Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ... Computers & Security 105, 102248, 2021 | 841 | 2021 |
Security and privacy in the internet of things C Maple Journal of cyber policy 2 (2), 155-184, 2017 | 404 | 2017 |
A survey of localization in wireless sensor network L Cheng, C Wu, Y Zhang, H Wu, M Li, C Maple International Journal of Distributed Sensor Networks 8 (12), 962523, 2012 | 382 | 2012 |
SAFA: A semi-asynchronous protocol for fast federated learning with low overhead W Wu, L He, W Lin, R Mao, C Maple, S Jarvis IEEE Transactions on Computers 70 (5), 655-668, 2020 | 350 | 2020 |
Comparative analysis of machine learning techniques for predicting air quality in smart cities S Ameer, MA Shah, A Khan, H Song, C Maple, SU Islam, MN Asghar IEEE Access 7, 128325-128338, 2019 | 271 | 2019 |
The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence H He, C Maple, T Watson, A Tiwari, J Mehnen, Y Jin, B Gabrys 2016 IEEE congress on evolutionary computation (CEC), 1015-1021, 2016 | 202 | 2016 |
Geometric design and space planning using the marching squares and marching cube algorithms C Maple 2003 international conference on geometric modeling and graphics, 2003 …, 2003 | 181 | 2003 |
Synthetic Data--what, why and how? J Jordon, L Szpruch, F Houssiau, M Bottarelli, G Cherubin, C Maple, ... arXiv preprint arXiv:2205.03257, 2022 | 180 | 2022 |
Motivation and opportunity based model to reduce information security insider threats in organisations NS Safa, C Maple, T Watson, R Von Solms Journal of information security and applications 40, 247-257, 2018 | 178 | 2018 |
A novel internet of things-enabled accident detection and reporting system for smart city environments F Bhatti, MA Shah, C Maple, SU Islam Sensors 19 (9), 2071, 2019 | 176 | 2019 |
Governing AI safety through independent audits G Falco, B Shneiderman, J Badger, R Carrier, A Dahbura, D Danks, ... Nature Machine Intelligence 3 (7), 566-571, 2021 | 172 | 2021 |
Intrusion detection systems for intra-vehicle networks: A review OY Al-Jarrah, C Maple, M Dianati, D Oxtoby, A Mouzakitis IEEE Access 7, 21266-21289, 2019 | 171 | 2019 |
A novel bio-inspired hybrid algorithm (NBIHA) for efficient resource management in fog computing H Rafique, MA Shah, SU Islam, T Maqsood, S Khan, C Maple IEEE Access 7, 115760-115773, 2019 | 169 | 2019 |
A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem V Viduto, C Maple, W Huang, D López-Peréz Decision Support Systems 53 (3), 599-610, 2012 | 150 | 2012 |
Deterrence and prevention-based model to mitigate information security insider threats in organisations NS Safa, C Maple, S Furnell, MA Azad, C Perera, M Dabbagh, M Sookhak Future Generation Computer Systems 97, 587-597, 2019 | 132 | 2019 |
A logitboost-based algorithm for detecting known and unknown web attacks MH Kamarudin, C Maple, T Watson, NS Safa IEEE Access 5, 26190-26200, 2017 | 115 | 2017 |
Distributed ledger technologies in supply chain security management: a comprehensive survey M Asante, G Epiphaniou, C Maple, H Al-Khateeb, M Bottarelli, KZ Ghafoor IEEE Transactions on Engineering Management, 2021 | 105 | 2021 |
Digital twins for precision healthcare G Ahmadi-Assalemi, H Al-Khateeb, C Maple, G Epiphaniou, ZA Alhaboby, ... Cyber defence in the age of AI, Smart societies and augmented humanity, 133-158, 2020 | 100 | 2020 |
Threat modelling for industrial cyber physical systems in the era of smart manufacturing M Jbair, B Ahmad, C Maple, R Harrison Computers in Industry 137, 103611, 2022 | 94 | 2022 |
A novel hybrid tabu search approach to container loading J Liu, Y Yue, Z Dong, C Maple, M Keech Computers & Operations Research 38 (4), 797-807, 2011 | 90 | 2011 |