Skip to main content

Showing 1–19 of 19 results for author: Turner, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.02855  [pdf, other

    cs.CR cs.CY

    It's more than just money: The real-world harms from ransomware attacks

    Authors: Nandita Pattnaik, Jason R. C. Nurse, Sarah Turner, Gareth Mott, Jamie MacColl, Pia Huesch, James Sullivan

    Abstract: As cyber-attacks continue to increase in frequency and sophistication, organisations must be better prepared to face the reality of an incident. Any organisational plan that intends to be successful at managing security risks must clearly understand the harm (i.e., negative impact) and the various parties affected in the aftermath of an attack. To this end, this article conducts a novel exploratio… ▽ More

    Submitted 6 July, 2023; originally announced July 2023.

    Comments: 17th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2023)

  2. arXiv:2304.04425  [pdf, ps, other

    quant-ph cs.NI

    Entangled Pair Resource Allocation under Uncertain Fidelity Requirements

    Authors: Rakpong Kaewpuang, Minrui Xu, Stephen John Turner, Dusit Niyato, Han Yu, Dong In Kim

    Abstract: In quantum networks, effective entanglement routing facilitates remote entanglement communication between quantum source and quantum destination nodes. Unlike routing in classical networks, entanglement routing in quantum networks must consider the quality of entanglement qubits (i.e., entanglement fidelity), presenting a challenge in ensuring entanglement fidelity over extended distances. To addr… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

    Comments: 6 pages and 6 figures

  3. arXiv:2303.17906  [pdf, other

    cond-mat.stat-mech cs.MA

    Environmental path-entropy and collective motion

    Authors: Harvey L. Devereux, Matthew S. Turner

    Abstract: Inspired by the swarming or flocking of animal systems we study groups of agents moving in unbounded 2D space. Individual trajectories derive from a ``bottom-up'' principle: individuals reorient to maximise their future path entropy over environmental states. This can be seen as a proxy for kee** options open, a principle that may confer evolutionary fitness in an uncertain world. We find an ord… ▽ More

    Submitted 20 April, 2023; v1 submitted 31 March, 2023; originally announced March 2023.

    Comments: Corrected bibliography (removing erroneous refs.), Published 19 April 2023 Phys. Rev. Lett

    Journal ref: Phys. Rev. Lett. 130, 168201 (16 Apr. 2023)

  4. arXiv:2212.11482  [pdf, other

    physics.flu-dyn cond-mat.soft cs.LG

    Learning to swim efficiently in a nonuniform flow field

    Authors: Krongtum Sankaewtong, John J. Molina, Matthew S. Turner, Ryoichi Yamamoto

    Abstract: Microswimmers can acquire information on the surrounding fluid by sensing mechanical queues. They can then navigate in response to these signals. We analyse this navigation by combining deep reinforcement learning with direct numerical simulations to resolve the hydrodynamics. We study how local and non-local information can be used to train a swimmer to achieve particular swimming tasks in a non-… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

  5. arXiv:2210.00956  [pdf, ps, other

    cs.NI

    Minimizing Age of Processed Information in Wireless Networks

    Authors: Chanikarn Nikunram, Wasin Meesena, Stephen John Turner, Sucha Supittayapornpong

    Abstract: The freshness of real-time status processing of time-sensitive information is crucial for several applications, including healthcare monitoring and autonomous vehicles. This freshness is considered in this paper for the system where unprocessed information is sent from sensors to a base station over a shared wireless network. The base station has a dedicated non-preemptive processor with a constan… ▽ More

    Submitted 3 October, 2022; originally announced October 2022.

    Comments: 13 pages,5 figures

  6. arXiv:2206.03930  [pdf, other

    cs.CR cs.HC

    "You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security

    Authors: Sarah Turner, Nandita Pattnaik, Jason R. C. Nurse, Shujun Li

    Abstract: The Internet of Things (IoT) is increasingly present in many family homes, yet it is unclear precisely how well families understand the cyber security threats and risks of using such devices, and how possible it is for them to educate themselves on these topics. Using a survey of 553 parents and interviews with 25 families in the UK, we find that families do not consider home IoT devices to be sig… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

