1. Other contribution › Research
  2. Forthcoming

    Sequential binning privacy model for data with prior knowledge of feature dependencies

    Nouretdinov, I., Darwish, S. & Wolthusen, S., Sep 2017, (Accepted/In press) 1 p. Data Science for Cyber-Security workshop, Sep 25-27 2017

    Research output: Other contribution

  3. Published

    Sergei Skripal attack: Russian Embassy is fuelling tensions with some very undiplomatic tweets

    Robinson, N. & Miltner, K., 21 Mar 2018, The Conversation.

    Research output: Other contribution

  4. Published

    Ships, Brooms and the End of Humanity

    Haggman, A., 17 Oct 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  5. Published
  6. Published

    Some Reflections on a Visit to the Playing with History Collection

    Haggman, A., 23 Feb 2016, Ludic Geopolitics Blog.

    Research output: Other contribution

  7. Published
  8. Published

    Taking Stock of Cyber Deterrence

    Haggman, A., 18 Jun 2015, Future Foreign Policy.

    Research output: Other contribution

  9. Published
  10. Published

    The Death of the Reader

    Thornton, P., 16 May 2017, 5 p. London : Under the Influence magazine .

    Research output: Other contribution

  11. Published

    The Evolution of Mobile Security: The Silicon Trust Report

    Mayes, K. & Markantonakis, K., Feb 2007, 8 p. The Silicon Trust.

    Research output: Other contribution

  12. Published

    The problem with curtains

    Haggman, A., 25 Feb 2014, Strife Blog.

    Research output: Other contribution

  13. Published
  14. Published

    Tweet-Deck Diplomacy

    Robinson, N., 12 Jan 2017, RHUL Geopolitics & Security.

    Research output: Other contribution

  15. Published

    Why 50,000 ships are so vulnerable to cyberattacks

    Martin, K. & Hopcraft, R., 13 Jun 2018

    Research output: Other contribution

  16. Published

    Will smart cards outsmart the criminals?

    Mayes, K. & Markantonakis, K., 29 Jan 2007, The Times Newspaper.

    Research output: Other contribution

  17. Exhibition › Research
  18. Published
  19. Published
  20. Working paper › Research
  21. Submitted

    A Central Limit Framework for Ring-LWE Decryption

    Murphy, S. & Player, R., 2019, (Submitted).

    Research output: Working paper

  22. E-pub ahead of print
  23. Published

    Anomalous Taint Detection

    Cavallaro, L. & Sekar, R., 1 Jun 2008.

    Research output: Working paper

  24. Published
  25. Unpublished

    Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers

    Gallery, E., Tomlinson, A. & Delicata, R., 1 Jun 2005, (Unpublished).

    Research output: Working paper

  26. Published

    Attacking a Trusted Computing Platform [Improving the Security of TCG Specification

    Bruschi, D., Cavallaro, L., Lanzi, A. & Monga, M., 2005, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  27. Published

    Conflict of interest policies: A general approach

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  28. Forthcoming

    Discretisation and Product Distributions in Ring-LWE

    Murphy, S. & Player, R., 20 Jul 2019, (Accepted/In press).

    Research output: Working paper

  29. Published

    Diversified Process Replicæ for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006.

    Research output: Working paper

  30. Published

    Does the IdP Mix-Up attack really work?

    Li, W. & Mitchell, C. J., 3 Jun 2016, 4 p.

    Research output: Working paper

  31. Published

    Evaluating and improving access control

    Crampton, J., Loizou, G. & O'Shea, G., 1999.

    Research output: Working paper

  32. Published
  33. Published

    LISABETH: Automated Content-Based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M., 2007.

    Research output: Working paper

  34. Published

    Mining the Network Behavior of Bots

    Cavallaro, L., Kruegel, C. & Vigna, G., 1 Jul 2009.

    Research output: Working paper

  35. Unpublished
  36. Published

    PAriCheck: An efficient pointer arithmetic checker for C programs

    Younan, Y., Phillipaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W., 1 Jun 2009.

    Research output: Working paper

  37. Unpublished

    PKI - An Insider's View (Extended Abstract)

    Price, G., 2005, (Unpublished).

    Research output: Working paper

  38. Published

    SARBAC: A New Model for Role-Based Administration

    Crampton, J. & Loizou, G., 2002.

    Research output: Working paper

  39. Unpublished

    Security consideration for virtualization

    Gebhardt, C. & Tomlinson, A., 2008, (Unpublished).

    Research output: Working paper

  40. Published

    Structural complexity of conflict of interest policies

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  41. Published

    Syscalls Obfuscation for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  42. Published
  43. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C., 27 Nov 2019, arXiv, 27 p.

    Research output: Working paper

  44. Published
  45. Published
  46. Unpublished

    Towards the Secure Initialisation of a Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A. & Pearce, D. B., 1 Jul 2005, (Unpublished).

    Research output: Working paper

  47. Published

    Triangulations of the sphere, bitrades and abelian groups

    Blackburn, S. R. & McCourt, T. A., 29 Jul 2013, arXiv, p. 1-22.

    Research output: Working paper

  48. Published

    Two partial orders on the set of antichains

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  49. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 9 Nov 2009.

    Research output: Working paper

Previous 1...16 17 18 19 20 Next