.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

2014
A new approach for a better recovery of cluster head nodes in underwater sensor networks.
Proceedings of the International Conference on Telecommunications and Multimedia, 2014

2012
Digital forensic research - The analysis of user input on volatile memory of Windows application.
Proceedings of the 2012 World Congress on Internet Security, 2012

Biometric Identification in Virtual Worlds using Biometric Fusion Techniques.
Proceedings of the SECRYPT 2012, 2012

Forensic memory evidence of windows application.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
On the extraction of forensically relevant information from physical memory.
Proceedings of the 2011 World Congress on Internet Security, 2011

Biometric Identification Using User Interactions with Virtual Worlds.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Extraction of User Information by Pattern Matching Techniques in Windows Physical Memory.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011

2010
Graphical Authentication based on user Behaviour.
Proceedings of the SECRYPT 2010, 2010

2004
A study of microcell and picocell wireless communication network channels.
PhD thesis, 2004


  Loading...