Skip to main content

Research Repository

Advanced Search

Outputs (6)

Efficient Comparison of Massive Graphs Through The Use Of 'Graph Fingerprints' (2016)
Presentation / Conference Contribution
Bonner, S., Brennan, J., Theodoropoulos, G., Kureshi, I., & McGough, A. (2016, August). Efficient Comparison of Massive Graphs Through The Use Of 'Graph Fingerprints'. Presented at Twelfth Workshop on Mining and Learning with Graphs (MLG) at KDD'16., San Francisco, USA

The problem of how to compare empirical graphs is an area of great interest within the field of network science. The ability to accurately but efficiently compare graphs has a significant impact in such areas as temporal graph evolution, anomaly dete... Read More about Efficient Comparison of Massive Graphs Through The Use Of 'Graph Fingerprints'.

Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour (2015)
Journal Article
McGough, A. S., Arief, B., Gamble, C., Wall, D., Brennan, J., Fitzgerald, J., …Ruck-Keene, E. (2015). Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour. Journal of wireless mobile networks, ubiquitous computing and dependable applications, 6(4), 1-44

The insider threat problem is a significant and ever present issue faced by any organisation. While security mechanisms can be put in place to reduce the chances of external agents gaining access to a system, either to steal assets or alter records,... Read More about Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour.

Data Quality Assessment and Anomaly Detection Via Map / Reduce and Linked Data: A Case Study in the Medical Domain (2015)
Presentation / Conference Contribution
Bonner, S., McGough, S., Kureshi, I., Brennan, J., Theodoropoulos, G., Moss, L., Corsar, D., & Antoniou, G. (2023, October). Data Quality Assessment and Anomaly Detection Via Map / Reduce and Linked Data: A Case Study in the Medical Domain. Presented at IEEE International Conference on Big Data, Santa Clara

Recent technological advances in modern healthcare have lead to the ability to collect a vast wealth of patient monitoring data. This data can be utilised for patient diagnosis but it also holds the potential for use within medical research. However,... Read More about Data Quality Assessment and Anomaly Detection Via Map / Reduce and Linked Data: A Case Study in the Medical Domain.

PBStoHTCondor system for campus grids (2015)
Presentation / Conference Contribution
Brennan, J., Holmes, V., Bonner, S., & Kureshi, I. (2015, July). PBStoHTCondor system for campus grids. Presented at 2015 Science and Information Conference (SAI)., London, UK

The campus grid architectures currently available are considered to be overly complex. We have focused on High Throughput Condor HTCondor as one of the most popular middlewares among UK universities, and are proposing a new system for unifying campus... Read More about PBStoHTCondor system for campus grids.

Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware) (2015)
Presentation / Conference Contribution
McGough, A. S., Wall, D., Brennan, J., Theodoropoulos, G., Ruck-Keene, E., Arief, B., Gamble, C., Fitzgerald, J., & van Moorsel, A. (2015, December). Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). Presented at Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats - MIST '15, Denver, USA

In this paper, we present the concept of "Ben-ware" as a beneficial software system capable of identifying anomalous human behaviour within a 'closed' organisation's IT infrastructure. We note that this behaviour may be malicious (for example, an emp... Read More about Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware).

Advancing Research Infrastructure Using OpenStack (2013)
Journal Article
Kureshi, I., Pulley, C., Brennan, J., Holmes, V., Bonner, S., & James, J. (2013). Advancing Research Infrastructure Using OpenStack. International Journal of Advanced Computer Science and Applications, 3(4), 63-69. https://doi.org/10.14569/specialissue.2013.030408

Cloud computing, which evolved from grid computing, virtualisation and automation, has a potential to deliver a variety of services to the end user via the Internet. Using the Web to deliver Infrastructure, Software and Platform as a Service (SaaS/Pa... Read More about Advancing Research Infrastructure Using OpenStack.