default search action
Gordon Russell 0001
Person information
- affiliation: Edinburgh Napier University, United Kingdom
Other persons with the same name
- Gordon Russell 0002 — Newcastle University, School of Electrical, Electronic and Computer Engineering, Newcastle upon Tyne, United Kingdom
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Iain Baird
, Baraq Ghaleb
, Isam Wadhaj
, Gordon Russell
, William J. Buchanan
:
Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks. RobCE 2024: 165-170 - 2023
- [c20]Belinda I. Onyeashie, Petra Leimich, Sean McKeown, Gordon Russell:
A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence. BDTA 2023: 112-131 - [c19]Belinda I. Onyeashie, Petra Leimich, Sean McKeown, Gordon Russell:
An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case. BDTA 2023: 156-167 - [c18]Andrew Thaeler, Yagmur Yigit, Leandros Maglaras
, William J. Buchanan, Naghmeh Moradpoor, Gordon Russell:
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. CAMAD 2023: 170-175 - 2021
- [j12]Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell, Zhiyuan Tan:
Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system. Ad Hoc Networks 120: 102590 (2021) - [j11]Andres Robles-Durazno
, Naghmeh Moradpoor
, James McWhinnie
, Gordon Russell
, Jorge Porcel-Bustamante:
Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems. Symmetry 13(3): 519 (2021) - 2020
- [c17]Sean McKeown
, Gordon Russell:
Forensic Considerations for the High Efficiency Image File Format (HEIF). Cyber Security 2020: 1-8 - [c16]Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell:
Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features. IJCNN 2020: 1-8 - [c15]Jan Sher Khan
, Ahsen Tahir, Jawad Ahmad, Syed Aziz Shah, Qammer H. Abbasi, Gordon Russell, William J. Buchanan
:
5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum. SAI (3) 2020: 26-36 - [i5]Sean McKeown, Gordon Russell:
Forensic Considerations for the High Efficiency Image File Format (HEIF). CoRR abs/2006.08060 (2020)
2010 – 2019
- 2019
- [j10]Peter McLaren, Gordon Russell
, William J. Buchanan
, Zhiyuan Tan:
Decrypting live SSH traffic in virtual environments. Digit. Investig. 29: 109-117 (2019) - [j9]Andres Robles-Durazno
, Naghmeh Moradpoor, James McWhinnie, Gordon Russell
, Inaki Maneru-Marin:
PLC memory attack detection and response in a clean water supply system. Int. J. Crit. Infrastructure Prot. 26 (2019) - [j8]Peter McLaren, William J. Buchanan
, Gordon Russell
, Zhiyuan Tan:
Deriving ChaCha20 key streams from targeted memory analysis. J. Inf. Secur. Appl. 48 (2019) - [c14]Andres Robles-Durazno
, Naghmeh Moradpoor, James McWhinnie, Gordon Russell:
WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels*. ICCA 2019: 724-731 - [i4]Peter McLaren, Gordon Russell, William J. Buchanan
, Zhiyuan Tan:
Decrypting live SSH traffic in virtual environments. CoRR abs/1907.10835 (2019) - [i3]Shane Murnion, William J. Buchanan
, Adrian Smales, Gordon Russell:
Machine learning and semantic analysis of in-game chat for cyberbullying. CoRR abs/1907.10855 (2019) - [i2]Peter McLaren, William J. Buchanan
, Gordon Russell, Zhiyuan Tan:
Deriving ChaCha20 Key Streams From Targeted Memory Analysis. CoRR abs/1907.11941 (2019) - [i1]Peter McLaren, William J. Buchanan
, Gordon Russell, Zhiyuan Tan:
Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge. CoRR abs/1907.11954 (2019) - 2018
- [j7]Shane Murnion
, William J. Buchanan
, Adrian Smales, Gordon Russell
:
