Liverpool Skyline

Department of Computer Science

Ms Aine Mac Dermott

Ms Aine Mac Dermott

Publications

Conference Publication (journal proceedings)

MacDermott Á, Shi Q, Kifayat K. 2017. Distributed attack prevention using dempster-shafer theory of evidence Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10363 LNAI :203-212 >DOI

Alghamdi M, Al-Jumeily D, Hussain A, Mac Dermott A. 2016. A Proposed Tutoring System to Support the Learning of Computer Programming: Case Study Proceedings of the 2016 SAI Computing Conference (SAI), SAI Computing Conference (SAI) :875-880 >Link

Hamid T, MacDermott A. 2016. A Methodology to Develop Dynamic Cost-Centric Risk Impact Metrics Proceedings - 2015 International Conference on Developments in eSystems Engineering, DeSE 2015, :53-59 >DOI

MacDermott A, Shi Q, Kifayat K. 2015. Collaborative Intrusion Detection in a Federated Cloud Environment Using the Dempster-Shafer Theory of Evidence Abouzakhar N. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 14th European Conference on Cyber Warfare and Security (ECCWS) :195-203 >Link

Jaitner M, Macdermott A. 2015. Cyber education? Branches of science contributing to the cyber domain European Conference on Information Warfare and Security, ECCWS, 2015-January :120-128

MacDermott A, Shi Q, Kifayat K. 2015. Detecting Intrusions in Federated Cloud Environments Using Security as a Service Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :91-96 >DOI >Link

Al-Jumeily D, Hussain A, MacDermott A, Murphy J. 2015. Improving the barrier of communication between healthcare professionals and their patients using a Prescription Tracking System Liatsis P, Uus A, Miah S. 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015), 22nd International Conference on Systems, Signals and Image Processing (IWSSIP) :282-286 >Link

Lever KE, MacDermott A, Kifayat K. 2015. Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :47-52 >DOI >Link

Al-Jumeily D, Hussain A, MacDermott A, Tawfik H, Seeckts G, Lunn J. 2015. The Development of Fraud Detection Systems for Detection of Potentially Fraudulent Applications Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :7-13 >DOI >Link

Buck P, Shi Q, MacDermott A. 2015. A Selective Regression Testing Approach for Composite Web Services Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :97-101 >DOI >Link

Al-Jumeily D, Hussain A, MacDermott A, Tawfik H, Murphy J. 2015. Improving Communication Between Healthcare Professionals and Their Patients Through a Prescription Tracking System Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :218-224 >DOI >Link

Al-Jumeily D, Hussain A, MacDermott A, Seeckts G, Lunn J. 2015. Methods and Techniques to Support the Development of Fraud Detection System Liatsis P, Uus A, Miah S. 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015), 22nd International Conference on Systems, Signals and Image Processing (IWSSIP) :224-227 >Link

MacDermott A, Hurst W, Shi Q, Merabti M. 2014. Simulating Critical Infrastructure Cascading Failure AlDabass D, Orsoni A, Cant R, Yunus J, Ibrahim Z, Saad I. 2014 UKSIM-AMSS 16TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 16th UKSim-AMSS International Conference on Computer Modelling and Simulation (UKSim) :324-329 >DOI >Link

MacDermott A, Shi Q, Merabti M, Kifayat K. 2013. Protecting critical infrastructure services in the cloud environment European Conference on Information Warfare and Security, ECCWS, :336-343

MacDermott A, Shi Q, Merabti M, Kifiyat K. 2013. Considering an Elastic Scaling Model for Cloud Security 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 8th International Conference for Internet Technology and Secured Transactions (ICITST) :150-155 >Link

Journal Articles

Chalmers C, Mackay M, MacDermott A. 2016. Securing the smart grid: threats and remediation International Journal of Smart Grid and Green Communications, 1 :166-166 >DOI

Jaitner ML, MacDermott Á. 2016. Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: International Journal of Cyber Warfare and Terrorism, 6 :24-40 >DOI

MacDermott Á, Shi Q, Merabti M, Kifayat K. 2015. Hosting critical infrastructure services in the cloud environment considerations International Journal of Critical Infrastructures, 11 :365-381 >DOI

Hurst W, MacDermott Á. 2015. Evaluating the effects of cascading failures in a network of critical infrastructures International Journal of System of Systems Engineering, 6 :221-236 >DOI

MacDermott Á, Shi Q, Merabti M, Kifayat K. 2014. An Elastic Scaling Method for Cloud Security Journal of Internet Technology and Secured Transaction, 3 :254-262 >DOI

Mac Dermott AM, Shi Q, Kifayat K. Collaborative Intrusion Detection in Federated Cloud Environments Journal of Computer Sciences and Applications, 3 :10-20 >DOI

Theses / Dissertations

Mac Dermott AM. Collaborative Intrusion Detection in Federated Cloud Environments using Dempster-Shafer Theory of Evidence Shi Q, Kifayat K.