default search action
Áine MacDermott
Person information
- affiliation: Liverpool John Moores University, Liverpool, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Farkhund Iqbal, Abdullah Kazim, Áine MacDermott, Richard Ikuesan, Musaab Hasan, Andrew Marrington:
Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot. ARES 2024: 194:1-194:9 - [c22]Laura Rafferty, Áine MacDermott:
Adaptive Defence of the Internet of Things (IoT) using the Belief-Desire-Intention (BDI) Model for Social Robots. HICSS 2024: 1722-1731 - 2023
- [j14]Howard Heath, Áine MacDermott, Alex Akinbi:
Forensic analysis of ephemeral messaging applications: Disappearing messages or evidential data? Forensic Sci. Int. Digit. Investig. 46: 301585 (2023) - [j13]Emma Raymer, Áine MacDermott, Alex Akinbi:
Virtual reality forensics: Forensic analysis of Meta Quest 2. Forensic Sci. Int. Digit. Investig. 47: 301658 (2023) - 2022
- [j12]Michal Motylinski, Áine MacDermott, Farkhund Iqbal, Babar Shah:
A GPU-based machine learning approach for detection of botnet attacks. Comput. Secur. 123: 102918 (2022) - [j11]Alex Akinbi, Áine MacDermott, Aras Masood Ismael:
A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models. Digit. Investig. 42-43: 301470 (2022) - [j10]Áine MacDermott, Michal Motylinski, Farkhund Iqbal, Kellyann Stamp, Mohammed Hussain, Andrew Marrington:
Using deep learning to detect social media 'trolls'. Digit. Investig. 43(Supplement): 301446 (2022) - 2021
- [j9]Khalifa Al-Room, Farkhund Iqbal, Thar Baker, Babar Shah, Benjamin Yankson, Áine MacDermott, Patrick C. K. Hung:
Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models. Int. J. Digit. Crime Forensics 13(1): 1-25 (2021) - [j8]Ghulam Mohi Ud Din, Angelos K. Marnerides, Qi Shi, Chelsea Dobbins, Áine MacDermott:
Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems. IEEE Trans. Emerg. Top. Comput. Intell. 5(6): 860-870 (2021) - [c21]Farkhund Iqbal, Michal Motylinski, Áine MacDermott:
Discord Server Forensics: Analysis and Extraction of Digital Evidence. NTMS 2021: 1-8 - [c20]Zainab Khalid, Farkhund Iqbal, Khalil Al-Hussaeni, Áine MacDermott, Mohammed Hussain:
Forensic Analysis of Microsoft Teams: Investigating Memory, Disk and Network. SmartCity360° 2021: 583-601 - [c19]Joseph Williams, Áine MacDermott, Kellyann Stamp, Farkhund Iqbal:
Forensic Analysis of Fitbit Versa: Android vs iOS. SP (Workshops) 2021: 318-326 - 2020
- [j7]Áine MacDermott, Thar Baker, Paul Buck, Farkhund Iqbal, Qi Shi:
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics. Int. J. Digit. Crime Forensics 12(1): 1-13 (2020) - [j6]Thar Baker, Muhammad Asim, Áine MacDermott, Farkhund Iqbal, Faouzi Kamoun, Babar Shah, Omar Alfandi, Mohammad Hammoudeh:
A secure fog-based platform for SCADA-based IoT critical infrastructure. Softw. Pract. Exp. 50(5): 503-518 (2020) - [c18]Michal Motylinski, Áine MacDermott, Farkhund Iqbal, Mohammed Hussain, Saiqa Aleem:
Digital Forensic Acquisition and Analysis of Discord Applications. CCCI 2020: 1-7 - [c17]Áine MacDermott, John Carr, Qi Shi, Mohd Rizuan Baharon, Gyu Myoung Lee:
Privacy Preserving Issues in the Dynamic Internet of Things (IoT). ISNCC 2020: 1-6
2010 – 2019
- 2019
- [j5]Anuoluwapo A. Adewuyi, Hui Cheng, Qi Shi, Jiannong Cao, Áine MacDermott, Xingwei Wang:
CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things. IEEE Internet Things J. 6(3): 5432-5445 (2019) - [j4]Upul Jayasinghe, Gyu Myoung Lee, Áine MacDermott, Woo-Seop Rhee:
TrustChain: A Privacy Preserving Blockchain with Edge Computing. Wirel. Commun. Mob. Comput. 2019: 2014697:1-2014697:17 (2019) - [c16]Dua'a Abu Hamdi, Farkhund Iqbal, Saiqa Alam, Abdulla Kazim, Áine MacDermott:
Drone Forensics: A Case Study on DJI Phantom 4. AICCSA 2019: 1-6 - [c15]Áine MacDermott, Phillip Kendrick, Ibrahim Idowu, Mal Ashall, Qi Shi:
Securing Things in the Healthcare Internet of Things. GIoTS 2019: 1-6 - [c14]Áine MacDermott, Stephen Lea, Farkhund Iqbal, Ibrahim Idowu, Babar Shah:
Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches. NTMS 2019: 1-6 - 2018
- [c13]Upul Jayasinghe, Gyu Myoung Lee, Áine MacDermott:
Trust-Based Data Controller for Personal Information Management. IIT 2018: 123-128 - [c12]Áine MacDermott, Thar Baker, Qi Shi:
Iot Forensics: Challenges for the Ioa Era. NTMS 2018: 1-5 - 2017
- [b1]Áine MacDermott:
Collaborative intrusion detection in federated cloud environments using Dempster-Shafer theory of evidence. Liverpool John Moores University, UK, 2017 - [c11]Áine MacDermott, Qi Shi, Kashif Kifayat:
Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence. ICIC (3) 2017: 203-212 - 2016
- [j3]Margarita Levin Jaitner, Áine MacDermott:
Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: The West European and the Russian Views. Int. J. Cyber Warf. Terror. 6(1): 24-40 (2016) - 2015
- [j2]Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat:
Hosting critical infrastructure services in the cloud environment considerations. Int. J. Crit. Infrastructures 11(4): 365-381 (2015) - [j1]William Hurst, Áine MacDermott:
Evaluating the effects of cascading failures in a network of critical infrastructures. Int. J. Syst. Syst. Eng. 6(3): 221-236 (2015) - [c10]Dhiya Al-Jumeily, Abir Hussain, Áine MacDermott, Hissam Tawfik, Gemma Seeckts, Jan Lunn:
The Development of Fraud Detection Systems for Detection of Potentially Fraudulent Applications. DeSE 2015: 7-13 - [c9]Kirsty E. Lever, Áine MacDermott, Kashif Kifayat:
Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence. DeSE 2015: 47-52 - [c8]Thaier Hamid, Áine MacDermott:
A Methodology to Develop Dynamic Cost-Centric Risk Impact Metrics. DeSE 2015: 53-59 - [c7]Áine MacDermott, Qi Shi, Kashif Kifayat:
Detecting Intrusions in Federated Cloud Environments Using Security as a Service. DeSE 2015: 91-96 - [c6]Paul Buck, Qi Shi, Áine MacDermott:
A Selective Regression Testing Approach for Composite Web Services. DeSE 2015: 97-101 - [c5]Dhiya Al-Jumeily, Abir Hussain, Áine MacDermott, Hissam Tawfik, Jennifer Murphy:
Improving Communication between Healthcare Professionals and Their Patients through a Prescription Tracking System. DeSE 2015: 218-224 - [c4]Dhiya Al-Jumeily, Abir Hussain, Áine MacDermott, Gemma Seeckts, Jan Lunn:
Methods and techniques to support the development of fraud detection system. IWSSIP 2015: 224-227 - [c3]Dhiya Al-Jumeily, Abir Hussain, Áine MacDermott, Jennifer Murphy:
Improving the barrier of communication between healthcare professionals and their patients using a Prescription Tracking System. IWSSIP 2015: 282-286 - 2014
- [c2]Áine MacDermott, William Hurst, Qi Shi, Madjid Merabti:
Simulating Critical Infrastructure Cascading Failure. UKSim 2014: 324-329 - 2013
- [c1]Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat:
Considering an elastic scaling model for cloud Security. ICITST 2013: 150-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint