Liverpool Skyline

Department of Computer Science

Dr Aine Mac Dermott

Dr Aine Mac Dermott

Biography

Dr Áine MacDermott is a Senior Lecturer in Cyber Security and IoT at Liverpool John Moores University. Áine teaches on both the Computer Forensics and Computer Security programmes in the Department of Computer Science. She obtained her PhD in Network Security from Liverpool John Moores University in 2017, and a first class BSc (Hons) in Computer Forensics in 2011.

Previously, Áine worked as an Associate Tutor at Edge Hill University for two academic years, providing her personal knowledge and experience of Computer Science – in particular that of computer networking, digital forensics and cyber security.

Degrees

Liverpool John Moores University, UK, PhD
Liverpool John Moores University, UK, BSc (Hons) Computer Forensics

Academic appointments

Senior Lecturer in Cyber Security and IoT, Computer Science, Liverpool John Moores University, 2017 - present

Postgraduate training

Fellow of Higher Education Academy, UK, Liverpool John Moores University, 2018 - present
Associate Fellow of Higher Education Academy, United Kingdom, Liverpool John Moores University, Liverpool, 2014 - 2018

Publications

Highlighted publications

Mac Dermott AM, Shamsa TB, Shi Q. 2018. IoT Forensics: Challenges For The IoA Era 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) :1-5 >DOI

Mac Dermott AM, Shi Q, Kifayat K. 2017. Distributed attack prevention using Dempster-Shafer theory of evidence Huang DS., Hussain A., Han K., Gromiha M. (eds) Intelligent Computing Methodologies., International Conference on Intelligent Computing (ICIC 2017) Lecture Notes in Computer Science, vol 10363. :203-212 >DOI

MacDermott Á, Shi Q, Merabti M, Kifayat K. 2015. Hosting critical infrastructure services in the cloud environment considerations International Journal of Critical Infrastructures, 11 :365-381 >DOI

Chapters

Jaitner ML, MacDermott Á. 2018. Arts and branches of science significantly contributing to cyber and cyber security: The West European and the Russian views Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications :977-994 9781522556350 >DOI

Conference publication

Mac Dermott AM, Shamsa TB, Shi Q. 2018. IoT Forensics: Challenges For The IoA Era 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) :1-5 >DOI

Mac Dermott AM, Shi Q, Kifayat K. 2017. Distributed attack prevention using Dempster-Shafer theory of evidence Huang DS., Hussain A., Han K., Gromiha M. (eds) Intelligent Computing Methodologies., International Conference on Intelligent Computing (ICIC 2017) Lecture Notes in Computer Science, vol 10363. :203-212 >DOI

Alghamdi M, Al-Jumeily D, Hussain A, Mac Dermott A. 2016. A Proposed Tutoring System to Support the Learning of Computer Programming: Case Study Proceedings of the 2016 SAI Computing Conference (SAI), SAI Computing Conference (SAI) :875-880 >Link

Hamid T, MacDermott A. 2016. A Methodology to Develop Dynamic Cost-Centric Risk Impact Metrics Proceedings - 2015 International Conference on Developments in eSystems Engineering, DeSE 2015, :53-59 >DOI

MacDermott A, Shi Q, Kifayat K. 2015. Collaborative Intrusion Detection in a Federated Cloud Environment Using the Dempster-Shafer Theory of Evidence Abouzakhar N. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 14th European Conference on Cyber Warfare and Security (ECCWS) :195-203 >Link

Jaitner M, Macdermott A. 2015. Cyber education? Branches of science contributing to the cyber domain European Conference on Information Warfare and Security, ECCWS, 2015-January :120-128

MacDermott A, Shi Q, Kifayat K. 2015. Detecting Intrusions in Federated Cloud Environments Using Security as a Service Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :91-96 >DOI >Link

Al-Jumeily D, Hussain A, MacDermott A, Murphy J. 2015. Improving the barrier of communication between healthcare professionals and their patients using a Prescription Tracking System Liatsis P, Uus A, Miah S. 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015), 22nd International Conference on Systems, Signals and Image Processing (IWSSIP) :282-286 >Link

Lever KE, MacDermott A, Kifayat K. 2015. Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :47-52 >DOI >Link

Al-Jumeily D, Hussain A, MacDermott A, Tawfik H, Seeckts G, Lunn J. 2015. The Development of Fraud Detection Systems for Detection of Potentially Fraudulent Applications Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :7-13 >DOI >Link

