Items where Division is "College of Business and Social Sciences > Aston Business School > Cyber Security Innovation (CSI) Research Centre" and Year is 2025
Up a levelA
Adamyk, Bogdan, Benson, Vladlena, Adamyk, Oksana and Liashenko, Oksana (2025). Risk Management in DeFi: Analyses of the Innovative Tools and Platforms for Tracking DeFi Transactions. Journal of Risk and Financial Management, 18 (1),
Adamyk, Bogdan, Benson, Vladlena, Adamyk, Oksana, Shevchuk, Ruslan, Al-Khateeb, Haider and Fraczek, Bożena (2025). Enhancing European Cyber Forensics: A Computational Intelligence Approach for Detecting Illicit Money Flows. IN: 2025 15th International Conference on Advanced Computer Information Technologies (ACIT). Proceedings from the International Conference on Advanced Computer Information Technologies (ACIT) . IEEE.
Adamyk, Bogdan, Benson, Vladlena, Shevchuk, Ruslan, Al-Khateeb, Haider, Grydzhuk, Dmytro and Adamyk, Oksana (2025). AI-Driven Reasoning Mechanism for Enhanced Detection of Illicit Money Flows. IN: 2025 15th International Conference on Advanced Computer Information Technologies (ACIT). Proceedings from the International Conference on Advanced Computer Information Technologies (ACIT) . IEEE.
Ahmadi‐Assalemi, Gabriela, Al‐Khateeb, Haider, Benson, Vladlena, Adamyk, Bogdan and Ammi, Meryem (2025). Adaptive learning anomaly detection and classification model for cyber and physical threats in industrial control systems. IET Cyber-Physical Systems: Theory & Applications, 10 (1),
Alhaboby, Zhraa, Rouse, Lorna, Hadley, Robin, Vijaykumar, Elango and Al-Khateeb, Haider (2025). Healthcare Consultations for People with Chronic Conditions and Disabilities: Managing Cyber-Victimisation Impact and Training Needs. Health Services Insights, 18 ,
B
Blake, John, Miah, Abu Saleh Musa, Kredens, Krzysztof and Shin, Jungpil (2025). Detection of AI-generated Texts: A Bi-LSTM and Attention-Based Approach. IEEE Access, 13 , pp. 71563-71576.
C
Cao, Guangming, Duan, Yanqing and Edwards, John S. (2025). Organizational culture, digital transformation, and product innovation. Information and Management, 62 (4),
Chiang, Emily, Kredens, Krzysztof and Thornton, John (2025). Fighting fraud: Corpus-assisted approaches to understanding and disrupting fraud activity on the dark web. Applied Corpus Linguistics, 5 (3),
K
Kasianchuk, Mykhailo, Shevchuk, Ruslan, Adamyk, Bogdan, Benson, Vladlena, Shylinska, Inna and Holembiovskyi, Mykhailo (2025). Affine Cipher Encryption Technique Using Residue Number System. Cryptography, 9 (2),
S
Shevchuk, Ruslan, Martsenyuk, Vasyl, Adamyk, Bogdan, Benson, Vladlena and Melnyk, Andriy (2025). Anomaly Detection in Blockchain: A Systematic Review of Trends, Challenges, and Future Directions. Applied Sciences, 15 (15),