​
Login / Signup
Diane Gan
ORCID
Publication Activity (10 Years)
Years Active: 1999-2023
Publications (10 Years): 14
Top Topics
Denial Of Service
Intrusion Detection
Supervised Machine Learning Algorithms
Autonomous Robotic
Top Venues
iThings/GreenCom/CPSCom/SmartData
MIPRO
IEEE Access
IUCC-CSS
</>
Publications
</>
D. O. Lawal
,
David W. Gresty
,
Diane Gan
,
T. C. Durojaiye
Forensic Implication of a Cyber-Enabled Fraud Taking Advantage of an Offline Adversary-in-the-Middle (AiTM) Attack.
MIPRO
(2023)
Mohamed Ali Kazi
,
Steve Woodhead
,
Diane Gan
Comparing the performance of supervised machine learning algorithms when used with a manual feature selection process to detect Zeus malware.
Int. J. Grid Util. Comput.
13 (5) (2022)
Mohamed Ali Kazi
,
Steve Woodhead
,
Diane Gan
An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques.
J. Cybersecur. Priv.
3 (1) (2022)
D. O. Lawal
,
David W. Gresty
,
Diane Gan
,
L. Hewitt
Have You Been Framed and Can You Prove It?
MIPRO
(2021)
Mohamed Ali Kazi
,
Steve Woodhead
,
Diane Gan
Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process.
SSCC
(2019)
George Loukas
,
Tuan Vuong
,
Ryan Heartfield
,
Georgia Sakellari
,
Yongpil Yoon
,
Diane Gan
Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning.
IEEE Access
6 (2018)
Ryan Heartfield
,
George Loukas
,
Diane Gan
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks.
SERA
(2017)
David W. Gresty
,
George Loukas
,
Diane Gan
,
Constantinos Ierotheou
Towards Web Usage Attribution via Graph Community Detection in Grouped Internet Connection Records.
iThings/GreenCom/CPSCom/SmartData
(2017)
Anatolij Bezemskij
,
George Loukas
,
Diane Gan
,
Richard J. Anthony
Detecting Cyber-Physical Threats in an Autonomous Robotic Vehicle Using Bayesian Networks.
iThings/GreenCom/CPSCom/SmartData
(2017)
Ryan Heartfield
,
George Loukas
,
Diane Gan
You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks.
IEEE Access
4 (2016)
Muhammad Aminu Ahmad
,
Steve Woodhead
,
Diane Gan
A Safeguard against Fast Self-propagating Malware.
ICCNS
(2016)
David W. Gresty
,
Diane Gan
,
George Loukas
,
Constantinos Ierotheou
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history.
Digit. Investig.
(2016)
Anatolij Bezemskij
,
George Loukas
,
Richard J. Anthony
,
Diane Gan
Behaviour-Based Anomaly Detection of Cyber-Physical Attacks on a Robotic Vehicle.
IUCC-CSS
(2016)
Muhammad Aminu Ahmad
,
Steve Woodhead
,
Diane Gan
A countermeasure mechanism for fast scanning malware.
Cyber Security And Protection Of Digital Services
(2016)
Diane Gan
,
Lily R. Jenkins
Social Networking Privacy - Who's Stalking You?
Future Internet
7 (1) (2015)
Tuan Phan Vuong
,
George Loukas
,
Diane Gan
Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle.
CIT/IUCC/DASC/PICom
(2015)
Tuan Phan Vuong
,
George Loukas
,
Diane Gan
,
Anatolij Bezemskij
Decision tree-based detection of denial of service and command injection attacks on robotic vehicles.
WIFS
(2015)
Tuan Vuong
,
Avgoustinos Filippoupolitis
,
George Loukas
,
Diane Gan
Physical indicators of cyber attacks against a rescue robot.
PerCom Workshops
(2014)
George Loukas
,
Diane Gan
,
Tuan Vuong
A Review of Cyber Threats and Defence Approaches in Emergency Management.
Future Internet
5 (2) (2013)
George Loukas
,
Diane Gan
,
Tuan Vuong
A taxonomy of cyber attack and defence mechanisms for emergency management networks.
PerCom Workshops
(2013)
Simone Cecchini
,
Diane Gan
SQL injection attacks with the AMPA suite.
Int. J. Electron. Secur. Digit. Forensics
5 (2) (2013)
Dimitrios Frangiskatos
,
Mona Ghassemian
,
Diane Gan
Technology Perspective: Is Green IT a Threat to IT Security?
ISDF
(2009)
Diane Gan
,
Sati McKenzie
Traffic policing in ATM networks with multimedia traffic: the super leaky bucket.
Comput. Commun.
22 (5) (1999)