Buck P, Shi Q, MacDermott A. 2015. A Selective Regression Testing Approach for Composite Web Services Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :97-101 >DOI >Link

Al-Jumeily D, Hussain A, MacDermott A, Tawfik H, Murphy J. 2015. Improving Communication Between Healthcare Professionals and Their Patients Through a Prescription Tracking System Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :218-224 >DOI >Link

Al-Jumeily D, Hussain A, MacDermott A, Seeckts G, Lunn J. 2015. Methods and Techniques to Support the Development of Fraud Detection System Liatsis P, Uus A, Miah S. 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015), 22nd International Conference on Systems, Signals and Image Processing (IWSSIP) :224-227 >Link

MacDermott A, Hurst W, Shi Q, Merabti M. 2014. Simulating Critical Infrastructure Cascading Failure AlDabass D, Orsoni A, Cant R, Yunus J, Ibrahim Z, Saad I. 2014 UKSIM-AMSS 16TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 16th UKSim-AMSS International Conference on Computer Modelling and Simulation (UKSim) :324-329 >DOI >Link

MacDermott A, Shi Q, Merabti M, Kifayat K. 2013. Protecting critical infrastructure services in the cloud environment European Conference on Information Warfare and Security, ECCWS, :336-343

MacDermott A, Shi Q, Merabti M, Kifiyat K. 2013. Considering an Elastic Scaling Model for Cloud Security 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 8th International Conference for Internet Technology and Secured Transactions (ICITST) :150-155 >Link

Vu Dinh P, Tran Nguyen N, Shone N, Mac Dermott A, Shi Q. Deep Learning Combined with De-noising Data for Network Intrusion Detection Intelligent and Evolutionary Systems (IES 2017)

Journal article

Chalmers C, Mackay M, MacDermott A. 2016. Securing the smart grid: threats and remediation International Journal of Smart Grid and Green Communications, 1 :166-166 >DOI

Jaitner ML, MacDermott Á. 2016. Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: International Journal of Cyber Warfare and Terrorism, 6 :24-40 >DOI

MacDermott Á, Shi Q, Merabti M, Kifayat K. 2015. Hosting critical infrastructure services in the cloud environment considerations International Journal of Critical Infrastructures, 11 :365-381 >DOI

Mac Dermott AM, Shi Q, Kifayat K. 2014. An elastic scaling method for cloud security The Journal of Internet Technology and Secured Transactions (JITST), 3 :254-262 >DOI

Mac Dermott AM, Shamsa TB, Buck P, Iqbal F, Shi Q. The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics International Journal of Digital Crime and Forensics (IJDCF),

Mac Dermott AM, Shi Q, Kifayat K. Collaborative Intrusion Detection in Federated Cloud Environments Journal of Computer Sciences and Applications, 3 :10-20 >DOI

Hurst W, Mac Dermott A. Evaluating the Effects of Cascading Failures in a Network of Critical Infrastructures Inderscience International Journal of System of Systems Engineering,

Thesis/Dissertation

Mac Dermott AM. Collaborative Intrusion Detection in Federated Cloud Environments using Dempster-Shafer Theory of Evidence Shi Q, Kifayat K.

Engagement & Impact

Media Coverage:

http://www.eolasmagazine.ie/demystifying-applied-iot-and-security-considerations/, An article on Dr MacDermott's research and role within the Department of Computer Science was published in an Eolas magazine issue entitled 'Demystifying applied IoT and security considerations' in their cyber security report section.

Other invited event:

Westminster eForum Keynote, London, Dr MacDermott delivered a keynote address to the Westminster eForum Keynote Seminar: Internet of Things - commercial opportunities, service development and connected homes, on 22nd May 2018.

State of the Art: Internet of Things, Liverpool, Dr MacDermott presented her research and offered a detailed primer on IoT utilisation by SMEs at "State of the Art: Internet of Things", organised by LCRActivate, LJMU, & FACT Liverpool on 3rd May 2018. Link available: http://networkhub.sci-techdaresbury.com/event/lcr-activate-event-state-of-the-art-internet-of-things/

Digital Government 2018, Belfast, Dr. Áine MacDermott was invited to speak about emerging trends in IoT and addressing security issues at the Digital Government meeting. Link available: http://www.digitalgovernment.agendani.com/speaker/dr-aine-macdermott/