


default search action
William Hurst
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]William Hurst, Orestis Spyrou, Arend F. van Peer, Reda Simbelyte:
DigiFungi: An education software for button mushrooms. SoftwareX 29: 101993 (2025) - 2024
- [j22]Christos Mitsanis
, William Hurst
, Bedir Tekinerdogan
:
A 3D functional plant modelling framework for agricultural digital twins. Comput. Electron. Agric. 218: 108733 (2024) - [j21]John Barrow
, William Hurst
, Joakim Edman, Natasja Ariesen, Caspar Krampe:
Virtual reality for biochemistry education: the cellular factory. Educ. Inf. Technol. 29(2): 1647-1672 (2024) - [j20]Orestis Spyrou, Cor Verdouw, William Hurst:
A digital twin reference architecture for pharmaceutical cannabis production. Int. J. Comput. Integr. Manuf. 37(6): 726-746 (2024) - [j19]Abide Coskun-Setirek
, Maria Carmela Annosi, William Hurst, Wilfred Dolfsma, Bedir Tekinerdogan
:
Architecture and Governance of Digital Business Ecosystems: A Systematic Literature Review. Inf. Syst. Manag. 41(1): 58-90 (2024) - [c30]Gubing Wang
, Dena Kasraian
, Yuan Lu
, William Hurst
, Marielle Jambroes
, Pieter Van Wesemael
:
The intangible outcomes of an intergenerational hackathon for active aging: a case study. PDC (1) 2024: 208-220 - 2023
- [j18]Orestis Spyrou, William Hurst
, Cor Verdouw:
Virtual Reality-Based Digital Twins: A Case Study on Pharmaceutical Cannabis. Big Data Cogn. Comput. 7(2): 95 (2023) - [j17]Naftali Slob, William Hurst
, Rick van de Zedde, Bedir Tekinerdogan
:
Virtual reality-based digital twins for greenhouses: A focus on human interaction. Comput. Electron. Agric. 208: 107815 (2023) - [j16]William Hurst
, Orestis Spyrou, Bedir Tekinerdogan
, Caspar Krampe:
Digital Art and the Metaverse: Benefits and Challenges. Future Internet 15(6): 188 (2023) - [j15]Reint Jansen
, Frida Ruiz Mendoza, William Hurst:
Augmented reality for supporting geo-spatial planning: An open access review. Vis. Informatics 7(4): 1-12 (2023) - 2022
- [j14]William Hurst
, Adam Withington, Hoshang Kolivand
:
Virtual conference design: features and obstacles. Multim. Tools Appl. 81(12): 16901-16919 (2022) - 2021
- [j13]Tuuli Katarina Lepasepp, William Hurst
:
A Systematic Literature Review of Industry 4.0 Technologies within Medical Device Manufacturing. Future Internet 13(10): 264 (2021) - [c29]Rebecca Patient, Fawaz Ghali, Hoshang Kolivand
, William Hurst, Nigel John:
Application of Virtual Reality and Electrodermal Activity for the Detection of Cognitive Impairments. DeSE 2021: 156-161 - 2020
- [j12]William Hurst
, Casimiro Aday Curbelo Montañez
, Nathan Shone
, Dhiya Al-Jumeily
:
An Ensemble Detection Model Using Multinomial Classification of Stochastic Gas Smart Meter Data to Improve Wellbeing Monitoring in Smart Cities. IEEE Access 8: 7877-7898 (2020) - [j11]Casimiro Aday Curbelo Montañez
, William Hurst
:
A Machine Learning Approach for Detecting Unemployment Using the Smart Metering Infrastructure. IEEE Access 8: 22525-22536 (2020) - [j10]Ahmed Adnan Makki
, Trung Thanh Nguyen
, Jun Ren
, Dhiya Al-Jumeily
, William Hurst
:
Estimating Road Traffic Capacity. IEEE Access 8: 228525-228547 (2020) - [j9]William Hurst
, Aaron Boddy, Madjid Merabti, Nathan Shone:
Patient Privacy Violation Detection in Healthcare Critical Infrastructures: An Investigation Using Density-Based Benchmarking. Future Internet 12(6): 100 (2020) - [c28]William Hurst, Casimiro Aday Curbelo Montañez
, Nathan Shone:
Towards an Approach for Fuel Poverty Detection from Gas Smart Meter Data using Decision Tree Learning. IMMS 2020: 23-28 - [c27]Matthew Banton
, Nathan Shone, William Hurst, Qi Shi:
Intrusion Detection Using Extremely Limited Data Based on SDN. IEEE Conf. on Intelligent Systems 2020: 304-309
2010 – 2019
- 2019
- [j8]Aaron Boddy
, William Hurst
, Michael Mackay, Abdennour El Rhalibi:
Density-Based Outlier Detection for Safeguarding Electronic Patient Record Systems. IEEE Access 7: 40285-40294 (2019) - [j7]Carl Chalmers
, William Hurst
, Michael Mackay, Paul Fergus:
Identifying behavioural changes for health monitoring applications using the advanced metering infrastructure. Behav. Inf. Technol. 38(11): 1154-1166 (2019) - [j6]Aaron Boddy, William Hurst
, Michael Mackay, Abdennour El Rhalibi, Thar Baker
, Casimiro Aday Curbelo Montañez
:
An Investigation into Healthcare-Data Patterns. Future Internet 11(2): 30 (2019) - [c26]Mutinta Mwansa
, William Hurst
, Yuanyuan Shen
:
Towards Smart Meter Energy Analysis and Profiling to Support Low Carbon Emissions. ACRIT 2019: 312-322 - [c25]William Hurst
, Casimiro Aday Curbelo Montañez
, Dhiya Al-Jumeily
:
Age Group Detection in Stochastic Gas Smart Meter Data Using Decision-Tree Learning. ICIC (3) 2019: 593-605 - [c24]Matthew Banton
, Nathan Shone, William Hurst
, Qi Shi:
A Fresh Look at Combining Logs and Network Data to Detect Anomalous Activity. ICT-DM 2019: 1-6 - 2017
- [c23]Darryl O'Hare, William Hurst
, David Tully, Abdennour El Rhalibi:
A Study into Autonomous Scanning for 3D Model Construction. Edutainment 2017: 182-190 - [c22]Aaron Boddy, William Hurst
, Michael Mackay, Abdennour El Rhalibi:
A study into data analysis and visualisation to increase the cyber-resilience of healthcare infrastructures. IML 2017: 32:1-32:7 - 2016
- [j5]Bashar Ahmed Alohali
, Kashif Kifayat
, Qi Shi, William Hurst
:
Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids. J. Sens. Actuator Networks 5(2): 9 (2016) - [c21]Sahar Badri
, Paul Fergus
, William Hurst
:
Critical infrastructure automated immuno-response system (CIAIRS). CoDIT 2016: 96-101 - [c20]Aaron Boddy, William Hurst
, Michael Mackay, Abdennour El Rhalibi:
A Study into Detecting Anomalous Behaviours within HealthCare Infrastructures. DeSE 2016: 111-117 - [c19]Sahar Badri
, Paul Fergus
, William Hurst
:
Statistical Analysis Methods for Interdependency Communication in Distributed Systems. DeSE 2016: 273-278 - [c18]Sahar Badri
, Paul Fergus
, William Hurst
:
A Support Network for Distributed Systems. Edutainment 2016: 318-330 - [c17]Kuo-Kun Tseng, Dachao Lee, William Hurst
, Fang-Yin Lin, W. H. Ip
:
Frequency Rank Order Statistic with Unknown Neural Network for ECG Identification System. ES 2016: 160-167 - [c16]Carl Chalmers
, William Hurst
, Michael Mackay, Paul Fergus
:
A Smart Health Monitoring Technology. ICIC (1) 2016: 832-842 - [c15]Mohamed Abdlhamed, Kashif Kifayat
, Qi Shi
, William Hurst
:
A System for Intrusion Prediction in Cloud Computing. ICC 2016 2016: 35:1-35:9 - [c14]Bashar Ahmed Alohali, Kashif Kifayat
, Qi Shi, William Hurst
:
Replay Attack Impact on Advanced Metering Infrastructure (AMI). SmartGIFT 2016: 52-59 - [c13]Aaron Boddy, William Hurst, Michael Mackay, Abdennour El Rhalibi:
Securing Health Care Information Systems using Visualisation Techniques. UKAIS 2016: 11 - [c12]William Hurst, Nathan Shone, Qi Shi:
Critical Infrastructure Testbed for Cyber-Security Training and Research. UKAIS 2016: 23 - 2015
- [j4]William Hurst
, Áine MacDermott
:
Evaluating the effects of cascading failures in a network of critical infrastructures. Int. J. Syst. Syst. Eng. 6(3): 221-236 (2015) - [c11]William Hurst
, Nathan Shone, Quentin Monnet:
Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures. CIT/IUCC/DASC/PICom 2015: 1697-1702 - [c10]Nathan Shone, Chelsea Dobbins
, William Hurst
, Qi Shi
:
Digital Memories Based Mobile User Authentication for IoT. CIT/IUCC/DASC/PICom 2015: 1796-1802 - [c9]Carl Chalmers
, William Hurst
, Michael Mackay, Paul Fergus
:
Smart Health Monitoring Using the Advance Metering Infrastructure. CIT/IUCC/DASC/PICom 2015: 2297-2302 - [c8]William Hurst
, Graham Davis, Abdennour El Rhalibi, David Tully, Zhigeng Pan
:
Predicting and Visualising City Noise Levels to Support Tinnitus Sufferers. ICIG (3) 2015: 583-598 - [c7]Carl Chalmers
, William Hurst
, Michael Mackay, Paul Fergus
:
Smart meter profiling for health applications. IJCNN 2015: 1-7 - 2014
- [b1]William Hurst:
Behavioural observation for critical infrastructure security support. Liverpool John Moores University, UK, 2014 - [j3]William Hurst
, Madjid Merabti, Shamaila Iram
, Paul Fergus
:
Protecting critical infrastructures through behavioural observation. Int. J. Crit. Infrastructures 10(2): 174-192 (2014) - [j2]William Hurst
, Madjid Merabti, Paul Fergus
:
Behaviour analysis techniques for supporting critical infrastructure security. Int. J. Crit. Infrastructures 10(3/4): 267-287 (2014) - [j1]Laura Pla Beltran, Madjid Merabti, William Hurst
:
Using behavioural observation and game technology to support critical infrastructure security. Int. J. Syst. Syst. Eng. 5(1): 45-67 (2014) - [c6]William Hurst
, Madjid Merabti, Paul Fergus
:
Big Data Analysis Techniques for Cyber-threat Detection in Critical Infrastructures. AINA Workshops 2014: 916-921 - [c5]William Hurst
, Madjid Merabti, Paul Fergus:
A Survey of Critical Infrastructure Security. Critical Infrastructure Protection 2014: 127-138 - [c4]Áine MacDermott
, William Hurst
, Qi Shi, Madjid Merabti:
Simulating Critical Infrastructure Cascading Failure. UKSim 2014: 324-329 - 2013
- [c3]William Hurst
, Madjid Merabti, Paul Fergus
:
Behavioural Observation for Critical Infrastructure Security Support. EMS 2013: 36-41 - 2012
- [c2]William Hurst
, Madjid Merabti, Paul Fergus
:
Operational Support for Critical Infrastructure Security. HPCC-ICESS 2012: 1473-1478 - [c1]William Hurst
, Madjid Merabti, Paul Fergus
:
Managing critical infrastructures through behavioural observation. NESEA 2012: 1-6
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint