Junade Ali
YOU?
Author Swipe
R v F (2025): Addressing the Defence of Hacking Open
The defence of hacking (sometimes referred to as the "Trojan Horse Defence" or the "SODDI Defence", Some Other Dude Did It Defence) is prevalent in computer cases and a challenge for those working in the criminal justice system. Historical…
"So Am I Dr. Frankenstein? Or Were You a Monster the Whole Time?": Mitigating Software Project Failure With Loss-Aversion-Aware Development Methodologies Open
Case studies have shown that software disasters snowball from technical issues to catastrophes through humans covering up problems rather than addressing them and empirical research has found the psychological safety of software engineers …
Investigation Into the Spread of Misinformation About UK Prime Ministers on Twitter Open
Misinformation presents threats to societal mental well-being, public health initiatives, as well as satisfaction in democracy. Those who spread misinformation can leverage cognitive biases to make others more likely to believe and share t…
Technical Debt: A Ticking Time Bomb? Open
Are more of the world has become digital, software has become increasingly critical to the functioning of modern society and critical national infrastructure. Software failures can have devastating effects on human life, from miscarriages …
View article: Cross Hashing: Anonymizing encounters in Decentralised Contact Tracing Protocols
Cross Hashing: Anonymizing encounters in Decentralised Contact Tracing Protocols Open
During the COVID-19 (SARS-CoV-2) epidemic, Contact Tracing emerged as an essential tool for managing the epidemic. App-based solutions have emerged for Contact Tracing, including a protocol designed by Apple and Google (influenced by an op…
View article: Battery-assisted Electric Vehicle Charging: Data Driven Performance Analysis
Battery-assisted Electric Vehicle Charging: Data Driven Performance Analysis Open
As the number of electric vehicles rapidly increases, their peak demand on\nthe grid becomes one of the major challenges. A battery-assisted charging\nconcept has emerged recently, which allows to accumulate energy during off-peak\nhours a…
Novel Keyword Extraction and Language Detection Approaches Open
Fuzzy string matching and language classification are important tools in Natural Language Processing pipelines, this paper provides advances in both areas. We propose a fast novel approach to string tokenisation for fuzzy language matching…
Protocols for Checking Compromised Credentials Open
To prevent credential stuffing attacks, industry best practice now proactively checks if user credentials are present in known data breaches. Recently, some web services, such as HaveIBeenPwned (HIBP) and Google Password Checkup (GPC), hav…
Protocols for Checking Compromised Credentials Open
To prevent credential stuffing attacks, industry best practice now proactively checks if user credentials are present in known data breaches. Recently, some web services, such as HaveIBeenPwned (HIBP) and Google Password Checkup (GPC), hav…
Mechanism for the prevention of password reuse through Anonymized Hashes Open
Password authentication is an essential and widespread form of user authentication on the Internet with no other authentication system matching its dominance. When a password on one website is breached, if reused, the stolen password can b…
Mechanism for the prevention of password reuse through Anonymized Hashes Open
Password authentication is an essential and widespread form of user authentication on the Internet with no other authentication system matching its dominance. When a password on one website is breached, if reused, the stolen password can b…
View article: Coverage and Mobile Sensor Placement for Vehicles on Predetermined Routes: A Greedy Heuristic Approach
Coverage and Mobile Sensor Placement for Vehicles on Predetermined Routes: A Greedy Heuristic Approach Open
Road potholes are not only nuisance but can also damage vehicles and pose serious safety risks for drivers. Recently, a number of approaches have been developed for automatic pothole detection using equipment such as accelerometers, image …