Image of Dr Nathan Shone

Dr Nathan Shone

School of Computer Science and Mathematics

Faculty of Engineering and Technology

Email: N.Shone@ljmu.ac.uk

Telephone: 0151 231 2535

Conference publication

Nguyen VQ, Ngo TL, Nguyen LM, Nguyen VH, Shone N. 2024. Deep Nested Clustering Auto-Encoder for Anomaly-Based Network Intrusion Detection 2023 RIVF International Conference on Computing and Communication Technologies (RIVF), 2023 RIVF IEEE International Conference on Computing and Communication Technologies :289-294 DOI Publisher Url Public Url

Ninh TP, Hung Nguyen V, Shone N, Babenko M. 2022. Function Exclusion in Automated Security Patch Testing Using Chopped Symbolic Execution 2021 18th NAFOSTED Conference on Information and Computer Science (NICS), 2021 8th NAFOSTED Conference on Information and Computer Science (NICS) DOI Publisher Url Public Url

Quan NV, Nguyen VH, Cao VL, Le-Khac N-A, Shone N. 2022. A Robust PCA Feature Selection to Assist Deep Clustering Autoencoder-Based Network Anomaly Detection 20218th NAFOSTED Conference on Information and Computer Science (NICS), 2021 8th NAFOSTED Conference on Information and Computer Science (NICS) (NICS’21) DOI Publisher Url Public Url

Nguyen VQ, Nguyen VH, Hoang TH, Shone N. 2022. A Novel Deep Clustering Variational Auto-Encoder for Anomaly-based Network Intrusion Detection Proceedings - International Conference on Knowledge and Systems Engineering, KSE, 2022-October DOI Publisher Url

Hurst W, Montanez CAC, Shone N. 2020. Towards an approach for fuel poverty detection from gas smart meter data using decision tree learning ACM International Conference Proceeding Series, :23-28 DOI Publisher Url

Banton M, Shone N, Hurst W, Shi Q. 2020. Intrusion Detection Using Extremely Limited Data Based on SDN 2020 IEEE 10th International Conference on Intelligent Systems, IS 2020 - Proceedings, :304-309 DOI Publisher Url

Tu NM, Hung NV, Anh PV, Van Loi C, Shone N. 2020. Detecting Malware Based on Dynamic Analysis Techniques Using Deep Graph Learning Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12466 LNCS :357-378 DOI Publisher Url

Banton M, Shone N, Hurst W, Shi Q. 2019. A Fresh Look at Combining Logs and Network Data to Detect Anomalous Activity HadjadjAoul Y. 2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019), 6th International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) DOI Author Url Publisher Url

Nguyen Viet H, Nguyen Van Q, Thi Trang LL, Shone N. 2018. Using Deep Learning Model for Network Scanning Detection Proceedings of the 4th International Conference on Frontiers of Educational Technologies, ICFET '18 Proceedings of the 4th International Conference on Frontiers of Educational Technologies DOI Publisher Url Public Url

Vu Dinh P, Tran Nguyen N, Shone N, Mac Dermott A, Shi Q. 2017. Deep Learning Combined with De-noising Data for Network Intrusion Detection 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES), Intelligent and Evolutionary Systems (IES 2017) DOI Author Url Publisher Url Public Url

Hurst W, Shone N, El Rhalibi A, Happe A, Kotze B, Duncan B. 2017. Advancing the Micro-CI Testbed for IoT Cyber-Security Research and Education Think Mind, CLOUD COMPUTING 2017 : The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization :129-134 Publisher Url Public Url

Hurst W, Shone N, Shi Q, Bazli B. 2016. MICRO-CI: A Testbed for Cyber-Security Research EMERGING 2016: The Eighth International Conference on Emerging Networks and Systems Intelligence, The Eighth International Conference on Emerging Networks and Systems Intelligence :17-22 Publisher Url Public Url

Panton T, Llewellyn-Jones D, Shone N, Hashem Eiza M. 2016. Secure Proximity-Based Identity Pairing using an Untrusted Signalling Service 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), The 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) DOI Author Url Publisher Url Public Url

Hashem Eiza M, Randles M, Johnson P, Shone N, Pang J, Bhih A. 2015. Rail Internet of Things: An Architectural Platform and Assured Requirements Model 15th IEEE International Conference on Computer and Information Technology (CIT-2015), 15th IEEE International Conference on Computer and Information Technology (CIT-2015) :364-370 DOI Author Url Publisher Url Public Url

Shone N, Dobbins C, Hurst W, Shi Q. 2015. Digital Memories Based Mobile User Authentication for IoT 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15) :1796-1802 DOI Author Url Publisher Url Public Url

