Dr Nathan Shone

School of Computer Science and Mathematics

Journal article

Hurst W, Montañez CAC, Shone N. 2020. Time-Pattern Profiling from Smart Meter Data to Detect Outliers in Energy Consumption IoT, 1 :92-108 DOI Publisher Url Public Url

Hurst W, Boddy A, Merabti M, Shone N. 2020. Patient privacy violation detection in healthcare critical infrastructures: An investigation using density-based benchmarking Future Internet, 12 DOI

Hurst W, Curbelo Montañez CA, Shone N, Al-Jumeily D. 2020. An Ensemble Detection Model using Multinomial Classification of Stochastic Gas Smart Meter Data to Improve Wellbeing Monitoring in Smart Cities IEEE Access, 8 :7877-7898 DOI Author Url Public Url

Shone N, Tran Nguyen N, Vu Dinh P, Shi Q. 2018. A Deep Learning Approach to Network Intrusion Detection IEEE Transactions on Emerging Topics in Computational Intelligence, 2 :41-50 DOI Publisher Url Public Url

Hurst W, Shone N, Shi Q, Bazli B. 2017. Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research International Journal On Advances in Security, 10 :114-125 Publisher Url Public Url

Hurst W, Shone N. 2016. Introduction International Journal of Critical Computer-Based Systems, 6 :171-172

Lee G, Shone N. BAT: block analytics tool integrated with blockchain based IoT platform Electronics, DOI Author Url Public Url

Conference publication

Hurst W, Montanez CAC, Shone N. 2020. Towards an approach for fuel poverty detection from gas smart meter data using decision tree learning ACM International Conference Proceeding Series, :23-28 DOI

Banton M, Shone N, Hurst W, Shi Q. 2020. Intrusion Detection Using Extremely Limited Data Based on SDN 2020 IEEE 10th International Conference on Intelligent Systems, IS 2020 - Proceedings, :304-309 DOI

Tu NM, Hung NV, Anh PV, Van Loi C, Shone N. 2020. Detecting Malware Based on Dynamic Analysis Techniques Using Deep Graph Learning Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12466 LNCS :357-378 DOI

Banton M, Shone N, Hurst W, Shi Q. 2019. A Fresh Look at Combining Logs and Network Data to Detect Anomalous Activity HadjadjAoul Y. 2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019), 6th International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) DOI Author Url

Nguyen Viet H, Nguyen Van Q, Thi Trang LL, Shone N. 2018. Using Deep Learning Model for Network Scanning Detection Proceedings of the 4th International Conference on Frontiers of Educational Technologies, ICFET '18 Proceedings of the 4th International Conference on Frontiers of Educational Technologies DOI Publisher Url Public Url

Vu Dinh P, Tran Nguyen N, Shone N, Mac Dermott A, Shi Q. 2017. Deep Learning Combined with De-noising Data for Network Intrusion Detection 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES), Intelligent and Evolutionary Systems (IES 2017) DOI Author Url Publisher Url Public Url

Hurst W, Shone N, Shi Q, Bazli B. 2016. MICRO-CI: A Testbed for Cyber-Security Research he Eighth International Conference on Emerging Networks and Systems Intelligence Public Url

Latham K, Hurst W, Shone N, El Rhalibi A. 2016. A Case Study on the Advantages of 3D Walkthroughs over Photo Stitching Techniques IEEE International Conference on Virtual Reality and Visualization (ICVRV 2016) DOI Author Url Public Url

Panton T, Llewellyn-Jones D, Shone N, Hashem Eiza M. 2016. Secure Proximity-Based Identity Pairing using an Untrusted Signalling Service The 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) DOI Author Url Public Url

Shone N, Dobbins C, Hurst W, Shi Q. 2016. Digital Memories Based Mobile User Authentication for IoT 015 IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15) :1796-1802 DOI Author Url Publisher Url Public Url

Hashem Eiza M, Randles M, Johnson P, Shone N, Pang J, Bhih A. 2015. Rail Internet of Things: An Architectural Platform and Assured Requirements Model 15th IEEE International Conference on Computer and Information Technology (CIT-2015) :364-370 DOI Author Url Publisher Url Public Url

Hurst W, Shone N, Monnet Q. 2015. Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015) DOI Author Url Publisher Url Public Url

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Securing complex system-of-systems compositions European Conference on Information Warfare and Security, ECCWS, 12th European Conference on Cyber Warfare and Security ECCWS-2013 :370-379

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Misbehaviour monitoring on system-of-systems components International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013, :1-6 DOI Author Url Publisher Url

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 DOI Author Url Publisher Url

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Detecting Behavioural Anomalies in System-of-Systems Components Proceedings of 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013), 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013)

Shone N, Shi Q, Merabti M, Kifayat K. 2012. Securing a System-of-Systems From Component Misbehaviour Proceedings of the 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012), 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012) Publisher Url

Shone N, Shi Q, Merabti M, Kifayat K. 2011. System-of-Systems Monitoring: A Survey Proceedings of 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011), 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011) Publisher Url

Hurst W, Shone N, El Rhalibi A, Happe A, Kotze B, Duncan B. Advancing the Micro-CI Testbed for IoT Cyber-Security Research and Education CLOUD COMPUTING 2017 : The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization Publisher Url Public Url

Hurst W. Developing a Productivity Accelerator Platform to Support UK Businesses in the Industry 4.0 Revolution Third International Congress on Information and Communication Technology DOI Author Url

Hurst W, Shone N, Tully D. Investigations into the Development of a Knowledge Transfer Platform for Business The 5th IEEE International Conference on Information Management (ICIM2019) DOI Author Url Public Url

Hurst W, Shone N, Shi Q. Critical Infrastructure Testbed for Cyber-security Training and Research 21st UKAIS Conference on Information Systems,

Dinh Vu P, Shone N, Phan Huy D, Shi Q, Nguyen Viet H, Tran Nguyen N. Behaviour-aware Malware Classification: Dynamic Feature Selection 11th International Conference on Knowledge and Systems Engineering (KSE) DOI Author Url Public Url

Top