LUCID member has been awarded with the 2018 IEEE Computational Intelligence Society Graduate Research Grant
LUCID is proud to announce that its PGR Student member Shaily Kabir has been awarded with the 2018 IEEE Computational Intelligence Society Graduate Research Grant. This grant is given to deserving PhD students with meritorious projects who seek to carry out their research, therefore, Shaily will work during this coming summer break period with Dr. Timothy C. Havens at the Michigan Technological University (USA).
Based on a collaboration with NTU Singapore, a new paper on leveraging the more faithful tracking of input uncertainty in the context of Quadcopter Unmanned Aerial Vehicle (UAV) control has been accepted for publication in the IEEE/ASME Transactions on Mechatronics.
An early access copy is available via the DOI here:
"Input Uncertainty Sensitivity Enhanced Non-Singleton Fuzzy Logic Controllers for Long-Term Navigation of Quadrotor UAVs": https://doi.org/10.1109/TMECH.2018.2810947
The UK Parliamentary Office of Science and Technology has published a POST note on Communicating Risk, including input on uncertainty by LUCID. For a summary of the note, read on, while summary, key points, and full report are available on the POST website here. "People's responses to risk are shaped by the way that such risks are communicated. Communicating risks effectively can defuse concerns, mitigate disaster situations and build trust with public institutions and organisations. This POSTnote defines the often misunderstood concepts of risk, uncertainty and hazard and describes the key stakeholders communicating it. It examines the factors that shape how people perceive and respond to such risks and summarises evidence on effective risk communication strategies."
LUCID is offering a fully-funded PhD scholarship for a UK or International student. If you are interested in our research, please send an email to christian.wagnerATnottingham.ac.uk, including a brief summary of what you would like to work on during your PhD and why you feel this proposed work would be important. Finally, please include your CV.
We are expecting to make a decision on the scholarship in the very near future, so please send your detail asap.
As part of ongoing collaboration across the UK Cyber Security sector, the LUCID project on 'Leveraging the Multi-Stakeholder Nature of Cyber Security', led by Christian Wagner is collaborating with the Research Institute of Science in Cyber Security (RISCS). See here for an interview with Christian on key aspects of the project including the importance of capturing uncertainty during data collection from security experts.
As part of a new EPSRC funded research project investigating “Leveraging the Multi-Stakeholder Nature of Cyber Security” (EP/P011918/1) on human centred cyber security, working with the NCSC and Carnegie Mellon University (USA), we are exploring novel approaches of capturing and modelling data on the vulnerability of computer systems from a variety of sources, specifically human experts, with the aim of developing new ways of alerting stakeholders to specific areas of cyber security risk in their systems.
To support this project, we are excited to offer two positions for post-doctoral research fellows in cyber security which provide exceptional opportunities to the successful applicants, including working with leading academic and institutional partners in cyber security; being based at one of the leading universities in the UK; benefitting from fully funded residencies at partner institutions including Carnegie Mellon University to support collaboration; and competitive remuneration. The two positions have different foci as follows:
· Research Associate/Fellow in Human-Centric Cyber Security
· Research Associate/Fellow in Data-Driven Cyber Security
fuzzycreator is a toolkit for automatic generation and analysis of fuzzy sets from data. It facilitates the creation of both conventional and non-conventional (non-normal and non-convex) type-1, interval type-2 and general type-2 (zSlices-based) fuzzy sets from data. These fuzzy sets may then be analysed and compared through a series of tools and measures (included in the toolkit), such as evaluating their similarity and distance.
It is now available through the LUCID website at www.lucidresearch.org/software.html
Detailed documentation is available within the toolkit and a high-level overview will be available soon.
Tutorials at Fuzz-IEEE 2017: http://www.fuzzieee2017.org/tutorials.html
To appear in January but available open access here: https://www.researchgate.net/publication/308076698_Interval_Type-2_Fuzzy_Decision_Making
The paper by Saeed Alqahtani and Bob John has just been accepted for presentation at SSCI 2016.
Abstract—The use of Internet has been increasing day by day and the internet traffic is exponentially increasing. The services providers such as web services providers, email services providers, and cloud service providers have to deal with millions of users per second; and thus, the level of threats to their growing networks is also very high. To deal with this much number of users is a big challenge but detection and prevention of such kinds of threats is even more challenging and vital. This is due to the fact that those threats might cause a severe loss to the service providers in terms of privacy leakage or unavailability of the services to the users. To incorporate this issue, several Intrusion Detections Systems (IDS) have been developed that differ in their detection capabilities, performance and accuracy. In this study, we have used SNORT and SURICATA as well-known IDS systems that are used worldwide. The aim of this paper is to analytically compare the functionality, working and the capability of these two IDS systems in order to detect the intrusions and different kinds of cyber-attacks within M yCloud network. Furthermore, this study also proposes a Fuzzy-Logic engine based on these two IDSs in order to enhances the performance and accuracy of these two systems in terms of increased accuracy, specificity, sensitivity and reduced false alarms. Several experiments in this compatrative study have been conducted by using and testing ISCX dataset, which results that fuzzy logic based IDS outperforms IDS alone whereas FL-SnortIDS system outperforms FL-SuricataIDS.
You can download here