Skip to main content

Research Repository

Advanced Search

Professor Sue Black's Outputs (6)

Optimising IT Security Research via a Low Cost, Instantly Available, Cloud Based Cyber Range (2024)
Presentation / Conference Contribution
Wake, P., Black, S., & Young, J. (2024, July). Optimising IT Security Research via a Low Cost, Instantly Available, Cloud Based Cyber Range. Presented at 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET), Sydney, Australia

Testing the effectiveness of IT security measures for enterprises, companies, and institutions can often incur substantial costs in terms of time and resources. These costs encompass not only the investment in infrastructure for creating a cyber rang... Read More about Optimising IT Security Research via a Low Cost, Instantly Available, Cloud Based Cyber Range.

Self-Regulated Sample Diversity in Large Language Models (2024)
Presentation / Conference Contribution
Liu, M., Frawley, J., Wyer, S., Shum, H. P. H., Uckelman, S. L., Black, S., & Willcocks, C. G. (2024, June). Self-Regulated Sample Diversity in Large Language Models. Presented at NAACL 2024: 2024 Annual Conference of the North American Chapter of the Association for Computational Linguistics, Mexico City

Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers’ Tactics, Techniques and Procedures (2023)
Presentation / Conference Contribution
Wake, P., Black, S., & Young, J. (2023, July). Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers’ Tactics, Techniques and Procedures. Presented at 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Delft, Netherlands

We present a framework for the creation of a cyber range to test the effectiveness of security standards, policies and frameworks. These assets guide organisations on how to protect themselves from cyber threats. They have been created via a variety... Read More about Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers’ Tactics, Techniques and Procedures.

Digital Inclusion in Nothern England: Training Women from Underrepresented Communities in Tech: A Data Analytics Case Study (2020)
Presentation / Conference Contribution
Aduragba, O. T., Yu, J., Cristea, A. I., Hardey, M., & Black, S. (2020, December). Digital Inclusion in Nothern England: Training Women from Underrepresented Communities in Tech: A Data Analytics Case Study. Presented at 2020 15th International Conference on Computer Science & Education (ICCSE)

The TechUPWomen programme takes 100 women from the Midlands and North of England, particularly from underrepresented communities, with degrees or experience in any subject area, retrains them in technology and upon graduation guarantees an interview... Read More about Digital Inclusion in Nothern England: Training Women from Underrepresented Communities in Tech: A Data Analytics Case Study.

Empirical comparison of text-based mobile apps similarity measurement techniques (2019)
Journal Article
Al-Subaihin, A., Sarro, F., Black, S., & Capra, L. (2019). Empirical comparison of text-based mobile apps similarity measurement techniques. Empirical Software Engineering, 24(6), 3290-3315. https://doi.org/10.1007/s10664-019-09726-5

Context: Code-free software similarity detection techniques have been used to support different software engineering tasks, including clustering mobile applications (apps). The way of measuring similarity may affect both the efficiency and quality of... Read More about Empirical comparison of text-based mobile apps similarity measurement techniques.

Clustering Mobile Apps Based on Mined Textual Features (2016)
Presentation / Conference Contribution
Al-Subaihin, A., Sarro, F., Black, S., Capra, L., Harman, M., Jia, Y., & Zhang, Y. (2016, September). Clustering Mobile Apps Based on Mined Textual Features. Presented at 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM '16