Home > Publications

Publications

36301 - 36400 out of 41,420Page size: 100
  1. Conference contribution › Research
  2. Published

    A Security Policy Infrastructure for Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 37-51 15 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A semantical approach to equilibria and rationality

    Pavlovic, D., 2009, Proceedings of CALCO 2009. Kurz, A. & Tarlecki, A. (eds.). Springer-Verlag, Vol. 5728. p. 317-334 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    A Semantics of Business Configurations Using Symbolic Graphs

    Mylonakis, N., Orejas, F. & Fiadeiro, J. L., 20 Aug 2015, Proceedings of the 12th IEEE International Conference on Services Computing. IEEE Computer Society Press, p. 146-153 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A service discovery threat model for ad hoc networks

    Leung, A. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 167-174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. E-pub ahead of print

    A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags

    Bonnefoi, P-F., Dusart, P., Sauveron, D., Akram, R. & Markantonakis, K., 3 Dec 2015, (E-pub ahead of print) The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A short-form measure of attitudes towards using mobile information systems

    Ogertschnig, M. & van der Heijden, H., 2004, Proceedings of the 17th Bled Electronic Commerce conference. Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    A Simulation Framework for Photon-Particle Interactions for Laserwires and Further Applications

    Alden, S., Gibson, S. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 4045-4048 4 p. THPRB095

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    A situated knowledge work context perspective on knowledge management software-organisation misalignments

    Le Nguyen, K., Dyerson, R. & Harindranath, G., 2009, Proceedings of the 2009 European Conference on Information Systems (ECIS), Verona, Italy. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. E-pub ahead of print

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K., 23 Aug 2017, (E-pub ahead of print) SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A Smart Micro-Grid Architecture for Resource Constrained Environments

    Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 2017, Advanced Information Networking and Applications (AINA), 2017 IEEE 31st International Conference on. IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    A sound algorithm for asynchronous session subtyping

    Bravetti, M., Carbone, M., Lange, J., Yoshida, N. & Zavattaro, G., 20 Aug 2019, 30th International Conference on Concurrency Theory, CONCUR 2019. Fokkink, W. & van Glabbeek, R. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 16 p. 38. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 140).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    A Spatial Perspective of Innovation and Development: Innovation Hubs in Zambia and the UK

    Jimenez Cisneros, A. & Zheng, Y., 16 May 2017, 14th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2017, Yogyakarta, Indonesia, May 22-24, 2017, Proceedings. Springer, p. 171-181 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    A static verification framework for message passing in Go using behavioural types

    Lange, J., Ng, N., Toninho, B. & Yoshida, N., 27 May 2018, Proceedings of the 40th International Conference on Software Engineering, ICSE 2018. IEEE Computer Society, p. 1137-1148 12 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    A stochastic simulation system and its application to causal models

    Luo, Z. & Gammerman, A., 1990, Proceeding of 3rd International Conference on IPMU in Knowledge-Based Systems. p. 186-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    A storage complexity based analogue of Maurer key establishment using public channels

    Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 84-93 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. A Study of Internet of Things (IoT) and its Impacts on Global Supply Chains

    Shah, S., Bolton, M. & Menon, S., Jan 2020, Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020. Institute of Electrical and Electronics Engineers Inc., p. 245-250 6 p. 9051474. (Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    A study of the quantum dot in application to terahertz single photon counting

    Hashiba, H., Antonov, V., Kulik, L. & Komiyama, S., 2008, CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPRINTRONICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 209-214 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. E-pub ahead of print

    A Subfield Lattice Attack on Overstretched NTRU Assumptions: Cryptanalysis of Some FHE and Graded Encoding Schemes

    Albrecht, M., Bai, S. & Ducas, L., 21 Jul 2016, (E-pub ahead of print) Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 153-178 26 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    A Substitution Operation for Constraints

    Jeavons, P. G., Cohen, D. A. & Cooper, M. C., 1 May 1994, Principles and Practice of Constraint Programming: Second International Workshop, PPCP '94 Rosario, Orcas Island, WA, USA, May 2–4, 1994 Proceedings. Borning, A. (ed.). Vol. 874. p. 1-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A Surfeit of SSH Cipher Suites

    Albrecht, M., Degabriele, J., Hansen, T. & Paterson, K., 24 Oct 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1480-1491 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks

    Wolthusen, S. D. & Al-Kuwari, S., Feb 2009, Digital Forensics and Cyber Crime: First International ICST Conference ICDF2C. Springer-Verlag, p. 19-32

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them

    Sbai, H., Goldsmith, M., Meftali, S. & Happa, J., 23 Sep 2018, (E-pub ahead of print) International Symposium on Cyberspace Safety and Security. p. 18-32 15 p. (Lecture Notes in Computer Science; vol. 11161).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A survey of security services and techniques in distributed storage systems

    Xu, Z., Martin, K. M. & Kotnik, C., 2011, Proceedings of the 2011 International Conference on Security and Management (SAM '11). p. 3-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A Synthetic Strategy Implementation Model

    Aboutalebi, R. & Tan, H., 10 Sep 2013, In: BAM (British Academy of Management), 27th Annual Conference of BAM: Managing to Make a Difference. 10-12 September 2013, Aintree Racecourse, Liverpool, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors

    Reina, A., Fattori, A. & Cavallaro, L., 14 Apr 2013, ACM European Workshop on Systems Security (EuroSec). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    A system for intrinsic evolution of linear and non-linear filters

    Flockton, S. & Sheehan, K., 1999, Proceedings 1st NASA/DoD Workshop on Evolvable Hardware. p. 93-100 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    A System-Based Strategy Implementation Model

    Aboutalebi, R. & Tan, H., 8 Sep 2013, In: UK Systems Society, 17th Annual Conference of the UK Systems Society: Systems and Society- Ideas from Practice. 08-10 September 2013, St Anne’s College, Oxford University, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    A Tactile Visual Library To Support User Experience Storytelling

    Lewis, M. & Coles-Kemp, L., 2014, Proceedings of NordDesign 2014. Design Society, 2014.. Aalto Design Factory, p. 386 395 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    A taxonomy of government approaches towards online identity management

    Seltsikas, P. & van der Heijden, H., 2010, 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010). LOS ALAMITOS: IEEE COMPUTER SOC, p. 1852-1859 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    A taxonomy of single sign-on systems

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security and Privacy - 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings. Safavi-Naini, R. & Seberry, J. (eds.). Springer-Verlag, Vol. 2727. p. 249-264 16 p. (Lecture Notes in Computer Science; vol. 2727).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    A Tentative Model of Strategy Implementation

    Aboutalebi, R., 21 Mar 2013, In: AIB (Academy of International Business), 40th Academy of International Business: International Business, Institutions and Performance after the Financial Crisis. 21-23 March 2013, Aston Business School, Birmingham, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    A Tighter Bound for Counting Max-Weight Solutions to 2SAT Instances

    Wahlström, M., 1 May 2008, 3rd International Workshop on Parameterized and Exact Computation (IWPEC 2008). Grohe, M. & Niedermeier, R. (eds.). Victoria (BC), Canada: Springer, Vol. 5018. p. 202-213 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    A time- and message-optimal distributed algorithm for minimum spanning trees

    Pandurangan, G., Robinson, P. & Scquizzato, M., 19 Jun 2017, STOC 2017: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. New York: Association for Computing Machinery (ACM), p. 743-756 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    A timed component algebra for services

    Delahaye, B., Fiadeiro, J. L., Legay, A. & Lopes, A., 2013, FMOODS/FORTE. Beyer, D. & Borelae, M. (eds.). Springer, p. 242-257 16 p. (Lecture Notes in Computer Science; vol. 7892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    A tour around finitely presented infinite simple groups

    Scott, E., 1989, Algorithms And Classification in Combinatorial Group Theory. Springer-Verlag, p. 83-119

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    A tunable proof of ownership scheme for deduplication using Bloom filters

