LUCID - LAB FOR UNCERTAINTY IN DATA AND DECISION MAKING
  • Home
  • Members
  • Projects
  • About
  • Software
  • Photos

LUCID

Lab for uncertainty in Data and
Decision Making
School of Computer Science,
​University of Nottingham

LUCID Cyber Security Project joins UK RISCS

2/10/2017

 
As part of ongoing collaboration across the UK Cyber Security sector, the LUCID project on 'Leveraging the Multi-Stakeholder Nature of Cyber Security', led by Christian Wagner is collaborating with the Research Institute of Science in Cyber Security (RISCS). See here for an interview with Christian on key aspects of the project including the importance of capturing uncertainty during data collection from security experts. 

Cyber Security Jobs @ LUCID

30/5/2017

 
As part of a new EPSRC funded research project investigating “Leveraging the Multi-Stakeholder Nature of Cyber Security” (EP/P011918/1) on human centred cyber security, working with the NCSC and Carnegie Mellon University (USA), we are exploring novel approaches of capturing and modelling data on the vulnerability of computer systems from a variety of sources, specifically human experts, with the aim of developing new ways of alerting stakeholders to specific areas of cyber security risk in their systems.

To support this project, we are excited to offer two positions for post-doctoral research fellows in cyber security which provide exceptional opportunities to the successful applicants, including working with leading academic and institutional partners in cyber security; being based at one of the leading universities in the UK; benefitting from fully funded residencies at partner institutions including Carnegie Mellon University to support collaboration; and competitive remuneration. The two positions have different foci as follows:

·         Research Associate/Fellow in Human-Centric Cyber Security
·         Research Associate/Fellow in Data-Driven Cyber Security

fuzzycreator - A Toolkit for Creating and Analysing Fuzzy Sets

16/2/2017

 
fuzzycreator is a toolkit for automatic generation and analysis of fuzzy sets from data. It facilitates the creation of both conventional and non-conventional (non-normal and non-convex) type-1, interval type-2 and general type-2 (zSlices-based) fuzzy sets from data. These fuzzy sets may then be analysed and compared through a series of tools and measures (included in the toolkit), such as evaluating their similarity and distance.
It is now available through the LUCID website at www.lucidresearch.org/software.html
Detailed documentation is available within the toolkit and a high-level overview will be available soon.

LUCID members give tutorial

25/11/2016

 
Tutorials at Fuzz-IEEE 2017: http://www.fuzzieee2017.org/tutorials.html ​

Interval type-2 fuzzy decision making

10/10/2016

 

To appear in January but available open access here:  https://www.researchgate.net/publication/308076698_Interval_Type-2_Fuzzy_Decision_Making
Picture

 Paper on Fuzzy Classifiers for Cloud Intrusion Detection Systems accepted for SSCI 2016

10/10/2016

 
The paper by Saeed Alqahtani and Bob John has just been accepted for presentation at SSCI 2016. 

Abstract—The use of Internet has been increasing day by day and the internet traffic is exponentially increasing. The services providers such as web services providers, email services providers, and cloud service providers have to deal with millions of users per second; and thus, the level of threats to their growing networks is also very high. To deal with this much number of users is a big challenge but detection and prevention of such kinds of threats is even more challenging and vital. This is due to the fact that those threats might cause a severe loss to the service providers in terms of privacy leakage or unavailability of the services to the users. To incorporate this issue, several Intrusion Detections Systems (IDS) have been developed that differ in their detection capabilities, performance and accuracy. In this study, we have used SNORT and SURICATA as well-known IDS systems that are used worldwide. The aim of this paper is to analytically compare the functionality, working and the capability of these two IDS systems in order to detect the intrusions and different kinds of cyber-attacks within M yCloud network. Furthermore, this study also proposes a Fuzzy-Logic engine based on these two IDSs in order to enhances the performance and accuracy of these two systems in terms of increased accuracy, specificity, sensitivity and reduced false alarms. Several experiments in this compatrative study have been conducted by using and testing ISCX dataset, which results that fuzzy logic based IDS outperforms IDS alone whereas FL-SnortIDS system outperforms FL-SuricataIDS.

