1. 2020
  2. Published

    Intriguing Properties of Adversarial ML Attacks in the Problem Space

    Pierazzi, F., Pendlebury, F., Cortellazzi, J. & Cavallaro, L., 30 Jul 2020, IEEE Symposium on Security and Privacy (IEEE S&P). IEEE, p. 1332-1349 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    (De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking

    Moeckel, C., 28 Jul 2020, In: Journal of Universal Computer Science. 26, 7, p. 783-804 22 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Key assignment schemes with authenticated encryption, revisited

    Pijnenburg, J. & Poettering, B., 24 Jul 2020, In: IACR Transactions on Symmetric Cryptology. 2020, 2, p. 40-67 28 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Driverless Vehicle Security for Military Applications

    Bates, N. & Akram, R. N., 10 Jul 2020, In: Computer Weekly.

    Research output: Contribution to journalArticle

  6. Published

    Digitalised Welfare: Systems For Both Seeing and Working With Mess

    Morris, A., Coles-Kemp, L. & Jones, W., 6 Jul 2020, WebSci '20 conference. ACM, p. 26-31 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol

    Basso, A., Kutas, P., Merz, S. P., Petit, C. & Weitkämper, C., 5 Jul 2020, (E-pub ahead of print) p. 195-213. 19 p.

    Research output: Contribution to conferencePaperpeer-review

  8. Published

    Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., Jun 2020, In: ACM Transactions on Privacy and Security. 23, 3, p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In: Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Unearthing feminist territories and terrains

    Jackman, A., Squire, R., Bruun, J. & Thornton, P., Jun 2020, In: Political Geography. 80, p. 1-12 12 p., 102180.

    Research output: Contribution to journalArticlepeer-review

  11. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Legislation-Driven Development of a Gift Aid system using Event-B

    Williams, D. M., Darwish, S., Schneider, S. & Michael, D. R., 25 May 2020, In: Formal Aspects of Computing. 32, 2, p. 251-273 23 p.

    Research output: Contribution to journalArticlepeer-review

  13. E-pub ahead of print

    Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols

    Nweke, L. O., Kahsay Weldehawaryat, G. & Wolthusen, S. D., 11 May 2020, (E-pub ahead of print) 2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 9089346. (2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published
  15. E-pub ahead of print

    Digital welfare: designing for more nuanced forms of access

    Coles-Kemp, L., Ashenden, D., Morris, A. & Yuille, J., 7 May 2020, (E-pub ahead of print) In: Policy Design and Practice. p. 1-12 12 p.

    Research output: Contribution to journalBook/Film/Article reviewpeer-review

  16. Published

    Who needs trust for 5G?

    Mitchell, C. J., 2 May 2020, arXiv.

    Research output: Working paper

  17. E-pub ahead of print

    (One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes

    D'Anvers, J-P., Rossi, M. & Virdia, F., 1 May 2020, (E-pub ahead of print) Advances in Cryptology – EUROCRYPT 2020. Springer, p. 3-33 31 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. E-pub ahead of print

    Implementing Grover Oracles for Quantum Key Search on AES and LowMC

    Jaques, S., Naehrig, M., Roetteler, M. & Virdia, F., 1 May 2020, (E-pub ahead of print) Advances in Cryptology – EUROCRYPT 2020. Springer, p. 280-310 31 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    2FA: Police Digital Security Centre

    Agha, D., May 2020

    Research output: Other contribution

  20. Published
  21. E-pub ahead of print

    Improved Classical Cryptanalysis of SIKE in Practice

    Costello, C., Longa, P., Naehrig, M., Renes, J. & Virdia, F., 29 Apr 2020, (E-pub ahead of print) Public-Key Cryptography – PKC 2020. Springer, p. 505-534 30 p. (Lecture Notes in Computer Science; vol. 12111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    On the unbearable lightness of FIPS 140-2 randomness tests

    Hurley-Smith, D., Patsakis, C. & Hernandez-Castro, J., 17 Apr 2020, In: IEEE Transactions on Information Forensics and Security . p. 1-13 13 p.

    Research output: Contribution to journalArticlepeer-review

  23. E-pub ahead of print

    Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange

    Dowling, B., Hansen, T. B. & Paterson, K. G., 10 Apr 2020, (E-pub ahead of print) Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Proceedings. Ding, J. & Tillich, J-P. (eds.). Springer, p. 483-502 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12100 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Shoe: Towards a Promiscuous Politics of Emergency Evacuation Mobility

    Adey, P., 1 Apr 2020, In: Environment and Planning D: Society and Space. 38, 2, p. 364-382 19 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Civic Empowerment through Digitalisation: The Case of Greenlandic Women

    Wendt, N., Jensen, R. B. & Coles-Kemp, L., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-13 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Digital Liminalities: Understanding Isolated Communities on the Edge

