Skip to main content

Showing 1–26 of 26 results for author: Atkinson, R

.
  1. Non-invasive Diver Respiration Rate Monitoring in Hyperbaric Lifeboat Environments using Short-Range Radar

    Authors: Mikolaj Czerkawski, Fraser Stewart, Christos Ilioudis, Craig Michie, Ivan Andonovic, Robert Atkinson, Maurice Coull, Donald Sandilands, Gareth Kerr, Carmine Clemente, Christos Tachtatzis

    Abstract: The monitoring of diver health during emergency events is crucial to ensuring the safety of personnel. A non-invasive system continuously providing a measure of the respiration rate of individual divers is exceedingly beneficial in this context. The paper reports on the application of short-range radar to record the respiration rate of divers within hyperbaric lifeboat environments. Results demons… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: Presented at IEEE OCEANS 2021 San Diego, Porto

  2. arXiv:2308.00541  [pdf, other

    cs.CV

    Detecting Cloud Presence in Satellite Images Using the RGB-based CLIP Vision-Language Model

    Authors: Mikolaj Czerkawski, Robert Atkinson, Christos Tachtatzis

    Abstract: This work explores capabilities of the pre-trained CLIP vision-language model to identify satellite images affected by clouds. Several approaches to using the model to perform cloud presence detection are proposed and evaluated, including a purely zero-shot operation with text prompts and several fine-tuning approaches. Furthermore, the transferability of the methods across different datasets and… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

    Journal ref: IGARSS 2023

  3. arXiv:2204.12623  [pdf, other

    q-bio.MN q-bio.BM q-bio.SC

    SANA: Cross-Species Prediction of Gene Ontology GO Annotations via Topological Network Alignment

    Authors: Siyue Wang, Giles R. S. Atkinson, Wayne B. Hayes

    Abstract: Topological network alignment aims to align two networks node-wise in order to maximize the observed common connection (edge) topology between them. The topological alignment of two Protein-Protein Interaction (PPI) networks should thus expose protein pairs with similar interaction partners allowing, for example, the prediction of common Gene Ontology (GO) terms. Unfortunately, no network alignmen… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

    Comments: 31 pages; 9 Figures; 8 Tables

    Journal ref: npj Syst Biol Appl 8, 25 (2022)

  4. arXiv:2112.01504  [pdf, other

    cs.CV cs.GR

    Neural Weight Step Video Compression

    Authors: Mikolaj Czerkawski, Javier Cardona, Robert Atkinson, Craig Michie, Ivan Andonovic, Carmine Clemente, Christos Tachtatzis

    Abstract: A variety of compression methods based on encoding images as weights of a neural network have been recently proposed. Yet, the potential of similar approaches for video compression remains unexplored. In this work, we suggest a set of experiments for testing the feasibility of compressing video using two architectural paradigms, coordinate-based MLP (CbMLP) and convolutional network. Furthermore,… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

    Comments: Accepted to the pre-registration workshop at NeurIPS 2021

    Journal ref: NeurIPS 2021 workshop in pre-registration

  5. Neural Knitworks: Patched Neural Implicit Representation Networks

    Authors: Mikolaj Czerkawski, Javier Cardona, Robert Atkinson, Craig Michie, Ivan Andonovic, Carmine Clemente, Christos Tachtatzis

    Abstract: Coordinate-based Multilayer Perceptron (MLP) networks, despite being capable of learning neural implicit representations, are not performant for internal image synthesis applications. Convolutional Neural Networks (CNNs) are typically used instead for a variety of internal generative tasks, at the cost of a larger model. We propose Neural Knitwork, an architecture for neural implicit representatio… ▽ More

    Submitted 15 April, 2024; v1 submitted 29 September, 2021; originally announced September 2021.

    Comments: Published in Pattern Recognition

    Journal ref: Volume 151, 2024, Page 110378

  6. arXiv:2107.04910  [pdf, other

    cs.CR

    Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends

    Authors: Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, Miroslav Bures, Robert Atkinson, Christos Tachtatzis, Xavier Bellekens

    Abstract: The integration of Information and Communication Technology (ICT) tools into mechanical devices found in aviation industry has raised security concerns. The more integrated the system, the more vulnerable due to the inherent vulnerabilities found in ICT tools and software that drives the system. The security concerns have become more heightened as the concept of electronic-enabled aircraft and sma… ▽ More

    Submitted 10 July, 2021; originally announced July 2021.

    Comments: 25 pages, 3 figures, 4 tables

  7. Utilising Flow Aggregation to Classify Benign Imitating Attacks

    Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens

    Abstract: Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable. Unsurprisingly, machine learning is utilised to defend against these attacks. In many applications, the choice of features is more important than the cho… ▽ More

    Submitted 6 March, 2021; originally announced March 2021.

    Comments: 21 pages, 6 figures

    Journal ref: MDPI Sensors 2021, 21, 1761. Special Issue: Security and Privacy in the Internet of Things (IoT)

  8. arXiv:2010.06850  [pdf, other

    cs.CR cs.HC eess.SY

    A Review of Cyber-Ranges and Test-Beds: Current and Future Trends

    Authors: Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic, Xavier Bellekens

    Abstract: Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber-hygiene and established processes. A more accurate assessment of the security provision informs on the most vulnerable environments that necessitate more diligent management.… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

    Comments: 43 pages, 18 Figures, 8 Tables

  9. arXiv:2007.11308  [pdf, other

    cs.SE

    Interoperability and Integration Testing Methods for IoT Systems: a Systematic Map** Study

    Authors: Miroslav Bures, Matej Klima, Vaclav Rechtberger, Xavier Bellekens, Christos Tachtatzis, Robert Atkinson, Bestoun S. Ahmed

    Abstract: The recent active development of Internet of Things (IoT) solutions in various domains has led to an increased demand for security, safety, and reliability of these systems. Security and data privacy are currently the most frequently discussed topics; however, other reliability aspects also need to be focused on to maintain the smooth and safe operation of IoT systems. Until now, there has been no… ▽ More

    Submitted 22 July, 2020; originally announced July 2020.

  10. Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection

    Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne, Xavier Bellekens

    Abstract: Machine Learning (ML) and Deep Learning (DL) have been used for building Intrusion Detection Systems (IDS). The increase in both the number and sheer variety of new cyber-attacks poses a tremendous challenge for IDS solutions that rely on a database of historical attack signatures. Therefore, the industrial pull for robust IDSs that are capable of flagging zero-day attacks is growing. Current outl… ▽ More

    Submitted 16 November, 2020; v1 submitted 27 June, 2020; originally announced June 2020.

    Comments: 18 pages, 4 figures

    Journal ref: Electronics 2020, 9, 1684

  11. Leveraging Siamese Networks for One-Shot Intrusion Detection Model

    Authors: Hanan Hindy, Christos Tachtatzis, Robert Atkinson, David Brosset, Miroslav Bures, Ivan Andonovic, Craig Michie, Xavier Bellekens

    Abstract: The use of supervised Machine Learning (ML) to enhance Intrusion Detection Systems has been the subject of significant research. Supervised ML is based upon learning by example, demanding significant volumes of representative instances for effective training and the need to re-train the model for every unseen cyber-attack class. However, retraining the models in-situ renders the network susceptibl… ▽ More

    Submitted 5 November, 2022; v1 submitted 27 June, 2020; originally announced June 2020.

    Comments: 12 pages, 2 figures, J Intell Inf Syst (2022)

  12. arXiv:2006.15340  [pdf, other

    cs.CR

    Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset)

    Authors: Hanan Hindy, Ethan Bayne, Miroslav Bures, Robert Atkinson, Christos Tachtatzis, Xavier Bellekens

    Abstract: The Internet of Things (IoT) is one of the main research fields in the Cybersecurity domain. This is due to (a) the increased dependency on automated device, and (b) the inadequacy of general purpose Intrusion Detection Systems (IDS) to be deployed for special purpose networks usage. Numerous lightweight protocols are being proposed for IoT devices communication usage. One of the distinguishable I… ▽ More

    Submitted 16 November, 2020; v1 submitted 27 June, 2020; originally announced June 2020.

    Comments: 14 pages, 5 figures, to be published in the proceeding of the 12th International Network Conference 2020 (INC2020)

  13. arXiv:1911.06260  [pdf, other

    cs.CR

    A Security Perspective on Unikernels

    Authors: Joshua Talbot, Przemek Pikula, Craig Sweetmore, Samuel Rowe, Hanan Hindy, Christos Tachtatzis, Robert Atkinson, Xavier Bellekens

    Abstract: Cloud-based infrastructures have grown in popularity over the last decade leveraging virtualisation, server, storage, compute power and network components to develop flexible applications. The requirements for instantaneous deployment and reduced costs have led the shift from virtual machine deployment to containerisation, increasing the overall flexibility of applications and increasing performan… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

    Comments: 6 pages, 4 figures

  14. Cyber-Security Internals of a Skoda Octavia vRS: A Hands on Approach

    Authors: Colin Urquhart, Xavier Bellekens, Christos Tachtatzis, Robert Atkinson, Hanan Hindy, Amar Seeam

    Abstract: The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit (ECU) and the Controller Area Network (CAN) for in-vehicle communications or through a mobile phone or server for out-vehicle communication. Information sent by or to the vehicle can… ▽ More

    Submitted 21 October, 2019; originally announced October 2019.

    Comments: 13 pages, 27 figures

    Journal ref: in IEEE Access, vol. 7, pp. 146057-146069, 2019

  15. arXiv:1903.08918  [pdf, other

    cs.CR cs.HC

    From Cyber-Security Deception To Manipulation and Gratification Through Gamification

    Authors: Xavier Bellekens, Gayan Jayasekara, Hanan Hindy, Miroslav Bures, David Brosset, Christos Tachtatzis, Robert Atkinson

    Abstract: With the ever growing networking capabilities and services offered to users, attack surfaces have been increasing exponentially, additionally, the intricacy of network architectures has increased the complexity of cyber-defenses, to this end, the use of deception has recently been trending both in academia and industry. Deception enables to create proactive defense systems, luring attackers in ord… ▽ More

    Submitted 21 March, 2019; originally announced March 2019.

    Comments: 17 Pages, Accepted in HCI International 2019

  16. A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems

    Authors: Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Christos Tachtatzis, Robert Atkinson, Xavier Bellekens

    Abstract: As the world moves towards being increasingly dependent on computers and automation, building secure applications, systems and networks are some of the main challenges faced in the current decade. The number of threats that individuals and businesses face is rising exponentially due to the increasing complexity of networks and services of modern networks. To alleviate the impact of these threats,… ▽ More

    Submitted 5 June, 2020; v1 submitted 9 June, 2018; originally announced June 2018.

    Comments: 28 Pages, 6 Figures

    Journal ref: IEEE Access, 2020

  17. arXiv:1806.03516  [pdf, other

    cs.CR

    A Taxonomy of Malicious Traffic for Intrusion Detection Systems

    Authors: Hanan Hindy, Elike Hodo, Ethan Bayne, Amar Seeam, Robert Atkinson, Xavier Bellekens

    Abstract: With the increasing number of network threats it is essential to have a knowledge of existing and new network threats in order to design better intrusion detection systems. In this paper we propose a taxonomy for classifying network attacks in a consistent way, allowing security researchers to focus their efforts on creating accurate intrusion detection systems and targeted datasets.

    Submitted 9 June, 2018; originally announced June 2018.

    Comments: 4 Pages, 2 Figures, Accepted in IEEE CyberSA 2018 Proceedings

  18. Machine Learning Approach for Detection of nonTor Traffic

    Authors: Elike Hodo, Xavier Bellekens, Ephraim Iorkyase, Andrew Hamilton, Christos Tachtatzis, Robert Atkinson

    Abstract: Intrusion detection has attracted a considerable interest from researchers and industries. After many years of research the community still faces the problem of building reliable and efficient intrusion detection systems (IDS) capable of handling large quantities of data with changing patterns in real time situations. The Tor network is popular in providing privacy and security to end user by anon… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Comments: 6 pages, 4 figures, Accepted and Presented in ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security

    Journal ref: Information 2018, 9(9), 231

  19. Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System

    Authors: Elike Hodo, Xavier Bellekens, Andrew Hamilton, Pierre-louis Dubouilh, Ephraim Iorkyase, Christos Tachtatzis, Robert Atkinson

    Abstract: The Internet of things (IoT) is still in its infancy and has attracted much interest in many industrial sectors including medical fields, logistics tracking, smart cities and automobiles. However as a paradigm, it is susceptible to a range of significant intrusion threats. This paper presents a threat analysis of the IoT and uses an Artificial Neural Network (ANN) to combat these threats. A multi-… ▽ More

    Submitted 7 April, 2017; originally announced April 2017.

    Comments: Published in The 2016 International Symposium on Networks, Computers and Communications (IEEE ISNCC'16) , Hammamet, Tunisia, 2016

  20. GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing

    Authors: Xavier Bellekens, Christos Tachtatzis, Robert Atkinson, Craig Renfrew, Tony Kirkham

    Abstract: Large industrial systems that combine services and applications, have become targets for cyber criminals and are challenging from the security, monitoring and auditing perspectives. Security log analysis is a key step for uncovering anomalies, detecting intrusion, and enabling incident response. The constant increase of link speeds, threats and users, produce large volumes of log data and become i… ▽ More

    Submitted 7 April, 2017; originally announced April 2017.

