1. Conference contribution › Research
  2. Published

    Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R. & Markantonakis, K., 3 Apr 2017, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Tracing Man-in-the-Middle in monoidal categories

    Pavlovic, D., 2012, Proceedings of CMCS 2012. Pattinson, D. & Schroeder, L. (eds.). Springer-Verlag, p. 28pp (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Trade-offs in cryptographic implementations of temporal access control

    Crampton, J., 2009, Proceedings of 14th Nordic Workshop on Secure IT Systems. Springer, p. 72-87 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Traffic management in satellite ATM bridge

    Sun, Z., Komisarczuk, P., Coakley, FP. & Evans, BG., 1994, Teletraffic Symposium, 11th. Performance Engineering in Telecommunications Networks. IEE Eleventh UK. p. 8B-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Training Data and Rationality

    Mersinas, K., Sobb, T., Sample, C., Bakdash, J. & Ormrod, D., Oct 2019, European Conference on the Impact of Artificial Intelligence and Robotics. Griffiths, P. & Kabir, M. N. (eds.). Oxford, UK: Academic Conferences and Publishing International Limited, p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L., 16 Aug 2017, Proceedings of the 26th USENIX Security Symposium. USENIX, p. 625-642 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

    Barbero, F., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 2022, IEEE Symposium on Security and Privacy (IEEE S&P). p. 1165-1183

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L., 1 Jul 2011, Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Trashing IMSI catchers in mobile networks

    Khan, M. & Mitchell, C. J., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution