1. 2021
  2. Published

    What Influences People’s View of Cyber Security Culture in Higher Education Institutions? An Empirical Study

    Mersinas, K., Durojaiye, T. & Watling, D., 3 Oct 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems CYBER 2021. p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Detecting video-game injectors exchanged in game cheating communities

    Karkallis, P., Blasco Alis, J., Suarez de Tangil Rotaeche, G. & Pastrana, S., Oct 2021, 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis

    Shepherd, C., Markantonakis, K., Van Heijningen, N., Aboulkassimi, D., Gaine, C., Heckmann, T. & Naccache, D., 17 Sep 2021, (E-pub ahead of print) In: Computers and Security. 102471.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Active Agency, Access and Power

    Salojarvi, V. & Jensen, R. B., 1 Sep 2021, In: Media, War & Conflict. 14, 3, p. 263-267 5 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Automating the evaluation of trustworthiness

    Sel, M. & Mitchell, C. J., 1 Sep 2021, Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, September 2021, Proceedings. Fischer-Huebner, S., Lambrinoudakis, C., Kotsis, G., Min Tjoa, A. & Khalil, I. (eds.). Springer-Verlag, p. 18-31 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Forthcoming

    Report and Trace Ring Signatures

    Fraser, A. & Quaglia, E., 1 Sep 2021, (Accepted/In press) 20th International Conference On Cryptology And Network Security: CANS 2021. Springer-Verlag, 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy

    Sivakumaran, P. & Blasco, J., Sep 2021, Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks: SECURECOMM 2021. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Forthcoming

    argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries

    Sivakumaran, P. & Blasco, J., 28 Aug 2021, (Accepted/In press) Proceedings of the 37th Annual Computer Security Applications Conference: ACSAC 2021. Association for Computing Machinery (ACM)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis

    Crampton, J., Gutin, G. & Majumdar, D., 19 Aug 2021, In: ACM Transactions on Privacy and Security. 24, 3, p. 1-22 22 p., 21.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Ransomclave: Ransomware Key Management using SGX

    Bhudia, A., O'Keeffe, D., Sgandurra, D. & Hurley-Smith, D., 17 Aug 2021, 10th International Workshop on Cyber Crime (IWCC 2021): In proceedings of the International Conference on Availability, Reliability and Security (ARES 2021). p. 1-10 10 p. 58

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...214 Next