  7. arXiv:2203.13432  [pdf, other

    cs.LG math.OC physics.data-an

    Nash Neural Networks : Inferring Utilities from Optimal Behaviour

    Authors: John J. Molina, Simon K. Schnyder, Matthew S. Turner, Ryoichi Yamamoto

    Abstract: We propose Nash Neural Networks ($N^3$) as a new type of Physics Informed Neural Network that is able to infer the underlying utility from observations of how rational individuals behave in a differential game with a Nash equilibrium. We assume that the dynamics for both the population and the individual are known, but not the payoff function, which specifies the cost per unit time of being in any… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

    Comments: 14 pages, 7 figures

  8. arXiv:2112.09035  [pdf, other

    cs.HC cs.CR cs.CY

    It was hard to find the words: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices

    Authors: Sarah Turner, Jason R. C. Nurse, Shujun Li

    Abstract: This study considers how well an autoethnographic diary study helps as a method to explore why families might struggle in the application of strong and cohesive cyber security measures within the smart home. Combining two human-computer interaction (HCI) research methods - the relatively unstructured process of autoethnography and the more structured diary study - allowed the first author to refle… ▽ More

    Submitted 16 December, 2021; originally announced December 2021.

    Comments: 2022 ACM CHI Conference on Human Factors in Computing Systems

  9. When Googling it doesn't work: The challenge of finding security advice for smart home devices

    Authors: Sarah Turner, Jason R. C. Nurse, Shujun Li

    Abstract: As users increasingly introduce Internet-connected devices into their homes, having access to accurate and relevant cyber security information is a fundamental means of ensuring safe use. Given the paucity of information provided with many devices at the time of purchase, this paper engages in a critical study of the type of advice that home Internet of Things (IoT) or smart device users might be… ▽ More

    Submitted 6 August, 2021; originally announced August 2021.

  10. A Google Earth Engine-enabled Python approach to improve identification of anthropogenic palaeo-landscape features

    Authors: Filippo Brandolini, Guillem Domingo Ribas, Andrea Zerboni, Sam Turner

    Abstract: The necessity of sustainable development for landscapes has emerged as an important theme in recent decades. Current methods take a holistic approach to landscape heritage and promote an interdisciplinary dialogue to facilitate complementary landscape management strategies. With the socio-economic values of the natural and cultural landscape heritage increasingly recognised worldwide, remote sensi… ▽ More

    Submitted 28 December, 2020; originally announced December 2020.

    Comments: 33 pages, 10 figures, 2 tables

  11. arXiv:1707.07310  [pdf, other

    cs.MA cs.CV nlin.AO q-bio.QM

    Robust Tracking and Behavioral Modeling of Movements of Biological Collectives from Ordinary Video Recordings

    Authors: Hiroki Sayama, Farnaz Zamani Esfahlani, Ali Jazayeri, J. Scott Turner

    Abstract: We propose a novel computational method to extract information about interactions among individuals with different behavioral states in a biological collective from ordinary video recordings. Assuming that individuals are acting as finite state machines, our method first detects discrete behavioral states of those individuals and then constructs a model of their state transitions, taking into acco… ▽ More

    Submitted 30 September, 2017; v1 submitted 23 July, 2017; originally announced July 2017.

    Comments: 8 pages, 14 figures; to be published in the Proceedings of the IEEE SSCI 2017

  12. arXiv:1601.01597  [pdf, other

    cs.DS

    Grafalgo - A Library of Graph Algorithms and Supporting Data Structures (revised)

    Authors: Jonathan Turner

    Abstract: This report provides an (updated) overview of {\sl Grafalgo}, an open-source library of graph algorithms and the data structures used to implement them. The programs in this library were originally written to support a graduate class in advanced data structures and algorithms at Washington University. Because the code's primary purpose was pedagogical, it was written to be as straightforward as po… ▽ More

    Submitted 7 January, 2016; originally announced January 2016.

    Report number: WUCSE-2016-01

  13. arXiv:1512.09349  [pdf, other

    cs.DS

    Faster Maximium Priority Matchings in Bipartite Graphs

    Authors: Jonathan Turner

    Abstract: A maximum priority matching is a matching in an undirected graph that maximizes a priority score defined with respect to given vertex priorities. An earlier paper showed how to find maximum priority matchings in unweighted graphs. This paper describes an algorithm for bipartite graphs that is faster when the number of distinct priority classes is limited. For graphs with $k$ distinct priority clas… ▽ More

    Submitted 31 December, 2015; originally announced December 2015.

    Report number: WUCSE-2015-08

  14. arXiv:1512.09002  [pdf, other

    cs.DS

    The Bounded Edge Coloring Problem and Offline Crossbar Scheduling

    Authors: Jonathan Turner

    Abstract: This paper introduces a variant of the classical edge coloring problem in graphs that can be applied to an offline scheduling problem for crossbar switches. We show that the problem is NP-complete, develop three lower bounds bounds on the optimal solution value and evaluate the performance of several approximation algorithms, both analytically and experimentally. We show how to approximate an opti… ▽ More

    Submitted 30 December, 2015; originally announced December 2015.

    Report number: WUCSE-2015-07

  15. arXiv:1512.08995  [pdf, other

    cs.DS

    The Edge Group Coloring Problem with Applications to Multicast Switching

    Authors: Jonathan Turner

    Abstract: This paper introduces a natural generalization of the classical edge coloring problem in graphs that provides a useful abstraction for two well-known problems in multicast switching. We show that the problem is NP-hard and evaluate the performance of several approximation algorithms, both analytically and experimentally. We find that for random $χ$-colorable graphs, the number of colors used by th… ▽ More

    Submitted 30 December, 2015; originally announced December 2015.

    Report number: WUCSE-2015-02

  16. arXiv:1512.08555  [pdf, other

    cs.DS

    Maximium Priority Matchings

    Authors: Jonathan Turner

    Abstract: Let $G=(V,E)$ be an undirected graph with $n$ vertices and $m$ edges, in which each vertex $u$ is assigned an integer priority in $[1,n]$, with 1 being the "highest" priority. Let $M$ be a matching of $G$. We define the priority score of $M$ to be an $n$-ary integer in which the $i$-th most-significant digit is the number of vertices with priority $i$ that are incident to an edge in $M$. We descri… ▽ More

    Submitted 28 December, 2015; originally announced December 2015.

    Report number: WUCSE-2015-06

  17. arXiv:0907.3456  [pdf

    cs.CY

    Exploring Peer Review in the Computer Science Classroom

    Authors: Scott Turner, Manuel A. Perez-Quinones

    Abstract: In computer science, students could benefit from more opportunities to learn important, high-level concepts and to improve their learning skills. Peer review is one method to encourage this by providing students with the opportunity to evaluate other people's work and to receive feedback on their own projects. This allows for rich learning experience but it is not immediately obvious how to crea… ▽ More

    Submitted 20 July, 2009; originally announced July 2009.

    Comments: 69 pages

    ACM Class: K.3.2

  18. arXiv:cs/0607072  [pdf

    cs.HC

    Effect of Interface Style in Peer Review Comments for UML Designs

    Authors: Scott A. Turner, Manuel A. Perez-Quinones, Stephen H. Edwards

    Abstract: This paper presents our evaluation of using a Tablet-PC to provide peer-review comments in the first year Computer Science course. Our exploration consisted of an evaluation of how students write comments on other students' assignments using three different methods: pen and paper, a Tablet-PC, and a desktop computer. Our ultimate goal is to explore the effect that interface style (Tablet vs. Des… ▽ More

    Submitted 14 July, 2006; originally announced July 2006.

    Comments: 8 pages, 7 figures

    ACM Class: H.1; H.4; H.5

  19. arXiv:cs/0603121  [pdf

    cs.HC cs.SE

    minimUML: A Minimalist Approach to UML Diagraming for Early Computer Science Education

    Authors: Scott Turner, Manuel A. Perez-Quinones, Stephen H. Edwards

    Abstract: The Unified Modeling Language (UML) is commonly used in introductory Computer Science to teach basic object-oriented design. However, there appears to be a lack of suitable software to support this task. Many of the available programs that support UML focus on develo** code and not on enhancing learning. Those that were designed for educational use sometimes have poor interfaces or are missing… ▽ More

    Submitted 30 March, 2006; originally announced March 2006.

    Comments: 38 pages, 15 figures

    ACM Class: K.3.2; H.5.2; D.2.2