Hurst W, Shone N, Monnet Q. 2015. Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015) :1697-1702 DOI Author Url Publisher Url Public Url

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Securing complex system-of-systems compositions European Conference on Information Warfare and Security, ECCWS, 12th European Conference on Cyber Warfare and Security ECCWS-2013 :370-379

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Misbehaviour monitoring on system-of-systems components International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013, :1-6 DOI Author Url Publisher Url

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 DOI Author Url Publisher Url

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Detecting Behavioural Anomalies in System-of-Systems Components Proceedings of 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013), 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013)

Shone N, Shi Q, Merabti M, Kifayat K. 2012. Securing a System-of-Systems From Component Misbehaviour Proceedings of the 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012), 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012) Publisher Url

Shone N, Shi Q, Merabti M, Kifayat K. 2011. System-of-Systems Monitoring: A Survey Proceedings of 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011), 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011) Publisher Url

Latham K, Hurst W, Shone N, El Rhalibi A, Pan Z. A Case Study on the Advantages of 3D Walkthroughs over Photo Stitching Techniques IEEE International Conference on Virtual Reality and Visualization (ICVRV 2016) DOI Author Url Publisher Url Public Url

Hurst W. Developing a Productivity Accelerator Platform to Support UK Businesses in the Industry 4.0 Revolution Third International Congress on Information and Communication Technology DOI Author Url Publisher Url

Hurst W, Shone N, Tully D. Investigations into the Development of a Knowledge Transfer Platform for Business The 5th IEEE International Conference on Information Management (ICIM2019) DOI Author Url Publisher Url Public Url

Hurst W, Shone N, Shi Q. Critical Infrastructure Testbed for Cyber-security Training and Research 21st UKAIS Conference on Information Systems,

Dinh Vu P, Shone N, Phan Huy D, Shi Q, Nguyen Viet H, Tran Nguyen N. Behaviour-aware Malware Classification: Dynamic Feature Selection IEEE Explore, 11th International Conference on Knowledge and Systems Engineering (KSE) DOI Author Url Publisher Url Public Url

Journal article

Nguyen MT, Nguyen VH, Shone N. 2023. Using deep graph learning to improve dynamic analysis-based malware detection in PE Files Journal of Computer Virology and Hacking Techniques, DOI Publisher Url Public Url

Hurst W, Tekinerdogan B, Alskaif T, Boddy A, Shone N. 2022. Securing electronic health records against insider-threats: A supervised machine learning approach Smart Health, 26 DOI Publisher Url Public Url

Edussuriya C, Vithanage K, Bandara N, Alawatugoda J, Sandirigama M, Jayasinghe U, Shone N, Lee GM. 2020. BAT: block analytics tool integrated with blockchain based IoT platform Electronics, 9 DOI Author Url Publisher Url Public Url

Hurst W, Montañez CAC, Shone N. 2020. Time-Pattern Profiling from Smart Meter Data to Detect Outliers in Energy Consumption IoT, 1 :92-108 DOI Publisher Url Public Url

Hurst W, Boddy A, Merabti M, Shone N. 2020. Patient privacy violation detection in healthcare critical infrastructures: An investigation using density-based benchmarking Future Internet, 12 DOI Publisher Url

Hurst W, Curbelo Montañez CA, Shone N, Al-Jumeily D. 2020. An Ensemble Detection Model using Multinomial Classification of Stochastic Gas Smart Meter Data to Improve Wellbeing Monitoring in Smart Cities IEEE Access, 8 :7877-7898 DOI Author Url Publisher Url Public Url

Shone N, Tran Nguyen N, Vu Dinh P, Shi Q. 2018. A Deep Learning Approach to Network Intrusion Detection IEEE Transactions on Emerging Topics in Computational Intelligence, 2 DOI Author Url Publisher Url Public Url

Hurst W, Shone N, Shi Q, Bazli B. 2017. Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research International Journal On Advances in Security, 10 :114-125 Publisher Url Public Url

Hurst W, Shone N. 2016. Introduction International Journal of Critical Computer-Based Systems, 6 :171-172

Chapters

Hurst W, Shone N. 2023. Critical infrastructure security: Cyber-threats, legacy systems and weakening segmentation Management and Engineering of Critical Infrastructures :265-286 9780323993319 DOI Publisher Url

Thesis/Dissertation

Shone N. Detecting Misbehaviour in a Complex System-of-Systems Environment Shi QI, Merabti MADJID, Kifayat KASHIF. Public Url

Top