    Jensen, R. B., Coles-Kemp, L., Wendt, N. & Lewis, M., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., Apr 2020, CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Virtual Private Networks: Police Digital Security Centre

    Agha, D., Apr 2020

    Research output: Other contribution

  29. Published

    When the Civic Turn turns Digital: Designing Safe and Secure Refugee Resettlement

    Jensen, R. B., Coles-Kemp, L. & Talhouk, R., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Resilience Analysis of Software-Defined Networks Using Queueing Networks

    Nweke, L. O. & Wolthusen, S. D., 30 Mar 2020, 2020 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. E-pub ahead of print

    Prenatal and perinatal risk and protective factors for psychosis: a systematic review and meta-analysis

    Davies, C., Segre, G., Estradé, A., Radua, J., De Micheli, A., Provenzani, U., Oliver, D., Salazar de Pablo, G., Ramella-Cravaro, V., Besozzi, M., Dazzan, P., Miele, M., Caputo, G., Spallarossa, C., Crossland, G., Ilyas, A., Spada, G., Politi, P., Murray, R., McGuire, P. & 1 others, Fusar-Poli, P., 24 Mar 2020, (E-pub ahead of print) In: The Lancet Psychiatry. p. 1-12 12 p.

    Research output: Contribution to journalArticlepeer-review

  32. Unpublished

    Maximum-Matching based Maintenance of Structural Controllability

    Zhang, S., 3 Mar 2020, (Unpublished) 174 p.

    Research output: ThesisDoctoral Thesis

  33. Published

    Capturing Tacit Knowledge in Security Operation Centres

    Cho, S., Happa, J. & Creese, S., 24 Feb 2020, In: IEEE Access. 8, p. 42021 - 42041 21 p.

    Research output: Contribution to journalArticlepeer-review

  34. E-pub ahead of print

    Another Look at Some Isogeny Hardness Assumptions

    Merz, S-P., Minko, R. & Petit, C., 14 Feb 2020, (E-pub ahead of print) p. 496-511. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  35. E-pub ahead of print

    Cryptanalysis of the multivariate encryption scheme EFLASH

    Øygarden, M., Felke, P., Raddum, H. & Cid, C., 14 Feb 2020, (E-pub ahead of print) Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). Springer, p. 85-105 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Measuring the Effectiveness of Twitter's URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 2. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. E-pub ahead of print

    Exploring Trade-offs in Batch Bounded Distance Decoding

    Albrecht, M., Curtis, B. & Wunderer, T., 10 Jan 2020, (E-pub ahead of print) SAC 2019. Springer, p. 467-491 25 p. (Lecture Notes in Computer Science; vol. 11959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Too little too late: Can we control browser fingerprinting?

    Al-Fannah, N. M. & Mitchell, C., 7 Jan 2020, In: Journal of Intellectual Capital. 21, 2, p. 165-180 16 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Multilinear Maps from Obfuscation

    Albrecht, M. R., Farshim, P., Han, S., Hofheinz, D., Larraia, E. & Paterson, K. G., 2 Jan 2020, In: Journal of Cryptology. p. 1-34 34 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    A Session Hijacking Attack against a Device-Assisted Physical Layer Key Agreement

    HU, Q., DU, B., Markantonakis, K. & Hancke, G., Jan 2020, In: IEEE Transactions on Industrial Informatics. 16, 1, p. 691-702 12 p.

    Research output: Contribution to journalArticlepeer-review

  42. Submitted

    A Central Limit Framework for Ring-LWE Decryption

    Murphy, S. & Player, R., 2020, (Submitted).

    Research output: Working paper

  43. Submitted

    A Complete Analysis of the BKZ Lattice Reduction Algorithm

    Li, J. & Nguyen, P. Q., 2020, (Submitted) TBC.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Unpublished

    Advancements in Proxy Re-Encryption: Defining Security for wider Applications

    Lee, E., 2020, (Unpublished) 221 p.

    Research output: ThesisDoctoral Thesis

  45. Unpublished

    An Analysis of Primality Testing and Its Use in Cryptographic Applications

    Massimo, J., 2020, (Unpublished) 209 p.

    Research output: ThesisDoctoral Thesis

  46. Unpublished

    Building and breaking encrypted search schemes for ordered data

    Lacharite, M-S., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  47. Unpublished

    Cryptanalysis and Applications of Lattice-based Encryption Schemes

    Curtis, B., 2020, (Unpublished) 220 p.

    Research output: ThesisDoctoral Thesis

  48. Unpublished

    Cryptographic Security of SSH Encryption Schemes

    Hansen, T., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  49. Published

    Cryptography: The Key to Digital Security, How it Works, and Why it Matters

    Martin, K. M., 2020, New York: W.W. Norton. 320 p.

