default search action
Simon Parkinson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Muhammad Ayub Ansari, Andrew Crampton, Simon Parkinson:
Keyhole Porosity Identification and Localization via X-Ray Imaging With YOLO. IEEE Access 12: 61049-61061 (2024) - [j37]Mohamed Ayyash, Tariq A. A. Alsboui, Omar Alshaikh, Isa Inuwa-Dutse, Saad Khan, Simon Parkinson:
Cybersecurity Education and Awareness Among Parents and Teachers: A Survey of Bahrain. IEEE Access 12: 86596-86617 (2024) - [j36]Adediji A. Fakoya, Simon Parkinson:
A Novel Image Casting and Fusion for Identifying Individuals at Risk of Alzheimer's Disease Using MRI and PET Imaging. IEEE Access 12: 134101-134114 (2024) - [j35]Omar Alshaikh, Simon Parkinson, Saad Khan:
Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach. Comput. Secur. 139: 103694 (2024) - [j34]Runlin Zhang, Qing Xu, Shunbo Wang, Simon Parkinson, Klaus Schoeffmann:
Information Difference of Transfer Entropies between Head Motion and Eye Movement Indicates a Proxy of Driving. Entropy 26(1): 3 (2024) - [e4]Slawomir Nowaczyk, Przemyslaw Biecek, Neo Christopher Chung, Mauro Vallati, Pawel Skruch, Joanna Jaworek-Korjakowska, Simon Parkinson, Alexandros Nikitas, Martin Atzmüller, Tomás Kliegr, Ute Schmid, Szymon Bobek, Nada Lavrac, Marieke Peeters, Roland van Dierendonck, Saskia Robben, Eunika Mercier-Laurent, Gülgün Kayakutlu, Mieczyslaw Lech Owoc, Karl Mason, Abdul Wahid, Pierangela Bruno, Francesco Calimeri, Francesco Cauteruccio, Giorgio Terracina, Diedrich Wolter, Jochen L. Leidner, Michael Kohlhase, Vania Dimitrova:
Artificial Intelligence. ECAI 2023 International Workshops - XAI³, TACTIFUL, XI-ML, SEDAMI, RAAIT, AI4S, HYDRA, AI4AI, Kraków, Poland, September 30 - October 4, 2023, Proceedings, Part I. Communications in Computer and Information Science 1947, Springer 2024, ISBN 978-3-031-50395-5 [contents] - [e3]Slawomir Nowaczyk, Przemyslaw Biecek, Neo Christopher Chung, Mauro Vallati, Pawel Skruch, Joanna Jaworek-Korjakowska, Simon Parkinson, Alexandros Nikitas, Martin Atzmüller, Tomás Kliegr, Ute Schmid, Szymon Bobek, Nada Lavrac, Marieke Peeters, Roland van Dierendonck, Saskia Robben, Eunika Mercier-Laurent, Gülgün Kayakutlu, Mieczyslaw Lech Owoc, Karl Mason, Abdul Wahid, Pierangela Bruno, Francesco Calimeri, Francesco Cauteruccio, Giorgio Terracina, Diedrich Wolter, Jochen L. Leidner, Michael Kohlhase, Vania Dimitrova:
Artificial Intelligence. ECAI 2023 International Workshops - XAI³, TACTIFUL, XI-ML, SEDAMI, RAAIT, AI4S, HYDRA, AI4AI, Kraków, Poland, September 30 - October 4, 2023, Proceedings, Part II. Communications in Computer and Information Science 1948, Springer 2024, ISBN 978-3-031-50484-6 [contents] - [i2]Runlin Zhang, Qing Xu, Simon Parkinson, Klaus Schoeffmann, Yu Chen:
Cognitive Effort Measures Driven by Fixation Induced Retinal Flow in Visual Scanning Behavior during Virtual Driving. CoRR abs/2405.13027 (2024) - 2023
- [j33]Muhammad Hussain, Hussain Al-Aqrabi, Muhammad Munawar, Richard Hill, Simon Parkinson:
Exudate Regeneration for Automated Exudate Detection in Retinal Fundus Images. IEEE Access 11: 83934-83945 (2023) - [j32]Rami Mubarak, Tariq A. A. Alsboui, Omar Alshaikh, Isa Inuwa-Dutse, Saad Khan, Simon Parkinson:
A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats. IEEE Access 11: 144497-144529 (2023) - [j31]Simon Parkinson, Saad Khan:
A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective. ACM Comput. Surv. 55(6): 123:1-123:28 (2023) - [j30]Monika Roopak, Saad Khan, Simon Parkinson, Rachel Armitage:
Comparison of deep learning classification models for facial image age estimation in digital forensic investigations. Forensic Sci. Int. Digit. Investig. 47: 301637 (2023) - [j29]Saad Khan, Simon Parkinson, Craig Murphy:
Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach. Expert Syst. Appl. 233: 120991 (2023) - [j28]Simon Parkinson, Saad Khan, Alexandru-Mihai Badea, Andrew Crampton, Na Liu, Qing Xu:
An empirical analysis of keystroke dynamics in passwords: A longitudinal study. IET Biom. 12(1): 25-37 (2023) - [c19]Saad Khan, Simon Parkinson, Monika Roopak, Rachel Armitage, Andrew Barlow:
Automated Planning to Prioritise Digital Forensics Investigation Cases Containing Indecent Images of Children. ICAPS 2023: 500-508 - [c18]Rongge Guo, Alexandros Nikitas, Simon Parkinson, Mauro Vallati:
One Bus is All it Takes: The Impact of Cyber Attacks in Customised Bus Services. ITSC 2023: 5784-5789 - 2022
- [j27]Simon Parkinson, Saad Khan:
Identifying high-risk over-entitlement in access control policies using fuzzy logic. Cybersecur. 5(1): 6 (2022) - [j26]Samer Mohammed Jaber Mubarak, Andrew Crampton, Jennifer Carter, Simon Parkinson:
Robust data expansion for optimised modelling using adaptive neuro-fuzzy inference systems. Expert Syst. Appl. 189: 116138 (2022) - [c17]Omar Alshaikh, Simon Parkinson, Saad Khan:
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security. UbiSec 2022: 545-555 - 2021
- [j25]Saad Khan, Simon Parkinson, Liam Grant, Na Liu, Stephen McGuire:
Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security. ACM Comput. Surv. 53(4): 85:1-85:29 (2021) - [j24]Simon Parkinson, Saad Khan, Andrew Crampton, Qing Xu, Weizhi Xie, Na Liu, Kyle Dakin:
Password policy characteristics and keystroke biometric authentication. IET Biom. 10(2): 163-178 (2021) - [j23]Iffat Gheyas, Simon Parkinson, Saad Khan:
OCEAN: A Non-Conventional Parameter Free Clustering Algorithm Using Relative Densities of Categories. Int. J. Pattern Recognit. Artif. Intell. 35(5): 2150017:1-2150017:31 (2021) - [j22]Saadia Arshad, Junaid Arshad, Muhammad Mubashir Khan, Simon Parkinson:
Analysis of security and privacy challenges for DNA-genomics applications and databases. J. Biomed. Informatics 119: 103815 (2021) - [c16]Zezhong Lv, Qing Xu, Klaus Schoeffmann, Simon Parkinson:
A Jensen-Shannon Divergence Driven Metric of Visual Scanning Efficiency Indicates Performance of Virtual Driving. ICME 2021: 1-6 - 2020
- [j21]Saad Khan, Simon Parkinson, Na Liu, Liam Grant:
Low-cost fitness and activity trackers for biometric authentication. J. Cybersecur. 6(1) (2020) - [j20]Jonathan Miller, Simon Fletcher, Andrew Longstaff, Simon Parkinson:
Simultaneous Constant Velocity Measurement of the Motion Errors of Linear Axes. Int. J. Autom. Technol. 14(3): 417-428 (2020) - [j19]Reza Montasari, Richard Hill, Simon Parkinson, Alireza Daneshkhah, Amin Hosseinian Far:
Hardware-based cyber threats: attack vectors and defence techniques. Int. J. Electron. Secur. Digit. Forensics 12(4): 397-411 (2020) - [j18]Reza Montasari, Richard Hill, Simon Parkinson, Pekka Peltola, Amin Hosseinian Far, Alireza Daneshkhah:
