Liverpool Skyline

Department of Computer Science

Dr Aine Mac Dermott

Dr Aine Mac Dermott

Telephone: 0151 231 2004

ORCID

Biography

Dr Áine MacDermott is a Senior Lecturer in Cyber Security and IoT at Liverpool John Moores University. Áine teaches on both the Computer Forensics and Computer Security programmes in the Department of Computer Science. She obtained her PhD in Network Security from Liverpool John Moores University in 2017, and a first class BSc (Hons) in Computer Forensics in 2011.

Previously, Áine worked as an Associate Tutor at Edge Hill University for two academic years, providing her personal knowledge and experience of Computer Science – in particular that of computer networking, digital forensics and cyber security.

Degrees

Liverpool John Moores University, UK, PhD
Liverpool John Moores University, UK, BSc (Hons) Computer Forensics

Academic appointments

Senior Lecturer in Cyber Security and IoT, Computer Science, Liverpool John Moores University, 2017 - present

Postgraduate training

Fellow of Higher Education Academy, UK, Liverpool John Moores University, 2018 - present
Associate Fellow of Higher Education Academy, United Kingdom, Liverpool John Moores University, Liverpool, 2014 - 2018

Publications

Highlighted publications

Mac Dermott A, Lea S, Iqbal F, Idowu I, Shah B. 2019. Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP watches 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 10th IFIP International Conference on New Technologies, Mobility and Security DOI Public Url

Mac Dermott A, Kendrick P, Idowu I, Ashall M, Shi Q. 2019. Securing Things in the Healthcare Internet of Things 2019 Global IoT Summit (GIoTS), Global IoT Summit DOI Author Url Public Url

Mac Dermott AM, Shamsa TB, Shi Q. 2018. IoT Forensics: Challenges For The IoA Era 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) :1-5 DOI Author Url Publisher Url Public Url

Mac Dermott AM, Shi Q, Kifayat K. 2017. Distributed attack prevention using Dempster-Shafer theory of evidence Huang DS., Hussain A., Han K., Gromiha M. (eds) Intelligent Computing Methodologies., International Conference on Intelligent Computing (ICIC 2017) Lecture Notes in Computer Science, vol 10363. :203-212 DOI Author Url Public Url

MacDermott Á, Shi Q, Merabti M, Kifayat K. 2015. Hosting critical infrastructure services in the cloud environment considerations International Journal of Critical Infrastructures, 11 :365-381 DOI Public Url

Journal article

Mac Dermott AM, Shamsa TB, Buck P, Iqbal F, Shi Q. 2019. The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics International Journal of Digital Crime and Forensics (IJDCF), 12 DOI Publisher Url Public Url

Jayasinghe U, Lee G, MacDermott, Á, Rhee WS. 2019. TrustChain: A Privacy Preserving Blockchain with Edge Computing Wireless Communications and Mobile Computing, DOI Author Url Publisher Url Public Url

Adewuyi AA, Cheng H, Shi Q, Cao J, MacDermott A, Wang X. 2019. CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things IEEE Internet of Things Journal, 6 :5432-5445 DOI Author Url Public Url

Shamsa TB, Asim M, Mac Dermott A, Iqbal F, Kamoun F, Shah B, Alfandi O, Hammoudeh M. 2019. A Secure Fog-based Platform for SCADA-based IoT Critical Infrastructure Software: Practice and Experience, DOI Public Url

MacDermott Á, Shi Q, Merabti M, Kifayat K. 2015. Hosting critical infrastructure services in the cloud environment considerations International Journal of Critical Infrastructures, 11 :365-381 DOI Public Url

Mac Dermott AM, Shi Q, Kifayat K. 2014. An elastic scaling method for cloud security The Journal of Internet Technology and Secured Transactions (JITST), 3 :254-262 DOI Public Url

Chalmers C, Mackay M, MacDermott A. Securing the smart grid: threats and remediation International Journal of Smart Grid and Green Communications, 1 :166-166 DOI

Jaitner ML, MacDermott Á. Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: International Journal of Cyber Warfare and Terrorism, 6 :24-40 DOI

Hurst W, Mac Dermott A. Evaluating the Effects of Cascading Failures in a Network of Critical Infrastructures Inderscience International Journal of System of Systems Engineering, DOI Public Url

Mac Dermott AM, Shi Q, Kifayat K. Collaborative Intrusion Detection in Federated Cloud Environments Journal of Computer Sciences and Applications, 3 :10-20 DOI Public Url

Al-Room K, Iqbal F, Shamsa TB, Shah B, Yankson B, Mac Dermott A, Hung P. Drones Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models International Journal of Digital Crime and Forensics (IJDCF), Public Url

Conference publication

Mac Dermott A, Lea S, Iqbal F, Idowu I, Shah B. 2019. Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP watches 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 10th IFIP International Conference on New Technologies, Mobility and Security DOI Public Url

Mac Dermott A, Kendrick P, Idowu I, Ashall M, Shi Q. 2019. Securing Things in the Healthcare Internet of Things 2019 Global IoT Summit (GIoTS), Global IoT Summit DOI Author Url Public Url

Lee GM. 2018. Trust-Based Data Controller for Personal Information Management IEEE 13th International Conference on Innovations in Information Technology DOI Author Url Public Url

Mac Dermott AM, Shamsa TB, Shi Q. 2018. IoT Forensics: Challenges For The IoA Era 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) :1-5 DOI Author Url Publisher Url Public Url

Vu Dinh P, Tran Nguyen N, Shone N, Mac Dermott A, Shi Q. 2017. Deep Learning Combined with De-noising Data for Network Intrusion Detection 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES), Intelligent and Evolutionary Systems (IES 2017) DOI Author Url Publisher Url Public Url

Mac Dermott AM, Shi Q, Kifayat K. 2017. Distributed attack prevention using Dempster-Shafer theory of evidence Huang DS., Hussain A., Han K., Gromiha M. (eds) Intelligent Computing Methodologies., International Conference on Intelligent Computing (ICIC 2017) Lecture Notes in Computer Science, vol 10363. :203-212 DOI Author Url Public Url

Alghamdi M, Al-Jumeily D, Hussain A, Mac Dermott A. 2016. A Proposed Tutoring System to Support the Learning of Computer Programming: Case Study Proceedings of the 2016 SAI Computing Conference (SAI), SAI Computing Conference (SAI) :875-880 DOI Author Url

MacDermott A, Shi Q, Kifayat K. 2015. Collaborative Intrusion Detection in a Federated Cloud Environment Using the Dempster-Shafer Theory of Evidence Abouzakhar N. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 14th European Conference on Cyber Warfare and Security (ECCWS) :195-203 Author Url

Al-Jumeily D, Hussain A, MacDermott A, Seeckts G, Lunn J. 2015. Methods and Techniques to Support the Development of Fraud Detection System Liatsis P, Uus A, Miah S. 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015), 22nd International Conference on Systems, Signals and Image Processing (IWSSIP) :224-227 DOI Author Url

Al-Jumeily D, Hussain A, MacDermott A, Murphy J. 2015. Improving the barrier of communication between healthcare professionals and their patients using a Prescription Tracking System Liatsis P, Uus A, Miah S. 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015), 22nd International Conference on Systems, Signals and Image Processing (IWSSIP) :282-286 DOI Author Url

Al-Jumeily D, Hussain A, MacDermott A, Tawfik H, Murphy J. 2015. Improving Communication Between Healthcare Professionals and Their Patients Through a Prescription Tracking System Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :218-224 DOI Author Url

Buck P, Shi Q, MacDermott A. 2015. A Selective Regression Testing Approach for Composite Web Services Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :97-101 DOI Author Url

Al-Jumeily D, Hussain A, MacDermott A, Tawfik H, Seeckts G, Lunn J. 2015. The Development of Fraud Detection Systems for Detection of Potentially Fraudulent Applications Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :7-13 DOI Author Url

Lever KE, MacDermott A, Kifayat K. 2015. Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :47-52 DOI Author Url

MacDermott A, Shi Q, Kifayat K. 2015. Detecting Intrusions in Federated Cloud Environments Using Security as a Service Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :91-96 DOI Author Url

Jaitner M, MacDermott A. 2015. Cyber Education? Branches of Science Contributing to the Cyber Domain Abouzakhar N. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 14th European Conference on Cyber Warfare and Security (ECCWS) :120-128 Author Url

Hamid T, MacDermott A. 2015. A Methodology to Develop Dynamic Cost-Centric Risk Impact Metrics Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :53-59 DOI Author Url

MacDermott A, Hurst W, Shi Q, Merabti M. 2014. Simulating Critical Infrastructure Cascading Failure AlDabass D, Orsoni A, Cant R, Yunus J, Ibrahim Z, Saad I. 2014 UKSIM-AMSS 16TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 16th UKSim-AMSS International Conference on Computer Modelling and Simulation (UKSim) :324-329 DOI Author Url

MacDermott A, Shi Q, Merabti M, Kifayat K. 2013. Protecting critical infrastructure services in the cloud environment European Conference on Information Warfare and Security, ECCWS, :336-343

MacDermott A, Shi Q, Merabti M, Kifiyat K. 2013. Considering an Elastic Scaling Model for Cloud Security 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 8th International Conference for Internet Technology and Secured Transactions (ICITST) :150-155 DOI Author Url

Chapters

Jaitner ML, MacDermott Á. 2018. Arts and branches of science significantly contributing to cyber and cyber security: The West European and the Russian views Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications :977-994 9781522556343 DOI

Thesis/Dissertation

Mac Dermott AM. Collaborative Intrusion Detection in Federated Cloud Environments using Dempster-Shafer Theory of Evidence Shi Q, Kifayat K. Public Url

Engagement & Impact

Other invited event:

IoT security and autonomous vehicles, Belfast Met - Springvale Campus, e3 Building - 398 Springfield Road - BT12 7DU Belfast - United Kingdom, Dr. MacDermott presents benefits and values of IoT applications for commercial operations. Title and abstract from the talk can be seen below: The Internet of Everything The Internet of Things (IoT) and the Industrial Internet of Things (IIoT) are growing in prominence and adoption. However, while is it known there are associated privacy and security challenges, the benefits and value for commercial operations often outweigh these. Clearly, the IIoT has more demonstrable value. Consumer IoT is a younger market to IIoT, but as it matures there is a ‘secure by design’ standard being encouraged, and development of organisational policies and procedures. Cybersecurity, data security and privacy are key, but resilience and accountability is a more realistic action going forward. GDPR compliance and associated costs make protecting IoT devices and improving resilience and exchange logging imperative. This talk takes a security and digital forensic look at the IoT and IIoT; offering insight and analysis on this emerging paradigm and explores ‘are they more than just interconnected ‘things’?’. 2019

Westminster eForum Keynote, London, Dr MacDermott delivered a keynote address to the Westminster eForum Keynote Seminar: Internet of Things - commercial opportunities, service development and connected homes, on 22nd May 2018.. 2018

State of the Art: Internet of Things, Liverpool, Dr MacDermott presented her research and offered a detailed primer on IoT utilisation by SMEs at "State of the Art: Internet of Things", organised by LCRActivate, LJMU, & FACT Liverpool on 3rd May 2018. Link available: http://networkhub.sci-techdaresbury.com/event/lcr-activate-event-state-of-the-art-internet-of-things/. 2018

Digital Government 2018, Belfast, Dr. Áine MacDermott was invited to speak about emerging trends in IoT and addressing security issues at the Digital Government meeting. Link available: http://www.digitalgovernment.agendani.com/speaker/dr-aine-macdermott/. 2018

Media Coverage:

http://www.eolasmagazine.ie/demystifying-applied-iot-and-security-considerations/, An article on Dr MacDermott's research and role within the Department of Computer Science was published in an Eolas magazine issue entitled 'Demystifying applied IoT and security considerations' in their cyber security report section..

https://bringitonni.co.uk/app/uploads/2019/03/Bring-IT-On-News-Dr-Aine-MacDermott.pdf, Bring It On Ni profiled Áine as a role model and inspiring woman in tech as part of their International Women’s Day promotion:.

https://syncni.com/view/1970/io-t-cyber-security-is-a-serious-problem-that-needs-real-solutions, SYNC NI wrote an article based on a talk Dr MacDermott gave at Belfast Metropolitan College (18th February 2019). The article highlights the topics covered and Áine’s expertise in the area..

https://www.agendani.com/demystifying-applied-iot-and-security-considerations/, An article Áine wrote was published in Agenda NIs recent issue (March 2019). "Demystifying applied IoT and security considerations highlights issues discussed at Digital Government conference 2018:.