Simon Parkinson

Orcid: 0000-0002-1747-9914

According to our database1, Simon Parkinson authored at least 56 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach.
Expert Syst. Appl., December, 2023

Comparison of deep learning classification models for facial image age estimation in digital forensic investigations.
Forensic Sci. Int. Digit. Investig., December, 2023

An empirical analysis of keystroke dynamics in passwords: A longitudinal study.
IET Biom., January, 2023

A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective.
ACM Comput. Surv., 2023

A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats.
IEEE Access, 2023

Exudate Regeneration for Automated Exudate Detection in Retinal Fundus Images.
IEEE Access, 2023

One Bus is All it Takes: The Impact of Cyber Attacks in Customised Bus Services.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

Automated Planning to Prioritise Digital Forensics Investigation Cases Containing Indecent Images of Children.
Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, 2023

2022
Robust data expansion for optimised modelling using adaptive neuro-fuzzy inference systems.
Expert Syst. Appl., 2022

Identifying high-risk over-entitlement in access control policies using fuzzy logic.
Cybersecur., 2022

On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

2021
Analysis of security and privacy challenges for DNA-genomics applications and databases.
J. Biomed. Informatics, 2021

OCEAN: A Non-Conventional Parameter Free Clustering Algorithm Using Relative Densities of Categories.
Int. J. Pattern Recognit. Artif. Intell., 2021

Password policy characteristics and keystroke biometric authentication.
IET Biom., 2021

Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security.
ACM Comput. Surv., 2021

A Jensen-Shannon Divergence Driven Metric of Visual Scanning Efficiency Indicates Performance of Virtual Driving.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

2020
Digital Forensics: Challenges and Opportunities for Future Studies.
Int. J. Organ. Collect. Intell., 2020

Hardware-based cyber threats: attack vectors and defence techniques.
Int. J. Electron. Secur. Digit. Forensics, 2020

Simultaneous Constant Velocity Measurement of the Motion Errors of Linear Axes.
Int. J. Autom. Technol., 2020

Low-cost fitness and activity trackers for biometric authentication.
J. Cybersecur., 2020

2019
Discovering and utilising expert knowledge from security event logs.
J. Inf. Secur. Appl., 2019

TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks.
IEEE Internet Things J., 2019

<i>Creeper</i>: a tool for detecting permission creep in file system access controls.
Cybersecur., 2019

Exploiting automated planning for efficient centralized vehicle routing and mitigating congestion in urban road networks.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Classifying Ransomware Using Machine Learning Algorithms.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019

Towards Automating Crime Prevention through Environmental Design (CPTED) Analysis to Predict Burglary.
Proceedings of the Twenty-Ninth International Conference on Automated Planning and Scheduling, 2019

2018
Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Review into State of the Art of Vulnerability Assessment using Artificial Intelligence.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Identifying File Interaction Patterns in Ransomware Behaviour.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Identifying irregularities in security event logs through an object-based Chi-squared test of independence.
J. Inf. Secur. Appl., 2018

Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach.
Expert Syst. Appl., 2018

GraphBAD: A general technique for anomaly detection in security information and event management.
Concurr. Comput. Pract. Exp., 2018

2017
Efficient computation of distance labeling for decremental updates in large dynamic graphs.
World Wide Web, 2017

Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges.
IEEE Trans. Intell. Transp. Syst., 2017

Use of access control to minimise ransomware impact.
Netw. Secur., 2017

A Hybrid Approach to Process Planning: The Urban Traffic Controller Example.
J. Comput. Sci., 2017

Fog computing security: a review of current applications and security solutions.
J. Cloud Comput., 2017

A Multi-layered Cloud Protection Framework.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

Causal Connections Mining Within Security Event Logs.
Proceedings of the Knowledge Capture Conference, 2017

Security auditing in the fog.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Edge Influence Computation in Dynamic Graphs.
Proceedings of the Database Systems for Advanced Applications, 2017

On the Exploitation of Automated Planning for Reducing Machine Tools Energy Consumption between Manufacturing Operations.
Proceedings of the Twenty-Seventh International Conference on Automated Planning and Scheduling, 2017

Towards A Multi-Tiered Knowledge-Based System for Autonomous Cloud Security Auditing.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Identification of irregularities and allocation suggestion of relative file system permissions.
J. Inf. Secur. Appl., 2016

Auditing file system permissions using association rule mining.
Expert Syst. Appl., 2016

Climate and human development impacts on municipal water demand: A spatially-explicit global modeling framework.
Environ. Model. Softw., 2016

2015
Multi-objective optimisation of machine tool error mapping using automated planning.
Expert Syst. Appl., 2015

2014
Automated planning to minimise uncertainty of machine tool calibration.
Eng. Appl. Artif. Intell., 2014

Automated Planning for Multi-Objective Machine Tool Calibration: Optimising Makespan and Measurement Uncertainty.
Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014

2013
A Novel Software Tool for Analysing NT File System Permissions.
CoRR, 2013

2012
Automatic planning for machine tool calibration: A case study.
Expert Syst. Appl., 2012

A test bed for self-regulating distribution systems: Modeling integrated renewable energy and demand response in the GridLAB-D/MATLAB environment.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

The Application of Automated Planning to Machine Tool Calibration.
Proceedings of the Twenty-Second International Conference on Automated Planning and Scheduling, 2012

2011
Energy efficient communication networks design for demand response in smart grid.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011

Representing the process of machine tool calibration on first-order logic.
Proceedings of the 17th International Conference on Automation and Computing, 2011

1993
Sensing Surface Shape by Touch.
Proceedings of the 1993 IEEE International Conference on Robotics and Automation, 1993


  Loading...