Intelligence & Security Informatics

"Village elder meeting" flickr photo by The U.S. Army https://flickr.com/photos/soldiersmediacenter/6260454768 shared under a Creative Commons (BY) license

“Village elder meeting” flickr photo by The U.S. Army https://flickr.com/photos/soldiersmediacenter/6260454768 shared under a Creative Commons (BY) license

 

Intelligence & Security Informatics is concerned with the design, development, and evaluation of processes and technology to build organisational or governmental security applications and systems.  BUCSR has specific interests in information assurance, global and homeland security, governance, security operations, and the application of data science approaches to cybersecurity.

Contacts:  Ed Apeh, Chris Richardson, Vasilis Katos

Projects:

Related Publications

  • E. Apeh, “Realtime Assessment and Feedback through Cyber Security Hackathons,” in Proceedings of CELebrate 2017 Regional Teaching and Learning Conference, 2017.
    [Bibtex]
    @inproceedings{apeh171,
    author = {Edward Apeh},
    booktitle = {{Proceedings of CELebrate 2017 Regional Teaching and Learning Conference}},
    title = {{Realtime Assessment and Feedback through Cyber Security Hackathons}},
    publisher = {Bournemouth University},
    year = {2017}}
  • E. Apeh and S. Jeffries, “Standard Operating Procedures for Cybercrime Investigations: A Systematic Literature Review,” in Psychological and Behavioural Examinations in Cybersecurity, IGI Global, 2017.
    [Bibtex]
    @incollection{apje17,
    author = {E. Apeh and S. Jeffries},
    booktitle = {{Psychological and Behavioural Examinations in Cybersecurity}},
    title = {{Standard Operating Procedures for Cybercrime Investigations: A Systematic Literature Review}},
    publisher = {IGI Global},
    note = {To Appear},
    year = {2017}}
  • J. Holdsworth and E. Apeh, “An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector,” in Proceedings of 4th International Workshop on Evolving Security & Privacy Requirements Engineering, 2017.
    [Bibtex]
    @inproceedings{hoap17,
    author = {Jack Holdsworth and Edward Apeh},
    booktitle = {{Proceedings of 4th International Workshop on Evolving Security \& Privacy Requirements Engineering}},
    title = {{An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector}},
    publisher = {IEEE},
    year = {2017}}
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “Folk Risk Analysis: Factors Influencing Security Analysts’ Interpretation of Risk,” in Proceedings of the 3rd Workshop on Security Information Workers, 2017.
    [Bibtex]
    @inproceedings{mfmw17,
    Author = {Andrew M'manga and Shamal Faily and John McAlaney and Christopher Williams},
    Booktitle = {{Proceedings of the 3rd Workshop on Security Information Workers}},
    Publisher = {USENIX Association},
    Title = {{Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk}},
    Year = {2017}}
  • S. Ambore, E. Apeh, H. Dogan, C. Richardson, and D. Osselton, “Development of Human Factors and Cybersecurity Objectives for Mobile Financial Service (MFS),” in Contemporary Ergonomics & Human Factors 2017, 2017.
    [Bibtex]
    @inproceedings{aadr17,
    Author = {Steven Ambore and Edward Apeh and Huseyin Dogan and Christopher Richardson and David Osselton},
    Booktitle = {{Contemporary Ergonomics \& Human Factors 2017}},
    Editor = {Rebecca Charles and John Wilkinson},
    Publisher = {Chartered Institute of Ergonomics \& Human Factors},
    Title = {{Development of Human Factors and Cybersecurity Objectives for Mobile Financial Service (MFS)}},
    Year = {2017}}
  • T. Tsikrika, B. Akhgar, V. Katos, S. Vrochidis, P. Burnap, and M. L. Williams, “1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web,” in Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017, p. 823–824.
    [Bibtex]
    @inproceedings{takv17,
    Author = {Tsikrika, Theodora and Akhgar, Babak and Katos, Vasilis and Vrochidis, Stefanos and Burnap, Pete and Williams, Matthew L.},
    Booktitle = {{Proceedings of the Tenth ACM International Conference on Web Search and Data Mining}},
    Pages = {823--824},
    Publisher = {ACM},
    Series = {WSDM '17},
    Title = {{1st International Workshop on Search and Mining Terrorist Online Content \& Advances in Data Science for Cyber Security and Risk on the Web}},
    Year = {2017}}
  • A. Nisioti, M. Heydari, A. Mylonas, V. Katos, and V. H. F. Tafreshi, “TRAWL: Protection against rogue sites for the masses,” in Proceedings of the 11th IEEE International Conference on Research Challenges in Information Science, 2017, p. 120–127.
    [Bibtex]
    @inproceedings{nihm17,
    Author = {Antonia Nisioti and Mohammad Heydari and Alexios Mylonas and Vasilios Katos and Vahid Heydari Fami Tafreshi},
    Booktitle = {{Proceedings of the 11th IEEE International Conference on Research Challenges in Information Science}},
    Pages = {120--127},
    Publisher = {IEEE},
    Title = {{TRAWL: Protection against rogue sites for the masses}},
    Year = {2017}}
  • R. Rogers, E. Apeh, and C. Richardson, “Resilience of the Internet of Things (IoT) from an Information Assurance (IA) Perspective,” in Proceedings of the 10th International Conference on Software, Knowledge, Information Management and Applications, 2016.
    [Bibtex]
    @inproceedings{roar16,
    Author = {Rebecca Rogers and Edward Apeh and Chris Richardson},
    Booktitle = {{Proceedings of the 10th International Conference on Software, Knowledge, Information Management and Applications}},
    Publisher = {IEEE},
    Title = {{Resilience of the Internet of Things (IoT) from an Information Assurance (IA) Perspective}},
    Volume = {110--115},
    Year = {2016}}
  • [PDF] S. Ambore, C. Richardson, H. Dogan, E. Apeh, and D. Osselton, “A “soft” approach to analysing mobile financial services sociotechnical systems,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016.
    [Bibtex]
    @inproceedings{amri16,
    Author = {Stephen Ambore and Christopher Richardson and Huseyin Dogan and Edward Apeh and David Osselton},
    Booktitle = {{Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion}},
    Note = {To Appear},
    Publisher = {British Computer Society},
    Title = {A ``Soft'' Approach to Analysing Mobile Financial Services Sociotechnical Systems},
    Year = {2016}}
  • P. Palmieri, “Anonymity networks and access to information during conflicts,” in Proceedings of the 8th International Conference on Cyber Conflict (CyCon 2016), 2016.
    [Bibtex]
    @inproceedings{palm161,
    Author = {Paolo Palmieri},
    Booktitle = {{Proceedings of the 8th International Conference on Cyber Conflict (CyCon 2016)}},
    Note = {To Appear},
    Title = {{Anonymity networks and access to information during conflicts}},
    Year = {2016}}
  • R. E. Gunstone and B. P. Weston, “Improving information sharing in major incidents using mobile devices and novel infrastructure,” Emergency services time, p. 69, 2010.
    [Bibtex]
    @article{guwe10,
    Author = {R. E. Gunstone and B. P. Weston},
    Journal = {Emergency Services Time},
    Month = {August},
    Pages = {69},
    Title = {Improving Information Sharing in Major Incidents using Mobile Devices and Novel Infrastructure},
    Year = {2010}}
  • V. Katos, “An integrated model for online transactions: illuminating the black box,” Information management & computer security, vol. 20, iss. 3, pp. 184-206, 2012.
    [Bibtex]
    @article{kat12,
    Author = {Vasilios Katos},
    Journal = {Information Management \& Computer Security},
    Number = {3},
    Pages = {184-206},
    Title = {An integrated model for online transactions: illuminating the black box},
    Volume = {20},
    Year = {2012},
    Bdsk-Url-1 = {http://dx.doi.org/10.1108/09685221211247299}}
  • A. Tasidou, P. S. Efraimidis, and V. Katos, “Economics of personal data management: fair personal information trades,” in Next generation society. technological and legal issues, Springer Berlin Heidelberg, 2010, pp. 151-160.
    [Bibtex]
    @incollection{taef10,
    Author = {Tasidou, A. and Efraimidis, P.S. and Katos, V.},
    Booktitle = {Next Generation Society. Technological and Legal Issues},
    Pages = {151-160},
    Publisher = {Springer Berlin Heidelberg},
    Title = {Economics of Personal Data Management: Fair Personal Information Trades},
    Year = {2010}}
  • N. Clarke, V. Katos, S. Menesidou, B. Ghita, and S. Furnell, “A novel security architecture for a space-data dtn,” in Wired/wireless internet communication, Springer Berlin Heidelberg, 2012, vol. 7277, pp. 342-349.
    [Bibtex]
    @incollection{ckmg21,
    Author = {Clarke, NathanL. and Katos, Vasilis and Menesidou, Sofia-Anna and Ghita, Bogdan and Furnell, Steven},
    Booktitle = {Wired/Wireless Internet Communication},
    Pages = {342-349},
    Publisher = {Springer Berlin Heidelberg},
    Series = {Lecture Notes in Computer Science},
    Title = {A Novel Security Architecture for a Space-Data DTN},
    Volume = {7277},
    Year = {2012}}
  • P. Bednar, M. Sadok, and V. Katos, “Contextual dependencies in information security systems,” in Ais sigsec and ifip tc 11.1 workshop on information security & privacy, 2013.
    [Bibtex]
    @inproceedings{besk13,
    Author = {P. Bednar and M. Sadok and V. Katos},
    Booktitle = {AIS SIGSEC and IFIP TC 11.1 Workshop on Information Security & Privacy},
    Title = {Contextual dependencies in information security systems},
    Year = {2013}}
  • P. Palmieri and O. Pereira, “Unconditionally secure oblivious transfer from real network behavior,” in Iwsec, 2013, p. 168–182.
    [Bibtex]
    @inproceedings{pape13,
    Author = {Paolo Palmieri and Olivier Pereira},
    Booktitle = {IWSEC},
    Ee = {http://dx.doi.org/10.1007/978-3-642-41383-4_11},
    Pages = {168--182},
    Title = {Unconditionally Secure Oblivious Transfer from Real Network Behavior},
    Year = {2013}}
  • P. Palmieri and J. A. Pouwelse, “Paying the guard: an entry-guard-based payment system for tor,” in Financial cryptography and data security – 19th international conference, FC 2015, 2015, p. 437–444.
    [Bibtex]
    @inproceedings{papo15,
    Author = {Paolo Palmieri and Johan A. Pouwelse},
    Booktitle = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015},
    Pages = {437--444},
    Title = {Paying the Guard: An Entry-Guard-Based Payment System for Tor},
    Url = {http://dx.doi.org/10.1007/978-3-662-47854-7_26},
    Year = {2015},
    Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-662-47854-7_26}}
  • G. Avoine, L. Calderoni, J. Delvaux, D. Maio, and P. Palmieri, “Passengers information in public transport and privacy: can anonymous tickets prevent tracking?,” Int j. information management, vol. 34, iss. 5, p. 682–688, 2014.
    [Bibtex]
    @article{acdp14,
    Author = {Gildas Avoine and Luca Calderoni and Jonathan Delvaux and Dario Maio and Paolo Palmieri},
    Journal = {Int J. Information Management},
    Number = {5},
    Pages = {682--688},
    Title = {Passengers information in public transport and privacy: Can anonymous tickets prevent tracking?},
    Url = {http://dx.doi.org/10.1016/j.ijinfomgt.2014.05.004},
    Volume = {34},
    Year = {2014},
    Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.ijinfomgt.2014.05.004}}