Computer Intrusions, Forensics and Exploitations Research
Loophole analysis: An algorithm that was developed to be used for the discovery of potential security flaws during requirements engineering. Aspects of the research findings have been implemented in an application called DevAssist that has been deployed in industry.
Multi-perspective machine learning: An approach to the classification of cyber threats using a machine learning ensemble method. Work has been focused on the application of the approach to botnets.
Business readable formal software specification: The implementation of a machine based translator that takes an expressive, business readable language that we are developing, and facilitates analysis using Alloy based tools and multiple output formats for composition and presentation.
A standardized procedure for conceptualizing and completing user stories: A generic set of steps that are aimed at standardizing the procedure utilized in documenting a user story during requirements engineering in agile software development.
Busby-Earle, C. and France, R.B: ‘Discovering potential interaction violations among requirements’. Published as Advanced Information Systems Engineering Workshops: CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings (Lecture Notes in Business Information Processing), 249, 1st ed., J. Krogstie, H. Mouratidis and J. Su Eds. Springer, 2016, ch. 23, pp 243-253.
Miller, S. and Busby-Earle, C.: ‘The Impact of different botnet flow feature subsets on prediction accuracy using supervised and unsupervised learning methods’. In Journal of Internet Technology and Secured Transaction, 5(2), June 2016
Fokum, D., Coore, D. and Busby-Earle, C. : ‘Learner Autonomy as a Means to Improve Pass Rates among First-Year Computing Students’. In UWI Quality Education Forum Journal 21, 2016. OBUS, Mona, Jamaica
Busby-Earle, C. and Mugisa, E.K:`Identifying potential security flaws using loophole analysis and the SECREt'. In GSTF International Journal on Computing, 1(2), February 2011
Miller, S. and Busby-Earle, C.,: ‘Multi-Perspective Machine Learning A Classifier Ensemble method for intrusion detection’. Proceedings of the International Conference on Machine Learning and Soft Computing (ICMLSC2017), Ho Chi Minh City, Vietnam. ACM, January 13-16, 2017
Miller, S. and Busby-Earle, C.,: ‘The Role of Machine Learning in Botnet Detection’. Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Barcelona, Spain, December 5-7, 2016
John, S. and Busby-Earle, C., : 'The Random Gate Principle'. Proceedings of the Ninth International Conference on Emerging Security Information, Systems and Technologies, Venice, Italy, August 2015
Busby-Earle, C. , France, R. B. and Ray, I.: 'Analysing Requirements to Detect Latent Security Vulnerabilities'. Proceedings of the IEEE Eighth International Conference on Software Security and Reliability – Companion (SERE-C), San Francisco, California, 2014, pp. 168-175
Busby-Earle, C. and Mugisa, E.K.:`SECREt: potential vulnerability discovery using loophole analysis'. Proceedings of the Annual International Conference on Information Technology Security (ITS2010), Phuket, Thailand, 2010, pp.I39-I46
Busby-Earle, C. and Mugisa, E.K.:`Web security: a cross-sectional view of businesses operating in Jamaica'. Proceedings of the Conf-IRM 2010 Conference, Montego Bay, Jamaica, 2010 (as at May 2015, downloaded 35 times)
Busby-Earle, C. and Mugisa, E.K.:`Metadata for boilerplate placement values for secure software development using derived requirements'. Proceedings of the IASTED International Conference on Software Engineering and Applications (SEA2009), Cambridge, Massachusetts, 2009, pp.196-201
Busby-Earle, C. and Mugisa, E.K.:`Towards writing secure software requirements'. Proceedings of the IASTED International Conference on Software Engineering (SE2009), Innsbruck, Austria, 2009, pp.101-105
Busby-Earle, C., France, R., and Ray, I. : 'Analysing Requirements to Detect Latent Security Vulnerabilities'. Computer science technical report, Colorado State University, Fort Collins, Colorado, 2013
Busby-Earle, C.;’ Developing More Secure Software Systems’. in Research for Development, URD2014, UWI Mona, 2014