Match!
Kimberly Tam
Plymouth University
VulnerabilityMobile deviceComputer securityMalwareAndroid (operating system)
8Publications
4H-index
335Citations
What is this?
Publications 14
Newest
Last. Kevin D. JonesH-Index: 6
view all 5 authors...
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats. In this paper, we attempt to assist human analysts by automating a single host penetration attack. To do so, a smart agent performs different attack sequences to find vulnerabilities in a target system. As it does so, it accumulates knowledge, learns...
#1Kimberly Tam (Plymouth University)H-Index: 4
#2K Forshaw (Plymouth University)
Last. Kevin D. Jones (Plymouth University)H-Index: 6
view all 3 authors...
Source
#1Kimberly TamH-Index: 4
#2Kevin D. JonesH-Index: 6
#1Kimberly Tam (Plymouth University)H-Index: 4
#2Kevin D. Jones (Plymouth University)H-Index: 6
Forensic investigation is an essential response strategy following a cyber-related incident, and forensic readiness is the capability to gather critical digital information and maximize its use as evidence. The effectiveness of this data is highly dependent on the readiness, quality, and trustworthiness of the data itself. Far from a passive post-analysis tool, there have been many instances where an organization has benefited from gathering, and using, digital evidence to improve their cyber-se...
Source
#1Kimberly TamH-Index: 4
#2Kevin D. JonesH-Index: 6
To ensure the safety of ships and ports, groups and individuals, at all levels of the maritime sector, use analysis to identify potential hazards and their outcomes. One of the most relied upon methods is using a risk assessment tool to define and prioritise threats. A disadvantage of most existing assessment frameworks, however, is their inability to update risks dynamically as factors, such as the environment, change. In the maritime sector, a range of dynamic factors is needed to measure risk...
Source
#1Kimberly Tam (Plymouth University)H-Index: 4
#2Kevin D. Jones (Plymouth University)H-Index: 6
In the current economy, roughly 90% of all world trade is transported by the shipping industry, which is now accelerating its technological growth. While the demand on mariners, ship owners, and the encompassing maritime community for digital advances (particularly towards digitization and automation) has led to efficient shipping operations, maritime cyber-security is a pertinent issue of equal importance. As hackers are becoming increasingly aware of cyber-vulnerabilities within the maritime s...
4 CitationsSource
#1Kimberly Tam (Plymouth University)H-Index: 4
#2Kevin D. Jones (Plymouth University)H-Index: 6
As a $183.3 Billion industry controlling 90 % of all world trade, the shipping community is continuously looking for methods to increase profits while still considering human and environmental safety. As a result of developing technologies and policy that make autonomy a feasible solution, at least three separate organizations are aiming to produce and sail their first autonomous ships by 2020. Thus it is essential to begin assessing their cyber-risk profiles in order to rank and mitigate any vu...
4 CitationsSource
#1Kimberly Tam (Plymouth University)H-Index: 4
#2Kevin D. Jones (Plymouth University)H-Index: 6
ABSTRACTAs the global maritime industry becomes increasingly dependent on advancing technology, it is important for the world to be more aware of, and understand, the possible scope and impacts cyberattacks can have on international shipping. This article explores the maritime-cyber landscape for security flaws related to the area of maritime operations with an emphasis on the system technology involved, how their vulnerabilities enable attacks with cyber elements, and possible outcomes. As ship...
1 CitationsSource
#1Kimberly Tam (RHUL: Royal Holloway, University of London)H-Index: 4
#2Ali Feizollah (UM: University of Malaya)H-Index: 7
Last. Lorenzo Cavallaro (RHUL: Royal Holloway, University of London)H-Index: 21
view all 5 authors...
With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article...
82 CitationsSource
12