Paul Jenkins

Paul Jenkins
  • Doctor of Engineering
  • Senior Lecturer at Cardiff Metropolitan University

About

63
Publications
8,853
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,310
Citations
Current institution
Cardiff Metropolitan University
Current position
  • Senior Lecturer

Publications

Publications (63)
Chapter
As technology advances and AI becomes embedded and accepted into everyday life, the risk of cyberattacks by adversaries increases. These cyberattacks are ubiquitous affecting both businesses and individuals alike, and causing financial and reputational loss as a result. Numerous cyberattack analysis methods are available to analyse the risk of cybe...
Chapter
Understanding the development and execution of a cyberattack is intrinsic in its prevention and mitigation. A suitable cyberattack analysis method can be utilised in analysing cyberattacks. However, not every analysis method can be utilised for analysing every type of cyberattack due to the specific aim, strategy, requirements and skills of an anal...
Chapter
The Metaverse will create an immersive and interoperable virtual universes for user interaction. The advancement of AR/VR technology, brain–computer interfaces (BCIs) via sensor technologies and 5G/6G links, has important implications for the Metaverse as different application domains will be realized sooner than predicted. However, its immersivene...
Article
Self-Sovereign Identity (SSI) empowers users to govern their digital identity and personal data. This approach has changed the identity paradigm where users become the central governor of their identity; hence the rapid growth of the SSI model. Utilizing the security and privacy properties of blockchain, together with other security technologies, S...
Article
The advent of new malware types and their attack vectors poses serious challenges for security experts in discovering effective malware detection and analysis techniques. The preliminary step in malware analysis is filtering out samples of counterfeit malware from the suspicious samples by classifying them into most likely and unlikely malware cate...
Article
Full-text available
A honeypot is a concealed security system that functions as a decoy to entice cyberattackers to reveal their information. Therefore, it is essential to disguise its identity to ensure its successful operation. Nonetheless, cyberattackers frequently attempt to uncover these honeypots; one of the most effective techniques for revealing their identity...
Article
Full-text available
The YARA rules technique is used in cybersecurity to scan for malware, often in its default form, where rules are created either manually or automatically. Creating YARA rules that enable analysts to label files as suspected malware is a highly technical skill, requiring expertise in cybersecurity. Therefore, in cases where rules are either created...
Article
As active network defence systems, honeypots are commonly used as a decoy to inspect attackers and their attack tactics in order to improve the cybersecurity infrastructure of an organisation. A honeypot may be successful provided that it disguises its identity. However, cyberattackers continuously endeavour to discover honeypots for evading any de...
Article
Full-text available
Dynamic fuzzy rule interpolation (D‐FRI) technique delivers a dynamic rule base through the utilisation of fuzzy rule interpolation to infer more accurate results for a given application problem. D‐FRI offered dynamic rule base is very useful in security areas where network conditions are always volatile and require the most updated rule base. A ho...
Chapter
Agile is a project management philosophy for collaborative working which consists of a set of values and principles that can be employed in any sector. It is adopted by the software development community a long time ago and now several methodologies based on agile principles have become established as a method of software development. These agile b...
Book
Dynamic fuzzy rule interpolation (D-FRI) consists of functionalities of fuzzy rule interpolation and dynamically refinement of the fuzzy rule base. It can be integrated with any fuzzy intelligent system to extend the system's capabilities in addition to its normal fuzzy reasoning. Systems security is one of the areas that require dynamic monitoring...
Conference Paper
Big Data security analysis is commonly used for the analysis of large volume security data from an organisational perspective, requiring powerful IT infrastructure and expensive data analysis tools. Therefore, it can be considered to be inaccessible to the vast majority of desktop users and is difficult to apply to their rapidly growing data sets f...
Conference Paper
The Internet of Things (IoT) has been substantially dominated by proprietary and domain specific protocol stacks. There is no universal application protocol for the IoT that can work across many networking interfaces available today. The successful implementation of the IoT requires a single universal application layer protocol for devices and appl...

Network

Cited By