A generic model of 1-60 GHz radio propagation through vegetation-final report NC Rogers, A Seville, J Richter, D Ndzi, N Savage, RFS Caldeirinha, ... Radio Agency, UK 152, 152, 2002 | 92 | 2002 |
Radio wave propagation through vegetation: Factors influencing signal attenuation N Savage, D Ndzi, A Seville, E Vilar, J Austin Radio Science 38 (5), 9-1-9-14, 2003 | 76 | 2003 |
Motivation of engineering students in higher education N Savage, R Birch, E Noussi Engineering education 6 (2), 39-46, 2011 | 63 | 2011 |
The Tor dark net G Owen, N Savage | 58 | 2015 |
A generic model of 1–60 GHz radio propagation through vegetation NC Rogers, A Seville, J Richter, D Ndzi, N Savage, RFS Caldeirinha, ... Final Report Radio Agency, UK, 2002 | 58 | 2002 |
Energy efficiency in underwater sensor networks: A research review K Ovaliadis, N Savage, V Kanakaris Journal of Engineering Science and Technology Review (JESTR) 3 (1), 151-156, 2010 | 53 | 2010 |
Empirical analysis of Tor hidden services G Owen, N Savage IET Information Security 10 (3), 113-118, 2016 | 52 | 2016 |
A generic narrowband model for radiowave propagation through vegetation J Richter, RFS Caldeirinha, MO Al-Nuaimi, A Seville, NC Rogers, ... 2005 IEEE 61st Vehicular Technology Conference 1, 39-43, 2005 | 42 | 2005 |
Big data security analysis approach using computational intelligence techniques in R for desktop users N Naik, P Jenkins, N Savage, V Katos 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016 | 22 | 2016 |
Cyberthreat Hunting-Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules N Naik, P Jenkins, N Savage, L Yang 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019 | 16 | 2019 |
Cluster protocols in underwater sensor networks: A research review N Savage, K Ovaliadis Journal of Engineering Science and Technology Review (JESTR) 7 (3), 171-175, 2014 | 15 | 2014 |
Forensic live response and event reconstruction methods in Linux systems F Olajide, N Savage, D Ndzi, H Al-Sinani PGNET 2009: The 10th Annual PostGraduate Symposium on The Convergence of …, 2009 | 15 | 2009 |
An evaluation of motivation in engineering students, employing self-determination theory N Savage, R Birch Innovation, Good practice and research in engineering education 1 (10), 2008 | 14 | 2008 |
Graphical authentication based on user behaviour A Al-Khazzar, N Savage 2010 International Conference on Security and Cryptography (SECRYPT), 1-4, 2010 | 13 | 2010 |
Application level evidence from volatile memory F Olajide, N Savage Journal of Computing in Systems and Engineering 10, 171-175, 2009 | 13 | 2009 |
Underwater sensor network simulation tool (USNeT) K Ovaliadis, N Savage International Journal of Computer Applications 71 (22), 2013 | 12 | 2013 |
Cyberthreat hunting-part 2: Tracking ransomware threat actors using fuzzy hashing and fuzzy c-means clustering N Naik, P Jenkins, N Savage, L Yang 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019 | 11 | 2019 |
Threat-aware honeypot for discovering and predicting fingerprinting attacks using principal components analysis N Naik, P Jenkins, N Savage 2018 IEEE Symposium Series on Computational Intelligence (SSCI), 623-630, 2018 | 10 | 2018 |
On the extraction of forensically relevant information from physical memory F Olajide, N Savage 2011 World Congress on Internet Security (WorldCIS-2011), 248-252, 2011 | 10 | 2011 |
Spatial and temporal variation of wideband indoor channels DL Ndzi, N Savage, B Gremont International Journal of Antennas and Propagation 2010, 2010 | 9 | 2010 |