1. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Virtual Private Networks: Police Digital Security Centre

    Agha, D., Apr 2020

    Research output: Other contribution

  3. Published

    Virtual relighting of a Roman statue head from Herculaneum: a case study

    Happa, J., Williams, M., Turley, G., Earl, G. P., Dubla, P., Beale, G., Gibbons, G., Debattista, K. & Chalmers, A., 2009, In: Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Visible-Spectrum Biometric Retina Recognition

    Borgen, H., Bours, P. & Wolthusen, S. D., 15 Aug 2008, Proc. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '08). IEEE Computer Society Press, p. 1056-1062

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Xu, H., Shen, W., Li, P., Sgandurra, D. & Wang, R., 27 Jul 2017, In: Journal of Sensors. 2017, p. 1-11 11 p., 3186482.

    Research output: Contribution to journalArticlepeer-review

  7. Unpublished

    Vulnerability Analysis of Power System State Estimation

    Gul, A., 2020, (Unpublished) 109 p.

    Research output: ThesisDoctoral Thesis

  8. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    War and Remembrance: The Case of Finnish Covert Operations in the First World War

    Haggman, A., 10 Dec 2014, In: Strife Journal. 4, p. 14-20 7 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Watching You Watching Me: The Art of Playing the Panopticon

    Coles-Kemp, L., Zugenmaier, A. & Lewis, M., 2014, Digital Enlightenment Yearbook 2014: Social Networks and Social Machines, Surveillance and Empowerment. O'Hara, K., Nguyen, C. & Haynes, P. (eds.). IOS Press, p. 147-162 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter