1. E-pub ahead of print

    Tokenisation Blacklisting Using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K., 14 Jun 2017, (E-pub ahead of print) Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. p. 182-198 17 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Too little too late: Can we control browser fingerprinting?

    Al-Fannah, N. M. & Mitchell, C., 7 Jan 2020, In: Journal of Intellectual Capital. 21, 2, p. 165-180 16 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., Apr 2020, CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Unpublished

    Topology-Aware Vulnerability Mitigation Worms: Defensive Worms

    Al-Salloum, Z., 2011, (Unpublished) 211 p.

    Research output: ThesisDoctoral Thesis

  5. Published

    Torsion-free metabelian groups with commutator quotient C_p^n x C_p^m

    Cid, C., 2002, In: Journal of Algebra. 248, p. 15-36 22 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric

    de Amorim, R. C. & Komisarczuk, P., 2014, Case Studies in Secure Computing: Achievements and Trends. 1st ed. CRC Press, p. 295 1 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Unpublished

    Towards A Better Understanding of Browser Fingerprinting

    Al-Fannah, N. M., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  8. Published

    Towards a Common Notion of Privacy Leakage on Public Database

    Kiyomoto, S. & Martin, K. M., 2010, Proceedings of Fifth International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10). IEEE Computer Society Press, p. 186-191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection

    Legg, P. A., Moffat, N., Nurse, J. R. C., Happa, J., Agrafiotis, I., Goldsmith, M. & Creese, S., 2013, In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4, 4, p. 20-37 18 p.

    Research output: Contribution to journalArticlepeer-review

  10. E-pub ahead of print

    Towards a Framework for Testing the Security of IoT Devices Consistently

    Lally, G. & Sgandurra, D., 24 Nov 2018, (E-pub ahead of print) 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, Vol. 11263. p. 88-102 15 p. (Lecture Notes in Computer Science ; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Towards a model facilitating discussions about Cyber Attacks and Defences

    Happa, J., Fairclough, G., Goldsmith, M. & Creese, S., 2014, Proceedings of the Workshop on Ethics and Policies for Cyber Warfare. NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Unpublished

    Towards a Multidisciplinary Framework for the Design and Analysis of Security Ceremonies

    Carlos, M., 2014, (Unpublished) 200 p.

    Research output: ThesisDoctoral Thesis

  13. Published

    Towards a Visual Grammar for IoT Systems Representation and their Cybersecurity Requirements

    Gómez-Cabrera, A., Escamilla-Ambrosio, P. J., Rodríguez-Mota, A. & Happa, J., 12 Oct 2020, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  14. Published

    Towards an Access-Control Framework for Countering Insider Threats

    Crampton, J. & Huth, M., 2010, Insider Threats in Cyber Security and Beyond. Bishop, M., Gollmann, D., Hunker, J. & Probst, C. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Towards Automated Android App Collusion Detection

    AsǍvoae, I. M., Blasco, J., Chen, T. M., Kalutarage, H. K., Muttik, I., Nguyen, H. N., Roggenbach, M. & Shaikh, S. A., 2016, p. 29-37. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  16. Published

    Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis

    Crampton, J., Gutin, G. & Majumdar, D., 19 Aug 2021, In: ACM Transactions on Privacy and Security. 24, 3, p. 1-22 22 p., 21.

    Research output: Contribution to journalArticlepeer-review

  17. E-pub ahead of print

    Towards Bidirectional Ratcheted Key Exchange

    Poettering, B. & Rösler, P., 25 Jul 2018, (E-pub ahead of print) p. 3-32. 30 p.

    Research output: Contribution to conferencePaperpeer-review

  18. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Towards Distributed Collaborative Workflow Management for Mobile Devices

    Kocúrová, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Towards enforcing on-the-fly policies in BYOD environments

    Costantino, G., Martinelli, F., Saracino, A. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 61-65 5 p. 6947734

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Towards improved distributed collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, First International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Forthcoming

    Towards Improving Code Stylometry Analysis in Underground Forums

    Tereszkowski-Kaminski, M., Pastrana, S., Blasco Alis, J. & Suarez-Tangil, G., 16 Sep 2021, (Accepted/In press) 22nd Privacy Enhancing Technologies Symposium (PETS 2022). p. 126-147 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Towards privacy in a context-aware social network based recommendation system

    Yau, P-W. & Tomlinson, A., 1 Oct 2011.

    Research output: Contribution to conferencePaper

  24. Unpublished

    Towards the Secure Initialisation of a Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A. & Pearce, D. B., 1 Jul 2005, (Unpublished).

    Research output: Working paper

  25. Published

    Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R. & Markantonakis, K., 3 Apr 2017, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution