Carsten Maple
#113,100
Most Influential Person Now
Ph.D.
Why Is Carsten Maple Influential?
(Suggest an Edit or Addition)According to Wikipedia, Carsten Maple is professor of cyber systems engineering at the University of Warwick. He was previously professor of applicable computing at the University of Bedfordshire. He is a fellow of the British Computer Society and vice-chair of the Council of Professors and Heads of Computing, UK. He is also co-director of the National Centre for Cyberstalking Research and a trustee of Protection Against Stalking.
Carsten Maple's Published Works
Published Works
- A Survey of Localization in Wireless Sensor Network (2012) (260)
- Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic (2020) (249)
- Security and privacy in the internet of things (2017) (121)
- SAFA: A Semi-Asynchronous Protocol for Fast Federated Learning With Low Overhead (2019) (112)
- The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence (2016) (107)
- A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem (2012) (98)
- Geometric design and space planning using the marching squares and marching cube algorithms (2003) (91)
- A Novel Internet of Things-Enabled Accident Detection and Reporting System for Smart City Environments (2019) (81)
- A Novel Bio-Inspired Hybrid Algorithm (NBIHA) for Efficient Resource Management in Fog Computing (2019) (77)
- Motivation and opportunity based model to reduce information security insider threats in organisations (2018) (75)
- Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities (2019) (71)
- Intrusion Detection Systems for Intra-Vehicle Networks: A Review (2019) (64)
- Cognitive radio networks for Internet of Things: Applications, challenges and future (2013) (57)
- A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks (2017) (55)
- Future developments in standardisation of cyber risk in the Internet of Things (IoT) (2019) (54)
- A novel hybrid tabu search approach to container loading (2011) (53)
- UMTS base station location planning: a mathematical model and heuristic optimisation algorithms (2007) (49)
- Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations (2019) (48)
- Effects of polarization on four-beam laser interference lithography (2013) (45)
- Direct modification of silicon surface by nanosecond laser interference lithography (2013) (44)
- Cyberstalking in the United Kingdom: an analysis of the ECHO Pilot Survey (2011) (42)
- Governing AI safety through independent audits (2021) (40)
- Parallel Genetic Algorithms for Third Generation Mobile Network Planning (2004) (34)
- Cyber security of smart homes: development of a reference architecture for attack surface analysis (2018) (33)
- Price-based demand response for household load management with interval uncertainty (2021) (31)
- Named Data Networking for Efficient IoT-based Disaster Management in a Smart Campus (2020) (29)
- Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies (2020) (29)
- A novel efficient algorithm for determining maximum common subgraphs (2005) (28)
- Cyberstalking in the UK: Analysis and Recommendations (2012) (28)
- The impact of cyberstalking: the lived experience - a thematic analysis. (2014) (27)
- Cyber Risk in IoT Systems (2019) (27)
- Digital Twins for Precision Healthcare (2020) (26)
- Bayesian Assessment of Newborn Brain Maturity from Two-Channel Sleep Electroencephalograms (2012) (26)
- Musipass: authenticating me softly with "my" song (2009) (26)
- The usability and practicality of biometric authentication in the workplace (2006) (25)
- Human errors in the information security realm – and how to fix them (2016) (25)
- Frequency Estimation under Local Differential Privacy (2021) (24)
- Trust in the smart home: Findings from a nationally representative survey in the UK (2020) (24)
- DDH-MAC: A novel Dynamic De-Centralized Hybrid MAC protocol for Cognitive Radio Networks (2011) (24)
- Towards a corporate governance trust agent scoring model for collaborative virtual organisations (2011) (23)
- Toward Smart Manufacturing Using Spiral Digital Twin Framework and Twinchain (2020) (23)
- Genetic algorithm based solution to dead-end problems in robot navigation (2011) (23)
- Defining Minimum Requirements of Inter-collaborated Nodes by Measuring the Weight of Node Interactions (2010) (23)
- On the detection-to-track association for online multi-object tracking (2021) (23)
- A longitudinal analysis of the public perception of the opportunities and challenges of the Internet of Things (2018) (23)
- Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security (2020) (23)
- Developing an Unsupervised Real-Time Anomaly Detection Scheme for Time Series With Multi-Seasonality (2020) (22)
- Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss (2010) (22)
- Hybrid feature selection technique for intrusion detection system (2019) (22)
- Towards greener smart cities and road traffic forecasting using air pollution data (2021) (21)
- A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis (2019) (21)
- Fuzzy logic based localisation in wireless sensor networks for disaster environments (2012) (20)
- Comparing Robustness of Pairwise and Multiclass Neural-Network Systems for Face Recognition (2007) (20)
- SecureABC: Secure AntiBody Certificates for COVID-19 (2020) (20)
- θ-Sensitive k-Anonymity: An Anonymization Model for IoT based Electronic Health Records (2020) (20)
- Bayesian Decision Trees for EEG Assessment of newborn brain maturity (2010) (18)
- A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape (2019) (18)
- A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detection (2017) (18)
- Both antireflection and superhydrophobicity structures achieved by direct laser interference nanomanufacturing (2014) (18)
- Superhydrophobic dual micro- and nanostructures fabricated by direct laser interference lithography (2014) (17)
- Synthetic Data - what, why and how? (2022) (17)
- Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey (2021) (17)
- Incremental Algorithm for Association Rule Mining under Dynamic Threshold (2019) (16)
- A novel lifecycle model for Web-based application development in small and medium enterprises (2010) (16)
- Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review (2020) (16)
- Toward optimal multi-objective models of network security: Survey (2011) (16)
- Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics in extreme environments – cyber risk in the colonisation of Mars (2020) (16)
- Manufacturing Robotics The Next Robotic Industrial Revolution (2016) (15)
- Information security collaboration formation in organisations (2017) (15)
- Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles (2020) (15)
- A multi-objective genetic algorithm for minimising network security risk and cost (2012) (15)
- An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks (2012) (15)
- Dynamic user equipment-based hysteresis-adjusting algorithm in LTE femtocell networks (2014) (14)
- A Novel Fog-Based Multi-Level Energy-Efficient Framework for IoT-Enabled Smart Environments (2020) (14)
- Cyber security standards and issues in V2X communications for Internet of Vehicles (2016) (14)
- Emotion Classification and Crowd Source Sensing; A Lexicon Based Approach (2019) (14)
- An Effective Mechanism to Mitigate Real-Time DDoS Attack (2020) (13)
- Machine Learning-based Mist Computing Enabled Internet of Battlefield Things (2021) (13)
- Cooperative automation through the cloud: The CARMA project (2017) (13)
- Shadows Don't Lie: n-Sequence Trajectory Inspection for Misbehaviour Detection and Classification in VANETs (2019) (13)
- Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems (2020) (13)
- Can a Mobile Game Teach Computer Users to Thwart Phishing Attacks? (2013) (13)
- Web Application Development Lifecycle for Small Medium-Sized Enterprises (SMEs) (Short Paper) (2008) (13)
- Coverage and Capacity Calculations for 3G Mobile Network Planning (2003) (13)
- An Attribute-Based Access Control for IoT Using Blockchain and Smart Contracts (2021) (12)
- K-Order Surrounding Roadmaps Path Planner for Robot Path Planning (2014) (12)
- Incremental information gain analysis of input attribute impact on RBF-kernel SVM spam detection (2016) (12)
- The internet of things (2017) (12)
- Challenges in mobile localisation in wireless sensor networks for disaster scenarios (2013) (12)
- Towards decentralized grid agent models for continuous resource discovery of interoperable grid Virtual Organisations (2010) (12)
- A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks (2017) (12)
- Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks (2020) (12)
- Deep GRU-CNN Model for COVID-19 Detection From Chest X-Rays Data (2021) (11)
- Offensive Security: Towards Proactive Threat Hunting via Adversary Emulation (2021) (11)
- Threat modelling for industrial cyber physical systems in the era of smart manufacturing (2022) (11)
- A lightweight model of trust propagation in a multi-client network environment: to what extent does experience matter? (2006) (11)
