1. 2020
  2. E-pub ahead of print

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., 3 Apr 2020, In : Computers and Security. 101825.

    Research output: Contribution to journalArticle

  3. Published
  4. E-pub ahead of print

    Prenatal and perinatal risk and protective factors for psychosis: a systematic review and meta-analysis

    Davies, C., Segre, G., Estradé, A., Radua, J., De Micheli, A., Provenzani, U., Oliver, D., Salazar de Pablo, G., Ramella-Cravaro, V., Besozzi, M., Dazzan, P., Miele, M., Caputo, G., Spallarossa, C., Crossland, G., Ilyas, A., Spada, G., Politi, P., Murray, R., McGuire, P. & 1 others, Fusar-Poli, P., 24 Mar 2020, In : The Lancet Psychiatry. p. 1-12 12 p.

    Research output: Contribution to journalArticle

  5. E-pub ahead of print

    Unearthing feminist territories and terrains

    Jackman, A., Squire, R., Bruun, J. & Thornton, P., 13 Mar 2020, In : Political Geography. 80, p. 1-12 12 p., 102180.

    Research output: Contribution to journalArticle

  6. Unpublished

    Maximum-Matching based Maintenance of Structural Controllability

    Zhang, S., 3 Mar 2020, (Unpublished) 174 p.

    Research output: ThesisDoctoral Thesis

  7. Published

    Intriguing Properties of Adversarial ML Attacks in the Problem Space

    Pierazzi, F., Pendlebury, F., Cortellazzi, J. & Cavallaro, L., Mar 2020, IEEE Symposium on Security and Privacy. p. 1308-1325 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Capturing Tacit Knowledge in Security Operation Centres

    Cho, S., Happa, J. & Creese, S., 24 Feb 2020, In : IEEE Access. 8, p. 42021 - 42041 21 p.

    Research output: Contribution to journalArticle

  9. Forthcoming

    Return-Oriented Programming on RISC-V

    Jaloyan, G-A., Markantonakis, K., Akram, R. N., Robin, D., Mayes, K. & Naccache, D., 16 Feb 2020, (Accepted/In press).

    Research output: Contribution to conferencePaper

  10. E-pub ahead of print

    Another Look at Some Isogeny Hardness Assumptions

    Merz, S-P., Minko, R. & Petit, C., 14 Feb 2020, p. 496-511. 16 p.

    Research output: Contribution to conferencePaper

  11. E-pub ahead of print

    Cryptanalysis of the multivariate encryption scheme EFLASH

    Øygarden, M., Felke, P., Raddum, H. & Cid, C., 14 Feb 2020, Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). Springer, p. 85-105 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Forthcoming

    Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems

    Semal, B., Markantonakis, K., Akram, R. N. & Kalbantner, J., 11 Feb 2020, (Accepted/In press).

    Research output: Contribution to conferencePaper

  13. Published

    An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Measuring the Effectiveness of Twitter's URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 2. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Forthcoming

    (One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes

    Virdia, F., D'Anvers, J-P. & Rossi, M., 20 Jan 2020, (Accepted/In press) Advances in Cryptology – EUROCRYPT 2020. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Forthcoming

    Implementing Grover oracles for quantum key search on AES and LowMC

    Virdia, F., Naehrig, M., Roetteler, M. & Jaques, S., 20 Jan 2020, (Accepted/In press) Advances in Cryptology – EUROCRYPT 2020. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Forthcoming

    Improved Classical Cryptanalysis of SIKE in Practice

    Virdia, F., Costello, C., Longa, P., Naehrig, M. & Renes, J., 19 Jan 2020, (Accepted/In press) Public-Key Cryptography – PKC 2020. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. E-pub ahead of print

    Exploring Trade-offs in Batch Bounded Distance Decoding

    Albrecht, M., Curtis, B. & Wunderer, T., 10 Jan 2020, SAC 2019. Springer, p. 467-491 25 p. (Lecture Notes in Computer Science; vol. 11959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Too little too late: Can we control browser fingerprinting?

    Al-Fannah, N. M. & Mitchell, C., 7 Jan 2020, In : Journal of Intellectual Capital. p. 1-16 16 p.

    Research output: Contribution to journalArticle

  20. Published

    Multilinear Maps from Obfuscation

    Albrecht, M. R., Farshim, P., Han, S., Hofheinz, D., Larraia, E. & Paterson, K. G., 2 Jan 2020, In : Journal of Cryptology. p. 1-34 34 p.

    Research output: Contribution to journalArticle

  21. Published

    A Session Hijacking Attack against a Device-Assisted Physical Layer Key Agreement

    HU, Q., DU, B., Markantonakis, K. & Hancke, G., Jan 2020, In : IEEE Transactions on Industrial Informatics. 16, 1, p. 691-702 12 p.

    Research output: Contribution to journalArticle

  22. Forthcoming

    Estonia: From the Bronze Night to Cybersecurity Pioneers

    Hardy, A. & Robinson, N., 2020, (Accepted/In press) The Routledge Companion to Global Cyber Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. 2019
  24. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Forthcoming

    Civic Empowerment through Digitalisation: the Case of Greenlandic Women

    Wendt, N., Jensen, R. B. & Coles-Kemp, L., 9 Dec 2019, (Accepted/In press) ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Forthcoming

    Digital Liminalities: Understanding Isolated Communities on the Edge

    Jensen, R. B., Coles-Kemp, L., Wendt, N. & Lewis, M., 9 Dec 2019, (Accepted/In press) ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Forthcoming

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., 9 Dec 2019, (Accepted/In press) CHI '20: CHI Conference on Human Factors in Computing Systems. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...79 Next