Skip to main content

Research Repository

Advanced Search

All Outputs (4)

Efficient Comparison of Massive Graphs Through The Use Of 'Graph Fingerprints' (2016)
Presentation / Conference Contribution
Bonner, S., Brennan, J., Theodoropoulos, G., Kureshi, I., & McGough, A. (2016, August). Efficient Comparison of Massive Graphs Through The Use Of 'Graph Fingerprints'. Presented at Twelfth Workshop on Mining and Learning with Graphs (MLG) at KDD'16., San Francisco, USA

The problem of how to compare empirical graphs is an area of great interest within the field of network science. The ability to accurately but efficiently compare graphs has a significant impact in such areas as temporal graph evolution, anomaly dete... Read More about Efficient Comparison of Massive Graphs Through The Use Of 'Graph Fingerprints'.

Data Quality Assessment and Anomaly Detection Via Map / Reduce and Linked Data: A Case Study in the Medical Domain (2015)
Presentation / Conference Contribution
Bonner, S., McGough, S., Kureshi, I., Brennan, J., Theodoropoulos, G., Moss, L., Corsar, D., & Antoniou, G. (2023, October). Data Quality Assessment and Anomaly Detection Via Map / Reduce and Linked Data: A Case Study in the Medical Domain. Presented at IEEE International Conference on Big Data, Santa Clara

Recent technological advances in modern healthcare have lead to the ability to collect a vast wealth of patient monitoring data. This data can be utilised for patient diagnosis but it also holds the potential for use within medical research. However,... Read More about Data Quality Assessment and Anomaly Detection Via Map / Reduce and Linked Data: A Case Study in the Medical Domain.

PBStoHTCondor system for campus grids (2015)
Presentation / Conference Contribution
Brennan, J., Holmes, V., Bonner, S., & Kureshi, I. (2015, July). PBStoHTCondor system for campus grids. Presented at 2015 Science and Information Conference (SAI)., London, UK

The campus grid architectures currently available are considered to be overly complex. We have focused on High Throughput Condor HTCondor as one of the most popular middlewares among UK universities, and are proposing a new system for unifying campus... Read More about PBStoHTCondor system for campus grids.

Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware) (2015)
Presentation / Conference Contribution
McGough, A. S., Wall, D., Brennan, J., Theodoropoulos, G., Ruck-Keene, E., Arief, B., Gamble, C., Fitzgerald, J., & van Moorsel, A. (2015, December). Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). Presented at Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats - MIST '15, Denver, USA

In this paper, we present the concept of "Ben-ware" as a beneficial software system capable of identifying anomalous human behaviour within a 'closed' organisation's IT infrastructure. We note that this behaviour may be malicious (for example, an emp... Read More about Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware).