Liverpool Skyline

Department of Computer Science

Dr Nathan Shone

Dr Nathan Shone

Publications

Conference Publication (journal proceedings)

Latham K, Hurst W, Shone N, El Rhalibi A, Pan Z. 2016. A Case Study on the Advantages of 3D Walkthroughs over Photo Stitching Techniques Chen J, Wang DX, Ding D, Luo X. 2016 INTERNATIONAL CONFERENCE ON VIRTUAL REALITY AND VISUALIZATION (ICVRV 2016), 6th International Conference on Virtual Reality and Visualization (ICVRV) :364-371 >DOI >Link

Hurst W, Shone N, Shi Q, Bazli B. 2016. MICRO-CI: A Testbed for Cyber-Security Research he Eighth International Conference on Emerging Networks and Systems Intelligence

Panton T, Llewellyn-Jones D, Shone N, Eiza MH. 2016. Secure Proximity-Based Identity Pairing using an Untrusted Signalling Service 2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 13th IEEE Annual Consumer Communications and Networking Conference (CCNC) >Link

Eiza MH, Randles M, Johnson P, Shone N, Pang J, Bhih A. 2015. Rail Internet of Things: An Architectural Platform and Assured Requirements Model Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :364-370 >DOI >Link

Hurst W, Shone N, Monnet Q. 2015. Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :1698-1703 >DOI >Link

Shone N, Dobbins C, Hurst W, Shi Q. 2015. Digital Memories Based Mobile User Authentication for IoT Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :1797-1803 >DOI >Link

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Detecting Behavioural Anomalies in System-of-Systems Components Proceedings of 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013), 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013)

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Misbehaviour Monitoring on System-of-Systems Components Crispo B, Sandhu R, CuppensBoulahia N, Conti M, Lanet JL. 2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 8th International Conference on Risks and Security of Internet and Systems (CRiSIS) >Link

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 >DOI >Link

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Securing complex system-of-systems compositions European Conference on Information Warfare and Security, ECCWS, 12th European Conference on Cyber Warfare and Security ECCWS-2013 :370-379

Shone N, Shi Q, Merabti M, Kifayat K. 2012. Securing a System-of-Systems From Component Misbehaviour Proceedings of the 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012), 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012)

Shone N, Shi Q, Merabti M, Kifayat K. 2011. System-of-Systems Monitoring: A Survey Proceedings of 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011), 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011)

Hurst W, Shone N, El Rhalibi A, Happe A, Kotze B, Duncan B. Advancing the Micro-CI Testbed for IoT Cyber-Security Research and Education CLOUD COMPUTING 2017 : The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization

Journal Articles

Hurst W, Shone N. 2016. Introduction International Journal of Critical Computer-Based Systems, 6 :171-172

Shone N, Tran Nguyen N, Vu Dinh P, Shi Q. A Deep Learning Approach to Network Intrusion Detection IEEE Transactions on Emerging Topics in Computational Intelligence,

Hurst W, Shone N, Shi Q, Bazli B. Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research International Journal On Advances in Security, 10