    Blasco, J., Di Pietro, R., Orfila, A. & Sorniotti, A., 29 Dec 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 481-489 9 p. 6997518. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    A type-theoretic framework for formal reasoning with different logical foundations

    Luo, Z., 2007, Advances in Computer Science, Proc of the 11th Annual Asian Computing Science Conference. LNCS 4435. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    A Unifying Theory of Dependent Types: the schematic approach

    Luo, Z., 1992, Proc. of Symp. on Logical Foundations of Computer Science (Logic at Tver'92), LNCS 620.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    A Universal Client-based Identity Management Tool

    Al-Sinani, H. S. & Mitchell, C. J., 2012, Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers: 8th European Workshop on Public Key Infrastructures, Services and Applications, Leuven, Belgium, 15th/16th September 2011. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Springer-Verlag, p. 49-74 26 p. (Lecture Notes in Computer Science; no. 7163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    A user-centric m-payment solution

    Zhang, Q., Mayes, K. & Markantonakis, K., 1 Nov 2005, Mobile Technology, Applications and Systems, 2005 2nd International Conference on. p. 8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    A User-Centric Solution To Realise M-Payment

    Zhang, Q. & Mayes, K., 2005, A User-Centric Solution To Realise M-Payment. Belgium

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    A viable grid marketplace

    Li, Q. & Martin, K. M., 2010, Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010). IEEE Computer Society Press, p. 427-432

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 8 Jul 2013, The 25th IFIP International Information Security Conference (SEC 2013). Springer-Verlag, Vol. 405. p. 102-110 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Abstract Constraint Data Types

    Fiadeiro, J. L. & Orejas, F., 2015, Software, Services, and Systems: Essays Dedicated to Martin Wirsing on the Occasion of His Retirement from the Chair of Programming and Software Engineering. de Nicola, R. & Hennicker, R. (eds.). Springer, p. 155-170 16 p. (Lecture Notes in Computer Science; vol. 8950).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Abstract object types – a temporal perspective

    SERNADAS, A., FIADEIRO, J., SERNADAS, C. & EHRICH, H. D., 1989, TEMPORAL LOGIC IN SPECIFICATION. BANIEQBAL, B., BARRINGER, H. & PNUELI, A. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 324-350 27 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Abusing the Tutte Matrix: An Algebraic Instance Compression for the K-set-cycle Problem

    Wahlström, M., 2013, STACS. p. 341-352 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Access control and authorization constraints for WS-BPEL

    Bertino, E., Crampton, J. & Paci, F., 2006, Proceedings of IEEE International Conference on Web Services. IEEE Computer Society Press, p. 275-284 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 2017, Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (eds.). Springer, p. 239-251 13 p. (Lecture Notes in Computer Science; vol. 10242).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of 3rd Annual Information Security South Africa Conference (ISSA 2003). p. 75-88 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Access Control in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2015. ACM, p. 657-662 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Accessibility and Adoption of Industry 4.0 Technologies for Small Manufacturing Firms

    Shah, S., Samadi, S. & Lin, T. F., Nov 2021, IEEE Int. Conference on Technology Management Operations and Decisions. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Accessing a New Land: Designing for a Social Conceptualisation of Access

    Coles-Kemp, L. & Jensen, R. B., 2 May 2019, CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-12 12 p. 181

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Accessing External Applications from Knowledge-Based Systems

    Cosmadopoulos, Y., Southwick, R. & Stathis, K., 1990, Proceedings of Expert Systems 90, Research and Development in Expert Systems VII. Addis, T. R. & Muir, R. M. (eds.). p. 54-65 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Unpublished

    Accreditation of Hospitals in Iran” Presented at the Critical Perspectives on Accounting Conference, Toronto, Canada, (International conference: July, 2014).

