If you made any changes in Pure these will be visible here soon.

Research Output 1985 2018

2018

A semi-automated security advisory system to resist cyber-attack in social networks

Albladi, S. M. & Weir, G. R. S., 8 Aug 2018, Computational Collective Intelligence - 10th International Conference, ICCCI 2018, Proceedings. Cham: Springer-Verlag, Vol. 11055. p. 146-156 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11055 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Security systems
Resist
Social Networks
Attack
Engineering

Cloud-based textual analysis as a basis for document classification

Weir, G., Owoeye, K., Oberacker, A. & Alshahrani, H., 1 Nov 2018, 2018 International Conference on High Performance Computing & Simulation (HPCS). Zine-Dine, K. & Smari, W. W. (eds.). Piscataway, New Jersey: IEEE, p. 629-633 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Document Classification
Supervised learning
Data mining
Learning systems
N-gram

Managing forensic recovery in the cloud

Weir, G. R. S., Aßmuth, A. & Jäger, N., 12 Jan 2018, (Accepted/In press). 6 p.

Research output: Contribution to conferencePaper

Open Access
File
Recovery
Monitoring
Fires
Data storage equipment

Personality traits and cyber-attack victimisation: multiple mediation analysis

Albladi, S. M. & Weir, G. R. S., 18 Jan 2018, Joint 13th CTTE and 10th CMI Conference on Internet of Things – Business Models, Users, and Networks. Falch, M. (ed.). Piscataway, NJ: IEEE, 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Crime
Experiments
3 Citations
Open Access
File
Security of data
2017

Cloud accounting systems, the audit trail, forensics and the EU GDPR: how hard can it be?

Weir, G., Aßmuth, A., Whittington, M. & Duncan, B., 10 Aug 2017. 6 p.

Research output: Contribution to conferencePaper

Open Access
File
Data privacy
Cloud computing
Internet of things
2 Citations

Competence measure in social networks

Albladi, S. M. & Weir, G. R. S., 7 Dec 2017, 2017 IEEE International Carnahan Conference on Security Technology (ICCST). Piscataway, NJ: IEEE, 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Security of data

Evaluating readability as a factor in information security policies

Alkhurayyif, Y. & Weir, G. R. S., 31 Dec 2017, In : International Journal of Trend in Research and Development. p. 54-64 11 p.

Research output: Contribution to journalConference Contribution

Open Access
File
Security of data
Experiments

Evidence acquisition in cloud forensics

Nasreldin, M., Aslan, H., Rasslan, M. & Weir, G., 5 Nov 2017. 8 p.

Research output: Contribution to conferencePaper

Open Access
File
Cloud computing

Factors affecting user's judgment of cyberattacks

Albladi, S. M. & Weir, G., 10 May 2017.

Research output: Contribution to conferencePoster

Open Access
File
Virtual reality

Hybrid Arabic text steganography

Alshahrani, H. M. S. & Weir, G., 30 Nov 2017, In : International Journal of Computer and Information Technology. 6, 6, p. 329-338 10 p., 6.

Research output: Contribution to journalArticle

Open Access
File
Steganography
Acoustic waves

Readability as a basis for information security policy assessment

Alkhurayyif, Y. & Weir, G. R. S., 2 Nov 2017, Seventh IEEE International Conference on Emerging Security Technologies (EST). Piscataway, NJ: IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Security of data
Personnel
Acceptance tests

Strategies for intrusion monitoring in cloud services

Weir, G. R. S. & Aßmuth, A., 27 Jan 2017, p. 1-5. 5 p.

Research output: Contribution to conferencePaper

Open Access
File
Monitoring
Digital forensics
2016
1 Citations

Cybersecurity and the unbearability of uncertainty

Renaud, K. & Weir, G. R. S., 20 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). Piscataway, NJ: Institute of Electrical and Electronics Engineers Inc., p. 137-143 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
security industry
uncertainty
threat
resilience
Industry

Improving resilience by deploying permuted code onto physically unclonable unique processors

Aßmuth, A., Cockshott, P., Kipke, J., Renaud, K., Mackenzie, L., Vanderbauwhede, W., Söllner, M., Fischer, T. & Weir, G., 20 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). Piscataway: IEEE, p. 144-150 7 p. 7600225

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
control system
resilience
Control systems
present

Management attitudes toward information security in Omani public sector organisations

Al-Izki, F. & Weir, G. R. S., 20 Oct 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC). Piscataway, NJ: Institute of Electrical and Electronics Engineers Inc., p. 107-112 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Security of data
public sector
management
Oman
governance

Methods and risks of textual steganography

Weir, G. & Neal, P., 13 Jun 2016.

Research output: Contribution to conferenceAbstract

Steganography
Communication
Television
Linguistics
Decoding
1 Citations

Positing the problem: enhancing classification of extremist web content through textual analysis

Weir, G., Frank, R., Cartwright, B. & dos Santos, E., 17 Nov 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). Cartwright, B., Weir, G. & Lau, L. Y-C. (eds.). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Terrorism
World Wide Web
Gages
Web crawler

The Internet of Things: promise of a better connected world

Weir, G. R. S., 11 Jun 2016, Mechatronic Futures: Challenges and Solutions for Mechatronic Systems and their Designers. Hehenberger, P. & Bradley, D. (eds.). Switzerland: Springer, p. 165-177 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

File
Economics
Availability
Internet
Communication
Internet of things
3 Citations

Vulnerability to social engineering in social networks: a proposed user-centric framework

Albladi, S. & Weir, G. R. S., 17 Nov 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). Cartwright, B., Weir, G. & Lau, L. Y-C. (eds.). Piscataway, NJ: IEEE, p. 95-100 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Security of data
Virtual reality
Education
2015
5 Citations

From ZeuS to Zitmo: trends in banking malware

Etaher, N., Weir, G. R. S. & Alazab, M., 3 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Piscataway, NJ.: IEEE, Vol. 1. p. 1386-1391 6 p. 7345443

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Malware
Botnet

Gender impact on information security in the Arab world

Al Izki, F. H. S. & Weir, G., 2015, Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: Proceedings of ICGS3 2015, 10th International Conference on Global Security, Safety & Sustainability.. Jahankhani, H., Carlile, A., Akhgar, B., Hessami, A. G. & Hosseinian-Far, A. (eds.). 1 ed. Switzerland, Vol. 534. p. 200-207 8 p. (Communications in Computer and Information Science; vol. 534).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
digital divide
Security of data
Arab
Arab countries
gender

Quantifying and neutralising sexually explicit language

Weir, G., 2015, (Accepted/In press) Cybercrime Risks and Responses: Eastern and Western Perspectives. Smith, R., Cheung, R. C-C. & Lau Yiu-Chung, L. (eds.).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
File
Students
Industry

The limitations of automating OSINT: understanding the question, not the answer

Weir, G. R. S., 3 Dec 2015, Automating Open Source Intelligence: Algorithms for OSINT. Layton, R. & Watters, P. A. (eds.). Waltham, MA., p. 159-169 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Taxation
Availability
Industry
5 Citations

Understanding Android security

Robinson, G. & Weir, G., 2015, Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: Proceedings of ICGS3 2015, 10th International Conference on Global Security, Safety & Sustainability.. Jahankhani, H., Carlile, A., Akhgar, B., Hessami, A. G. & Hosseinian-Far, A. (eds.). 1 ed. Switzerland, Vol. 534. p. 189-199 11 p. (Communications in Computer and Information Science; vol. 534).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Application programs
Malware
2014

Development of a readability index attuned to the new English Course of Study in Japan

Ozasa, T., Weir, G. R. S. & Fukui, M., Nov 2014, Proceedings of ICERI2014 Conference. p. 2446-2453 8 p. (7th International Conference of Education, Research and Innovation).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Textbooks
Japan
textbook
Teaching
Regression analysis

Information security and digital divide in the Arab world

Al Izki, F. & Weir, G., 23 Jun 2014, p. 15-24. 10 p.

Research output: Contribution to conferencePaper

File
digital divide
Security of data
Arab
Telecommunication
Communication

Measuring sexually explicit content

Darroch, K. & Weir, G., 24 Jun 2014, p. 101-112. 12 p.

Research output: Contribution to conferencePaper

File
Education
Experiments
sex education
experiment
trend

The forensic detection of very similar images

Connor, R., Mackenzie-Leigh, S. & Weir, G., 23 Jun 2014, (Unpublished) p. 26-32. 7 p.

Research output: Contribution to conferencePaper

Law enforcement
Scalability
law enforcement

Understanding the threat of banking malware

Etaher, N. & Weir, G., 24 Jun 2014, p. 73-80. 8 p.

Research output: Contribution to conferencePaper

File
banking
threat
Internet
General Terms
bank

Special Issue: on cybercrime prevention, detection and response

Al-nemrat, A. (ed.) & Weir, G. (ed.), 2013, In : International Journal of Electronic Security and Digital Forensics. 5, 2

Research output: Contribution to journalSpecial issue

electronics
Digital forensics
1 Citations

Strategies for covert Web search

Weir, G. R. S. & Igbako, D., 2013, Fourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013. Piscataway, NJ, United States: IEEE, p. 50-57 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Search engines
World Wide Web
2012
1 Citations

Genre-based information hiding

Ogilvie, R. & Weir, G. R. S., 7 Nov 2012, In : Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. 99, p. 104-111 8 p.

Research output: Contribution to journalArticle

Steganography
Electronic data interchange
Cryptography
Decoding
Internet
1 Citations

Genre-based information hiding

Ogilvie, R. & Weir, G. R. S., 12 Sep 2012, Global Security, Safety and Sustainability & e-Democracy: 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers. Georgiadis, C. K., Jahankhani, H., Pimenidis, E., Bashroush, R. & Al-Nemrat, A. (eds.). Berlin: Springer, Vol. 99. p. 104-111 8 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 99).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Steganography
Electronic data interchange
Cryptography
Decoding
Internet

Issues in Cybercrime, Security and Digital Forensics

Weir, G. (ed.) & Al-nemrat, A. (ed.), 2012, 210 p.

Research output: Book/ReportBook

Security of data
Digital devices
Terrorism
Repair
Digital forensics

Strategies for neutralising sexually explicit language

Weir, G. & Duta, A-M., 30 Oct 2012. 9 p.

Research output: Contribution to conferencePaper

File
Students

The sources of digital evidence

Weir, G. & Mason, S., 15 Nov 2012, Electronic Evidence. Mason, S. (ed.). 3rd ed. p. 1-25 25 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

evidence
electronics
civil law
criminal law
lawyer

Triage in forensic accounting using Zipf's law

Odueke, A. & Weir, G., 2012, Issues in Cybercrime, Security and Digital Forensics. Weir, G. & Al-Nemrat, A. (eds.). Glasgow, p. 33-43 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Experiments
2011

Classifying suspicious content using frequency analysis

Gellineau, O. & Weir, G. R. S., 2011, Corpora and Language Technologies in Teaching, Learning and Research. Weir, G., Ishikawa, S. & Poonpol, K. (eds.). 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Application programs
Experiments

Corpora and language technologies in teaching, learning and research

Weir, G. (ed.), Ishikawa, S. (ed.) & Poonpol, K. (ed.), Sep 2011, Glasgow: University of Strathclyde. 150 p.

Research output: Book/ReportBook

Teaching
language
learning

Cyberforensics: issue and perspectives

Weir, G. (ed.), 2011, Glasgow: University of Strathclyde. 234 p.

Research output: Book/ReportBook

terrorism
vulnerability
offense
threat
evidence

Perceived risk and sensitive data on mobile devices

Lazou, A. & Weir, G., 28 Jun 2011, Cyberforensics: issues and perspectives. Weir, G. R. S. (ed.). Glasgow: University of Strathclyde, p. 183-196 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
File
Smartphones
Mobile devices
Security of data
15 Citations

The threats of social networking: old wine in new bottles?

Weir, G., Toolan, F. & Smeed, D., May 2011, In : Information Security Technical Report. 16, 2, p. 38-43 6 p.

Research output: Contribution to journalArticle

File
Wine
Bottles

Toward music-based data discrimination for cybercrime investigations

Weir, G. R. S. & Rossi, G., 2011, Cyberforensics: Issue and Perspectives. Weir, G. R. S. (ed.). Glasgow: University of Strathclyde, p. 229-234 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Security of data
Digital forensics
2010

A software application for assessing readability in the Japanese EFL context

Ozasa, T., Weir, G. & Fukui, M., 2010, In : Themes in Science and Technology Education. 3, 1-2, p. 91-118 28 p.

Research output: Contribution to journalArticle

Application programs
2 Citations

Balancing the threat of personal technology in the workplace

Garrity, S. & Weir, G. R. S., 2010, In : International Journal of Electronic Security and Digital Forensics. 3, 1, p. 73-81 9 p.

Research output: Contribution to journalArticle

workplace
threat
Computer viruses
larceny
entertainment

Corpus, ICT and Language Education

Weir, G. R. S. & (Eds), S. I., 2010, Glasgow, UK: University of Strathclyde. 246 p.

Research output: Book/ReportBook

teaching analysis
studies (academic)
language education
Japan
language
2 Citations

Hiding the hidden message: approaches to textual steganography

Weir, G. R. S. & Morran, M., 2010, In : International Journal of Electronic Security and Digital Forensics. 3, 3, p. 223-233 11 p.

Research output: Contribution to journalArticle

Steganography
appeal

Learning from Analysis of Japanese EFL Texts

Weir, G. R. S. & Ozasa, T., 2010, In : Educational Perspectives, Journal of the College of Education/University of Hawaii at Manoa. 43, 1 & 2, p. 56-66 11 p.

Research output: Contribution to journalArticle

Open Access
File
textbook
learning
Teaching
history
foreign language