Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Natalie Clewley is active.

Publication


Featured researches published by Natalie Clewley.


Neurocomputing | 2013

Effects-based feature identification for network intrusion detection

Panos Louvieris; Natalie Clewley; Xiaohui Liu

Intrusion detection systems (IDS) are an important element in a networks defences to help protect against increasingly sophisticated cyber attacks. IDS that rely solely on a database of stored known attacks are no longer sufficient for effectively detecting modern day threats. This paper presents a novel anomaly detection technique that can be used to detect previously unknown attacks on a network by identifying attack features. This effects-based feature identification method uniquely combines k-means clustering, Naive Bayes feature selection and C4.5 decision tree classification for pinpointing cyber attacks with a high degree of accuracy in order to increase the situational awareness of cyber network operators.


Online Information Review | 2009

Evaluation of the credibility of internet shopping in the UK

Natalie Clewley; Sherry Y. Chen; Xiaohui Liu

Purpose – The purpose of this paper is to examine the credibility of internet shopping. Credibility, which refers to the believability of information, is an important consideration of internet shopping.Design/methodology/approach – The evaluation is conducted by incorporating Foggs 10 Stanford Guidelines for Web Credibility into Nielsens heuristic evaluation. Furthermore, security and individualisation are considered as additional heuristics. Evaluation criteria are developed based on these 12 heuristics. Three UK car insurance web sites are selected for evaluation, including the AA, Norwich Union and Tesco.Findings – The results show that the Norwich Union site seems to be the most credible while the Tesco site appears to be the least credible. The most significant credibility problems are found to lie in the areas of “trustworthiness”, “expertise” and “real‐world feel”. In other words, these three areas are key issues for future improvement of these sites.Originality/value – This paper contributes to ...


international conference on cyber conflict | 2014

Dynamic cyber-incident response

Kevin Mepham; Panos Louvieris; Gheorghita Ghinea; Natalie Clewley

Traditional cyber-incident response models have not changed significantly since the early days of the Computer Incident Response with even the most recent incident response life cycle model advocated by the US National Institute of Standards and Technology (Cichonski, Millar, Grance, & Scarfone, 2012) bearing a striking resemblance to the models proposed by early leaders in the field e.g. Carnegie-Mellon University (West-Brown, et al., 2003) and the SANS Institute (Northcutt, 2003). Whilst serving the purpose of producing coherent and effective response plans, these models appear to be created from the perspectives of Computer Security professionals with no referenced academic grounding. They attempt to defend against, halt and recover from a cyber-attack as quickly as possible. However, other actors inside an organisation may have priorities which conflict with these traditional approaches and may ultimately better serve the longer-term goals and objectives of an organisation.


Journal of Documentation | 2010

Cognitive styles and search engine preferences: Field dependence/independence vs holism/serialism

Natalie Clewley; Sherry Y. Chen; Xiaohui Liu


Educational Technology & Society | 2011

Mining Learning Preferences in Web-Based Instruction: Holists vs. Serialists

Natalie Clewley; Sherry Y. Chen; Xiaohui Liu


international conference on information fusion | 2013

A Markov multi-phase transferable belief model: An application for predicting data exfiltration APTs

Georgios Ioannou; Panos Louvieris; Natalie Clewley; Gavin Powell


systems, man and cybernetics | 2009

Cognitive styles and web-based instruction: Field dependent/independent vs. Holist/Serialist

Natalie Clewley; Sherry Y. Chen; Xiaohui Liu


european conference on information systems | 2014

CYBERSECURITY INFORMATION SHARING: A FRAMEWORK FOR SUSTAINABLE INFORMATION SECURITY MANAGEMENT IN UK SME SUPPLY CHAINS

Riyana Lewis; Panos Louvieris; Pamela Abbott; Natalie Clewley; Kevin Jones


Archive | 2014

Digital Personhood Research Landscape (Impact)

Nicola Osborne; Gaynor Bagnall; Chris Bevan; Pamela Briggs; Mike J. Chantler; Natalie Clewley; Elaine Farrow; Garry Graham; Audrey Guinchard; Hazel Hall; Tracy Harwood; Andrew Hoskins; A Hudson-Smith; Amelia Jupit; Nadja Kanellopoulou; Shaun W. Lawson; Mark Levine; Panos Louvieris; Sophia Lycouris; Sarah Martindale; Tom Methven; Stefano Padilla; Calvin Taylor; Len Tiu Wright; Gillian Youngs


Archive | 2014

Digital Personhood Research Landscape

Nicola Osborne; Gaynor Bagnall; Chris Bevan; Pamela Briggs; Mike J. Chantler; Natalie Clewley; Elaine Farrow; Garry Graham; Audrey Guinchard; Hazel Hall; Tracy Harwood; Andrew Hoskins; A Hudson-Smith; Amelia Jupit; Nadja Kanellopoulou; Shaun W. Lawson; Mark Levine; Panos Louvieris; Sophia Lycouris; Sarah Martindale; Tom Methven; Stefano Padilla; Calvin Taylor; Len Tiu Wright; Gillian Youngs

Collaboration


Dive into the Natalie Clewley's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sherry Y. Chen

National Central University

View shared research outputs
Top Co-Authors

Avatar

A Hudson-Smith

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge