Skip to main content

Showing 1–26 of 26 results for author: de Roure, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.04425  [pdf

    cs.CY cs.CR cs.ET cs.LG

    Red Teaming Generative AI/NLP, the BB84 quantum cryptography protocol and the NIST-approved Quantum-Resistant Cryptographic Algorithms

    Authors: Petar Radanliev, David De Roure, Omar Santos

    Abstract: In the contemporary digital age, Quantum Computing and Artificial Intelligence (AI) convergence is resha** the cyber landscape, introducing unprecedented opportunities and potential vulnerabilities.This research, conducted over five years, delves into the cybersecurity implications of this convergence, with a particular focus on AI/Natural Language Processing (NLP) models and quantum cryptograph… ▽ More

    Submitted 16 September, 2023; originally announced October 2023.

  2. arXiv:2308.01925  [pdf

    cs.CY cs.CV cs.MM cs.SI

    Accessibility and Inclusiveness of New Information and Communication Technologies for Disabled Users and Content Creators in the Metaverse

    Authors: Petar Radanliev, David De Roure, Peter Novitzky, Ivo Sluganovic

    Abstract: Despite the proliferation of Blockchain Metaverse projects, the inclusion of physically disabled individuals in the Metaverse remains distant, with limited standards and regulations in place. However, the article proposes a concept of the Metaverse that leverages emerging technologies, such as Virtual and Augmented Reality, and the Internet of Things, to enable greater engagement of disabled creat… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

  3. arXiv:2301.10234  [pdf

    cs.CY cs.AI cs.HC

    Disease X vaccine production and supply chains: risk assessing healthcare systems operating with artificial intelligence and industry 4.0

    Authors: Petar Radanliev, David De Roure

    Abstract: A set of six algorithmic solutions is presented for resolving vaccine production and supply chain bottlenecks. A different set of algorithmic solutions is presented for forecasting risks during a Disease X event.

    Submitted 4 January, 2023; originally announced January 2023.

  4. arXiv:2301.10028  [pdf

    cs.CY cs.AI cs.CR

    Super forecasting the technological singularity risks from artificial intelligence

    Authors: Petar Radanliev, David De Roure, Carsten Maple, Uchenna Ani

    Abstract: The article forecasts emerging cyber-risks from the integration of AI in cybersecurity.

    Submitted 28 December, 2022; originally announced January 2023.

    Journal ref: Evol. Syst. 2022, pp. 1 11, Jun. 2022

  5. arXiv:2212.08141  [pdf

    cs.CY cs.GL eess.SY stat.ME

    Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things

    Authors: Petar Radanliev, David De Roure, Pete Burnap, Omar Santos

    Abstract: To enable quantitative risk assessment of uncontrollable risk states in complex and coupled IoT systems, a new epistemological equation is designed and tested though comparative and empirical analysis. The comparative analysis is conducted on national digital strategies, followed by an empirical analysis of cyber risk assessment approaches. The new epistemological analysis approach enables the ass… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

  6. New and emerging forms of data and technologies: literature and bibliometric review

    Authors: Petar Radanliev, David De Roure

    Abstract: With the increased digitalisation of our society, new and emerging forms of data present new values and opportunities for improved data driven multimedia services, or even new solutions for managing future global pandemics (i.e., Disease X). The results are somewhat unexpected. Despite the special relationship between the US and the UK, there is not much evidence of collaboration in research on th… ▽ More

    Submitted 16 October, 2022; originally announced November 2022.

    Comments: Multimed Tools Appl (2022)

  7. arXiv:2210.10659  [pdf

    cs.AI cs.HC cs.LG cs.RO

    Review of the state of the art in autonomous artificial intelligence

    Authors: Petar Radanliev, David De Roure

    Abstract: This article presents a new design for autonomous artificial intelligence (AI), based on the state-of-the-art algorithms, and describes a new autonomous AI system called AutoAI. The methodology is used to assemble the design founded on self-improved algorithms that use new and emerging sources of data (NEFD). The objective of the article is to conceptualise the design of a novel AutoAI algorithm.… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: AI Ethics (2022)

  8. Advancing the cybersecurity of the healthcare system with self-optimising and self-adaptative artificial intelligence (part 2)

    Authors: Petar Radanliev, David De Roure

    Abstract: This article advances the knowledge on teaching and training new artificial intelligence algorithms, for securing, preparing, and adapting the healthcare system to cope with future pandemics. The core objective is to develop a concept healthcare system supported by autonomous artificial intelligence that can use edge health devices with real-time data. The article constructs two case scenarios for… ▽ More

    Submitted 30 August, 2022; originally announced October 2022.

    Journal ref: Heal. Technol. 2022, pp. 1.7, Aug. 2022

  9. Data mining and analysis of scientific research data records on Covid 19 mortality, immunity, and vaccine development in the first wave of the Covid 19 pandemic

    Authors: Petar Radanliev, David De Roure, Rob Walton

    Abstract: In this study, we investigate the scientific research response from the early stages of the pandemic, and we review key findings on how the early warning systems developed in previous epidemics responded to contain the virus. The data records are analysed with commutable statistical methods, including R Studio, Bibliometrix package, and the Web of Science data mining tool. We identified few differ… ▽ More

    Submitted 12 September, 2020; originally announced September 2020.

    Journal ref: Volume 14, Issue 5, September October 2020,

  10. COVID-19 what have we learned? The rise of social machines and connected devices in pandemic management following the concepts of predictive, preventive and personalised medicine

    Authors: Petar Radanliev, David De Roure, Rob Walton, Max Van Kleek, Rafael Mantilla Montalvo, Omar Santos, LaTreall Maddox, Stacy Cannady

    Abstract: A comprehensive bibliographic review with R statistical methods of the COVID pandemic in PubMed literature and Web of Science Core Collection, supported with Google Scholar search. In addition, a case study review of emerging new approaches in different regions, using medical literature, academic literature, news articles and other reliable data sources. Public responses of mistrust about privacy… ▽ More

    Submitted 23 November, 2020; v1 submitted 12 September, 2020; originally announced September 2020.

    Journal ref: EPMA Journal 11, 311 332 (2020)

  11. arXiv:2005.12409  [pdf

    cs.CY

    Digitalization of COVID-19 pandemic management and cyber risk from connected systems

    Authors: Petar Radanliev, David De Roure, Max Van Kleek

    Abstract: What makes cyber risks arising from connected systems challenging during the management of a pandemic? Assuming that a variety of cyber-physical systems are already operational-collecting, analyzing, and acting on data autonomously-what risks might arise in their application to pandemic management? We already have these systems operational, collecting, and analyzing data autonomously, so how would… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

  12. arXiv:2005.12150  [pdf

    cs.CY cs.AI cs.CR cs.LG

    Design of a dynamic and self adapting system, supported with artificial intelligence, machine learning and real time intelligence for predictive cyber risk analytics in extreme environments, cyber risk in the colonisation of Mars

    Authors: Petar Radanliev, David De Roure, Kevin Page, Max Van Kleek, Omar Santos, La Treall Maddox, Pete Burnap, Eirini Anthi, Carsten Maple

    Abstract: Multiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for de… ▽ More

    Submitted 11 February, 2021; v1 submitted 19 May, 2020; originally announced May 2020.

    Comments: 12 pages, 1 figure

    MSC Class: 68T01; 68T05; 97P80; 68T37 ACM Class: I.1.2; D.4; G.1; G.3; H.4

  13. arXiv:2005.10082  [pdf

    cs.DL cs.CY

    What country, university or research institute, performed the best on COVID-19? Bibliometric analysis of scientific literature

    Authors: Petar Radanliev, David De Roure, Rob Walton, Max Van Kleek, Omar Santos, La Treall Maddox

    Abstract: In this article, we conduct data mining to discover the countries, universities and companies, produced or collaborated the most research on Covid-19 since the pandemic started. We present some interesting findings, but despite analysing all available records on COVID-19 from the Web of Science Core Collection, we failed to reach any significant conclusions on how the world responded to the COVID-… ▽ More

    Submitted 16 July, 2022; v1 submitted 19 May, 2020; originally announced May 2020.

  14. Cyber Risk at the Edge: Current and future trends on Cyber Risk Analytics and Artificial Intelligence in the Industrial Internet of Things and Industry 4.0 Supply Chains

    Authors: Petar Radanliev, David De Roure, Kevin Page, Jason Nurse, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Peter Burnap

    Abstract: Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0, with a sp… ▽ More

    Submitted 14 May, 2020; v1 submitted 5 November, 2019; originally announced November 2019.

  15. Epistemological and Bibliometric Analysis of Ethics and Shared Responsibility Health Policy and IoT Systems

    Authors: Petar Radanliev, David De Roure

    Abstract: The focus in this paper is placed on shared responsibility and ethics in health policy, specific to Internet of Things (IoT) devices in healthcare systems. The article assesses how the introduction of IoT brings risks to the security of medical systems. The justification for this research emerges from the opportunities emerging from digital technologies for medical services, but also creating a ra… ▽ More

    Submitted 25 December, 2022; v1 submitted 8 March, 2019; originally announced March 2019.

  16. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge

    Authors: Petar Radanliev, David De Roure, Max Van Kleek, Uchenna Ani, Pete Burnap, Eirini Anthi, Jason R. C. Nurse, Omar Santos, Rafael Mantilla Montalvo, LaTreall Maddox

    Abstract: The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-ass… ▽ More

    Submitted 23 November, 2020; v1 submitted 12 March, 2019; originally announced March 2019.

  17. Future developments in standardisation of cyber risk in the Internet of Things (IoT)

    Authors: Petar Radanliev, David C De Roure, Jason RC Nurse, Rafael Mantilla Montalvo, Stacy Cannady, Omar Santos, Peter Burnap, Carsten Maple

    Abstract: In this research article, we explore the use of a design process for adapting existing cyber risk assessment standards to allow the calculation of economic impact from IoT cyber risk. The paper presents a new model that includes a design process with new risk assessment vectors, specific for IoT cyber risk. To design new risk assessment vectors for IoT, the study applied a range of methodologies,… ▽ More

    Submitted 29 April, 2020; v1 submitted 11 March, 2019; originally announced March 2019.

    Report number: Radanliev, P., Roure, D. De., R.C. Nurse, J., Montalvo, R.M., Cannady, S., Santos, O., Maddox, La., Burnap, P., and Maple, C., l. Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Appl Sci. 2020;(2: 169):1--16

    Journal ref: SN Appl. Sci. 2, 169 (2020)

  18. Artificial intelligence in cyber physical systems

    Authors: Petar Radanliev, David De Roure, Max Van Kleek, Omar Santos, Uchenna Ani

    Abstract: This article conducts a literature review of current and future challenges in the use of artificial intelligence (AI) in cyber physical systems. The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. The methodology applied resembled a literature review and taxonomic analysis of compl… ▽ More

    Submitted 12 September, 2020; v1 submitted 11 March, 2019; originally announced March 2019.

  19. Security Risk Assessment in Internet of Things Systems

    Authors: Jason R. C. Nurse, Sadie Creese, David De Roure

    Abstract: Information security risk assessment methods have served us well over the past two decades. They have provided a tool for organizations and governments to use in protecting themselves against pertinent risks. As the complexity, pervasiveness, and automation of technology systems increases and cyberspace matures, particularly with the Internet of Things (IoT), there is a strong argument that we wil… ▽ More

    Submitted 8 November, 2018; originally announced November 2018.

    Comments: 9 pages, 1 figure

    Journal ref: IT Professional (Volume: 19, Issue: 5, 2017 )

  20. arXiv:1809.05904  [pdf

    cs.CY cs.AI cs.HC cs.SI

    A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines

    Authors: Aastha Madaan, Jason R. C. Nurse, David De Roure, Kieron O'Hara, Wendy Hall, Sadie Creese

    Abstract: The concept of social machines is increasingly being used to characterise various socio-cognitive spaces on the Web. Social machines are human collectives using networked digital technology which initiate real-world processes and activities including human communication, interactions and knowledge creation. As such, they continuously emerge and fade on the Web. The relationship between humans and… ▽ More

    Submitted 30 November, 2018; v1 submitted 16 September, 2018; originally announced September 2018.

    Comments: 14 pages, 4 figures

    Report number: SSRN-3250383

  21. Future developments in cyber risk assessment for the internet of things

    Authors: Petar Radanliev, David Charles De Roure, Razvan Nicolescu, Michael Huth, Rafael Mantilla Montalvo, Stacy Cannady, Peter Burnap

    Abstract: This article is focused on the economic impact assessment of Internet of Things (IoT) and its associated cyber risks vectors and vertices - a reinterpretation of IoT verticals. We adapt to IoT both the Cyber Value at Risk model, a well-established model for measuring the maximum possible loss over a given time period, and the MicroMort model, a widely used model for predicting uncertainty through… ▽ More

    Submitted 13 September, 2018; originally announced September 2018.

    Comments: http://doi.org/10.1016/J.COMPIND.2018.08.002

  22. arXiv:1806.10906  [pdf, other

    cs.CR cs.CY cs.NI

    If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems

    Authors: Jason R. C. Nurse, Petar Radanliev, Sadie Creese, David De Roure

    Abstract: Security risk assessment methods have served us well over the last two decades. As the complexity, pervasiveness and automation of technology systems increases, particularly with the Internet of Things (IoT), there is a convincing argument that we will need new approaches to assess risk and build system trust. In this article, we report on a series of sco** workshops and interviews with industry… ▽ More

    Submitted 28 June, 2018; originally announced June 2018.

    Comments: 9 pages, 1 figure

    Journal ref: IET Living in the Internet of Things: Cybersecurity of the IoT Conference 2018

  23. arXiv:1606.03276  [pdf, other

    cs.CY cs.LG stat.ML

    An Application of Network Lasso Optimization For Ride Sharing Prediction

    Authors: Shaona Ghosh, Kevin Page, David De Roure

    Abstract: Ride sharing has important implications in terms of environmental, social and individual goals by reducing carbon footprints, fostering social interactions and economizing commuter costs. The ride sharing systems that are commonly available lack adaptive and scalable techniques that can simultaneously learn from the large scale data and predict in real-time dynamic fashion. In this paper, we study… ▽ More

    Submitted 6 July, 2016; v1 submitted 10 June, 2016; originally announced June 2016.

  24. arXiv:1311.2789  [pdf

    q-bio.GN cs.DL

    Structuring research methods and data with the Research Object model: genomics workflows as a case study

    Authors: Kristina M. Hettne, Harish Dharuri, Jun Zhao, Katherine Wolstencroft, Khalid Belhajjame, Stian Soiland-Reyes, Eleni Mina, Mark Thompson, Don Cruickshank, Lourdes Verdes-Montenegro, Julian Garrido, David de Roure, Oscar Corcho, Graham Klyne, Reinout van Schouwen, Peter A. C. 't Hoen, Sean Bechhofer, Carole Goble, Marco Roos

    Abstract: One of the main challenges for biomedical research lies in the computer-assisted integrative study of large and increasingly complex combinations of data in order to understand molecular mechanisms. The preservation of the materials and methods of such computational experiments with clear annotations is essential for understanding an experiment, and this is increasingly recognized in the bioinform… ▽ More

    Submitted 19 September, 2014; v1 submitted 12 November, 2013; originally announced November 2013.

    Comments: 35 pages, 10 figures, 1 table. Submitted to Journal of Biomedical Semantics on 2013-05-13, resubmitted after reviews 2013-11-09, 2014-06-27. Accepted in principle 2014-07-29. Published: 2014-09-18 http://www.jbiomedsem.com/content/5/1/41. Research Object homepage: http://www.researchobject.org/

    Report number: uk-ac-man-scw:212837 ACM Class: J.3; I.7.4; H.3.7

  25. arXiv:cs/0204012  [pdf

    cs.LG cs.MA

    Exploiting Synergy Between Ontologies and Recommender Systems

    Authors: Stuart E. Middleton, Harith Alani, David C. De Roure

    Abstract: Recommender systems learn about user preferences over time, automatically finding things of similar interest. This reduces the burden of creating explicit queries. Recommender systems do, however, suffer from cold-start problems where no initial information is available early on upon which to base recommendations. Semantic knowledge structures, such as ontologies, can provide valuable domain kno… ▽ More

    Submitted 8 April, 2002; originally announced April 2002.

    Comments: Semantic web conference, WWW2002, 10 pages

    ACM Class: K.3.2; I.2.11

  26. arXiv:cs/0203011  [pdf

    cs.LG cs.MA

    Capturing Knowledge of User Preferences: ontologies on recommender systems

    Authors: S. E. Middleton, D. C. De Roure, N. R. Shadbolt

    Abstract: Tools for filtering the World Wide Web exist, but they are hampered by the difficulty of capturing user preferences in such a dynamic environment. We explore the acquisition of user profiles by unobtrusive monitoring of browsing behaviour and application of supervised machine-learning techniques coupled with an ontological representation to extract user preferences. A multi-class approach to pap… ▽ More

    Submitted 8 March, 2002; originally announced March 2002.

    Comments: First international conference on Knowledge Capture 2001, 8 pages

    ACM Class: I.2.6; I.2.11