Staff
Students
Search
Students
Staff
Find your course
About us
Study here
Departments
& Schools
Student life
International
Research
For business
Alumni
Home
>
Department of Information Security home
>
Research
>
Profile
>
Publications
Department of Information Security
Show 3 research groupings
Show 3 research groupings
CDT in Cyber Security for the Everyday
ISG Smart Card and IoT Security Centre
The Institute of Cyber Security Innovation
Profile
Researchers
Publications
Projects
Advanced search
Advanced search
Organisational unit
Reset
Department of Information Security
CDT in Cyber Security for the Everyday
ISG Smart Card and IoT Security Centre
Information Security Group
The Institute of Cyber Security Innovation
Type
Thesis
→ Doctoral Thesis
→ Master's Thesis
Chapter in Book/Report/Conference proceeding
→ Chapter
→ Entry for encyclopedia/dictionary
→ Conference contribution
→ Other contribution
→ Chapter (peer-reviewed)
Contribution to journal
→ Article
→ Comment/debate
→ Book/Film/Article review
→ Editorial
→ Special issue
→ Review article
Non-textual form
→ Exhibition
Contribution to non-peer-reviewed publication
→ Newspaper article
→ Internet publication
Working paper
→ Working paper
Contribution to conference
→ Paper
→ Poster
→ Abstract
→ Other
Other contribution
→ Other contribution
Book/Report
→ Book
→ Anthology
→ Commissioned report
→ Other report
Patent
→ Patent
Language
English
German
French
Spanish
Italian
Portuguese
Russian
Kazakh
Tswana
German (Austria)
English (New Zealand)
Spanish (Peru)
Icelandic
Hebrew
Arabic (Israel)
Chinese (Traditional)
Chinese (Simplified)
Catalan
Spanish (Puerto Rico)
Ladino
English (Ireland)
Chinese (Hong Kong)
German (Switzerland)
Spanish (Bolivia)
Arabic (Saudi Arabia)
Latvian
Bosnian
Estonian
Korean
Croatian
Dutch
Persian (Iran, Islamic Republic of)
Tajik
Czech
Ukranian
Hungarian
Lithuanian
Romanian
Slovak
Slovenian
Vietnamese
Indonesian
Other
Multiple languages
Undefined/Unknown
Publication year
Choose year
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1963
1800
to
Choose year
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1963
1800
Publication category
Research
Peer-reviewed
Peer-reviewed
Not peer-reviewed
Open Access status
Open
Embargoed
Closed
Indeterminate
None
2141 - 2150 out of 2,162
Page size:
10
10
25
50
100
500
RSS feed of this list
Sort by:
Type
Publication date
Title
Type
Working paper › Research
Published
Evaluating and improving access control
Crampton, J.
,
Loizou, G.
&
O'Shea, G.
,
1999
.
Research output
:
Working paper
Published
How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure
Mitchell, C. J.
,
9 May 2020
,
arXiv
.
Research output
:
Working paper
Published
How to make 5G security a reality: Talk given at the 2019 Huawei Security Technology SAB Summit, Munich, 10th July 2019
Mitchell, C. J.
,
24 Jul 2019
.
Research output
:
Working paper
Published
LISABETH: Automated Content-Based Signatures Generator for Zero-day Polymorphic Worms
Cavallaro, L.
,
Lanzi, A.
,
Mayer, L.
&
Monga, M.
,
2007
.
Research output
:
Working paper
Published
Mining the Network Behavior of Bots
Cavallaro, L.
,
Kruegel, C.
&
Vigna, G.
,
1 Jul 2009
.
Research output
:
Working paper
Unpublished
On the satisfiability of authorization constraints in workflow systems
Crampton, J.
,
2004
, (Unpublished).
Research output
:
Working paper
Published
PAriCheck: An efficient pointer arithmetic checker for C programs
Younan, Y.
,
Phillipaerts, P.
,
Cavallaro, L.
,
Sekar, R.
,
Piessens, F.
&
Joosen, W.
,
1 Jun 2009
.
Research output
:
Working paper
Unpublished
PKI - An Insider's View (Extended Abstract)
Price, G.
,
2005
, (Unpublished).
Research output
:
Working paper
Published
SARBAC: A New Model for Role-Based Administration
Crampton, J.
&
Loizou, G.
,
2002
.
Research output
:
Working paper
Unpublished
Security consideration for virtualization
Gebhardt, C.
&
Tomlinson, A.
,
2008
, (Unpublished).
Research output
:
Working paper
Previous
1
...
211
212
213
214
215
216
217
Next
Find an expert
Search for researchers:
Search for research:
Department of Information Security home
Research
Profile
Researchers
Publications
Projects