Skip to main content

Showing 1–6 of 6 results for author: Axon, L

.
  1. arXiv:2309.07101  [pdf, ps, other

    math.GT math.GN

    The end sum of surfaces

    Authors: Liam K. Axon, Jack S. Calcut

    Abstract: End sum is a natural operation for combining two noncompact manifolds and has been used to construct various manifolds with interesting properties. The uniqueness of end sum has been well-studied in dimensions three and higher. We study end sum -- and the more general notion of adding a 1-handle at infinity -- for surfaces and prove uniqueness results. The result of adding a 1-handle at infinity t… ▽ More

    Submitted 21 December, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: 37 pages, 27 figures, changed document class, acknowledged anonymous referee, corrected typos, added three references, removed two figures

    MSC Class: 57K20 (Primary); 57Q99 (Secondary)

  2. arXiv:2304.14095  [pdf, other

    cs.NI

    Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI

    Authors: Louise Axon, Dimitrios Panagiotakopoulos, Samuel Ayo, Carolina Sanchez-Hernandez, Yan Zong, Simon Brown, Lei Zhang, Michael Goldsmith, Sadie Creese, Weisi Guo

    Abstract: Air Traffic Management data systems today are inefficient and not scalable to enable future unmanned systems. Current data is fragmented, siloed, and not easily accessible. There is data conflict, misuse, and eroding levels of trust in provenance and accuracy. With increased autonomy in aviation, Artificially Intelligent (AI) enabled unmanned traffic management (UTM) will be more reliant on secure… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: under review in IEEE

  3. arXiv:2210.08372  [pdf, other

    cs.GT cs.CR

    An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version)

    Authors: Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Louise Axon, Mohamad Kassab

    Abstract: While online interactions and exchanges have grown exponentially over the past decade, most commercial infrastructures still operate through centralized protocols, and their success essentially depends on trust between different economic actors. Digital advances such as blockchain technology has led to a massive wave of \textit{Decentralized Ledger Technology} (\textit{DLT}) initiatives, protocols… ▽ More

    Submitted 5 November, 2022; v1 submitted 15 October, 2022; originally announced October 2022.

    Comments: 62 pages, 9 figures, 19 tables

  4. The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes

    Authors: Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese

    Abstract: Cyber insurance is a key component in risk management, intended to transfer risks and support business recovery in the event of a cyber incident. As cyber insurance is still a new concept in practice and research, there are many unanswered questions regarding the data and economic models that drive it, the coverage options and pricing of premiums, and its more procedural policy-related aspects. Th… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Journal ref: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)

  5. arXiv:1807.06706  [pdf, other

    cs.HC cs.CR cs.SD eess.AS

    Sonification in security operations centres: what do security practitioners think?

    Authors: Louise M. Axon, Bushra Alahmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese

    Abstract: In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as sound, is said to have potential as an approach to addressing some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could… ▽ More

    Submitted 17 July, 2018; originally announced July 2018.

    ACM Class: K.6.5; H.5.5

    Journal ref: Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium 2018

  6. Future Scenarios and Challenges for Security and Privacy

    Authors: Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese

    Abstract: Over the past half-century, technology has evolved beyond our wildest dreams. However, while the benefits of technological growth are undeniable, the nascent Internet did not anticipate the online threats we routinely encounter and the harms which can result. As our world becomes increasingly connected, it is critical we consider what implications current and future technologies have for security… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

    Comments: 6 pages, 1 figure, Proceedings of the 2nd International Forum on Research and Technologies for Society and Industry (2016)