Follow
Aine MacDermott
Aine MacDermott
Senior Lecturer
Verified email at ljmu.ac.uk
Title
Cited by
Cited by
Year
Iot forensics: Challenges for the ioa era
A MacDermott, T Baker, Q Shi
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
1272018
CTRUST: A dynamic trust model for collaborative applications in the Internet of Things
AA Adewuyi, H Cheng, Q Shi, J Cao, Á MacDermott, X Wang
IEEE Internet of Things Journal 6 (3), 5432-5445, 2019
912019
A secure fog‐based platform for SCADA‐based IoT critical infrastructure
T Baker, M Asim, Á MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ...
Software: Practice and Experience 50 (5), 503-518, 2020
792020
TrustChain: A privacy preserving blockchain with edge computing
U Jayasinghe, GM Lee, Á MacDermott, WS Rhee
Wireless Communications and Mobile Computing 2019, 2019
692019
Securing things in the healthcare internet of things
Á MacDermott, P Kendrick, I Idowu, M Ashall, Q Shi
2019 Global IoT Summit (GIoTS), 1-6, 2019
362019
Forensic analysis of wearable devices: Fitbit, Garmin and HETP Watches
A MacDermott, S Lea, F Iqbal, I Idowu, B Shah
2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019
272019
Drone forensics: A case study on DJI phantom 4
F Iqbal, S Alam, A Kazim, Á MacDermott
2019 IEEE/ACS 16th International conference on computer systems and …, 2019
252019
The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics
Á MacDermott, T Baker, P Buck, F Iqbal, Q Shi
International Journal of Digital Crime and Forensics (IJDCF) 12 (1), 1-13, 2020
242020
A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models
A Akinbi, Á MacDermott, AM Ismael
Forensic Science International: Digital Investigation 42, 301470, 2022
212022
Collaborative intrusion detection in federated cloud environments
AM Mac Dermott, Q Shi, K Kifayat
Journal of Computer Sciences and Applications 3 (3A), 10-20, 2015
202015
Recurrent neural networks in medical data analysis and classifications
H Al-Askar, N Radi, Á MacDermott
Applied Computing in Medicine and Health, 147-165, 2016
192016
Intrusion detection for critical infrastructure protection
Á MacDermott, Q Shi, M Merabti, K Kifayat
13th Annual Postgraduate Symposium on Convergence of Telecommunications …, 2012
192012
Deep learning combined with de-noising data for network intrusion detection
PV Dinh, TN Ngoc, N Shone, Á MacDermott, Q Shi
2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems …, 2017
162017
Digital forensic acquisition and analysis of discord applications
M Motyliński, Á MacDermott, F Iqbal, M Hussain, S Aleem
2020 international conference on communications, computing, cybersecurity …, 2020
152020
Drone forensics: A case study of digital forensic investigations conducted on common drone models
K Al-Room, F Iqbal, T Baker, B Shah, B Yankson, A MacDermott, ...
International Journal of Digital Crime and Forensics (IJDCF) 13 (1), 1-25, 2021
142021
Protecting critical infrastructure services in the cloud environment
Á MacDermott, Q Shi, M Merabti, K Kifayat
Proceedings of the 12th European Conference on Information Warfare and …, 2013
132013
The development of fraud detection systems for detection of potentially fraudulent applications
D Al-Jumeily, A Hussain, Á MacDermott, H Tawfik, G Seeckts, J Lunn
2015 International Conference on Developments of E-Systems Engineering (DeSE …, 2015
122015
Hosting critical infrastructure services in the cloud environment considerations
Á MacDermott, Q Shi, M Merabti, K Kifayat
International Journal of Critical Infrastructures 11 (4), 365-381, 2015
122015
Considering an elastic scaling model for cloud security
Á MacDermott, Q Shi, M Merabti, K Kifiyat
8th International Conference for Internet Technology and Secured …, 2013
122013
Security as a Service for a Cloud Federation
A MacDermott, Q Shi, M Merabti, K Kifayat
The 15th Post Graduate Symposium on the Convergence of Telecommunications …, 2014
112014
The system can't perform the operation now. Try again later.
Articles 1–20