Close Menu

C.I.F.E.R

Overview: 

Computer Intrusions, Forensics and Exploitations Research

Work in Progress: 

Loophole analysis: An algorithm that was developed to be used for the discovery of potential security flaws during requirements engineering. Aspects of the research findings have been implemented in an application called DevAssist that has been deployed in industry.

Multi-perspective machine learning: An approach to the classification of cyber threats using a machine learning ensemble method. Work has been focused on the application of the approach to botnets.

Business readable formal software specification: The implementation of a machine based translator that takes an expressive, business readable language that we are developing, and facilitates analysis using Alloy based tools and multiple output formats for composition and presentation.

A standardized procedure for conceptualizing and completing user stories: A generic set of steps that are aimed at standardizing the procedure utilized in documenting a user story during requirements engineering in agile software development.

Potential Applications: 

Book Chapters

Busby-Earle, C. and France, R.B: ‘Discovering potential interaction violations among requirements’. Published as Advanced Information Systems Engineering Workshops: CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings (Lecture Notes in Business Information Processing), 249, 1st ed., J. Krogstie, H. Mouratidis and J. Su Eds. Springer, 2016, ch. 23, pp 243-253.

Journal Papers

Miller, S. and Busby-Earle, C.: ‘The Impact of different botnet flow feature subsets on prediction accuracy using supervised and unsupervised learning methods’. In Journal of Internet Technology and Secured Transaction, 5(2), June 2016

Fokum, D., Coore, D. and Busby-Earle, C. : ‘Learner Autonomy as a Means to Improve Pass Rates among First-Year Computing Students’. In UWI Quality Education Forum Journal 21, 2016. OBUS, Mona, Jamaica

Busby-Earle, C. and Mugisa, E.K:`Identifying potential security flaws using loophole analysis and the SECREt'. In GSTF International Journal on Computing, 1(2), February 2011

Conference Papers

Miller, S. and Busby-Earle, C.,: ‘Multi-Perspective Machine Learning A Classifier Ensemble method for intrusion detection’. Proceedings of the International Conference on Machine Learning and Soft Computing (ICMLSC2017), Ho Chi Minh City, Vietnam. ACM, January 13-16, 2017

Miller, S. and Busby-Earle, C.,: ‘The Role of Machine Learning in Botnet Detection’. Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Barcelona, Spain, December 5-7, 2016

John, S. and Busby-Earle, C., : 'The Random Gate Principle'. Proceedings of the Ninth International Conference on Emerging Security Information, Systems and Technologies, Venice, Italy, August 2015

Busby-Earle, C. , France, R. B. and Ray, I.: 'Analysing Requirements to Detect Latent Security Vulnerabilities'. Proceedings of the IEEE Eighth International Conference on Software Security and Reliability – Companion (SERE-C), San Francisco, California, 2014, pp. 168-175

Busby-Earle, C. and Mugisa, E.K.:`SECREt: potential vulnerability discovery using loophole analysis'. Proceedings of the Annual International Conference on Information Technology Security (ITS2010), Phuket, Thailand, 2010, pp.I39-I46

Busby-Earle, C. and Mugisa, E.K.:`Web security: a cross-sectional view of businesses operating in Jamaica'. Proceedings of the Conf-IRM 2010 Conference, Montego Bay, Jamaica, 2010 (as at May 2015, downloaded 35 times)

Busby-Earle, C. and Mugisa, E.K.:`Metadata for boilerplate placement values for secure software development using derived requirements'. Proceedings of the IASTED International Conference on Software Engineering and Applications (SEA2009), Cambridge, Massachusetts, 2009, pp.196-201

Busby-Earle, C. and Mugisa, E.K.:`Towards writing secure software requirements'. Proceedings of the IASTED International Conference on Software Engineering (SE2009), Innsbruck, Austria, 2009, pp.101-105

Technical Reports

Busby-Earle, C., France, R., and Ray, I. : 'Analysing Requirements to Detect Latent Security Vulnerabilities'. Computer science technical report, Colorado State University, Fort Collins, Colorado, 2013

Scholarly Publications​

Busby-Earle, C.;’ Developing More Secure Software Systems’. in Research for Development, URD2014, UWI Mona, 2014

Top of Page