Name
Affiliation
Papers
IAN S. WELCH
Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
37
Collaborators
Citations 
PageRank 
64
120
18.53
Referers 
Referees 
References 
238
513
242
Search Limit
100513
Title
Citations
PageRank
Year
Autoencoder-based feature construction for IoT attacks clustering10.362022
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification00.342022
Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection00.342022
Corrigendum to ‘Probabilistic modelling of deception-based security framework using markov decision process’ [Computers & Security 115 (2022)/102599]00.342022
Failure Modes and Effects Analysis (FMEA) of Honeypot-Based Cybersecurity Experiment for IoT00.342021
Achieving IoT Devices Secure Sharing in Multi-User Smart Space00.342020
IoT Attacks: Features Identification and Clustering00.342020
A survey on the architecture, application, and security of software defined networking: Challenges and open issues00.342020
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain00.342020
How do they find us? A study of geolocation tracking techniques of malicious web sites00.342020
Automatic Device Selection and Access PolicyGeneration based on User Preference for IoTActivity Workflow.00.342019
Automatic Device Selection And Access Policy Generation Based On User Preference For Iot Activity Workflow00.342019
Geolocation Tracking and Cloaking of Malicious Web Sites00.342019
Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network.10.362018
Impacts of Power Factor Control Schemes in Time Series Power Flow Analysis for Centralized PV Plants Using Wavelet Variability Model.00.342017
Learning Under Data Shift for Domain Adaptation: A Model-Based Co-clustering Transfer Learning Solution.10.362016
Novel Features for Web Spam Detection00.342016
Towards SDN Network Proofs — Taming a Complex System00.342016
Empirical Analysis Of Impact Of Http Referer On Malicious Website Behaviour And Delivery00.342016
Application Of Hazop To The Design Of Cyber Security Experiments00.342016
A Machine Learning Based Web Spam Filtering Approach40.462016
Co-clustering for Dual Topic Models.10.342016
Measurement of IP and network tracking behaviour of malicious websites.00.342016
Visraid: Visualizing Remote Access For Intrusion Detection10.352015
YALIH, yet another low interaction honeyclient40.402014
A Novel Scoring Model to Detect Potential Malicious Web Pages20.402012
The effect of user interface delay in thin client mobile games00.342010
Remotely shooting asteroids on our mobile phone10.372009
Intrusion-Tolerant Middleware: The Road to Automatic Security401.952006
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture100.772004
Re-engineering Security as a Crosscutting Concern20.432003
Using reflection as a mechanism for enforcing security policies on compiled code130.862002
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code90.742000
Kava - a powerful and portable reflective Java (poster session)00.342000
Supporting Real World Security Models in Java70.811999
Runtime Implementation of Aspects Using Kava00.341999
From Dalang to Kava - The Evolution of a Reflective Java Extension232.471999