Follow
Diane Gan
Diane Gan
Centre for Sustainable Cyber Security (CS2), University of Greenwich
Verified email at gre.ac.uk
Title
Cited by
Cited by
Year
Cloud-based cyber-physical intrusion detection for vehicles using deep learning
G Loukas, T Vuong, R Heartfield, G Sakellari, Y Yoon, D Gan
Ieee Access 6, 3491-3508, 2017
2782017
Decision tree-based detection of denial of service and command injection attacks on robotic vehicles
TP Vuong, G Loukas, D Gan, A Bezemskij
2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015
902015
You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks
R Heartfield, G Loukas, D Gan
IEEE Access 4, 6910-6928, 2016
872016
Performance evaluation of cyber-physical intrusion detection on a robotic vehicle
TP Vuong, G Loukas, D Gan
2015 IEEE International Conference on Computer and Information Technology …, 2015
672015
Wireless LAN security threats & vulnerabilities
M Waliullah, D Gan
International Journal of Advanced Computer Science and Applications 5 (1), 2014
602014
A review of cyber threats and defence approaches in emergency management
G Loukas, D Gan, T Vuong
Future Internet 5 (2), 205-236, 2013
542013
Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle
A Bezemskij, G Loukas, RJ Anthony, D Gan
2016 15th international conference on ubiquitous computing and …, 2016
512016
Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian networks
A Bezemskij, G Loukas, D Gan, RJ Anthony
2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017
492017
Physical indicators of cyber attacks against a rescue robot
T Vuong, A Filippoupolitis, G Loukas, D Gan
2014 IEEE International Conference on Pervasive Computing and Communication …, 2014
492014
Social networking privacy—Who’s stalking you?
D Gan, LR Jenkins
Future Internet 7 (1), 67-93, 2015
332015
A taxonomy of cyber attack and defence mechanisms for emergency management networks
G Loukas, D Gan, T Vuong
2013 IEEE International Conference on Pervasive Computing and Communications …, 2013
302013
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks
R Heartfield, G Loukas, D Gan
2017 IEEE 15th international conference on software engineering research …, 2017
232017
Social engineering in the internet of everything
D Gan, R Heartfield
Cutter IT Journal 29 (7), 20-29, 2016
222016
Cyber security countermeasures to combat cyber terrorism
L MacKinnon, L Bacon, D Gan, G Loukas, D Chadwick, D Frangiskatos
Strategic intelligence management, 234-257, 2013
222013
Traffic policing in ATM networks with multimedia traffic: the super leaky bucket
D Gan, S McKenzie
Computer Communications 22 (5), 439-450, 1999
151999
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history
DW Gresty, D Gan, G Loukas, C Ierotheou
Digital Investigation 16, S124-S133, 2016
112016
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history
DW Gresty, D Gan, G Loukas, C Ierotheou
Digital Investigation 16, S124-S133, 2016
112016
The V-network: a testbed for malware analysis
MA Ahmad
Science World Journal 14 (3), 70-76, 2019
102019
Threat evaluation based on automatic sensor signal characterisation and anomaly detection
A Bezemskij, RJ Anthony, G Loukas, D Gan
IARIA, 2016
92016
Analysis of attacks using a honeypot
G Kelly, D Gan
International cybercrime, security and digital forensics conference, 2011
82011
The system can't perform the operation now. Try again later.
Articles 1–20