1. Published

    The BIOS and Rootkits

    Hili, G., Mayes, K. & Markantonakis, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, D. K. (eds.). Springer, p. 369-381 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  2. Published

    The bi-objective workflow satisfiability problem and workflow resiliency

    Crampton, J., Gutin, G., Karapetyan, D. & Watrigant, R., 16 Mar 2017, In : Journal of Computer Security. 25, 1, p. 83-115 33 p.

    Research output: Contribution to journalArticle

  3. Published

    The Benefits and Drawbacks of Using Electronic Identities

    Price, G., 2008, In : Information Security Technical Report. 13, 2

    Research output: Contribution to journalArticle

  4. E-pub ahead of print

    The Authorization Policy Existence Problem

    Berge, P., Crampton, J., Gutin, G. & Watrigant, R., 28 Nov 2018, In : IEEE Transactions on Dependable and Secure Computing. p. 1-12 12 p.

    Research output: Contribution to journalArticle

  5. Published
  6. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E., 21 Dec 2017, Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE, p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    The ambiguous class group and the genus group of certain non-normal extensions

    Walter, C. D., 1979, In : Mathematika. 26, p. 113-124 12 p.

    Research output: Contribution to journalArticle

  8. Published

    TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., Aug 2019, 28th USENIX Security Symposium (USENIX Sec). p. 729-746 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Ten years of information security Masters programmes: reflections and new challenges

    Martin, K. M., Ciechanowicz, C., Piper, F. C. & Robshaw, M. J. B., 2003, Security Education and Critical Infrastructures: Proceedings of WISE03. Kluwer, p. 215-230 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Ten reasons WHY IRIS Needed 20:20 Foresight: Some Lessons for Introducing Biometric Border Control Systems

    Palmer, A. & Hurrey, C., 2012, Proceedings of the 2012 European Intelligence and Security Informatics Conference. Washington: IEEE Computer Society, p. 311-316 6 p. Palmer:2012:TRW:2373856.2372920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Temporally Aware Behaviour-Based Security in Smart Cards

    Sirett, W. G., Markantonakis, K. & Mayes, K., 1 Nov 2006, Computational Intelligence and Security, 2006 International Conference on. Vol. 1. p. 604 -608

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Teeth Segmentation and Feature Extraction for Odontological Biometrics

    Mairaj, D., Busch, C. & Wolthusen, S. D., Oct 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Computer Society Press, p. 323-328

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Technological advances drive development of new cryptographic mechanisms

    Martin, K., 2018, In : Jane's Intelligence Review. 30, 11, p. 52-55

    Research output: Contribution to journalArticle

  14. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1 Oct 1998, Proc. 2nd IMACS Internat. Conf. on Circuits, Systems Computers. Vol. 2. p. 945-949 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1998, Recent Advances in Information Science and Technology. Mastorakis, N. (ed.). World Scientific, p. 157-161 5 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  16. Unpublished
  17. Published

    Technical Perspective: On heartbleed: A Hard Beginnyng Makth a Good Endyng

    Paterson, K., 21 Feb 2018, In : Communications of the ACM. 61, 3, p. 108-108 1 p.

    Research output: Contribution to journalComment/debate

  18. E-pub ahead of print

    Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators

    Williams, P. & Coles-Kemp, L., 27 Apr 2019, Transactions on Edutainment . Pan, Z. (ed.). Springer, Vol. XV. p. 108-128 21 p. (Lecture Notes in Computer Science; vol. XV).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Taxonomy of honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, Citeseer.

    Research output: Book/ReportOther report

  20. Published

    Taking Stock of Cyber Deterrence

    Haggman, A., 18 Jun 2015, Future Foreign Policy.

    Research output: Other contribution

  21. Published

    Take a Deep Breath: a Stealthy, Resilient and Cost-Effective Botnet Using Skype

    Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M. & Cavallaro, L., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Taint-Enhanced Anomaly Detection

    Cavallaro, L. & Sekar, R., 2011, ICISS. p. 160-174 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Tailoring authentication protocols to match underlying mechanisms

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1996, Information Security and Privacy - Proceedings: First Australasian Conference, Wollongong, NSW, Australia, June 1996. Pieprzyk, J. & Seberry, J. (eds.). Springer-Verlag, p. 121-133 13 p. (Lecture Notes in Computer Science; no. 1172).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol

    Paterson, K. G., Ristenpart, T. & Shrimpton, T., 2011, Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011: Proceedings. Lee, D. H. & Wang, X. (eds.). Springer, p. 372-389 (Lecture Notes in Computer Science; vol. 7073).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Forthcoming

    Tag Group Authentication using Bit Collisions

    Leng, X., Hancke, G., Mayes, K. & Markantonakis, K., Oct 2012, (Accepted/In press) Information Security South Africa (ISSA). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...7 8 9 10 11 12 13 14 ...83 Next