1985 …2023

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2019

A conceptual model to predict social engineering victims

Muslah Albladi, S. & Weir, G. R. S., 10 Apr 2019, 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). Piscataway, N.J., 1 p. 8688352

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
1 Citation (Scopus)
18 Downloads (Pure)
2018

A semi-automated security advisory system to resist cyber-attack in social networks

Albladi, S. M. & Weir, G. R. S., 8 Aug 2018, Computational Collective Intelligence - 10th International Conference, ICCCI 2018, Proceedings. Cham: Springer-Verlag, Vol. 11055. p. 146-156 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11055 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
1 Citation (Scopus)
20 Downloads (Pure)

Classification of extremist text on the web using sentiment analysis approach

Owoeye, K. O. & Weir, G. R. S., 13 Dec 2018. 6 p.

Research output: Contribution to conferencePaper

Open Access
File
53 Downloads (Pure)

Classification of radical web text using a composite-based method

Owoeye, K. O. & Weir, G. R. S., 13 Dec 2018. 7 p.

Research output: Contribution to conferencePaper

Open Access
File
23 Downloads (Pure)

Cloud-based textual analysis as a basis for document classification

Weir, G., Owoeye, K., Oberacker, A. & Alshahrani, H., 1 Nov 2018, 2018 International Conference on High Performance Computing & Simulation (HPCS). Zine-Dine, K. & Smari, W. W. (eds.). Piscataway, New Jersey: IEEE, p. 629-633 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
1 Citation (Scopus)
14 Downloads (Pure)

Managing forensic recovery in the cloud

Weir, G. R. S., Aßmuth, A. & Jäger, N., 12 Jan 2018, (Accepted/In press). 6 p.

Research output: Contribution to conferencePaper

Open Access
File
31 Downloads (Pure)

Personality traits and cyber-attack victimisation: multiple mediation analysis

Albladi, S. M. & Weir, G. R. S., 18 Jan 2018, Joint 13th CTTE and 10th CMI Conference on Internet of Things – Business Models, Users, and Networks. Falch, M. (ed.). Piscataway, NJ: IEEE, 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
1 Citation (Scopus)
215 Downloads (Pure)
Open Access
File
12 Citations (Scopus)
56 Downloads (Pure)
2017

Cloud accounting systems, the audit trail, forensics and the EU GDPR: how hard can it be?

Weir, G., Aßmuth, A., Whittington, M. & Duncan, B., 10 Aug 2017. 6 p.

Research output: Contribution to conferencePaper

Open Access
File
27 Downloads (Pure)

Competence measure in social networks

Albladi, S. M. & Weir, G. R. S., 7 Dec 2017, 2017 IEEE International Carnahan Conference on Security Technology (ICCST). Piscataway, NJ: IEEE, 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
2 Citations (Scopus)
33 Downloads (Pure)

Evaluating readability as a factor in information security policies

Alkhurayyif, Y. & Weir, G. R. S., 31 Dec 2017, In : International Journal of Trend in Research and Development. p. 54-64 11 p.

Research output: Contribution to journalConference Contribution

Open Access
File
34 Downloads (Pure)

Evidence acquisition in cloud forensics

Nasreldin, M., Aslan, H., Rasslan, M. & Weir, G., 5 Nov 2017. 8 p.

Research output: Contribution to conferencePaper

Open Access
File
26 Downloads (Pure)

Factors affecting user's judgment of cyberattacks

Albladi, S. M. & Weir, G., 10 May 2017.

Research output: Contribution to conferencePoster

Open Access
File
18 Downloads (Pure)

Hybrid Arabic text steganography

Alshahrani, H. M. S. & Weir, G., 30 Nov 2017, In : International Journal of Computer and Information Technology. 6, 6, p. 329-338 10 p., 6.

Research output: Contribution to journalArticle

Open Access
File
22 Downloads (Pure)

Readability as a basis for information security policy assessment

Alkhurayyif, Y. & Weir, G. R. S., 2 Nov 2017, Seventh IEEE International Conference on Emerging Security Technologies (EST). Piscataway, NJ: IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
1 Citation (Scopus)
25 Downloads (Pure)

Strategies for intrusion monitoring in cloud services

Weir, G. R. S. & Aßmuth, A., 27 Jan 2017, p. 1-5. 5 p.

Research output: Contribution to conferencePaper

Open Access
File
115 Downloads (Pure)
2016

Cybersecurity and the unbearability of uncertainty

Renaud, K. & Weir, G. R. S., 20 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). Piscataway, NJ, p. 137-143 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
1 Citation (Scopus)
80 Downloads (Pure)

Improving resilience by deploying permuted code onto physically unclonable unique processors

Aßmuth, A., Cockshott, P., Kipke, J., Renaud, K., Mackenzie, L., Vanderbauwhede, W., Söllner, M., Fischer, T. & Weir, G., 20 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). Piscataway: IEEE, p. 144-150 7 p. 7600225

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
42 Downloads (Pure)

Management attitudes toward information security in Omani public sector organisations

Al-Izki, F. & Weir, G. R. S., 20 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). Piscataway, NJ, p. 107-112 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
1 Citation (Scopus)
123 Downloads (Pure)

Methods and risks of textual steganography

Weir, G. & Neal, P., 13 Jun 2016.

Research output: Contribution to conferenceAbstract

Positing the problem: enhancing classification of extremist web content through textual analysis

Weir, G., Frank, R., Cartwright, B. & dos Santos, E., 17 Nov 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). Cartwright, B., Weir, G. & Lau, L. Y-C. (eds.). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
4 Citations (Scopus)
49 Downloads (Pure)

The Internet of Things: promise of a better connected world

Weir, G. R. S., 11 Jun 2016, Mechatronic Futures: Challenges and Solutions for Mechatronic Systems and their Designers. Hehenberger, P. & Bradley, D. (eds.). Switzerland: Springer, p. 165-177 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

File
13 Downloads (Pure)

Vulnerability to social engineering in social networks: a proposed user-centric framework

Albladi, S. & Weir, G. R. S., 17 Nov 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). Cartwright, B., Weir, G. & Lau, L. Y-C. (eds.). Piscataway, NJ: IEEE, p. 95-100 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
4 Citations (Scopus)
611 Downloads (Pure)
2015

From ZeuS to Zitmo: trends in banking malware

Etaher, N., Weir, G. R. S. & Alazab, M., 3 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Piscataway, NJ.: IEEE, Vol. 1. p. 1386-1391 6 p. 7345443

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
12 Citations (Scopus)
622 Downloads (Pure)

Gender impact on information security in the Arab world

Al Izki, F. H. S. & Weir, G., 2015, Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: Proceedings of ICGS3 2015, 10th International Conference on Global Security, Safety & Sustainability.. Jahankhani, H., Carlile, A., Akhgar, B., Hessami, A. G. & Hosseinian-Far, A. (eds.). 1 ed. Switzerland: Springer International Publishing AG, Vol. 534. p. 200-207 8 p. (Communications in Computer and Information Science; vol. 534).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
1 Citation (Scopus)
130 Downloads (Pure)

Quantifying and neutralising sexually explicit language

Weir, G., 2015, (Accepted/In press) Cybercrime Risks and Responses: Eastern and Western Perspectives. Smith, R., Cheung, R. C-C. & Lau Yiu-Chung, L. (eds.).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
File
6 Downloads (Pure)

The limitations of automating OSINT: understanding the question, not the answer

Weir, G. R. S., 3 Dec 2015, Automating Open Source Intelligence: Algorithms for OSINT. Layton, R. & Watters, P. A. (eds.). Waltham, MA., p. 159-169 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Understanding Android security

Robinson, G. & Weir, G., 2015, Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: Proceedings of ICGS3 2015, 10th International Conference on Global Security, Safety & Sustainability.. Jahankhani, H., Carlile, A., Akhgar, B., Hessami, A. G. & Hosseinian-Far, A. (eds.). 1 ed. Switzerland: Springer International Publishing AG, Vol. 534. p. 189-199 11 p. (Communications in Computer and Information Science; vol. 534).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
5 Citations (Scopus)
346 Downloads (Pure)
2014

Development of a readability index attuned to the new English Course of Study in Japan

Ozasa, T., Weir, G. R. S. & Fukui, M., Nov 2014, Proceedings of ICERI2014 Conference. p. 2446-2453 8 p. (7th International Conference of Education, Research and Innovation).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
46 Downloads (Pure)

Information security and digital divide in the Arab world

Al Izki, F. & Weir, G., 23 Jun 2014, p. 15-24. 10 p.

Research output: Contribution to conferencePaper

File
946 Downloads (Pure)

Measuring sexually explicit content

Darroch, K. & Weir, G., 24 Jun 2014, p. 101-112. 12 p.

Research output: Contribution to conferencePaper

File
88 Downloads (Pure)

The forensic detection of very similar images

Connor, R., Mackenzie-Leigh, S. & Weir, G., 23 Jun 2014, (Unpublished) p. 26-32. 7 p.

Research output: Contribution to conferencePaper

Understanding the threat of banking malware

Etaher, N. & Weir, G., 24 Jun 2014, p. 73-80. 8 p.

Research output: Contribution to conferencePaper

File
347 Downloads (Pure)

Special Issue: on cybercrime prevention, detection and response

Al-nemrat, A. (Guest ed.) & Weir, G. (Guest ed.), 2013, In : International Journal of Electronic Security and Digital Forensics. 5, 2

Research output: Contribution to journalSpecial issue

Strategies for covert Web search

Weir, G. R. S. & Igbako, D., 2013, Fourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013. Piscataway, NJ, United States: IEEE, p. 50-57 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

1 Citation (Scopus)
2012

Genre-based information hiding

Ogilvie, R. & Weir, G. R. S., 7 Nov 2012, In : Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. 99, p. 104-111 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Genre-based information hiding

Ogilvie, R. & Weir, G. R. S., 12 Sep 2012, Global Security, Safety and Sustainability & e-Democracy: 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers. Georgiadis, C. K., Jahankhani, H., Pimenidis, E., Bashroush, R. & Al-Nemrat, A. (eds.). Berlin: Springer, Vol. 99. p. 104-111 8 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 99).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
10 Downloads (Pure)

Issues in Cybercrime, Security and Digital Forensics

Weir, G. (ed.) & Al-nemrat, A. (ed.), 2012, 210 p.

Research output: Book/ReportBook

Strategies for neutralising sexually explicit language

Weir, G. & Duta, A-M., 30 Oct 2012. 9 p.

Research output: Contribution to conferencePaper

File
93 Downloads (Pure)

The sources of digital evidence

Weir, G. & Mason, S., 15 Nov 2012, Electronic Evidence. Mason, S. (ed.). 3rd ed. p. 1-25 25 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Triage in forensic accounting using Zipf's law

Odueke, A. & Weir, G., 2012, Issues in Cybercrime, Security and Digital Forensics. Weir, G. & Al-Nemrat, A. (eds.). Glasgow, p. 33-43 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
276 Downloads (Pure)
2011

Classifying suspicious content using frequency analysis

Gellineau, O. & Weir, G. R. S., 2011, Corpora and Language Technologies in Teaching, Learning and Research. Weir, G., Ishikawa, S. & Poonpol, K. (eds.). 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
66 Downloads (Pure)

Corpora and language technologies in teaching, learning and research

Weir, G. (ed.), Ishikawa, S. (ed.) & Poonpol, K. (ed.), Sep 2011, Glasgow: University of Strathclyde. 150 p.

Research output: Book/ReportBook

Cyberforensics: issue and perspectives

Weir, G. (ed.), 2011, Glasgow: University of Strathclyde. 234 p.

Research output: Book/ReportBook

Perceived risk and sensitive data on mobile devices

Lazou, A. & Weir, G., 28 Jun 2011, Cyberforensics: issues and perspectives. Weir, G. R. S. (ed.). Glasgow: University of Strathclyde, p. 183-196 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
File
76 Downloads (Pure)

The threats of social networking: old wine in new bottles?

Weir, G., Toolan, F. & Smeed, D., May 2011, In : Information Security Technical Report. 16, 2, p. 38-43 6 p.

Research output: Contribution to journalArticle

File
20 Citations (Scopus)
580 Downloads (Pure)

Toward music-based data discrimination for cybercrime investigations

Weir, G. R. S. & Rossi, G., 2011, Cyberforensics: Issue and Perspectives. Weir, G. R. S. (ed.). Glasgow: University of Strathclyde, p. 229-234 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
10 Downloads (Pure)
2010

A software application for assessing readability in the Japanese EFL context

Ozasa, T., Weir, G. & Fukui, M., 2010, In : Themes in Science and Technology Education. 3, 1-2, p. 91-118 28 p.

Research output: Contribution to journalArticle

Balancing the threat of personal technology in the workplace

Garrity, S. & Weir, G. R. S., 2010, In : International Journal of Electronic Security and Digital Forensics. 3, 1, p. 73-81 9 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)