Skip to main content

Research Repository

Advanced Search

Dr Lee Speakman's Outputs (14)

An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks (2025)
Journal Article

The widespread use of wireless networks to transfer an enormous amount of sensitive information has caused a plethora of vulnerabilities and privacy issues. The management frames, particularly authentication and association frames, are vulnerable to... Read More about An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks.

FACO: Fuzzy Ant Colony Optimization for Attack Detection in Smart Water Security using Few-Shot Learning (2024)
Presentation / Conference Contribution

In the realm of smart water utilities, the increasing sophistication of cyber threats presents a significant challenge to the security and operational integrity of water and wastewater treatment facilities. These facilities, heavily dependent on Indu... Read More about FACO: Fuzzy Ant Colony Optimization for Attack Detection in Smart Water Security using Few-Shot Learning.

Watchdog Monitoring for Detecting and Handling of Control Flow Hijack on RISC-V-based Binaries (2022)
Journal Article
Oyinloye, T., Speakman, L., Eze, T., & O’Mahony, L. (2022). Watchdog Monitoring for Detecting and Handling of Control Flow Hijack on RISC-V-based Binaries. International Journal of Advanced Computer Science and Applications, 13(8), 10. https://doi.org/10.14569/ijacsa.2022.0130896

Control flow hijacking has been a major challenge in software security. Several means of protections have been developed but insecurities persist. This is because existing protections have sometimes been circumvented while some resilient protections... Read More about Watchdog Monitoring for Detecting and Handling of Control Flow Hijack on RISC-V-based Binaries.

Talos: A prototype Intrusion Detection and Prevention system for profiling ransomware behaviour (2021)
Presentation / Conference Contribution

In this paper, we profile the behaviour and functionality of multiple recent variants of WannaCry and CrySiS/Dharma, through static and dynamic malware analysis. We then analyse and detail the commonly occurring behavioural features of ransomware. Th... Read More about Talos: A prototype Intrusion Detection and Prevention system for profiling ransomware behaviour.

Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond (2018)
Presentation / Conference Contribution

The landscape in which UK policing operates today is a dynamic one, and growing threats such as the proliferation of cyber crime are increasing the demand on police resources. The response to cyber crime by national and regional law enforcement agenc... Read More about Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond.

Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppession and Loop Correction (2009)
Journal Article
Speakman, L., Owada, Y., & Mase, K. (2009). Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppession and Loop Correction. IEICE Transactions on Communications, E92-B(4), 1210-1221. https://doi.org/10.1587/transcom.e92.b.1210

Transient routing loops have been observed to form in Mobile Ad-hoc Networks running the OLSRv2 proactive link-state routing protocol. The packets falling into loops impact the surrounding network thus degrading throughput even though only a small pr... Read More about Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppession and Loop Correction.

An analysis of loop formation in OLSRv2 in ad-hoc networks and limiting its negative impact (2008)
Presentation / Conference Contribution

Transient routing loops have been observed to form in Ad-hoc Networks running the OLSRv2 routing protocol. The looping traffic significantly increases the impact on the surrounding network and its traffic thus degrading end-to-end transmission by a s... Read More about An analysis of loop formation in OLSRv2 in ad-hoc networks and limiting its negative impact.