[go: up one dir, main page]

Follow
Nick Savage
Nick Savage
University of Portsmouth
Verified email at tryhackme.com
Title
Cited by
Cited by
Year
Motivation of engineering students in higher education
N Savage, R Birch, E Noussi
Engineering education 6 (2), 39-46, 2011
1492011
The tor dark net
GH Owenson, NJ Savage
1402015
Deep learning based fusion approach for hate speech detection
Y Zhou, Y Yang, H Liu, X Liu, N Savage
IEEE Access 8, 128923-128929, 2020
1342020
Radio wave propagation through vegetation: Factors influencing signal attenuation
N Savage, D Ndzi, A Seville, E Vilar, J Austin
Radio Science 38 (5), 9-1-9-14, 2003
1202003
Empirical analysis of tor hidden services
G Owen, N Savage
IET Information Security 10 (3), 113-118, 2016
1112016
A generic model of 1-60 GHz radio propagation through vegetation-final report
NC Rogers, A Seville, J Richter, D Ndzi, N Savage, R Caldeirinha, ...
Radio Agency, UK 152, 152, 2002
1082002
A generic model of 1–60 GHz radio propagation through vegetation
NC Rogers, A Seville, J Richter, D Ndzi, N Savage, RFS Caldeirinha, ...
Final Report. QinetiQ for the UK Radiocommunications Agency, Malvern …, 2002
772002
Energy efficiency in underwater sensor networks: A research review
K Ovaliadis, N Savage, V Kanakaris
Journal of Engineering Science and Technology Review (JESTR) 3 (1), 151-156, 2010
682010
A generic narrowband model for radiowave propagation through vegetation
J Richter, RFS Caldeirinha, MO Al-Nuaimi, A Seville, NC Rogers, ...
2005 IEEE 61st Vehicular Technology Conference 1, 39-43, 2005
482005
Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis
N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On, K Naik, ...
Complex & Intelligent Systems 7 (2), 687-702, 2021
422021
Cyberthreat Hunting-Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019
392019
Fuzzy-import hashing: A static analysis technique for malware detection
N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On
Forensic Science International: Digital Investigation 37, 301139, 2021
372021
Airborne measurements of trace gases and aerosols over the London metropolitan region
GR McMeeking, M Bart, P Chazette, JM Haywood, JR Hopkins, ...
Atmospheric Chemistry and Physics 12 (11), 5163-5187, 2012
372012
A novel approach to detect phishing attacks using binary visualisation and machine learning
L Barlow, G Bendiab, S Shiaeles, N Savage
2020 IEEE World Congress on Services (SERVICES), 177-182, 2020
352020
A ransomware detection method using fuzzy hashing for mitigating the risk of occlusion of information systems
N Naik, P Jenkins, N Savage
2019 international symposium on systems engineering (ISSE), 1-6, 2019
332019
Cyberthreat hunting-part 2: Tracking ransomware threat actors using fuzzy hashing and fuzzy c-means clustering
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE international conference on fuzzy systems (FUZZ-IEEE), 1-6, 2019
332019
Mitigating insider threats using bio-inspired models
A Nicolaou, S Shiaeles, N Savage
Applied Sciences 10 (15), 5046, 2020
312020
Big data security analysis approach using computational intelligence techniques in R for desktop users
N Naik, P Jenkins, N Savage, V Katos
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
302016
Fuzzy-Import Hashing: A malware analysis approach
N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On
2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-8, 2020
282020
Fuzzy hashing aided enhanced YARA rules for malware triaging
N Naik, P Jenkins, N Savage, L Yang, K Naik, J Song, T Boongoen, ...
2020 IEEE Symposium Series on Computational Intelligence (SSCI), 1138-1145, 2020
272020
The system can't perform the operation now. Try again later.
Articles 1–20