1. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873. p. 250-263 14 p. (Lecture Notes In Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  7. Published
  8. Published

    Using Trusted Computing in Commercial Grids

    Yau, P-W. & Tomlinson, A., 1 Jul 2007, p. 31-36. 6 p.

    Research output: Contribution to conferencePaper

  9. Published

    Using trusted computing to secure mobile ubiquitous environments

    Leung, A., Yau, P-W. & Mitchell, C., 2009, Security and Privacy in Mobile & Wireless Networking. Gritzalis, S., Karaygiannis, T. & Skianis, C. (eds.). Leicester, UK: Troubador, p. 303-335 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices

    Eze, C., Nurse, JRC. & Happa, J., Mar 2016, In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 7, p. 39-57 19 p., 1.

    Research output: Contribution to journalArticlepeer-review