    Research output: Book/ReportBook

  50. Published

    Digital Identity: Ground-up Perspectives

    Coles-Kemp, L. & Heath, C. P. R., 2020, 46 p.

    Research output: Book/ReportBook

  51. Unpublished
  52. Published

    How private is your period? A systematic analysis of menstrual app privacy policies

    Shipp, L. & Blasco Alis, J., 2020, Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020). Vol. 2020(4). p. 491-510 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Unpublished

    Modelling Digital Banking Attackers – Attacker-Centric Approaches in Security

    Moeckel, C., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  54. Published
  55. Unpublished

    Security and Privacy in Emerging Communication Standards

    Khan, H., 2020, (Unpublished) 175 p.

    Research output: ThesisDoctoral Thesis

  56. Unpublished

    Techniques for the Automation of the Heap Exploit Synthesis Pipeline

    Repel, D., 2020, (Unpublished) 241 p.

    Research output: ThesisDoctoral Thesis

  57. Published

    The Handbook of Displacement

    Adey, P., Bowstead, J., Brickell, K., Desai, V., Dolton, M., Pinkerton, A. & Siddiqi, A., 2020, Palgrave Macmillan.

    Research output: Book/ReportAnthology

  58. In preparation

    The Way We Evacuate: emergency, reproduction and the aesthetics of mobility

    Adey, P., 2020, (In preparation) Duke University Press.

    Research output: Book/ReportBook

  59. Unpublished

    Towards A Better Understanding of Browser Fingerprinting

    Al-Fannah, N. M., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  60. Unpublished

    Variants of Group Signatures and Their Applications

    Garms, L., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  61. Unpublished

    Variants of LWE: Reductions, Attacks and a Construction

    Deo, A., 2020, (Unpublished) 179 p.

    Research output: ThesisDoctoral Thesis

  62. Unpublished

    Vulnerability Analysis of Power System State Estimation

    Gul, A., 2020, (Unpublished) 109 p.

    Research output: ThesisDoctoral Thesis

  63. 2019
  64. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists

    Bell, S., Paterson, K. & Cavallaro, L., 5 Dec 2019, arXiv.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  66. E-pub ahead of print

    Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving

    Kirshanova, E., Mårtensson, E., Postlethwaite, E. & Roy Moulik, S., 25 Nov 2019, (E-pub ahead of print) Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Springer, p. 521-551 31 p. (Lecture Notes in Computer Science; vol. 11921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. E-pub ahead of print

    Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

    Albrecht, M., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 22 Nov 2019, (E-pub ahead of print) ASIACRYPT 2019. p. 371-397 17 p. (Lecture Notes in Computer Science; vol. 11923).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. E-pub ahead of print

    Criminal use of cryptocurrencies: a great new threat or is cash still king?

    Butler, S., 20 Nov 2019, (E-pub ahead of print) In: Journal of Cyber Policy. p. 1-20 20 p.

    Research output: Contribution to journalArticlepeer-review

  69. E-pub ahead of print

    Subverting Decryption in AEAD

    Armour, M. & Poettering, B., 18 Nov 2019, (E-pub ahead of print) Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 22-41 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 14 Nov 2019, Central European Cybersecurity Conference 2019. ACM, p. 1-4 4 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T., 11 Nov 2019, Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM, p. 35-44 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

    Curtis, B. & Player, R., 11 Nov 2019, 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Springer, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    1st Workshop on Cyber-Security Arms Race (CYSARM 2019)

    Giannetsos, T. & Sgandurra, D., 6 Nov 2019, p. 2711-2712. 2 p.

    Research output: Contribution to conferenceOther

  74. E-pub ahead of print

    You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

    Loe, A. F. & Quaglia, E. A., 6 Nov 2019, (E-pub ahead of print) CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 2231-2247 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Functional repair codes: a view from projective geometry

    Ng, S. & Paterson, M., Nov 2019, In: Designs, Codes and Cryptography. 87, 11, p. 2701-2722 22 p.

    Research output: Contribution to journalArticlepeer-review

  76. Published

    The significance of securing as a critical component of information security: An Australian narrative

    Burdon, M. & Coles-Kemp, L., Nov 2019, In: Computers and Security. 87, p. 1-10 10 p., 101601.

    Research output: Contribution to journalArticlepeer-review

  77. E-pub ahead of print

    Anomaly Detection using Pattern-of-Life Visual Metaphors

    Happa, J., Bashford-Rogers, T., Agrafiotis, I., Goldsmith, M. & Creese, S., 21 Oct 2019, (E-pub ahead of print) In: IEEE Access. 7, p. 154018-154034 17 p.

    Research output: Contribution to journalArticlepeer-review

  78. Published

    Training Data and Rationality

    Mersinas, K., Sobb, T., Sample, C., Bakdash, J. & Ormrod, D., Oct 2019, European Conference on the Impact of Artificial Intelligence and Robotics. Griffiths, P. & Kabir, M. N. (eds.). Oxford, UK: Academic Conferences and Publishing International Limited, p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. E-pub ahead of print

    A Critique of Game-Based Definitions of Receipt-Freeness for Voting

    Fraser, A., Quaglia, E. & Smyth, B., 26 Sep 2019, (E-pub ahead of print) Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings. Springer, p. 189-205 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Threat Analysis for Smart Homes

    Kavallieratos, G., Chowdhury, N., Katsikas, S., Gkioulos, V. & Wolthusen, S. D., 25 Sep 2019, In: Future Internet. 11, 10, p. 1-19 19 p., 207.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    Substitution Attacks against Message Authentication

    Armour, M. & Poettering, B., 20 Sep 2019, In: IACR Transactions on Symmetric Cryptology. 2019, 3, p. 152-168 17 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks

    Grubbs, P., Lacharite, M-S., Minaud, B. & Paterson, K., 16 Sep 2019, 2019 IEEE Symposium on Security and Privacy (SP). IEEE Press, p. 1067-1083 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  83. E-pub ahead of print

    Feistel Structures for MPC, and More

    Albrecht, M., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 15 Sep 2019, (E-pub ahead of print) ESORICS 2019. p. 151-171 21 p. (Lecture Notes in Computer Science ; vol. 11736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. E-pub ahead of print

    Evacuated to Death: The Lexicon, Concept, and Practice of Mobility in the Nazi Deportation and Killing Machine

    Adey, P., 29 Aug 2019, (E-pub ahead of print) In: Annals of the Association of American Geographers. 110, 3, p. 808-826 19 p.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Structural Controllability Recovery via the Minimum-edge Addition

    Zhang, S. & Wolthusen, S., 29 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  86. Published

    Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

    Moeckel, C., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19): 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). Association for Computing Machinery (ACM), 93

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Location Tracking Using Smartphone Accelerometer and Magnetometer Traces

    Nguyen, D. K. A., Akram, R. N., Markantonakis, K., Luo, Z. & Watkins, C., 26 Aug 2019, The First Location Privacy Workshop (LPW 2019), the 14th International Conference on Availability, Reliability and Security (ARES 2019). Association for Computing Machinery (ACM), p. 1-9 9 p. 96

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. E-pub ahead of print

    Intrusion Detection in Robotic Swarms

    Sargeant, I. & Tomlinson, A., 24 Aug 2019, (E-pub ahead of print) Proceedings of SAI Intelligent Systems Conference. Bi, Y., Bhatia, R. & Kapoor, S. (eds.). Springer, Vol. 2. p. 968-980 13 p. (Advances in Intelligent Systems and Computing; vol. 1038).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    On the Efficacy of New Privacy Attacks against 5G AKA

    Khan, H. & Martin, K., 16 Aug 2019, p. 431-438. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  90. Published

    Driver-Node based Security Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 15 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  91. Published
  92. Published

    State Estimation under Undetectable Single and Double Line Failures: Anonymised for review

    Gul, A. & Wolthusen, S. D., 8 Aug 2019, 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Time Accuracy De-Synchronisation Attacks Against IEC 60870-5-104 and IEC 61850 Protocols

    Wright, J. & Wolthusen, S. D., 8 Aug 2019, p. 1-5. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  94. E-pub ahead of print

    Parameterized Resiliency Problems

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 7 Aug 2019, (E-pub ahead of print) In: Theoretical Computer Science. p. 1-14 14 p.

    Research output: Contribution to journalArticlepeer-review

  95. E-pub ahead of print

    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

    Inoue, Iwata, Minematsu & Poettering, B., 1 Aug 2019, (E-pub ahead of print) p. 3-31. 29 p.

    Research output: Contribution to conferencePaperpeer-review

  96. Published

    TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., Aug 2019, 28th USENIX Security Symposium (USENIX Sec). p. 729-746 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Sonification to Support the Monitoring Tasks of Security Operations Centres

    Axon, L., Happa, J., van Rensburg, A. J., Goldsmith, M. & Creese, S., 29 Jul 2019, In: IEEE Transactions on Dependable and Secure Computing. p. 1-17 17 p.

    Research output: Contribution to journalArticlepeer-review

  98. Published
  99. Published

    Improved Security Notions for Proxy Re-Encryption to Enforce Access Control

    Lee, E., 20 Jul 2019, Progress in Cryptology – LATINCRYPT 2017: International Conference on Cryptology and Information Security in Latin America. Springer, p. 66-85 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Cyber War, Supply Chains, and Realism in Lithuania

    Agha, D., 17 Jul 2019

    Research output: Other contribution

  101. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, Progress in Cryptology – AFRICACRYPT 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings. Springer, p. 429-447 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published
Previous 1 2 3 4 5 6 7 8 ...22 Next