- Secrecy Outage Analysis for Alamouti Space–Time Block Coded Non-Orthogonal Multiple Access (2020) (10)
- Safety, Security and Privacy in Machine Learning Based Internet of Things (2022) (10)
- Methodologies to Develop Quantitative Risk Evaluation Metrics (2012) (10)
- UK security breach investigations report: an analysis of data compromise cases (2010) (10)
- A Visualisation Technique for the Identification of Security Threats in Networked Systems (2010) (10)
- A Comprehensive Review of Computing Paradigms, enabling Computation Offloading and Task Execution in Vehicular Networks (2022) (9)
- Selecting Effective Blockchain Solutions (2018) (9)
- Securing the Electric Vehicle Charging Infrastructure (2021) (9)
- Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications (2021) (9)
- Data-Driven Detection and Identification of IoT-Enabled Load-Altering Attacks in Power Grids (2021) (9)
- Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks (2015) (9)
- Seventh International Conference on Information Visualization (IV 03) (2003) (9)
- Localization in Wireless Sensor Network (2013) (9)
- Choosing the right wireless LAN security protocol for the home and business user (2006) (9)
- A novel multi-fold security framework for cognitive radio wireless ad-hoc networks (2012) (9)
- A hybrid swarm intelligence algorithm for multiuser scheduling in HSDPA (2013) (8)
- Reliability, Availability and Security of Wireless Networks in the Community (2007) (8)
- An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats (2010) (8)
- Trust Issues on Crowd-Sourcing Methods for Urban Environmental Monitoring (2012) (8)
- Parallel solutions of large dense linear systems using MPI (2002) (8)
- Privacy and Trust in the Internet of Vehicles (2022) (7)
- Managing threats by the use of visualisation techniques (2011) (7)
- Emerging Privacy Challenges and Approaches in CAV Systems (2019) (7)
- Solving Hamiltonian systems arising from ODE eigenproblems (1999) (7)
- Location Proof Systems for Smart Internet of Things: Requirements, Taxonomy, and Comparative Analysis (2020) (7)
- The Rise of Cyberstalking (2015) (7)
- Security and Privacy of Things: Regulatory Challenges and Gaps for the Secure Integration of Cyber-Physical Systems (2018) (6)
- An opportunistic resource management model to overcome resource‐constraint in the Internet of Things (2018) (6)
- Security-Minded Verification of Space Systems (2020) (6)
- Traffic Flow Prediction: An Intelligent Scheme for Forecasting Traffic Flow Using Air Pollution Data in Smart Cities with Bagging Ensemble (2022) (6)
- A profile-driven dynamic risk assessment framework for connected and autonomous vehicles (2018) (6)
- Using a Bayesian averaging model for estimating the reliability of decisions in multimodal biometrics (2006) (6)
- Modelling Self-Led Trust Value Management in Grid and Service Oriented Infrastructures: A Graph Theoretic Social Network Mediated Approach (2010) (6)
- A survey on assistive chair and related integrated sensing techniques (2013) (6)
- Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages (2019) (6)
- Machine Learning Solutions for controlling Cyberbullying and Cyberstalking (2015) (6)
- Differentially Private Health Tokens for Estimating COVID-19 Risk (2020) (6)
- Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks (2021) (6)
- Volunteer Computing in Connected Vehicles: Opportunities and Challenges (2020) (6)
- The use of multiple coordinated views in three-dimensional virtual environments (2004) (6)
- Towards Energy Efficient Smart Grids Using Bio-Inspired Scheduling Techniques (2020) (6)
- Edge Computing to Support Message Prioritisation in Connected Vehicular Systems (2019) (6)
- Classification of multi-channels SEMG signals using wavelet and neural networks on assistive robot (2012) (5)
- A novel symmetric key cryptographic authentication for cooperative communication in cognitive radio networks (2013) (5)
- A multi-modelling based approach to assessing the security of smart buildings (2018) (5)
- Meeting sustainable development goals via robotics and autonomous systems (2022) (5)
- Finding and characterising candidate binding sites (2001) (5)
- A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks (2021) (5)
- A Machine Learning Framework to Detect and Document Text-Based Cyberstalking (2015) (5)
- Object shadowing – a key concept for a modern programming language (2004) (5)
- Accessible and secure? Design constraints on image and sound based passwords (2010) (5)
- An IoT-enabled supply chain integration framework : empirical case studies (2017) (5)
- Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs (2021) (5)
- Re-thinking threat intelligence (2016) (5)
- Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs (2021) (5)
- Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures (2020) (5)
- The Dark Web: Cyber-Security Intelligence Gathering Opportunities, Risks and Rewards (2014) (5)
- Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles (2021) (5)
- Forecasts on future evolution of artificial intelligence and intelligent systems (2022) (5)
- A boundary representation technique for three-dimensional objects (2001) (5)
- Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics (2021) (5)
- Multi-dimensional fuzzy interpolation neural network (2009) (5)
- A visual formalism for graphical user interfaces based on state transition diagrams (2003) (4)
- Music is the Key: Using our Enduring Memory for Songs to Help Users Log On (2012) (4)
- Data fidelity: Security's soft underbelly (2017) (4)
- A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks (2021) (4)
- Cybersecurity in CS Degrees (2016) (4)
- Play That Funky Password!: Recent Advances in Authentication with Music (2015) (4)
- DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks (2021) (4)
- An information security risk management model for smart industries (2017) (4)
- A Meta-Learning Approach to the Optimal Power Flow Problem Under Topology Reconfigurations (2020) (4)
- Sitecam: a multimedia tool for the exploration of construction environments (2005) (4)
- Determination of beam incidence conditions based on the analysis of laser interference patterns (2015) (4)
- Towards more trustworthy B2C e-commerce using a hybrid authentication scheme (2004) (4)
- Dynamic Route Selection for Vehicular Store-Carry-Forward Networks and Misbehaviour Vehicles Analysis (2018) (4)
- Super-forecasting the ‘technological singularity’ risks from artificial intelligence (2022) (4)
- IoT interoperability: Security considerations and challenges in implementation (2018) (4)
- Fuzzy Logic-Based Novel Hybrid Fuel Framework for Modern Vehicles (2020) (4)
- Key Security Challenges for Cloud-assisted Connected and Autonomous Vehicles (2019) (4)
- Malware Detection: A Framework for Reverse Engineered Android Applications through Machine Learning Algorithms (2022) (4)
- Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET (2011) (3)
- Localisation algorithm in wireless sensor networks (2011) (3)
- Vulnerability, Victims and Free Movement: The Case of Cyberstalking (2012) (3)
- Analysis of cyber risk and associated concentration of research (ACR)2 in the security of vehicular edge clouds (2018) (3)
- Smart delivery and retrieval of swab collection kit for COVID-19 test using autonomous Unmanned Aerial Vehicles (2021) (3)
- Development of a capability maturity model for cyber security in IIoT enabled supply chains (2019) (3)
- Creating a Forest of Binary Search Trees for a Multiprocessor System (2006) (3)
- Feature Importance in Bayesian Assessment of Newborn Brain Maturity from EEG (2010) (3)
- Guaranteeing hard real-time traffic with legitimately short deadlines with the timed token protocol (2009) (3)
- Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data (2021) (3)
- The modelling of the FDTD method based on graph theory (2004) (3)
- Application of Physics-Informed Machine Learning Techniques for Power Grid Parameter Estimation (2022) (3)
- Encoding minimum requirements of ad hoc inter-connected grids to a genetic algorithm infrastructure (2010) (3)
- Guaranteeing the timely transmission of periodic messages with arbitrary deadline constraints using the timed token media access control protocol (2011) (3)
- A simplified approach for dynamic security risk management in connected and autonomous vehicles (2019) (3)
- Case study: Multi-role shadow robotic system for independent living (2012) (3)
- Infinite alphabet passwords: A unified model for a class of authentication systems (2010) (3)
- Maintaining a Random Binary Search Tree Dynamically (2006) (3)
- A novel flexible approach to document encryption using an MathML extension to the W3C XML Digital Certificate Standard (2003) (3)
- Co-planar shape-fitting using the Rotating Squares algorithm (2000) (3)
- Active Robot Learning for Building Up High-Order Beliefs (2008) (3)
- A hybrid approach to combat email-based cyberstalking (2015) (3)
- An On-line Distributed Induction Motor Monitoring System Based-on ARM and CAN Bus (2011) (3)
- Integrated Sensing Techniques for Assistive Chairs: A Survey towards Sit-to-Stand Problems (2013) (3)
- Planarity testing for graphs represented by a rotation scheme (2003) (3)
- Design and Development of Industrial Cyber-Physical System Testbed (2020) (3)
- Blockchain and cloud computing-based secure electronic healthcare records storage and sharing (2022) (3)
- Rethinking transparency for the Internet of Things (2020) (3)
- A Graph Theoretic Framework for Trust - From Local to Global (2006) (3)
- Security Issues of a Biometrics Health Care Information System: The Case of the NHS (2009) (2)
- Eighth International Conference on Information Visualisation, 2004. IV 2004. (2004) (2)
- Three-dimensional localisation for wireless sensor networks using probabilistic fuzzy logic (2013) (2)
- Preparing computing students for culturally diverse e-mediated IT projects (2006) (2)
- A three-dimensional object similarity test using graph matching (2004) (2)
- Effectively handling three-dimensional spaces for container loading (2012) (2)
- Hybrid pass: authentication mechanism for web applications – both secure and user-friendly (2009) (2)
- An Application-Oriented Top-Down Scheme for FPGA-Based Embedded System Design with 3D Graphics Applications (2013) (2)
- Efficient discovery and recovery of common control channel in cognitive radio wireless ad-hoc networks (2013) (2)
- A dynamically adaptive, dimensionalised, experience feedback mechanism within second life (2009) (2)
- Human interaction based Robot Self-Learning approach for generic skill learning in domestic environment (2013) (2)
- Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls (2012) (2)
- Real-time compliance control of an assistive joint using QNX operating system (2013) (2)
- Online Harassment and Digital Stalking (2013) (2)
- Optimal Placement of the Wind Generators in the Medium Voltage Power Grid (2011) (2)
- V 4 . 3 pg 1 of 21 Evaluating the Effectiveness of Image-based Password Design Paradigms using a Newly Developed Metric (2006) (2)
- A Resource Discovery Architecture of Loosely Coupled Grid Inter-cooperated Virtual Organisations Using Mobile Agents and Neural Networks (2010) (2)
- Control channel etiquettes: Implementation and evaluation of a hybrid approach for cognitive radio networks (2013) (2)
- Effect of fullerenol on the morphology features of SW480 cells (2013) (2)
- Mathematical use cases lead naturally to Non-Standard Inheritance Relationships (2004) (2)
- Erratum to: An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks (2014) (2)
- From Grids to Clouds: A Collective Intelligence Study for Inter-cooperated Infrastructures (2010) (2)
- Enriching the Object-Oriented Paradigm via Shadows in the Context of Mathematics (2006) (2)
- Cultural impact on user authentication systems (2013) (2)
- Enhancing usability and security in click-based visual password systems (2010) (2)
- Can intelligent optimisation techniques improve computing job scheduling in a Grid environment? review, problem and proposal (2006) (2)
- Modification of silicon surface by direct laser interference (2012) (2)
- A Three-dimensional Object Similarity Test Using Graph Matching Techniques (2004) (2)
- Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential Privacy (2022) (2)
- Privacy Challenges With Protecting Live Vehicular Location Context (2020) (2)
- CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model (2017) (2)
- Unpacking Privacy: Willingness to pay to protect personal data (2019) (2)
- The impact of decreasing transmit power levels on FlockLab to achieve a sparse network (2019) (2)
- Extending e-government to e-society: usability lessons from the UK ID Card Trial (2006) (2)
- Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities (2020) (2)
- A threat based approach to computational offloading for collaborative cruise control (2017) (2)
- Mechanisms for meaningful consent in Internet of Things (2018) (2)
- APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition (2022) (2)
- Embedded Feature Selection Method for a Network-Level Behavioural Analysis Detection Model (2018) (2)
- Fogbanks: Future Dynamic Vehicular Fog Banks for Processing, Sensing and Storage in 6G (2020) (2)
- Peer‐assisted location authentication and access control for wireless networks (2018) (2)
- Challenges in Threat Modelling of New Space Systems: A Teleoperation Use-Case (2022) (2)
- The Impact of Message Encryption on Teleoperation for Space Applications (2022) (1)
- A New Scheme for Deniable/Repudiable Authentication (2007) (1)
- Taxonomy of optimisation techniques and applications (2014) (1)
- A mobile agent strategy for grid interoperable virtual organisations (2010) (1)
- CyRes - Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract) (2020) (1)
- Methodology for integrating artificial intelligence in healthcare systems: learning from COVID-19 to prepare for Disease X (2021) (1)
- A Novel Privacy Paradigm for Improving Serial Data Privacy (2022) (1)
- A hybrid ant colony algorithm for solving container loading (2012) (1)
- Rapid homology modelling of membrane transport proteins and receptors (2001) (1)
- What's in a name? Cultural observations on nationally named hacking groups (2017) (1)
- A novel scalable parallel algorithm for finding optimal paths over heterogeneous terrain (2005) (1)
- EEG Based Aptitude Detection System for Stress Regulation in Health Care Workers (2021) (1)
- A Parallel Algorithm to Calculate the Costrank of a Network (2012) (1)
- A privacy preserving querying mechanism with high utility for electric vehicles (2022) (1)
- A Novel Detection Approach of Unknown Cyber-Attacks for Intra-Vehicle Networks Using Recurrence Plots and Neural Networks (2023) (1)
- Applying the Shuffle Model of Differential Privacy to Vector Aggregation (2021) (1)
- A privacy-preserving route planning scheme for the Internet of Vehicles (2021) (1)
- A Graph theoretical approach to Network Vulnerability Analysis and Countermeasures (2011) (1)
- Collaborative multi-agents in dynamic industrial internet of things using deep reinforcement learning (2022) (1)
- A High-Level Semiotic Trust Agent Scoring Model for Collaborative Virtual Organsations (2010) (1)
- Realising the vision of digital twins: Challenges in trustworthiness (2019) (1)
- Silicon wafer modification by laser interference (2013) (1)
- sEMG BASED INTENTION IDENTIFICATION OF HUMAN BODY MOVEMENT RESEARCH ON ASSISTIVE ROBOT (2013) (1)
- Fuzzy optimisation based symbolic grounding for service robots (2012) (1)
- Optimal Placement of Wind Generators in Medium Voltage Power Grids -- Investigations of Genetic Algorithm (2011) (1)
- State‐of‐the‐Art of Sparse Code Multiple Access for Connected Autonomous Vehicle Application (2019) (1)
- An experimental analysis on iterative block ciphers and their effects on VoIP under different coding schemes (2010) (1)
- A less subjective method for evaluating cyber event threat actors (2016) (1)
- A Comparative Study of Cyber Threats on Evolving Digital Identity Systems (2021) (1)
- On-Line Database Encryption and Authentication (2012) (1)
- The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729 (2010) (1)
- Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store (2022) (1)
- Adoption and Acceptability of Smart Devices for the Home (2019) (1)
- Embedding Cybersecurity in the Computer Science Curriculum (2016) (1)
- A networked multi-player game to facilitate pupil to pupil contact within the context of a school twinning scheme (2006) (1)
- The Value of Personal Data in Iot : Industry Perspectives on Consumer Conceptions of Value (2019) (1)
- A Distributed Mix-Context-Based Method for Location Privacy in Road Networks (2021) (1)
- Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks (2023) (1)
- Future Developments in Standardization of Cyber Risk in the Internet of Things (IoT) (2019) (1)
- Unbundling the Emerging Cyber-Physical Risks in Connected and Autonomous Vehicles: Part II (2017) (1)
- Cyber risk management in satellite systems (2019) (0)
- A Theoretical Framework for Addressing Trust in Open Pervasive Networks (2011) (0)
- K-Order Surrounding Roadmaps Path Planner for Robot Path Planning (2013) (0)
- Music is Key (1995) (0)
- Biometrics Health Care Information Systems and Secure Clinical Messaging: The Case of the NHS (2009) (0)
- Anti-reflection structures fabricated by direct laser interference technology under different ambiances (2013) (0)
- 12th International Conference formation Visualisation, 2008. IV '08 (2008) (0)
- A special numerical method for solving Hamiltonian eigenproblems (1998) (0)
- Throughput-Efficient Blockchain for Internet-of-Vehicles (2021) (0)
- Information Visualization IV 2009 (2009) (0)
- Supply Chain Security Management through Data Process Decomposition: An Architecture Perspective (2021) (0)
- Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes (2022) (0)
- Bayesian model averaging over decision trees for assessing newborn brain maturity from electroencephalogram (2010) (0)
- MGGAN: Improving sample generations of Generative Adversarial Networks (2021) (0)
