Dr Nathan Shone
School of Computer Science and Mathematics
Faculty of Engineering and Technology
Email: N.Shone@ljmu.ac.uk
Telephone: 0151 231 2535
Journal article
Nguyen VQ, Ngo LT, Nguyen LM, Nguyen VH, Shone N. 2024. Deep clustering hierarchical latent representation for anomaly-based cyber-attack detection Knowledge-Based Systems, 301 :1-20 DOI Publisher Url Public Url
Nguyen MT, Nguyen VH, Shone N. 2023. Using deep graph learning to improve dynamic analysis-based malware detection in PE Files Journal of Computer Virology and Hacking Techniques, DOI Publisher Url Public Url
Hurst W, Tekinerdogan B, Alskaif T, Boddy A, Shone N. 2022. Securing electronic health records against insider-threats: A supervised machine learning approach Smart Health, 26 DOI Publisher Url Public Url
Edussuriya C, Vithanage K, Bandara N, Alawatugoda J, Sandirigama M, Jayasinghe U, Shone N, Lee GM. 2020. BAT: block analytics tool integrated with blockchain based IoT platform Electronics, 9 DOI Author Url Publisher Url Public Url
Hurst W, Montañez CAC, Shone N. 2020. Time-Pattern Profiling from Smart Meter Data to Detect Outliers in Energy Consumption IoT, 1 :92-108 DOI Publisher Url Public Url
Hurst W, Boddy A, Merabti M, Shone N. 2020. Patient privacy violation detection in healthcare critical infrastructures: An investigation using density-based benchmarking Future Internet, 12 DOI Publisher Url
Hurst W, Curbelo Montañez CA, Shone N, Al-Jumeily D. 2020. An Ensemble Detection Model using Multinomial Classification of Stochastic Gas Smart Meter Data to Improve Wellbeing Monitoring in Smart Cities IEEE Access, 8 :7877-7898 DOI Author Url Publisher Url Public Url
Shone N, Tran Nguyen N, Vu Dinh P, Shi Q. 2018. A Deep Learning Approach to Network Intrusion Detection IEEE Transactions on Emerging Topics in Computational Intelligence, 2 DOI Author Url Publisher Url Public Url
Hurst W, Shone N, Shi Q, Bazli B. 2017. Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research International Journal On Advances in Security, 10 :114-125 Publisher Url Public Url
Hurst W, Shone N. 2016. Introduction International Journal of Critical Computer-Based Systems, 6 :171-172
Conference publication
Nguyen VQ, Ngo TL, Nguyen LM, Nguyen VH, Shone N. 2024. Deep Nested Clustering Auto-Encoder for Anomaly-Based Network Intrusion Detection 2023 RIVF International Conference on Computing and Communication Technologies (RIVF), 2023 RIVF IEEE International Conference on Computing and Communication Technologies :289-294 DOI Publisher Url Public Url
Ninh TP, Hung Nguyen V, Shone N, Babenko M. 2022. Function Exclusion in Automated Security Patch Testing Using Chopped Symbolic Execution 2021 18th NAFOSTED Conference on Information and Computer Science (NICS), 2021 8th NAFOSTED Conference on Information and Computer Science (NICS) DOI Publisher Url Public Url
Quan NV, Nguyen VH, Cao VL, Le-Khac N-A, Shone N. 2022. A Robust PCA Feature Selection to Assist Deep Clustering Autoencoder-Based Network Anomaly Detection 20218th NAFOSTED Conference on Information and Computer Science (NICS), 2021 8th NAFOSTED Conference on Information and Computer Science (NICS) (NICS’21) DOI Publisher Url Public Url
Nguyen VQ, Nguyen VH, Hoang TH, Shone N. 2022. A Novel Deep Clustering Variational Auto-Encoder for Anomaly-based Network Intrusion Detection Proceedings - International Conference on Knowledge and Systems Engineering, KSE, 2022-October DOI Publisher Url
Hurst W, Montanez CAC, Shone N. 2020. Towards an approach for fuel poverty detection from gas smart meter data using decision tree learning ACM International Conference Proceeding Series, :23-28 DOI Publisher Url
Banton M, Shone N, Hurst W, Shi Q. 2020. Intrusion Detection Using Extremely Limited Data Based on SDN 2020 IEEE 10th International Conference on Intelligent Systems, IS 2020 - Proceedings, :304-309 DOI Publisher Url
Tu NM, Hung NV, Anh PV, Van Loi C, Shone N. 2020. Detecting Malware Based on Dynamic Analysis Techniques Using Deep Graph Learning Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12466 LNCS :357-378 DOI Publisher Url
Vu Dinh P, Shone N, Phan Huy D, Shi Q, Nguyen Viet H, Tran Nguyen N. 2019. Behaviour-aware Malware Classification: Dynamic Feature Selection 2019 11th International Conference on Knowledge and Systems Engineering (KSE), 11th International Conference on Knowledge and Systems Engineering (KSE) DOI Author Url Publisher Url Public Url
Hurst W, Shone N, Tully D. 2019. Investigations into the Development of a Knowledge Transfer Platform for Business 2019 5th International Conference on Information Management (ICIM), The 5th IEEE International Conference on Information Management (ICIM2019) DOI Author Url Publisher Url Public Url
Banton M, Shone N, Hurst W, Shi Q. 2019. A Fresh Look at Combining Logs and Network Data to Detect Anomalous Activity HadjadjAoul Y. 2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019), 6th International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) DOI Author Url Publisher Url
Nguyen Viet H, Nguyen Van Q, Thi Trang LL, Shone N. 2018. Using Deep Learning Model for Network Scanning Detection Proceedings of the 4th International Conference on Frontiers of Educational Technologies, ICFET '18 Proceedings of the 4th International Conference on Frontiers of Educational Technologies DOI Publisher Url Public Url
Vu Dinh P, Tran Nguyen N, Shone N, Mac Dermott A, Shi Q. 2017. Deep Learning Combined with De-noising Data for Network Intrusion Detection 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES), Intelligent and Evolutionary Systems (IES 2017) DOI Author Url Publisher Url Public Url
Hurst W, Shone N, El Rhalibi A, Happe A, Kotze B, Duncan B. 2017. Advancing the Micro-CI Testbed for IoT Cyber-Security Research and Education Think Mind, CLOUD COMPUTING 2017 : The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization :129-134 Publisher Url Public Url
Hurst W, Shone N, Shi Q, Bazli B. 2016. MICRO-CI: A Testbed for Cyber-Security Research EMERGING 2016: The Eighth International Conference on Emerging Networks and Systems Intelligence, The Eighth International Conference on Emerging Networks and Systems Intelligence :17-22 Publisher Url Public Url
Panton T, Llewellyn-Jones D, Shone N, Hashem Eiza M. 2016. Secure Proximity-Based Identity Pairing using an Untrusted Signalling Service 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), The 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) DOI Author Url Publisher Url Public Url
Hashem Eiza M, Randles M, Johnson P, Shone N, Pang J, Bhih A. 2015. Rail Internet of Things: An Architectural Platform and Assured Requirements Model 15th IEEE International Conference on Computer and Information Technology (CIT-2015), 15th IEEE International Conference on Computer and Information Technology (CIT-2015) :364-370 DOI Author Url Publisher Url Public Url
Shone N, Dobbins C, Hurst W, Shi Q. 2015. Digital Memories Based Mobile User Authentication for IoT 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15) :1796-1802 DOI Author Url Publisher Url Public Url
Hurst W, Shone N, Monnet Q. 2015. Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015) :1697-1702 DOI Author Url Publisher Url Public Url
Shone N, Shi Q, Merabti M, Kifayat K. 2013. Securing complex system-of-systems compositions European Conference on Information Warfare and Security, ECCWS, 12th European Conference on Cyber Warfare and Security ECCWS-2013 :370-379
Shone N, Shi Q, Merabti M, Kifayat K. 2013. Misbehaviour monitoring on system-of-systems components International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013, :1-6 DOI Author Url Publisher Url
Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 DOI Author Url Publisher Url
Shone N, Shi Q, Merabti M, Kifayat K. 2013. Detecting Behavioural Anomalies in System-of-Systems Components Proceedings of 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013), 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013)
Shone N, Shi Q, Merabti M, Kifayat K. 2012. Securing a System-of-Systems From Component Misbehaviour Proceedings of the 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012), 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012) Publisher Url
Shone N, Shi Q, Merabti M, Kifayat K. 2011. System-of-Systems Monitoring: A Survey Proceedings of 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011), 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011) Publisher Url
Latham K, Hurst W, Shone N, El Rhalibi A, Pan Z. A Case Study on the Advantages of 3D Walkthroughs over Photo Stitching Techniques IEEE International Conference on Virtual Reality and Visualization (ICVRV 2016) DOI Author Url Publisher Url Public Url
Hurst W. Developing a Productivity Accelerator Platform to Support UK Businesses in the Industry 4.0 Revolution Third International Congress on Information and Communication Technology DOI Author Url Publisher Url
Hurst W, Shone N, Shi Q. Critical Infrastructure Testbed for Cyber-security Training and Research 21st UKAIS Conference on Information Systems,
Chapters
Hurst W, Shone N. 2023. Critical infrastructure security: Cyber-threats, legacy systems and weakening segmentation Management and Engineering of Critical Infrastructures :265-286 DOI Publisher Url
Thesis/Dissertation
Shone N. Detecting Misbehaviour in a Complex System-of-Systems Environment Shi QI, Merabti MADJID, Kifayat KASHIF. Public Url