Catherine Menon

ORCID: 0000-0003-2072-5845
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Safety Systems Engineering in Autonomy
  • Ethics and Social Impacts of AI
  • Social Robot Interaction and HRI
  • Information and Cyber Security
  • Risk and Safety Analysis
  • Formal Methods in Verification
  • Distributed systems and fault tolerance
  • Real-Time Systems Scheduling
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Human Pose and Action Recognition
  • Software Reliability and Analysis Research
  • Context-Aware Activity Recognition Systems
  • Model-Driven Software Engineering Techniques
  • Embedded Systems Design Techniques
  • Advanced Software Engineering Methodologies
  • Software Engineering Techniques and Practices
  • AI in Service Interactions
  • Software Engineering Research
  • Occupational Health and Safety Research
  • Terrorism, Counterterrorism, and Political Violence
  • Healthcare Systems and Public Health
  • Islamic Finance and Banking Studies
  • Digital Games and Media
  • Spam and Phishing Detection

University of Hertfordshire
2017-2024

University of York
2009-2010

Ospedale San Bassiano
2010

The University of Adelaide
2004-2005

Security is a mandatory issue in any network, where sensitive data are transferred safely the required direction. Wireless sensor networks (WSNs) formed hostile areas for different applications. Whatever application, WSNs must gather large amount of and send them to an authorized body, generally sink. WSN has integrated with Internet-of-Things (IoT) via internet access nodes along internet-connected devices. The gathered IoT enormous, which eventually collected by over Internet. Due several...

10.3390/electronics10192365 article EN Electronics 2021-09-28

Autonomous Vehicles (AVs) have significant ethical and safety implications. Questions of informed consent risk acceptance are primary importance, as is an explicit identification the principles underlying these decisions. In this paper we present a process framework for producing ethics assurance case, which can be used to translate imperatives into design decisions management practices. The resultant case integrate considerations wider engineering lifecycle, providing tool demonstrate that...

10.1080/09617353.2019.1697918 article EN Safety and Reliability 2019-12-17

Threat assessment is the continuous process of monitoring threats identified in network real-time informational environment an organisation and business companies. The sagacity security assurance for system company’s seem to need that information exercise unambiguously effectively handle threat agent’s attacks. How this unambiguous effective way present-day state practice working? Given prevalence modern environment, it essential guarantee national infrastructure. However, existing models...

10.3390/electronics10151849 article EN Electronics 2021-07-31

We present a discussion of the issues involved with eliciting and managing safety requirements in complex systems. show how case architectures modular view which is consistent structure system These can also be used to allocate responsibility for analysis across contractual boundaries. This paper discusses these address technical engineering management challenges associated

10.1109/systems.2010.5482343 article EN 2010-04-01

The challenge of mixed-criticality scheduling is to keep tasks higher criticality running in case resource shortages caused by faults. Traditionally, has focused on methods handle faults where overrun their optimistic worst-case execution time (WCET) estimate. In this paper we present the Adaptive Tolerance-based Mixed-criticality Protocol (ATMP), which generalises concept also other nature, like failure cores a multi-core system. ATMP an adaptation method triggered shortage at runtime....

10.1109/sies.2018.8442082 article EN 2018-06-01

Service Oriented Architecture is an architectural style that being adopted by many of the major military organisations such as United States Department Defense, The North Alliance Treaty Organization and UK's Ministry Defence, a means to realise increased agility reduced long term cost ownership. SOA has emerged matured predominately within commercial sectors well maturing further overcome current challenges in these sectors, must address specific when employed context. This paper provides...

10.1049/cp.2010.0828 article EN 2010-01-01

Safety engineering and cyber security have complementary aims, but typically realise these using different techniques, risk assessment methods cultural approaches. As a result, the integration of safety concerns is complex process, with potential for conflict. We present generalized taxonomy common conflict areas between security, oriented around development deployment lifecycle, supplement this discussion concepts methodologies resolution based on shared principle defence-in-depth.

10.1109/iccst49569.2021.9717390 article EN 2021-10-11

Ethical considerations for autonomous vehicles (AVs) go beyond the "trolley problem" to include such aspects as risk / benefit trade-offs, informed consent, responsibility and mitigation within a system of systems.In this paper we present methodology arguing that behaviour given AV meets desired ethical characteristics.We identify some imperatives surrounding introduction AVs consider how decisions made during development can impact ethics AV's behaviour.

10.1049/cp.2017.0174 article EN 2017-01-01

These days, digital crime is one of the main challenges for law enforcement and judicial system. Many laws which are used to protect users current technologies were derived from legislation that utilized in control crimes based physical realm. This applies not only Western countries, but countries adopt Sharia law. There a need establish specific accepted best practice deal with compatible law, affects more than billion Muslims. paper presents view approach Saudi Arabia under Law,...

10.15394/jdfsl.2018.1568 article EN cc-by-nc ˜The œjournal of digital forensics, security and law 2018-01-01

Rosetta is a systems level design language that allows algebraic specifica- tion of through facets. The usual approach to formally describe specification define an algebra satisfies the specification. Although it possible for- mally facets with use algebras, we choose dual algebra, i.e. coalgebra, do so. Coalgebras are particularly suited for describing state- based systems. This makes defining state-based quite straightforward. For non-state-based Rosetta, formalization not as direct, but...

10.3217/jucs-009-11-1322 article EN cc-by Zenodo (CERN European Organization for Nuclear Research) 2003-11-28

The power that stems from modern DRAM devices represents a significant portion of the overall system in computing systems. In multi-core systems, competing cores share same memory banks. contention between these may lead to activate large row only access small data. This over-fetching problem wastes activation with slight performance gain.

10.1145/3457388.3458660 article EN 2021-04-29

In this paper we examine some of the challenges associated with adequately demonstrating safety COTS products as required by goal-based standards. The evidence available for products-if any-is sometimes questionable quality and applicability. This introduces a framework assessing applicability when selecting product purchase. Use enables purchase particular to be justified from perspective, well identifying where further post-purchase analysis software will support argument. (6 pages)

10.1049/cp.2009.1541 article EN 2009-01-01

The use of assistive robots in domestic environments can raise significant ethical concerns, from the risk individual harm to wider societal impacts including culture flattening and compromise human dignity. It is therefore essential ensure that technological development these informed by robust inclusive techniques for mitigating concerns. This paper presents EHAZOP, a method conducting an hazard analysis on robot. EHAZOP draws upon collaborative, creative structured processes originating...

10.48550/arxiv.2406.09239 preprint EN arXiv (Cornell University) 2024-06-13

10.1109/biorob60516.2024.10719749 article EN 2022 9th IEEE RAS/EMBS International Conference for Biomedical Robotics and Biomechatronics (BioRob) 2024-09-01

Inconsistency management in component-based languages is the identification and resolution of conflicting constraints or expectations between different components which make up a system. Here we present category theoretical framework for detecting classifying those inconsistencies can arise throughout simulation. In addition, permits us to apply techniques developed defining database view updates. With these, analyse set traces system with respect particular behaviour subsystem.

10.1016/j.entcs.2005.02.052 article EN Electronic Notes in Theoretical Computer Science 2005-11-29
Coming Soon ...