Nick Savage
Nick Savage
School of Computing, University of Portsmouth
Verified email at
Cited by
Cited by
A generic model of 1-60 GHz radio propagation through vegetation-final report
NC Rogers, A Seville, J Richter, D Ndzi, N Savage, RFS Caldeirinha, ...
Radio Agency, UK, 2002
Radio wave propagation through vegetation: Factors influencing signal attenuation
N Savage, D Ndzi, A Seville, E Vilar, J Austin
Radio Science 38 (5), 9-1-9-14, 2003
Motivation of engineering students in higher education
N Savage, R Birch, E Noussi
Engineering education 6 (2), 39-46, 2011
The Tor dark net
G Owen, N Savage
Energy efficiency in underwater sensor networks: a research review
K Ovaliadis, N Savage, V Kanakaris
Journal of Engineering Science and Technology Review (JESTR) 3 (1), 151-156, 2010
Empirical analysis of Tor hidden services
G Owen, N Savage
IET Information Security 10 (3), 113-118, 2016
A generic narrowband model for radiowave propagation through vegetation
J Richter, RFS Caldeirinha, MO Al-Nuaimi, A Seville, NC Rogers, ...
2005 IEEE 61st Vehicular Technology Conference 1, 39-43, 2005
Big data security analysis approach using computational intelligence techniques in R for desktop users
N Naik, P Jenkins, N Savage, V Katos
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
Cluster protocols in underwater sensor networks: A research review
N Savage, K Ovaliadis
Journal of Engineering Science and Technology Review (JESTR) 7 (3), 171-175, 2014
Cyberthreat hunting-part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019
Forensic live response and event reconstruction methods in Linux systems
F Olajide, N Savage, D Ndzi, H Al-Sinani
PGNET 2009: The 10th Annual PostGraduate Symposium on The Convergence of …, 2009
An evaluation of motivation in engineering students, employing self-determination theory
N Savage, R Birch
Innovation, Good practice and research in engineering education 1 (10), 2008
Application level evidence from volatile memory
F Olajide, N Savage
Journal of Computing in Systems and Engineering 10, 171-175, 2009
Underwater sensor network simulation tool (USNeT)
K Ovaliadis, N Savage
International Journal of Computer Applications 71 (22), 2013
Graphical authentication based on user behaviour
A Al-Khazzar, N Savage
2010 International Conference on Security and Cryptography (SECRYPT), 1-4, 2010
Cyberthreat hunting-Part 2: tracking ransomware threat actors using fuzzy hashing and fuzzy c-means clustering
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019
Threat-aware honeypot for discovering and predicting fingerprinting attacks using principal components analysis
N Naik, P Jenkins, N Savage
2018 IEEE Symposium Series on Computational Intelligence (SSCI), 623-630, 2018
On the extraction of forensically relevant information from physical memory
F Olajide, N Savage
2011 World Congress on Internet Security (WorldCIS-2011), 248-252, 2011
Spatial and temporal variation of wideband indoor channels
DL Ndzi, N Savage, B Gremont
International Journal of Antennas and Propagation 2010, 2010
Forensic extraction of user information in continuous block of evidence
F Olajide, N Savage
International Conference on Information Society (i-Society 2011), 476-481, 2011
The system can't perform the operation now. Try again later.
Articles 1–20