​You can download here

Paper on an Agreement Ratio of Fuzzy Sets accepted to IEEE SSCI 2016

5/10/2016

 

The paper "Measuring Agreement on Linguistic Expressions in Medical Treatment Scenarios" by Javier Navarro, Christian Wagner, Uwe Aickelin, Lynsey Green and Robert Ashford has been accepted to the 2016 IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2016) which will be held in Athens, Greece in December 2016. This paper comes from a study made in collaboration with the East Midlands Sarcoma Service, Nottingham University Hospitals.

Abstract of the paper is included below. A full version of the paper will be made available after final amendments.

Abstract: Quality of life assessment represents a key process of deciding treatment success and viability. As such, patients' perceptions of their functional status and well-being are important inputs for impairment assessment. Given that patient completed questionnaires are often used to assess patient status and determine future treatment options, it is important to know the level of agreement of the words used by patients and different groups of medical professionals. In this paper, we propose a measure called the Agreement Ratio which provides a ratio of overall agreement when modelling words through Fuzzy Sets (FSs). The measure has been specifically designed for assessing this agreement in fuzzy sets which are generated from data such as patient responses. The measure relies on using the Jaccard Similarity Measure for comparing the different levels of agreement in the FSs generated. Synthetic examples are provided in order to show how to calculate the measure for given Fuzzy Sets. An application to real-world data is provided as well as a discussion about the results and the potential of the proposed measure.

Paper on Improving Cyber Security Assessments accepted to IEEE SSCI 2016

4/10/2016

 
The paper "Improving Security Requirement Adequacy" by Hanan Hibishi, Travis D. Breaux and Christian Wagner has been accepted to the 2016 IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2016) will be held in Athens, Greece in December 2016. The paper has resulted from a recent collaboration between Carnegie Mellon and Nottingham Universities, with Hanan visiting Nottingham in early 2016.
Full title and abstract are included below. A full version of the paper will be available soon.
Title: Improving Security Requirement Adequacy - An Interval Type 2 Fuzzy Logic Security Assessment System
Abstract: Organizations rely on security experts to improve the security of their systems. These professionals use background knowledge and experience to align known threats and vulnerabilities before selecting mitigation options. The substantial depth of expertise in any one area (e.g., databases, networks, operating systems) precludes the possibility that an expert would have complete knowledge about all threats and vulnerabilities. To begin addressing this problem of fragmented knowledge, we investigate the challenge of developing a security requirements rule base that mimics multi-human expert reasoning to enable new decision-support systems.  In this paper, we show how to collect relevant information from cyber security experts to enable the generation of: (1) interval type-2 fuzzy sets that capture intra- and inter-expert uncertainty around vulnerability levels; and (2) fuzzy logic rules driving the decision-making process within the requirements analysis. The proposed method relies on comparative ratings of security requirements in the context of concrete vignettes, providing a novel, interdisciplinary approach to knowledge generation for fuzzy logic systems. The paper presents an initial evaluation of the proposed approach through 52 scenarios with 13 experts to compare their assessments to those of the fuzzy logic decision support system. The results show that the system provides reliable assessments to the security analysts, in particular, generating more conservative assessments in 19% of the test scenarios compared to the experts’ ratings.

Fuzzy Logic in R

3/10/2016

 
Tajul and Chao have released a new version of FuzzyR! https://CRAN.R-project.org/package=FuzzyR ​

Keynote Talk by Prof. Jon Garibaldi

29/9/2016

 
Prof. Jon Garibaldi is giving a keynote presentation at CEEC 2016, the 8th Computer Science & Electronic Engineering Conference taking place at University of Essex, UK, on Friday 30th September. Copies of his slides will be posted here soon after the talk.
<<Previous
Forward>>

    LUCID BLOG

    News, Ideas and Comments around our work.

    Archives

    November 2021
    February 2021
    October 2020
    April 2020
    March 2020
    February 2020
    October 2019
    July 2019
    June 2019
    April 2019
    February 2019
    December 2018
    October 2018
    September 2018
    August 2018
    July 2018
    May 2018
    March 2018
    November 2017
    October 2017
    May 2017
    February 2017
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016

    Categories

    All
    Fuzzy Sets
    Publications

    RSS Feed

Proudly powered by Weebly
  • Home
  • Members
  • Projects
  • About
  • Software
  • Photos