Lowri Williams
Lowri Williams
Home
News
Supervision
Teaching
Publications
Funding
Contact
Light
Dark
Automatic
2
The Evolution of Digital Security by Design Using Temporal Network Analysis
Digital Security by Design (DSbD) is an initiative supported by the UK government aimed at transforming digital technology to deliver …
Lowri Williams
,
Hamza Khan
,
Pete Burnap
Cite
DOI
The Evolution of Digital Security by Design Using Temporal Network Analysis
This paper presents a data-driven analysis of the evolving landscape of DSbD from 2019 to 2024, gathering insights from textual …
Lowri Williams
,
Hamza Khan
,
Pete Burnap
Jan 17, 2025
Cite
DOI
Uncovering Key Factors That Drive the Impressions of Online Emerging Technology Narratives
Social media platforms play a significant role in facilitating business decision making, especially in the context of emerging …
Lowri Williams
,
Eirini Anthi
,
Pete Burnap
Cite
DOI
Uncovering Key Factors That Drive the Impressions of Online Emerging Technology Narratives
This paper presents a data-driven framework to identify and quantify the influence of such features on the visibility and impact of …
Lowri Williams
,
Eirini Anthi
,
Pete Burnap
Nov 5, 2024
Cite
DOI
Investigating Radio Frequency Vulnerabilities in the Internet of Things (IoT)
With the increase in the adoption of Internet of Things (IoT) devices, the security threat they face has become more pervasive. Recent …
Eirini Anthi
,
Lowri Williams
,
Vasilis Ieropoulos
,
Theodoros Spyridopoulos
Cite
DOI
Investigating Radio Frequency Vulnerabilities in the Internet of Things (IoT)
This paper explores security vulnerabilities that target RF communications on popular commercial IoT devices such as Wi-Fi, Zigbee, and …
Eirini Anthi
,
Lowri Williams
,
Vasilis Ieropoulos
,
Theodoros Spyridopoulos
Jun 6, 2024
Cite
DOI
Mapping Automated Cyber Attack Intelligence to Context-based Impact on System-level Goals
Traditionally, cyber risk assessment considers system-level risk separately from individual component-level risk, i.e., devices, data, …
Pete Burnap
,
Eirini Anthi
,
Phillip Reinecke
,
Lowri Williams
,
Fengnian Cao
,
Rakan Aldmoura
,
Kevin Jones
Cite
DOI
Severity-oriented Multiclass Drone Flight Logs Anomaly Detection
The availability of log data recorded by computer-based systems such as operating system and network logs, makes it possible for the …
Swardiantara Silalahi
,
Tohari Ahmad
,
Hudan Studiawan
,
Eirini Anthi
,
Lowri Williams
Cite
DOI
Topic Modelling: Going Beyond Token Outputs
Topic modelling is a text mining technique for identifying salient themes from a number of documents. The output is commonly a set of …
Lowri Williams
,
Eirini Anthi
,
Laura Arman
,
Pete Burnap
Cite
DOI
A Scalable and Automated Framework for Tracking the likely Adoption of Emerging Technologies
While new technologies are expected to revolutionise and become game-changers in improving the efficiencies and practises of our daily …
Lowri Williams
,
Eirini Anthi
,
Pete Burnap
Cite
DOI
»
Cite
×