1. Conference contribution › Research
  2. Published

    Curb Your Enthusiasm: Why the Future is Not Stuxnet

    Haggman, A., 2 Jul 2015, Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, p. 397-403 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise

    Creese, S., Goldsmith, M., Moffat, N., Happa, J. & Agrafiotis, I., 2013, IEEE Conference on Technologies for Homeland Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Günther, F., Marson, G. A. & Paterson, K., 1 Aug 2015, Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (Lecture Notes in Computer Science; vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Dataset Construction and Analysis of Screenshot Malware

    Sbai, H., Happa, J., Goldsmith, M. & Meftali, S., 29 Dec 2020, International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 18 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Forthcoming

    Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper

    Meister, J. A., Akram, R. N. & Markantonakis, K., 7 Nov 2018, (Accepted/In press) The 12th WISTP International Conference on Information Security Theory and Practice (WISTP'2018). Blazy, O. & Yeun, C. Y. (eds.). Brussels, Belgium: Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Delay and jitter attacks on hierarchical state estimation

    Baiocco, A., Foglietta, C. & Wolthusen, S., 21 Mar 2016, Proceedings of the 2015 IEEE International Conference on Smart Grid Communications. IEEE Press, p. 485-490

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Delegation and satisfiability in workflow systems

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 31-40 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2006, Proceedings of 11th European Symposium on Research in Computer Security. Springer, p. 174-191 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Deriving authentication for pervasive security

    Pavlovic, D. & Meadows, C., 2008, Proceedings of the ISTPS 2008. McLean, J. (ed.). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Forthcoming

    Deriving ephemeral authentication using channel axioms

    Pavlovic, D. & Meadows, C., 2012, (Accepted/In press) Proceedings of the Cambridge Workshop on Security Protocols 2009. Christianson, B. (ed.). Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Design and development of a facebook application to raise privacy awareness

    Costantino, G. & Sgandurra, D., 2015, Proceedings - 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2015. Institute of Electrical and Electronics Engineers Inc., p. 583-586 4 p. 7092778

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Design of a multiagent-based e-marketplace to secure service trading on the Internet

    Li, Q., Martin, K. M. & Zhang, J., 2011, Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Design, Installation and Execution of a Security Agent for Mobile Stations.

    Sirett, W. G., MacDonald, J. A., Mayes, K. & Markantonakis, K., 2006, CARDIS. Domingo-Ferrer, J., Posegga, J. & Schreckling, D. (eds.). Springer, Vol. 3928. p. 1-15 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Designing Workflows for Grid Enabled Internet Instruments

    Stirling, D., Welch, I. & Komisarczuk, P., 2008, 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France. p. 218-225 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 9 Sep 2018, Proceedings of the 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Springer-Verlag, p. 131-143 13 p. (Lecture Notes in Computer Science; vol. 10707).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?

    Crampton, J. & Huth, M., 2009, Proceedings of 5th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    Detecting disguised processes using application-behavior profiling

    Vaas, C. & Happa, J., 8 Jun 2017, Technologies for Homeland Security (HST), 2017 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013. p. 300-303 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes

    Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 81-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science; vol. 10898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks

    Esnaashari, S., Welch, I. & Komisarczuk, P., 2013, 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013. p. 725-729 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Differential Cryptanalysis of Round-Reduced Sparx-64/128

    Ankele, R. & List, E., 2018, ACNS 2018 Applied Cryptography & Network security.. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 459-475 17 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Digital Liminalities: Understanding Isolated Communities on the Edge

    Jensen, R. B., Coles-Kemp, L., Wendt, N. & Lewis, M., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Digital rights management using a mobile phone

    Abbadi, I. & Mitchell, C. J., 2007, Proceedings of ICEC 2007, Ninth International Conference on Electronic Commerce, Minneapolis, USA, August 2007. ACM Press, p. 185-194 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Digital Trust - Trusted Computing and Beyond A Position Paper

    Akram, R. N. & Ko, R. K. L., 2014, The 7th IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things (IEEE SpaIoT 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Marmol, F. G., Tapiador, J. E. & Dong, M. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Digitalised Welfare: Systems For Both Seeing and Working With Mess

    Morris, A., Coles-Kemp, L. & Jones, W., Jul 2020, WebSci '20 conference. ACM, p. 26-31 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Digitally signed documents - Ambiguities and solutions

    Alsaid, A. & Mitchell, C. J., 2004, Proceedings - International Network Conference 2004 (INC 2004), University of Plymouth, UK, July 2004. Plymouth University, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Discretionary and Mandatory Control for Role-Based Administration

    Crampton, J., 2006, Data Applications and Security XX. Damiani, E. & Liu, P. (eds.). Springer, p. 194-208 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Forthcoming

    Distance Bounding for RFID: Effectiveness of Terrorist Fraud

    Hancke, G., Nov 2012, (Accepted/In press) IEEE RFID-TA. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Distinguishing Exponent Digits by Observing Modular Subtractions

    Walter, C. D. & Thompson, S., 2001, CT-RSA 2001. Naccache, D. (ed.). Springer, Vol. 2020. p. 192-207 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. E-pub ahead of print

    Distributed Conformal Anomaly Detection

    Nouretdinov, I., 2 Feb 2017, Machine Learning and Applications (ICMLA), 2016 15th IEEE International Conference on. IEEE Computer Society, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K., 2012, Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Diversified Process Replicae for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 4 Aug 2016, Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L., 22 Mar 2017, ACM CODASPY. ACM, p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Dynamic Forced Partitioning of Robust Hierarchical State Estimators for Power Networks

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014). Springer-Verlag, p. 73 85 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Dynamics, robustness and fragility of trust

    Pavlovic, D., 2008, Proceedings of FAST 2008. Degano, P., Guttman, J. & Martinelli, F. (eds.). Springer-Verlag, Vol. 5491. p. 97-113 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Eavesdropping Attacks on High-Frequency RFID Tokens

    Hancke, G. P., 1 Jul 2008, Workshop on RFID Security -- RFIDSec'08. Budapest, Hungary, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Effect of rerouting on NGN VoIP Quality

    Komisarczuk, P. & Koudrin, A., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 364-370 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. E-pub ahead of print

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...5 6 7 8 9 10 11 12 ...42 Next