Dr Nathan Shone
School of Computer Science and Mathematics

Email address: N.Shone@ljmu.ac.uk
Telephone: 0151 231 2535
Journal article
Hurst W, Montañez CAC, Shone N. 2020. Time-Pattern Profiling from Smart Meter Data to Detect Outliers in Energy Consumption IoT, 1 :92-108 DOI Publisher Url Public Url
Hurst W, Boddy A, Merabti M, Shone N. 2020. Patient privacy violation detection in healthcare critical infrastructures: An investigation using density-based benchmarking Future Internet, 12 DOI
Hurst W, Curbelo Montañez CA, Shone N, Al-Jumeily D. 2020. An Ensemble Detection Model using Multinomial Classification of Stochastic Gas Smart Meter Data to Improve Wellbeing Monitoring in Smart Cities IEEE Access, 8 :7877-7898 DOI Author Url Public Url
Shone N, Tran Nguyen N, Vu Dinh P, Shi Q. 2018. A Deep Learning Approach to Network Intrusion Detection IEEE Transactions on Emerging Topics in Computational Intelligence, 2 :41-50 DOI Publisher Url Public Url
Hurst W, Shone N, Shi Q, Bazli B. 2017. Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research International Journal On Advances in Security, 10 :114-125 Publisher Url Public Url
Hurst W, Shone N. 2016. Introduction International Journal of Critical Computer-Based Systems, 6 :171-172
Lee G, Shone N. BAT: block analytics tool integrated with blockchain based IoT platform Electronics, DOI Author Url Public Url
Conference publication
Hurst W, Montanez CAC, Shone N. 2020. Towards an approach for fuel poverty detection from gas smart meter data using decision tree learning ACM International Conference Proceeding Series, :23-28 DOI
Banton M, Shone N, Hurst W, Shi Q. 2020. Intrusion Detection Using Extremely Limited Data Based on SDN 2020 IEEE 10th International Conference on Intelligent Systems, IS 2020 - Proceedings, :304-309 DOI
Tu NM, Hung NV, Anh PV, Van Loi C, Shone N. 2020. Detecting Malware Based on Dynamic Analysis Techniques Using Deep Graph Learning Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12466 LNCS :357-378 DOI
Banton M, Shone N, Hurst W, Shi Q. 2019. A Fresh Look at Combining Logs and Network Data to Detect Anomalous Activity HadjadjAoul Y. 2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019), 6th International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) DOI Author Url
Nguyen Viet H, Nguyen Van Q, Thi Trang LL, Shone N. 2018. Using Deep Learning Model for Network Scanning Detection Proceedings of the 4th International Conference on Frontiers of Educational Technologies, ICFET '18 Proceedings of the 4th International Conference on Frontiers of Educational Technologies DOI Publisher Url Public Url
Vu Dinh P, Tran Nguyen N, Shone N, Mac Dermott A, Shi Q. 2017. Deep Learning Combined with De-noising Data for Network Intrusion Detection 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES), Intelligent and Evolutionary Systems (IES 2017) DOI Author Url Publisher Url Public Url
Hurst W, Shone N, Shi Q, Bazli B. 2016. MICRO-CI: A Testbed for Cyber-Security Research he Eighth International Conference on Emerging Networks and Systems Intelligence Public Url
Latham K, Hurst W, Shone N, El Rhalibi A. 2016. A Case Study on the Advantages of 3D Walkthroughs over Photo Stitching Techniques IEEE International Conference on Virtual Reality and Visualization (ICVRV 2016) DOI Author Url Public Url
Panton T, Llewellyn-Jones D, Shone N, Hashem Eiza M. 2016. Secure Proximity-Based Identity Pairing using an Untrusted Signalling Service The 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) DOI Author Url Public Url
Shone N, Dobbins C, Hurst W, Shi Q. 2016. Digital Memories Based Mobile User Authentication for IoT 015 IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15) :1796-1802 DOI Author Url Publisher Url Public Url
Hashem Eiza M, Randles M, Johnson P, Shone N, Pang J, Bhih A. 2015. Rail Internet of Things: An Architectural Platform and Assured Requirements Model 15th IEEE International Conference on Computer and Information Technology (CIT-2015) :364-370 DOI Author Url Publisher Url Public Url
Hurst W, Shone N, Monnet Q. 2015. Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015) DOI Author Url Publisher Url Public Url
Shone N, Shi Q, Merabti M, Kifayat K. 2013. Securing complex system-of-systems compositions European Conference on Information Warfare and Security, ECCWS, 12th European Conference on Cyber Warfare and Security ECCWS-2013 :370-379
Shone N, Shi Q, Merabti M, Kifayat K. 2013. Misbehaviour monitoring on system-of-systems components International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013, :1-6 DOI Author Url Publisher Url
Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 DOI Author Url Publisher Url
Shone N, Shi Q, Merabti M, Kifayat K. 2013. Detecting Behavioural Anomalies in System-of-Systems Components Proceedings of 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013), 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013)
Shone N, Shi Q, Merabti M, Kifayat K. 2012. Securing a System-of-Systems From Component Misbehaviour Proceedings of the 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012), 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012) Publisher Url
Shone N, Shi Q, Merabti M, Kifayat K. 2011. System-of-Systems Monitoring: A Survey Proceedings of 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011), 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011) Publisher Url
Hurst W, Shone N, El Rhalibi A, Happe A, Kotze B, Duncan B. Advancing the Micro-CI Testbed for IoT Cyber-Security Research and Education CLOUD COMPUTING 2017 : The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization Publisher Url Public Url
Hurst W. Developing a Productivity Accelerator Platform to Support UK Businesses in the Industry 4.0 Revolution Third International Congress on Information and Communication Technology DOI Author Url
Hurst W, Shone N, Tully D. Investigations into the Development of a Knowledge Transfer Platform for Business The 5th IEEE International Conference on Information Management (ICIM2019) DOI Author Url Public Url
Hurst W, Shone N, Shi Q. Critical Infrastructure Testbed for Cyber-security Training and Research 21st UKAIS Conference on Information Systems,
Dinh Vu P, Shone N, Phan Huy D, Shi Q, Nguyen Viet H, Tran Nguyen N. Behaviour-aware Malware Classification: Dynamic Feature Selection 11th International Conference on Knowledge and Systems Engineering (KSE) DOI Author Url Public Url