444 results on '"Parkinson, Simon"'
Search Results
2. The Use of GPS Spoofing Attacks in Location Deception
3. Detecting Abnormal Vehicle Behavior: A Clustering-Based Approach
4. The Connected and Autonomous Vehicle Trade-Off: Functional Benefits versus Security Risks
5. Introduction
6. Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach
7. On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security
8. Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach
9. Comparison of deep learning classification models for facial image age estimation in digital forensic investigations
10. A Case Study of Using Machine Learning Techniques for COVID-19 Diagnosis
11. Balancing smart irrigation and hydropower investments for sustainable water conservation in the Indus basin
12. The deceitful Connected and Autonomous Vehicle: Defining the concept, contextualising its dimensions and proposing mitigation policies
13. Role of energy storage in energy and water security in Central Asia
14. Identifying high-risk over-entitlement in access control policies using fuzzy logic
15. Robust data expansion for optimised modelling using adaptive neuro-fuzzy inference systems
16. The Emerging Challenges of Wearable Biometric Cryptosystems.
17. The role of Artificial Intelligence in digital forensics: Case studies and future directions
18. Hydropower and seasonal pumped hydropower storage in the Indus basin:pros and cons
19. A Case Study of Using Machine Learning Techniques for COVID-19 Diagnosis
20. Identifying File Interaction Patterns in Ransomware Behaviour
21. Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study
22. Review into State of the Art of Vulnerability Assessment using Artificial Intelligence
23. Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach
24. Transboundary cooperation a potential route to sustainable development in the Indus basin
25. Classifying Ransomware Using Machine Learning Algorithms
26. An Unsupervised Approach for the Detection of Zero-Day DDoS Attacks in IoT Networks
27. A Survey on Factors Preventing the Adoption of Automated Software Testing: A Principal Component Analysis Approach
28. A Novel Image Casting and Fusion for Identifying Individuals at Risk of Alzheimer’s Disease Using MRI and PET Imaging
29. Towards compliance-based inspection modelling
30. Keyhole Porosity Identification and Localisation via X-Ray Imaging with YOLO
31. Classifying Participant Standing and Sitting Postures Using Channel State Information
32. A Novel Software Tool for Analysing NT File System Permissions
33. Guiding urban water management towards 1.5 °C
34. Discovering and utilising expert knowledge from security event logs
35. Construction of machine tool calibration plans using domain-independent automated planning
36. Comfort-constrained distributed heat pump management
37. Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach
38. One Bus is All it Takes: The Impact of Cyber Attacks in Customised Bus Services
39. A Survey on Factors Preventing the Adoption of Automated Software Testing: A Principle Component Analysis Approach
40. Edge Influence Computation in Dynamic Graphs
41. Identifying irregularities in security event logs through an object-based Chi-squared test of independence
42. Spatial and temporal synchronization of water and energy systems: Towards a single integrated optimization model for long-term resource planning
43. A multi-criteria model analysis framework for assessing integrated water-energy system transformation pathways
44. Adaptive decision support for suggesting a machine tool maintenance strategy : From reactive to preventative
45. Automated Planning to Prioritise Digital Forensics Investigation Cases Containing Indecent Images of Children
46. Repetition and Template Generalisability for Instance-Based Keystroke Biometric Systems
47. Use of access control to minimise ransomware impact
48. A reduced-form approach for representing the impacts of wind and solar PV deployment on the structure and operation of the electricity system
49. Built environment attributes and crime: an automated machine learning approach
50. Global resource potential of seasonal pumped hydropower storage for energy and water storage
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.