    Comments: Published in The 7th International Conference of Security of Information and Networks, SIN 2014, Glasgow, UK, September, 2014

    ACM Class: D.4.6; K.6.5

  21. A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems

    Authors: Xavier Bellekens, Christos Tachtatzis, Robert Atkinson, Craig Renfrew, Tony Kirkham

    Abstract: Pattern Matching is a computationally intensive task used in many research fields and real world applications. Due to the ever-growing volume of data to be processed, and increasing link speeds, the number of patterns to be matched has risen significantly. In this paper we explore the parallel capabilities of modern General Purpose Graphics Processing Units (GPGPU) applications for high speed patt… ▽ More

    Submitted 7 April, 2017; originally announced April 2017.

    Comments: Published in The 7th International Conference of Security of Information and Networks, SIN 2014, Glasgow, UK, September, 2014

    ACM Class: D.4.6; K.6.5

  22. arXiv:1702.03657  [pdf, other

    cs.DS cs.DC

    Trie Compression for GPU Accelerated Multi-Pattern Matching

    Authors: Xavier Bellekens, Amar Seeam, Christos Tachtatzis, Robert Atkinson

    Abstract: Graphics Processing Units allow for running massively parallel applications offloading the CPU from computationally intensive resources, however GPUs have a limited amount of memory. In this paper a trie compression algorithm for massively parallel pattern matching is presented demonstrating 85% less space requirements than the original highly efficient parallel failure-less aho-corasick, whilst d… ▽ More

    Submitted 13 February, 2017; originally announced February 2017.

    Comments: 4 pages, 6 figures. Accepted and Published in The Ninth International Conferences on Pervasive Patterns and Applications PATTERNS 2017 (19 - 23/02, 2017 - Athens, Greece)

  23. arXiv:1701.02145  [pdf

    cs.CR cs.LG

    Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey

    Authors: Elike Hodo, Xavier Bellekens, Andrew Hamilton, Christos Tachtatzis, Robert Atkinson

    Abstract: Intrusion detection has attracted a considerable interest from researchers and industries. The community, after many years of research, still faces the problem of building reliable and efficient IDS that are capable of handling large quantities of data, with changing patterns in real time situations. The work presented in this manuscript classifies intrusion detection systems (IDS). Moreover, a ta… ▽ More

    Submitted 9 January, 2017; originally announced January 2017.

  24. arXiv:1104.1784  [pdf, ps, other

    cond-mat.mtrl-sci

    Van der Waals interactions in the ground state of Mg(BH4)2 from density functional theory

    Authors: A. Bil, B. Kolb, R. Atkinson, D. G. Pettifor, T. Thonhauser, A. N. Kolmogorov

    Abstract: In order to resolve an outstanding discrepancy between experiment and theory regarding the ground-state structure of Mg(BH4)2, we examine the importance of long-range dispersive interactions on the compound's thermodynamic stability. Careful treatment of the correlation effects within a recently developed nonlocal van der Waals density functional (vdW-DF) leads to a good agreement with experiment,… ▽ More

    Submitted 10 April, 2011; originally announced April 2011.

    Comments: Phys. Rev. B, accepted, 7 pages, 4 figures

    Journal ref: Phys. Rev. B 83, 224103 (2011)

  25. arXiv:cs/0208039  [pdf

    cs.DL

    A Virtual Library of Technical Publications

    Authors: Elizabeth Anderson, Robert Atkinson, Elizabeth Buckley-Geer, Cynthia Crego, Lisa Giacchetti, Stephen Hanson, David Ritchie, Jean Slisz, Sara Tompson, Stephen Wolbers

    Abstract: Through a collaborative effort, the Fermilab Information Resources Department and Computing Division have created a "virtual library" of technical publications that provides public access to electronic full-text documents. This paper will discuss the vision, planning and milestones of the project, as well as the hardware, software and interdepartmental cooperation components.

    Submitted 23 August, 2002; originally announced August 2002.

    Comments: Presented at 6th International World Wide Web Conference, Santa Clara, CA, 7-12 Apr 1997 and at Inforum'97, Oak Ridge TN, 6-8 May 1997

    Report number: FERMILAB-TM-2004 ACM Class: H.3.7

  26. arXiv:cs/9811020  other

    cs.DL

    Digitizing Legacy Documents: A Knowledge-Base Preservation Project

    Authors: Elizabeth Anderson, Robert Atkinson, Cynthia Crego, Jean Slisz, Sara Tompson

    Abstract: This paper addresses the issue of making legacy information (that material held in paper format only) electronically searchable and retrievable. We used proprietary software and commercial hardware to create a process for scanning, cataloging, archiving and electronically disseminating full-text documents. This process is relatively easy to implement and reasonably affordable.

    Submitted 11 November, 1998; originally announced November 1998.

    Comments: 21 pages, 5 figures

    Report number: Fermilab-TM-2056 ACM Class: H.3.7

    Journal ref: IllinoisLibraries80:211-219,1998