- User Authentication and Security Systems
- Information and Cyber Security
- Advanced Malware Detection Techniques
- Telemedicine and Telehealth Implementation
- Network Security and Intrusion Detection
- Biometric Identification and Security
- Electromagnetic Launch and Propulsion Technology
- Integrated Energy Systems Optimization
- Cybercrime and Law Enforcement Studies
- Hybrid Renewable Energy Systems
- Terrorism, Counterterrorism, and Political Violence
- Social Media in Health Education
- Personality Traits and Psychology
- Thermodynamic and Exergetic Analyses of Power and Cooling Systems
- Smart Grid Energy Management
- Medical Image Segmentation Techniques
- Digital Mental Health Interventions
- Privacy, Security, and Data Protection
- Power Systems and Technologies
- Railway Systems and Energy Efficiency
- Advanced Numerical Analysis Techniques
- Social Media and Politics
- Cardiac Health and Mental Health
- 3D Shape Modeling and Analysis
- Interactive and Immersive Displays
Loughborough University
2024-2025
University of East Anglia
2018-2024
Norwich Research Park
2018
Defence Academy of the United Kingdom
2015-2017
Cranfield University
2015-2017
University of Oxford
2014
Bangor University
2007-2008
European Union
1995
University College London
1995
Micro Focus (United States)
1983
The threat that insiders pose to businesses, institutions and governmental organisations continues be of serious concern. Recent industry surveys academic literature provide unequivocal evidence support the significance this its prevalence. Despite this, however, there is still no unifying framework fully characterise insider attacks facilitate an understanding problem, many components how they all fit together. In paper, we focus on challenge put forward a grounded for reflecting pose....
Organizations are experiencing an ever-growing concern of how to identify and defend against insider threats. Those who have authorized access sensitive organizational data placed in a position power that could well be abused cause significant damage organization. This range from financial theft intellectual property the destruction business reputation. Traditional intrusion detection systems neither designed nor capable identifying those act maliciously within In this paper, we describe...
Abstract The purpose was to investigate the impact of Industry 5.0 paradigm on supply chain research field. Our study contributes conceptualization 5.0, a term that has been receiving increased attention as chains adapt fifth industrial revolution. We conducted systematic literature network analysis (SLNA) examine landscape chains. used VOSViewer software and Bibliometrix R-package for multiple bibliometric analyses using 682 documents published between 2016 2022. present comprehensive...
Magnetic properties of permalloy.---Effect tension on magnetization and hysteresis. Wires 5 nickel-iron alloys containing 45, 65, 78.5, 81 84 percent Ni, 60 cm long 0.1 in diameter, were studied by a ballistic method, for tensions up to 10,000 lb per ${\mathrm{in}.}^{2}$ fields saturation (10 20 gauss). Permalloy with Ni is nearly indifferent its magnetic behavior; permalloy less nickel more easily magnetized has hysteresis when under tension, while difficulty greater tension. The values are...
Digital technologies are increasingly being implemented in health care to improve the quality and efficiency of for patients. However, rapid adoption over last 5 years has failed adequately consider patient clinician needs, which results ineffective implementation. There is also a lack consideration differences between resulting overgeneralized approaches implementation use digital technologies. This study aimed explore barriers facilitators diagnosis heart disease both patients clinicians,...
The greatest asset that any organisation has are its people, but they may also be the threat. Those who within have authorised access to vast amounts of sensitive company records essential for maintaining competitiveness and market position, knowledge information services procedures crucial daily operations. In many cases, those such do indeed require it in order conduct their expected workload. However, should an individual choose act against organisation, then with privileged extensive...
The invention of permalloy and its application to submarine cables have led the installation transoceanic many times traffic-carrying capacity former non-loaded cables. This paper relates briefly history development permalloy-loaded discusses certain outstanding problems concerned with their design, construction operation. In a concluding general survey field usefulness loaded telegraph is considered. To considerable extent critical summary material previously published by members staff Bell...
Witht an increase of traffic carrying capacity 300 per cent over that corresponding cables the previous art, New York-Azores permalloy-loaded cable marks a revolution in submarine practise. This represents first practical application inductive loading to transoceanic cables. The copper conductor is surrounded by thin layer new magnetic mtaterial, permalloy, which serves its inductance and consequently ability transmit rapid succession telegraph signals. paper explains part played operation...
Objective The aim of this study is to understand stakeholder experiences diagnosis cardiovascular disease (CVD) support the development technological solutions that meet current needs. Specifically, we aimed identify challenges in process diagnosing CVD, discrepancies between patient and clinician CVD diagnosis, requirements future health technology intended improve diagnosis. Design Semistructured focus groups one-to-one interviews generate qualitative data were subjected thematic analysis....
WHEN Sir William Thomson saw the newly invented telephone of Alexander Graham Bell at Philadelphia Centennial Exposition in 1876, he stated that “it was greatest marvel hitherto achieved by telegraph.” Recognizing limitations first crude instruments would soon be removed, remarked “the invention is yet its infancy and susceptible great improvements,” also said “with somewhat more advanced plans powerful apparatus, we may confidently expect Mr. will give us means making voice spoken words...
Smartphones and tablets are becoming ubiquitous within our connected lives as a result these devices increasingly being used for more sensitive applications, such banking. The security of the information applications is managed through variety different processes, all which minimise exposure this to other potentially malicious applications. This paper documents experiments with `zero-permission' motion sensors on device side-channel inferring text typed into application. These freely...
In 2022, 39% of all UK businesses reported identifying a cyber security attack against their own organisation, 83% which were phishing attempts. A large body research in focuses on technical solutions, however humans remain one the most exploitable endpoints an organisation. Traditional training within organisations commonly includes point-and-click exercises and simple video media that employees are required to complete. These often seen as unengaging tedious, pushed complete rather than...
The way in which IT systems are usually secured is through the use of username and password pairs. However, these credentials all too easily lost, stolen or compromised. behavioural biometrics can be used to supplement provide a greater level assurance identity an authenticated user. user behaviours also ascertain other identifiable information about individual. In this paper we build upon notion keystroke dynamics (the analysis typing behaviours) infer anonymous user's name predict their...
With an increase of traffic carrying capacity 300% over that corresponding cables the previous art, New York-Azores permalloy-loaded cable marks a revolution in submarine practice. This represents first practical application inductive loading to transoceanic cables. The copper conductor is surrounded by thin layer new magnetic material, permalloy, which serves its inductance and consequently ability transmit rapid succession telegraph signals. paper explains part played operation type...
With an increase of traffic carrying capacity S00 per cent over that corresponding cables the previous art, New York-Azores permalloy-loaded cable marks a revolution in submarine practise. This represents first practical application inductive loading to transoceanic cables. The copper conductor is surrounded by thin layer new magnetic material, permalloy, which serves its inductance and consequently ability transmit rapid succession telegraph signals. paper explains part played operation...
An enterprise's information security policy is an exceptionally important control as it provides the employees of organisation with details what expected them, and they can expect from organisation's teams, well informing culture within that organisation. The threat accidental insiders a reality across all enterprises be extremely damaging to systems, data reputation Recent industry reports academic literature underline fact risk insider compromise potentially more pressing than posed by...
Introduction Cardiovascular diseases are highly prevalent among the UK population, and quality of care is being reduced due to accessibility resource issues. Increased implementation digital technologies into cardiovascular pathway has enormous potential lighten load on National Health Service (NHS), however, it not possible adopt this shift without embedding perspectives service users clinicians. Methods analysis A series qualitative studies will be carried out with aim developing a...
The cyber-security threat that most organisations face is not one only resides outside their perimeter attempting to get in, but emanates from the inside too. Insider threats encompass anyone or thing which exploits authorised access company information and resources steal, corrupt disrupt assets. Threat actors could include employees, also contractors, trusted partners in some cases clients. nature of usually persistent, as it valid required conduct roles, such abuse privileges can pose a...
Abstract The ubiquitous nature of the Internet provides an ideal platform for human communication, trade, information sharing and learning. Websites play a central role in these activities as they often act key point interaction individuals navigating through cyberspace. In this article, we look beyond visual interface websites to consider exactly what occurs when webpage is visited. particular, focus on various web scripts that are programmatically executed, explore extent which third-party...