Machine learning and semantic analysis of in-game chat for cyberbullying. Comput. Secur. 76: 197-213 (2018) - [j6]Sean McKeown, Gordon Russell
, Petra Leimich:
Fingerprinting JPEGs With Optimised Huffman Tables. J. Digit. Forensics Secur. Law 13(2): 7:1-7:14 (2018) - [c13]Sean McKeown
, Gordon Russell, Petra Leimich
:
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. Cyber Security 2018: 1-7 - [c12]Sean McKeown
, Gordon Russell, Petra Leimich
:
Sub-file Hashing Strategies for Fast Contraband Detection. Cyber Security 2018: 1-7 - [c11]Andres Robles-Durazno
, Naghmeh Moradpoor, James McWhinnie, Gordon Russell:
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. Cyber Security 2018: 1-8 - 2017
- [c10]Elochukwu Ukwandu
, William J. Buchanan
, Gordon Russell:
Performance evaluation of a fragmented secret share system. CyberSA 2017: 1-6 - [c9]Naghmeh Moradpoor
, Martyn Brown, Gordon Russell:
Insider threat detection using principal component analysis and self-organising map. SIN 2017: 274-279 - 2016
- [j5]Shancang Li, Theo Tryfonas
, Gordon Russell
, Panagiotis Andriotis
:
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network. IEEE Trans. Cybern. 46(8): 1749-1759 (2016) - 2015
- [j4]William J. Buchanan
, David Lanc, Elochukwu Ukwandu
, Lu Fan, Gordon Russell
:
The Future Internet: A World of Secret Shares. Future Internet 7(4): 445-464 (2015) - [c8]Shancang Li, Junhua Chen, Theodoros Spyridopoulos
, Panagiotis Andriotis
, Robert Ludwiniak, Gordon Russell
:
Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System. HCI (22) 2015: 379-390 - [c7]William J. Buchanan
, Elochukwu Ukwandu
, Nicole van Deursen, Lu Fan, Gordon Russell
, Owen Lo, Christoph Thuemmler:
Secret shares to protect health records in Cloud-based infrastructures. HealthCom 2015: 669-672 - [c6]Elochukwu Ukwandu
, William J. Buchanan
, Lu Fan, Gordon Russell
, Owen Lo:
RESCUE: Resilient Secret Sharing Cloud-Based Architecture. TrustCom/BigDataSE/ISPA (1) 2015: 872-879 - 2012
- [c5]Gordon Russell
, Richard Macfarlane:
Security Issues of a Publicly Accessible Cloud Computing Infrastructure. TrustCom 2012: 1210-1216
2000 – 2009
- 2007
- [b2]Andrew Cumming, Gordon Russell:
SQL hacks - tips and tools for digging into your data. O'Reilly 2007, ISBN 978-0-596-52799-0, pp. I-XXI, 1-386 - 2004
- [c4]Trevor Paterson, Jessie B. Kennedy, Martin R. Pullan, Alan Cannon, Kate Armstrong, Mark F. Watson, Cedric Raguenaud, Sarah M. McDonald, Gordon Russell
:
A Universal Character Model and Ontology of Defined Terms for Taxonomic Description. DILS 2004: 63-78 - [c3]Gordon Russell, Andrew Cumming:
Improving the Student Learning Experience for SQL Using Automatic Marking. CELDA 2004: 281-288
1990 – 1999
- 1999
- [c2]Tatiana Kalganova
, Gordon Russell
, Andrew Cumming:
Multiple Traffic Signal Control Using A Genetic Algorithm. ICANNGA 1999: 220-228 - 1994
- [c1]Gordon Russell
, Paul Shaw, W. Paul Cockshott:
DAIS: An Object-Addressed Processor Cache. POS 1994: 374-386 - 1993
- [j3]Gordon Russell
, Paul Cockshott:
Architectures for persistence. Microprocess. Microsystems 17(3): 117-130 (1993) - [j2]Gordon Russell
, Paul Shaw:
Shifting register windows. IEEE Micro 13(4): 28-35 (1993)
1980 – 1989
- 1989
- [b1]Gordon Russell, Ian L. Sayers:
Advanced simulation and test methodologies for VLSI design. Van Nostrand Reinhold 1989, ISBN 978-0-7476-0001-5, pp. I-XI, 1-378 - 1986
- [j1]Gordon Russell, Ian L. Sayers:
Design for testability - a review of advanced methods. Microprocess. Microsystems 10(10): 531-539 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint