1. Conference contribution › Research
  2. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Valid Probabilistic Prediction of Life Status after Percutaneous Coronary Intervention procedure

    Volkhonskiy, D., Nouretdinov, I., Gammerman, A. & Lim, P., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Validating an Insider Threat Detection System: A Real Scenario Perspective

    Agrafiotis, I., Erola, A., Happa, J., Goldsmith, M. & Creese, S., 4 Aug 2016, IEEE Security and Privacy Workshop on Research for Insider Threat. IEEE, p. 286-295 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Visible-Spectrum Biometric Retina Recognition

    Borgen, H., Bours, P. & Wolthusen, S. D., 15 Aug 2008, Proc. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '08). IEEE Computer Society Press, p. 1056-1062

    Research output: Chapter in Book/Report/Conference proceedingConference contribution