- Crime Patterns and Interventions
- Crime, Illicit Activities, and Governance
- Cybercrime and Law Enforcement Studies
- Information and Cyber Security
- Advanced SAR Imaging Techniques
- Advanced Malware Detection Techniques
- Terrorism, Counterterrorism, and Political Violence
- Synthetic Aperture Radar (SAR) Applications and Techniques
- Wildlife Conservation and Criminology Analyses
- COVID-19 epidemiological studies
- Privacy, Security, and Data Protection
- Infrastructure Resilience and Vulnerability Analysis
- Geophysical Methods and Applications
- Traffic and Road Safety
- Sexual Assault and Victimization Studies
- Simulation Techniques and Applications
- Mobile Crowdsensing and Crowdsourcing
- Risk and Safety Analysis
- Stalking, Cyberstalking, and Harassment
- Species Distribution and Climate Change
- Hate Speech and Cyberbullying Detection
- Digital and Cyber Forensics
- Radar Systems and Signal Processing
- Occupational Health and Safety Research
- HIV, Drug Use, Sexual Risk
University College London
2016-2025
Zayed University
2022
University of London
2017
UCL Australia
2012
This study presents the use of micro‐Doppler signatures collected by a multistatic radar to detect and discriminate between micro‐drones hovering flying while carrying different payloads, which may be an indication unusual or potentially hostile activities. Different features have been extracted tested, namely related cross‐section micro‐drones, as well singular value decomposition centroid signatures. In particular, added benefit using information in comparison with conventional is...
Preliminary results on the use of multistatic radar and micro‐Doppler analysis to detect discriminate between micro‐drones hovering carrying different payloads are presented. Two suitable features related centroid signature have been identified used perform classification, investigating also added benefit using information from a as opposed conventional monostatic system. Very good performance with accuracy above 90% has demonstrated for classification micro‐drones.
The metaverse is an emerging convergence of technologies (e.g., virtual reality and blockchains) that enables users to experience mixed/extended realities for various legitimate purposes gaming, tourism, manufacturing education). Unfortunately, the crime security implications are often overlooked. To anticipate crimes might facilitate, we report findings a nominal group technique (NGT) study, which involved state-of-the-art scoping review existing literature elicitation exercises with two...
In this paper, the decision-making processes of victims during ransomware attacks were analysed. Forty-one using qualitative data collected from organisations and police officers cybercrime units in UK examined. The hypothesis tested paper is that carefully analyse situation before deciding whether to pay a ransom. This research confirms often weigh costs benefits interventions making final decisions, their decisions are based on range reasons. As become more prevalent globally, findings...
With the growing interest in use of crime scripts and attack scenarios for development control measures comes need more systematic scripting methods. Information about those sequences actions that offenders carry out to commit a given type can be extremely valuable designers as may designed influence possibility actualise criminal plans. However, there exists limited guidance what qualities should possess order support creation suitable requirements, how they handled design framework. This...
Studies suggest that incidents of sexual harassment are common occurrence on public transport in India, but there is little reliable data to understand and tackle the problem. This research explores actual witnessed victimisations as well perceptions risk by a sample 200 tertiary female students Lucknow, India. Consistent with literature, victimisation appears be most prevalent buses increases frequency use transport. We found number experienced victim witness were comparable, suggesting...
This paper uses resilience as a lens through which to analyse disasters and other major threats patterns of criminal behaviour. A set indicators mathematical models are introduced that aim quantitatively describe changes in crime levels comparison what could otherwise be expected, might expected by way adaptation subsequent resumption those patterns. The validity the proposed assessment tool is demonstrated using commercial theft data from COVID-19 pandemic period. 64 per cent reduction was...
<title>Abstract</title> The cocaine trade within Colombia involves complex processes, from coca cultivation to end-user distribution and is marked by violence, corruption, environmental damage health risks. Despite substantial efforts successive governments disrupt it, there no detailed, peer-reviewed process model of the its consequences. This study employs crime script analysis map stages explore contextual factors influencing dynamics. We used relevant academic literature, grey...
This study examines ransomware crime through the lens of neutralisation theory, and explores techniques used by alleged offenders to justify their involvement in attacks. work focuses on highly organised groups that not only conduct attacks but also operate as Ransomware-as-a-Service businesses. The interview data ( n = 9) this research were collected several media cyber security companies. Drawing Kaptein Van Helvoort model techniques, we discovered interviewees – reported distorted facts...
Abstract Illegal activities concerning terrestrial species (TS) are responsible for a variety of health, environmental, economic and security issues. The majority academic research associated with relates to conservation, few publications specifically investigating the scale crimes impacting or how they can be prevented. This article systematically reviews available evidence about what works prevent crime against species. Of over 29,000 documents that were returned in first stage review,...
Objectives: This study examines the convergence of smuggling and trafficking in persons along Central Mediterranean Route (CMR) to Europe. We explore where how these phenomena blur, impacting states' obligations policy decisions. Methods: analyse 71 interviews with migrants who travelled on CMR 2018 2019, a focus 17 participants experienced forced labour. Results: find clear overlaps crossovers between migrants, labour, debt bondage, extortion, kidnapping human trafficking. Notably, we...
Abstract Conventional police databases contain much information on cybercrime, but extracting it remains a practical challenge. This is because these rarely labels that could be used to automatically retrieve all cybercrime incidents. In this article, we present supervised machine learning method for incidents in calls service datasets. Data from the Korean National Police (2020, 9 months, N = 15 million call logs) demonstration. We combined methods of keyword query selection, minority...
Abstract In his 2018 Stockholm prize winner lecture, Goldstein highlighted the need for problem-oriented policing (POP) to be not only effective but also fair. Contributing development of POP, this study examines how a wider perspective on problem-solving generally, and scoping in particular, can adopted address some growing challenges 21st century policing. We demonstrate that concept ‘problem’ was too narrowly defined that, as result, many models found criminology are ill-structured...
Digital technology now plays a critical role in policing and security management, with apps, drones body-worn cameras potentially being game-changers. Adoption of such technologies is, however, not straightforward depends upon the buy-in senior management teams users. This study examines what obstacles practitioners face procurement, deployment use crime prevention detection technologies. The issue is explored through number expert interviews conducted London between August 2019 March 2020....
Metal theft has become an increasingly common crime in recent years, but lack of data limited research into it. The present study used police-recorded to the spatial and temporal concentration metal from railway network Great Britain. was found exhibit only weak seasonality, be concentrated at night cluster a few locations close – not major cities. Repeat-victimisation risk continued for longer than been other types. These features appear point being planned, rather opportunistic, offence...
Metro rail systems (MRS) currently face a serious threat from terrorist attacks – especially through use of explosives. The comes at time when scores new MRS are under construction or the planning stage in cities across world. Designers these need to consider ways detect explosives without an adverse impact upon passenger comfort and profitability. This paper presents framework for designers identify security functions MRS, understand current methods detection used recognise their...
The metaverse is an emerging convergence of technologies (e.g. virtual reality and blockchains) that enables users to experience mixed/extended realities for a range legitimate purposes gaming, entertainment education). Unfortunately, the crime security implications are often overlooked. To anticipate crimes might facilitate, in this paper we report findings nominal group technique (NGT) study which was informed by state-of-the-art scoping review existing literature. We elicited views from...