Digital Forensics: Challenges and Opportunities for Future Studies. Int. J. Organ. Collect. Intell. 10(2): 37-53 (2020)
2010 – 2019
- 2019
- [j17]Simon Parkinson, Saad Khan, James Bray, Daiyaan Shreef:
Creeper: a tool for detecting permission creep in file system access controls. Cybersecur. 2(1): 14 (2019) - [j16]Muhammad Ajmal Azad, Samiran Bag, Simon Parkinson, Feng Hao:
TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks. IEEE Internet Things J. 6(4): 5878-5891 (2019) - [j15]Saad Khan, Simon Parkinson:
Discovering and utilising expert knowledge from security event logs. J. Inf. Secur. Appl. 48 (2019) - [c15]Leanne Monchuk, Simon Parkinson, James Kitchen:
Towards Automating Crime Prevention through Environmental Design (CPTED) Analysis to Predict Burglary. ICAPS 2019: 539-547 - [c14]Samuel Egunjobi, Simon Parkinson, Andrew Crampton:
Classifying Ransomware Using Machine Learning Algorithms. IDEAL (2) 2019: 45-52 - [c13]Lukás Chrpa, Mauro Vallati, Simon Parkinson:
Exploiting automated planning for efficient centralized vehicle routing and mitigating congestion in urban road networks. SAC 2019: 191-194 - 2018
- [j14]Simon Parkinson, Mauro Vallati, Andrew Crampton, Shirin Sohrabi:
GraphBAD: A general technique for anomaly detection in security information and event management. Concurr. Comput. Pract. Exp. 30(16) (2018) - [j13]Saad Khan, Simon Parkinson:
Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach. Expert Syst. Appl. 113: 116-127 (2018) - [j12]Simon Parkinson, Saad Khan:
Identifying irregularities in security event logs through an object-based Chi-squared test of independence. J. Inf. Secur. Appl. 40: 52-62 (2018) - [p3]Saad Khan, Simon Parkinson:
Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 3-32 - [p2]Saad Khan, Simon Parkinson:
Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 159-182 - [p1]Liam Grant, Simon Parkinson:
Identifying File Interaction Patterns in Ransomware Behaviour. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 317-335 - [e2]Simon Parkinson, Andrew Crampton, Richard Hill:
Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach. Computer Communications and Networks, Springer 2018, ISBN 978-3-319-92623-0 [contents] - 2017
- [j11]Saad Khan, Simon Parkinson, Yongrui Qin:
Fog computing security: a review of current applications and security solutions. J. Cloud Comput. 6: 19 (2017) - [j10]Falilat Jimoh, Simon Parkinson, Thomas Leo McCluskey:
A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. J. Comput. Sci. 13(8): 257-274 (2017) - [j9]Simon Parkinson:
Use of access control to minimise ransomware impact. Netw. Secur. 2017(7): 5-8 (2017) - [j8]Simon Parkinson, Paul Ward, Kyle M. Wilson, Jonathan Miller:
Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges. IEEE Trans. Intell. Transp. Syst. 18(11): 2898-2915 (2017) - [j7]Yongrui Qin, Quan Z. Sheng, Nickolas J. G. Falkner, Lina Yao, Simon Parkinson:
Efficient computation of distance labeling for decremental updates in large dynamic graphs. World Wide Web 20(5): 915-937 (2017) - [c12]Saad Khan, Simon Parkinson:
Towards A Multi-Tiered Knowledge-Based System for Autonomous Cloud Security Auditing. AAAI Workshops 2017 - [c11]Simon Parkinson, Andrew Longstaff, Simon Fletcher, Mauro Vallati, Lukás Chrpa:
On the Exploitation of Automated Planning for Reducing Machine Tools Energy Consumption between Manufacturing Operations. ICAPS 2017: 400-408 - [c10]Yongrui Qin, Quan Z. Sheng, Simon Parkinson, Nickolas J. G. Falkner:
Edge Influence Computation in Dynamic Graphs. DASFAA (2) 2017: 649-660 - [c9]Simon Parkinson, Yongrui Qin, Saad Khan, Mauro Vallati:
Security auditing in the fog. ICC 2017: 191:1-191:9 - [c8]Saad Khan, Simon Parkinson:
Causal Connections Mining Within Security Event Logs. K-CAP 2017: 38:1-38:4 - [c7]Saad Khan, Simon Parkinson, Andrew Crampton:
A Multi-layered Cloud Protection Framework. UCC (Companion") 2017: 233-238 - [e1]Lukás Chrpa, Simon Parkinson, Mauro Vallati:
Proceedings of the 34th Workshop of the UK Planning and Scheduling Special Interest Group, PlanSIG 2016, Huddersfield, UK, December 15-16, 2016. CEUR Workshop Proceedings 1782, CEUR-WS.org 2017 [contents] - 2016
- [j6]Simon Parkinson, Nils Johnson, Narasimha D. Rao, Bryan Jones, Michelle T. H. van Vliet, Oliver Fricko, Ned Djilali, Keywan Riahi, Martina Flörke:
Climate and human development impacts on municipal water demand: A spatially-explicit global modeling framework. Environ. Model. Softw. 85: 266-278 (2016) - [j5]Simon Parkinson, Vassiliki Somaraki, R. Ward:
Auditing file system permissions using association rule mining. Expert Syst. Appl. 55: 274-283 (2016) - [j4]Simon Parkinson, Andrew Crampton:
Identification of irregularities and allocation suggestion of relative file system permissions. J. Inf. Secur. Appl. 30: 27-39 (2016) - 2015
- [j3]Simon Parkinson, Andrew Peter Longstaff:
Multi-objective optimisation of machine tool error mapping using automated planning. Expert Syst. Appl. 42(6): 3005-3015 (2015) - 2014
- [j2]Simon Parkinson, Andrew Longstaff, Simon Fletcher:
Automated planning to minimise uncertainty of machine tool calibration. Eng. Appl. Artif. Intell. 30: 63-72 (2014) - [c6]Simon Parkinson, Peter Gregory, Andrew Peter Longstaff, Andrew Crampton:
Automated Planning for Multi-Objective Machine Tool Calibration: Optimising Makespan and Measurement Uncertainty. ICAPS 2014 - 2013
- [i1]Simon Parkinson, Andrew Crampton:
A Novel Software Tool for Analysing NT File System Permissions. CoRR abs/1312.2804 (2013) - 2012
- [j1]Simon Parkinson, Andrew Longstaff, Simon Fletcher, Andrew Crampton, Peter Gregory:
Automatic planning for machine tool calibration: A case study. Expert Syst. Appl. 39(13): 11367-11377 (2012) - [c5]Simon Parkinson, Andrew Longstaff, Andrew Crampton, Peter Gregory:
The Application of Automated Planning to Machine Tool Calibration. ICAPS 2012 - [c4]Dan Wang, Braydon de Wit, Simon Parkinson, Jason C. Fuller, David P. Chassin, Curran Crawford, Ned Djilali:
A test bed for self-regulating distribution systems: Modeling integrated renewable energy and demand response in the GridLAB-D/MATLAB environment. ISGT 2012: 1-7 - 2011
- [c3]Simon Parkinson, Andrew Longstaff, Andrew Crampton, Simon Fletcher, G. Allen, Alan Myers:
Representing the process of machine tool calibration on first-order logic. ICAC 2011: 22-27 - [c2]Lei Zheng, Simon Parkinson, Dan Wang, Lin Cai, Curran Crawford:
Energy efficient communication networks design for demand response in smart grid. WCSP 2011: 1-6
1990 – 1999
- 1993
- [c1]R. Andrew Russell, Simon Parkinson:
Sensing Surface Shape by Touch. ICRA (1) 1993: 423-428
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint