1. Conference contribution › Research
  2. Published

    Time Pattern Analysis of Malware by Circular Statistics

    Pan, L., Tomlinson, A. & Koloydenko, A., 3 Jul 2017, Architectures for Networking and Communications Systems (ANCS), 2017 ACM/IEEE Symposium on. IEEE, p. 119-130 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Time Specific Encryption

    Paterson, K. & Quaglia, E., 2010, SCN. Springer, Vol. 6280. p. 1-16 16 p. (Lecture Notes in Computer Science; vol. 6280).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Time-Storage Trade-Offs for Cryptographically-Enforced Access Control

    Crampton, J., 2011, ESORICS: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Springer, Vol. LNCS 6879. p. 245-261 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. E-pub ahead of print

    Tokenisation Blacklisting Using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K., 14 Jun 2017, (E-pub ahead of print) Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. p. 182-198 17 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., Apr 2020, CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Towards a Common Notion of Privacy Leakage on Public Database

    Kiyomoto, S. & Martin, K. M., 2010, Proceedings of Fifth International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10). IEEE Computer Society Press, p. 186-191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. E-pub ahead of print

    Towards a Framework for Testing the Security of IoT Devices Consistently

    Lally, G. & Sgandurra, D., 24 Nov 2018, (E-pub ahead of print) 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, Vol. 11263. p. 88-102 15 p. (Lecture Notes in Computer Science ; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Towards a model facilitating discussions about Cyber Attacks and Defences

    Happa, J., Fairclough, G., Goldsmith, M. & Creese, S., 2014, Proceedings of the Workshop on Ethics and Policies for Cyber Warfare. NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Towards Distributed Collaborative Workflow Management for Mobile Devices

    Kocúrová, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Towards enforcing on-the-fly policies in BYOD environments

    Costantino, G., Martinelli, F., Saracino, A. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 61-65 5 p. 6947734

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Towards improved distributed collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, First International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Forthcoming

    Towards Improving Code Stylometry Analysis in Underground Forums

    Tereszkowski-Kaminski, M., Pastrana, S., Blasco Alis, J. & Suarez-Tangil, G., 16 Sep 2021, (Accepted/In press) 22nd Privacy Enhancing Technologies Symposium (PETS 2022). p. 126-147 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R. & Markantonakis, K., 3 Apr 2017, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Tracing Man-in-the-Middle in monoidal categories

    Pavlovic, D., 2012, Proceedings of CMCS 2012. Pattinson, D. & Schroeder, L. (eds.). Springer-Verlag, p. 28pp (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Trade-offs in cryptographic implementations of temporal access control

    Crampton, J., 2009, Proceedings of 14th Nordic Workshop on Secure IT Systems. Springer, p. 72-87 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Traffic management in satellite ATM bridge

    Sun, Z., Komisarczuk, P., Coakley, FP. & Evans, BG., 1994, Teletraffic Symposium, 11th. Performance Engineering in Telecommunications Networks. IEE Eleventh UK. p. 8B-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Training Data and Rationality

    Mersinas, K., Sobb, T., Sample, C., Bakdash, J. & Ormrod, D., Oct 2019, European Conference on the Impact of Artificial Intelligence and Robotics. Griffiths, P. & Kabir, M. N. (eds.). Oxford, UK: Academic Conferences and Publishing International Limited, p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L., 16 Aug 2017, Proceedings of the 26th USENIX Security Symposium. USENIX, p. 625-642 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Forthcoming

    Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

    Barbero, F., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 6 Nov 2021, (Accepted/In press) IEEE Symposium on Security and Privacy (IEEE S&P).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L., 1 Jul 2011, Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Trashing IMSI catchers in mobile networks

    Khan, M. & Mitchell, C. J., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots

    Seifert, C., Komisarczuk, P. & Welch, I., 2009, The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. p. 63-69 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution