1. 2020
  2. Published

    Driverless Vehicle Security for Military Applications

    Bates, N. & Akram, R. N., 10 Jul 2020, In: Computer Weekly.

    Research output: Contribution to journalArticle

  3. E-pub ahead of print

    On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol

    Basso, A., Kutas, P., Merz, S. P., Petit, C. & Weitkämper, C., 5 Jul 2020, p. 195-213. 19 p.

    Research output: Contribution to conferencePaperpeer-review

  4. Published

    Digitalised Welfare: Systems For Both Seeing and Working With Mess

    Morris, A., Coles-Kemp, L. & Jones, W., Jul 2020, WebSci '20 conference. ACM, p. 26-31 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., Jun 2020, In: ACM Transactions on Privacy and Security. 23, 3, p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In: Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Unearthing feminist territories and terrains

    Jackman, A., Squire, R., Bruun, J. & Thornton, P., Jun 2020, In: Political Geography. 80, p. 1-12 12 p., 102180.

    Research output: Contribution to journalArticlepeer-review

  8. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Legislation-Driven Development of a Gift Aid system using Event-B

    Williams, D. M., Darwish, S., Schneider, S. & Michael, D. R., 25 May 2020, In: Formal Aspects of Computing. 32, 2, p. 251-273 23 p.

    Research output: Contribution to journalArticlepeer-review

  10. E-pub ahead of print

    Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols

    Nweke, L. O., Kahsay Weldehawaryat, G. & Wolthusen, S. D., 11 May 2020, 2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 9089346. (2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published
Previous 1...3 4 5 6 7 8 9 10 ...209 Next