1. 2023
  2. Forthcoming

    Digital security narratives in the time of COVID-19: a case for kindness

    Coles-Kemp, L. & Hall, P., 1 Jan 2023, (Accepted/In press) Perspectives on design research: Practices and theories in Design and Digital Communication.. Springer, [Cham]

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. 2022
  4. Forthcoming

    Subverting Deniability

    Armour, M. & Quaglia, E., 11 Nov 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  5. Published

    SLR: From Saltzer & Schroeder to 2021...: 47 years of research on the development and validation of Security API recommendations

    Patnaik, N., Dwyer, A., Hallett, J. & Rashid, A., 15 Sep 2022, In: ACM Transactions on Software Engineering and Methodology.

    Research output: Contribution to journalArticlepeer-review

  6. Forthcoming

    Epoch Confidentiality in Updatable Encryption

    Knapp, J. & Quaglia, E., 10 Sep 2022, (Accepted/In press) 16th International Conference on Provable and Practical Security : ProvSec 2022. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Identifying Incentives for Extortion in Proof of Stake Consensus Protocols

    Bhudia, A., Cartwright, A., Cartwright, E., Hernandez-Castro, J. & Hurley-Smith, D., 1 Sep 2022, The 3rd International Conference on Deep Learning, Big Data and Blockchain (DBB 2022). Springer, Vol. 541.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    What Can a Critical Cybersecurity Do?

    Dwyer, A., Stevens, C., Muller, L., Dunn Cavelty, M., Coles-Kemp, L. & Thornton, P., Sep 2022, In: International Political Sociology. 16, 3

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Introduction: An Offensive Future?

    Dwyer, A. C. & Ertan, A., 16 Aug 2022, In: The Cyber Defense Review. 7, 3, p. 9-13 5 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Breaking Bridgefy, again: Adopting libsignal is not enough

    Albrecht, M., Eikenberg, R. & Paterson, K., 12 Aug 2022, USENIX Security'22.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Crafting a democratic and responsible cyber power?

    Dwyer, A., Aug 2022, Offensive Cyber Working Group. 18 p.

    Research output: Book/ReportOther report

  12. Published
  13. Forthcoming

    Towards Analogue Geographies: Moving with and beyond enclosure

    Squire, R., Adey, P. & Jensen, R. B., 22 Jul 2022, (Accepted/In press) In: GeoHumanities.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Constructing orientable sequences

    Mitchell, C. J. & Wild, P. R., Jul 2022, In: IEEE Transactions on Information Theory. 68, 7, p. 4782-4789 8 p.

    Research output: Contribution to journalArticlepeer-review

  15. E-pub ahead of print

    Accessible and inclusive cyber security: a nuanced and complex challenge

    Renaud, K. & Coles-Kemp, L., 22 Jun 2022, (E-pub ahead of print) In: SN Computer Science. 3, p. 1-14 14 p., 346 (2022).

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Algorithm substitution attacks against receivers

    Armour, M. & Poettering, B., 21 Jun 2022, In: International Journal of Information Security.

    Research output: Contribution to journalArticlepeer-review

  17. E-pub ahead of print

    Detecting CAN Attacks on J1939 and NMEA 2000 Networks

    Rogers, M., Weigand, P., Happa, J. & Rasmussen, K., 14 Jun 2022, (E-pub ahead of print) In: IEEE Transactions on Dependable and Secure Computing.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Generalized Noise Role Mining

    Crampton, J., Eiben, E., Gutin, G., Karapetyan, D. & Majumdar, D., Jun 2022, p. 91-102.

    Research output: Contribution to conferencePaperpeer-review

  19. E-pub ahead of print

    PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals

    Zhao, Q., Zuo, C., Blasco Alis, J. & Lin, Z., 30 May 2022, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  20. Published

    Hack the Heap: Heap Layout Manipulation made Easy

    Gennissen, J. & O'Keeffe, D., 26 May 2022, Hack the Heap: Heap Layout Manipulation made Easy. 16th Workshop on Offensive Technologies (WOOT) 2022

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Cheat detection and security in video games

    Hassan, M., 5 May 2022

    Research output: ThesisDoctoral Thesis

  22. Published
  23. Published

    Cyber security and the Leviathan

    Da Silva, J., May 2022, In: Computers and Security. 116, 102674.

    Research output: Contribution to journalArticlepeer-review

  24. E-pub ahead of print

    Estonia: a curious and cautious approach to artificial intelligence and national security

    Robinson, N., Hardy, A. & Ertan, A., May 2022, (E-pub ahead of print) Routledge Companion to Artificial Intelligence and National Security Policy.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. E-pub ahead of print

    Drawing Out the Everyday Hyper-[In]Securities of Digital Identity

    Heath, C. P. R. & Coles-Kemp, L., 29 Apr 2022, (E-pub ahead of print) Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems.. ACM, p. 1-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Privacy-preserving Web single sign-on: Formal security analysis and design

    Schmitz, G., 26 Apr 2022, In: it - Information Technology. 64, 1-2

    Research output: Contribution to journalArticlepeer-review

  27. E-pub ahead of print

    Valued Authorization Policy Existence Problem: Theory and Experiments

    Crampton, J., Eiben, E., Gutin, G., Karapetyan, D. & Majumdar, D., Nov 2022, In: ACM Transactions on Privacy and Security. 25, 4, 28.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 5 6 7 8 ...89 Next