- Alignment method with application to Gas Chromatography/Mass Spectrometry screening (2012) (0)
- Synthesizing Faces with Demographic Attributes (2023) (0)
- A point process model for rare event detection (2022) (0)
- Employment opportunities for the future (2009) (0)
- 14th International Conference on Information Visualisation, IV 2010, 26-29 July 2010, London, UK (2010) (0)
- ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication (2018) (0)
- A boundary representation and comparison technique for two-dimensional objects (2002) (0)
- MEMORY FORENSICS : HARVESTING WINDOWS CREDENTIALS FROM VOLATILE STORAGE (2015) (0)
- Federated Boosted Decision Trees with Differential Privacy (2022) (0)
- The Internet of Things’ potential to achieve supply chain integration : a case study (2017) (0)
- An International Technical Standard for Commercial Space System Cybersecurity - A Call to Action (2022) (0)
- Task Scheduling for Jobs of a Non-constant Workload over a Heterogeneous Network (2003) (0)
- Bridging the gap between security and quality of service for VoIP streams over unicast transmissions (2011) (0)
- Consumer perceived vulnerability, privacy calculus and information disclosure : an empirical investigation in retailer loyalty program (2017) (0)
- Edge Computing Based Connected Autonomous Vehicles: A Discussion on Cyber-Attacks and Security Mechanisms (2023) (0)
- Session 17: New Enabling Technologies (2010) (0)
- Case study: Laser nanoscale manufacturing (LaserNaMi) (2012) (0)
- Unpacking privacy: Valuation of personal data protection (2023) (0)
- Sit-to-Stand Intention Recognition (2020) (0)
- Effect of pulse repetition rate on silicon wafer modification by four-beam laser interference (2013) (0)
- BUILDING UP HIGH QUALITY ROADMAP USING VERTEX CLASSIFICATION BASED INCREMENTAL PATH PLANNER (2013) (0)
- BUILDING UP HIGH QUALITY ROADMAP USING VERTEX CLASSIFICATION BASED INCREMENTAL PATH PLANNER (2013) (0)
- The Bayesian Decision Tree Technique Using an Adaptive Sampling Scheme (2007) (0)
- Considerations for secure MOSIP deployment (2022) (0)
- Biomedical applications of capsule and rehabilitation robots (2015) (0)
- Exploring the carbon impact of cybercrime and its mitigation (2022) (0)
- Direct laser interference technology and potential applications (2014) (0)
- A novel strategy for optimal security investments (2010) (0)
- Impact of Sampling on Locally Differentially Private Data Collection (2022) (0)
- Resilient Machine Learning in Space Systems: Pose Estimation as a Case Study (2022) (0)
- Prediction of Malignant Melanoma Incidence (2003) (0)
- Data-Driven Security Verification for Autonomous Debris Removal in Space (2022) (0)
- Preliminary Examination of Emergent Threat and Risk Landscapes in Intelligent Harvesting Robots (2022) (0)
- Affected vehicle population in automotive cyber risk assessments (2022) (0)
- Digital twins in cyber effects modelling of IoT/CPS points of low resilience (2023) (0)
- A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol (2022) (0)
- FedProf: Selective Federated Learning with Representation Profiling (2021) (0)
- An Evolutionary-Based Approach to Learning Multiple Decision Models from Underrepresented Data (2008) (0)
- Human Factors for Vehicle Platooning: A Review (2021) (0)
- Localizing Load-Altering Attacks Against Power Grids Using Deep Capsule Nets (2022) (0)
- A Comparison of Data-Driven Techniques for Power Grid Parameter Estimation (2021) (0)
- Synthesizing Faces with Demographics Background (2022) (0)
- GC/MS data reduction using retention time alignment and spectral subtraction (2007) (0)
- Pivot Attack Classification for Cyber Threat Intelligence (2022) (0)
- Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems (2022) (0)
- A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes (2023) (0)
- A Deep Learning-based Solution for Securing the Power Grid against Load Altering Threats by IoT-enabled Devices (2023) (0)
- Determining candidate binding site locations using conserved features (2003) (0)
- Digital twins – trusted data environments enabling acceleration of NetZero in critical national infrastructure (2022) (0)
- Privacy, vulnerability, and willingness to share : an empirical investigation using latent growth curve model (2017) (0)
- Prevention of IoT-Enabled Crime Using Home Routers (PITCHR) (2021) (0)
- SECURITY ISSUES OF FEDERATED LEARNING IN REAL-LIFE APPLICATIONS (2021) (0)
- Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling (2023) (0)
- Barriers and Opportunities In Cyber Risk And Compliance Management For Data-Driven Supply Chains (2022) (0)
- FedProf: Selective Federated Learning based on Distributional Representation Profiling (2023) (0)
- Rotating squares to boundary cubes: boundary representation and classification techniques for two- and three-dimensional objects (2004) (0)
- A New Approach for Selecting Informative Features For Text Classification (2015) (0)
- Real-time anomaly detection with superexperts (2020) (0)
- A cross-disciplinary approach to modelling and expressing adversity (2016) (0)
- Artificial Intelligence, Machine Learning and Real-time Probabilistic Data for Cyber Risk (Super) – Forecasting (2020) (0)
- Security and Privacy in Connected Vehicle Cyber Physical System Using Zero Knowledge Succinct Non Interactive Argument of Knowledge over Blockchain (2023) (0)
- Using ML and NLP to Understand the Trend of Adoption of Homomorphic Encryption by Financial Institutions (2023) (0)
- Fast and Secure Consortium Blockchains with Lightweight Block Verifiers (2021) (0)
- Towards a socio-technical approach for privacy requirements analysis for next-generation trusted research environments (2022) (0)
- Dynamic cyber risk estimation with competitive quantile autoregression (2021) (0)
- Artificial Intelligence Technologies in Building Resilient Machine Learning (2021) (0)
- Management Challenges in the Implementation of an Email Boundary Control for Data Leakage Prevention (2021) (0)
- Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations (2020) (0)
- I-TRACE: PROTECTING CYBER-PHYSICAL INFRASTRUCTURE THROUGH ENHANCED GATEWAYS, DLT AND MACHINE LEARNING (2021) (0)
- Developing Offloading-Enabled Application Development Frameworks for Android Mobile Devices (2018) (0)
- Future developments in standardisation of cyber risk in the Internet of Things (IoT) (2020) (0)
- Security Outage Probability Analysis of Cognitive Networks With Multiple Eavesdroppers for Industrial Internet of Things (2022) (0)
- A framework for and implementation of intelligent task distribution (2002) (0)
- A Resilient Cyber-Physical Demand Forecasting System for Critical Infrastructures against Stealthy False Data Injection Attacks (2022) (0)
- Determining roots of real-valued functions of a single variable over a distributed network (2002) (0)
- Throughput Aware Authentication Prioritisation for Vehicular Communication Networks (2019) (0)
- An Intelligent Cluster-Based Communication System for Multi-Unmanned Aerial Vehicles for Searching and Rescuing (2023) (0)
- Lagrange Coded Federated Learning (L-CoFL) Model for Internet of Vehicles (2022) (0)
- Awareness of wireless security by home and business users (2006) (0)
- Seventh International Conference on Information Visualization, IV 2003, 16-18 July 2003, London, UK (2003) (0)
- Impact of Combined Modality: A Practical Investigation on Driver Behaviors Under Critical Scenario for Semi-Autonomous Driving (2022) (0)
- A graph drawing algorithm for spherical pictures (2003) (0)
- A generic visualisation and editing tool for hierarchical and object-oriented systems (2003) (0)
- Fuzzy logic based symbolic grounding for best grasp pose for homecare robotics (2012) (0)
- On Decision-making for Computation Offloading in Cloud-assisted Autonomous Vehicle Systems (2017) (0)
- An integrated approach to web application development (2006) (0)
- CCBS – a method to maintain memorability, accuracy of password submission and the effective password space in click-based visual passwords (2011) (0)
- Bid writing: EU project impact (2012) (0)
- Bid writing: Is project management different? What is appropriate? (2012) (0)
- Magnetic surface patterns made by non-destructive laser interference (2013) (0)
- Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation (2022) (0)
- PrivExtractor: Towards Redressing the Imbalance of Understanding Between Virtual Assistant Users and Vendors (2023) (0)
- Analysing Cyber Attacks and Risks in V2X-Assisted Autonomous Highway Merging (2023) (0)
- 13th International Conference on Information Visualisation, IV 2009, 15-17 July 2009, Barcelona, Spain (2009) (0)
- Trustworthy digital infrastructure for identity systems: why should privacy matter to security engineers? (2021) (0)
- 1 Information security collaboration formation in organisations (2018) (0)
This paper list is powered by the following services:
Other Resources About Carsten Maple
What Schools Are Affiliated With Carsten Maple?
Carsten Maple is affiliated with the following schools: