| Motivation of engineering students in higher education N Savage, R Birch, E Noussi Engineering education 6 (2), 39-46, 2011 | 149 | 2011 |
| The tor dark net GH Owenson, NJ Savage | 140 | 2015 |
| Deep learning based fusion approach for hate speech detection Y Zhou, Y Yang, H Liu, X Liu, N Savage IEEE Access 8, 128923-128929, 2020 | 134 | 2020 |
| Radio wave propagation through vegetation: Factors influencing signal attenuation N Savage, D Ndzi, A Seville, E Vilar, J Austin Radio Science 38 (5), 9-1-9-14, 2003 | 120 | 2003 |
| Empirical analysis of tor hidden services G Owen, N Savage IET Information Security 10 (3), 113-118, 2016 | 111 | 2016 |
| A generic model of 1-60 GHz radio propagation through vegetation-final report NC Rogers, A Seville, J Richter, D Ndzi, N Savage, R Caldeirinha, ... Radio Agency, UK 152, 152, 2002 | 108 | 2002 |
| A generic model of 1–60 GHz radio propagation through vegetation NC Rogers, A Seville, J Richter, D Ndzi, N Savage, RFS Caldeirinha, ... Final Report. QinetiQ for the UK Radiocommunications Agency, Malvern …, 2002 | 77 | 2002 |
| Energy efficiency in underwater sensor networks: A research review K Ovaliadis, N Savage, V Kanakaris Journal of Engineering Science and Technology Review (JESTR) 3 (1), 151-156, 2010 | 68 | 2010 |
| A generic narrowband model for radiowave propagation through vegetation J Richter, RFS Caldeirinha, MO Al-Nuaimi, A Seville, NC Rogers, ... 2005 IEEE 61st Vehicular Technology Conference 1, 39-43, 2005 | 48 | 2005 |
| Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On, K Naik, ... Complex & Intelligent Systems 7 (2), 687-702, 2021 | 42 | 2021 |
| Cyberthreat Hunting-Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules N Naik, P Jenkins, N Savage, L Yang 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019 | 39 | 2019 |
| Fuzzy-import hashing: A static analysis technique for malware detection N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On Forensic Science International: Digital Investigation 37, 301139, 2021 | 37 | 2021 |
| Airborne measurements of trace gases and aerosols over the London metropolitan region GR McMeeking, M Bart, P Chazette, JM Haywood, JR Hopkins, ... Atmospheric Chemistry and Physics 12 (11), 5163-5187, 2012 | 37 | 2012 |
| A novel approach to detect phishing attacks using binary visualisation and machine learning L Barlow, G Bendiab, S Shiaeles, N Savage 2020 IEEE World Congress on Services (SERVICES), 177-182, 2020 | 35 | 2020 |
| A ransomware detection method using fuzzy hashing for mitigating the risk of occlusion of information systems N Naik, P Jenkins, N Savage 2019 international symposium on systems engineering (ISSE), 1-6, 2019 | 33 | 2019 |
| Cyberthreat hunting-part 2: Tracking ransomware threat actors using fuzzy hashing and fuzzy c-means clustering N Naik, P Jenkins, N Savage, L Yang 2019 IEEE international conference on fuzzy systems (FUZZ-IEEE), 1-6, 2019 | 33 | 2019 |
| Mitigating insider threats using bio-inspired models A Nicolaou, S Shiaeles, N Savage Applied Sciences 10 (15), 5046, 2020 | 31 | 2020 |
| Big data security analysis approach using computational intelligence techniques in R for desktop users N Naik, P Jenkins, N Savage, V Katos 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016 | 30 | 2016 |
| Fuzzy-Import Hashing: A malware analysis approach N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-8, 2020 | 28 | 2020 |
| Fuzzy hashing aided enhanced YARA rules for malware triaging N Naik, P Jenkins, N Savage, L Yang, K Naik, J Song, T Boongoen, ... 2020 IEEE Symposium Series on Computational Intelligence (SSCI), 1138-1145, 2020 | 27 | 2020 |