    Agyemang, G. & Agrizzi, D., 8 Jul 2014, (Unpublished) Critical Perspectives on Accounting Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 210-215 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Achieving Efficient and Optimal Joint Action in Distributed Cognitive Radio Networks Using Payoff Propagation

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. In preparation

    Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution

    Bhattacharya, S., Garcia-Morchon, O., Player, R. & Tolhuizen, L., 2019, (In preparation) Eprint.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Achieving social integration to implement ERP systems

    Elbanna, A., 2003, The European Conference of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Achieving strategic growth in microenterprises through information technology: UK micro enterprise case study

    Shah, S., Long, M. & Ganji, E. N., 9 Feb 2018, 2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017. IEEE Computer Society Press, p. 1133-1137 5 p. (IEEE International Conference on Industrial Engineering and Engineering Management; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Action-Based Environment Modeling for Maintaining Trust

    Kafali, O. & Yolum, P., 2008, Trust in Agent Societies. Vol. 5396. p. 81-98 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Active Disk Paxos with infinitely many processes

    Chockler, G. & Malkhi, D., 1 Jan 2002, Proceedings of the 21st Annual ACM Symposium on Principles of Distributed Computing (PODC 2002). p. 78-87 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Activity Recognition for an Agent-oriented Personal Health System

    Kafali, O., Romero, A. E. & Stathis, K., Dec 2014, Principles and Practice of Multi-Agent Systems - 17th International Conference, PRIMA 2014. Khanh Dam, H., Pitt, J., Xu, Y., Governatori, G. & Ito, T. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Actor-Network Procedures

    Pavlovic, D. & Meadows, C., 2012, Distributed Computing and Internet Technology: 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012: Proceedings. Ramanujam, R. & Ramaswamy, S. (eds.). Springer-Verlag, p. 7-26 (Lecture Notes in Computer Science; vol. 7154).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Actual and perceived levels of risk in consumer e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2001, Proceedings - 2nd International We-B Conference 2001, Perth, Western Australia, November 2001. p. 207-216 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Adapting Reinforcement Learning For Trust: Effective Modeling in Dynamic Environments (Short Paper)

    Kafali, O. & Yolum, P., 2009, IEEE / WIC / ACM International Conference on Web Intelligence. p. 383-386 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Adaptive bone abnormality detection in medical imagery using deep neural networks

    Storey, O., Wei, B., Zhang, L. & Romuald Fotso Mtope, F., 15 Aug 2020, World Scientific Proceedings Series on Computer Engineering and Information Science. In: Developments of Artificial Intelligence Technologies in Computation and Robotics. World Scientific Proceedings Series on Computer Engineering and Information Science, 12.: World Scientific, Singapore, p. 915-922 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Adaptive Hedge

    Erven, T. V., Rooij, S. D., Koolen, W. M. & Grünwald, P., 1 Dec 2011, Proceedings of the 25th Annual Conference on Neural Information Processing Systems (NIPS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Adaptive totally ordered multicast protocol that tolerates partitions

    Chockler, G. V., Huleihel, N. & Dolev, D., 1998, Proceedings of the 17th ACM Symposium on Principles of Distributed Computing (PODC '98). ACM, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Addressing privacy issues in CardSpace

    Alrodhan, W. & Mitchell, C. J., 2007, Proceedings of IAS '07, Third International Symposium on Information Assurance and Security, Manchester, UK, August 2007. IEEE Computer Society Press, p. 285-291 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Addressing privacy issues in location-based collaborative and distributed environments

    Saracino, A., Sgandurra, D. & Spagnuelo, D., 2014, 2014 International Conference on Collaboration Technologies and Systems, CTS 2014. IEEE Computer Society, p. 166-172 7 p. 6867560

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Addressing Threats to Real-World Identity Management Systems

    Li, W. & Mitchell, C., 16 Oct 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Wiesbaden: Springer Vieweg, p. 251-259 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Administrative scope and hierarchy operations

    Crampton, J. & Loizou, G., 2002, Proceedings of 7th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 145-154 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Adoption of Additive Manufacturing Approaches: The Case of Manufacturing SMEs

    Shah, S. & Mattiuzza, S., 13 Aug 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. IEEE, 8436257. (2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Adoption of mobile technologies in Malawian academic libraries: the case of Mzuzu University Library

    Kapondera, S. K. & Ngalande, E., 2016, Standing Conference of Eastern, Central and Southern African Library and Information Associations. p. 165-174 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Advanced technology integration in food manufacturing supply chain environment: Pathway to sustainability and companies' prosperity

    Ojo, O. O., Shah, S., Zigan, S. & Orchard, J., Jun 2019, 2019 IEEE Technology and Engineering Management Conference, TEMSCON 2019. Institute of Electrical and Electronics Engineers Inc., 8813713. (2019 IEEE Technology and Engineering Management Conference, TEMSCON 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Adventures with Lucos Cozza: a conduit beneath the grounds of the Villa Wolkonsky - the Lateran branch of the Acqua Felice (1586-88)

    Claridge, A., 20 Apr 2014, Scritti in onore di Lucos Cozza. Coates-Stephens, R. & Cozza, L. (eds.). Rome: Edizioni Quasar Rome, p. 192-197 5 p. (Lexicon Topographicum Urbis Romae Supplementum; vol. VII).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. E-pub ahead of print

    Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols

    Nweke, L. O., Kahsay Weldehawaryat, G. & Wolthusen, S. D., 11 May 2020, (E-pub ahead of print) 2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 9089346. (2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Unpublished

    Aesthetics of Conventionalisation and the Contributions to Xiqu's Intercultural Communication

    Li, X., 2018, (Unpublished) Intercultural Communications, Translation, and Methods of Teaching Foreign Languages.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Affordance Theory in Social Media Research: Systematic Review and Synthesis of The Literature

    Hafezieh, N. & Eshraghian, F., 2017, European Conference on Information Systems Proceedings. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    'Affordance’-what does this mean?

    Hafezieh, N. & Harwood, S., 2017, Proceedings of Twenty Second UK Academy of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    After Beckett: Edward Bond’s Post-Auschwitz Dramaturgy of Ruins

    Chen, C-C., 5 Sep 2016, TaPRA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Unpublished

    Agency and institutions in MNC research: the contribution of critical realism

    Rees, C., Jul 2012, (Unpublished) 28th European Group for Organizational Studies (EGOS) Colloquium. Helsinki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Unpublished

    Agency Issues and Investment: A Comparative Analysis of the UK and Pakistani Listed firms

    Naeem, K. & Li, M. C., 2018, (Unpublished) Proceedings of New York International Business and Social Science Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Aggregating strategies

    Vovk, V., 1990, Proceedings of the Third Annual Workshop on Computational Learning Theory. Fulk, M. & Case, J. (eds.). San Mateo, CA: Morgan Kaufmann, p. 371-383 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Aggregation Algorithm vs. Average For Time Series Prediction

    Jamil, W., Kalnishkan, Y. & Bouchachia, H., 23 Sep 2016, Proceedings of the ECML PKDD 2016 Workshop on Large-scale Learning from Data Streams in Evolving Environments, STREAMEVOLV-2016. p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Agreement in Directed Dynamic Networks

    Biely, M., Robinson, P. & Schmid, U., 2012, Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30-July 2, 2012, Revised Selected Papers. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Algebraic Cryptanalysis and RFID Authentication

    Cid, C., Ferreira, L., Procter, G. & Robshaw, M., 21 Nov 2015, The 11th Workshop on RFID Security - RFIDSec 2015. Springer, p. 104-121 18 p. (Lecture Notes in Computer Science; vol. 9440).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. E-pub ahead of print

    Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

    Albrecht, M., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 22 Nov 2019, (E-pub ahead of print) ASIACRYPT 2019. p. 371-397 17 p. (Lecture Notes in Computer Science; vol. 11923).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Algebraic Knowledge Representation: The Unification of Procedure, Logic and Structure

    Sernadas, A., Sernadas, C. & Fiadeiro, J. L., 1986, ADT.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Albrecht, M., Cid, C., Dullien, T., Faugere, J-C. & Perret, L., 2010, Information Security and Cryptology - 6th International Conference, Inscrypt 2010. Springer, Vol. 6584. p. 387-403 17 p. (Lecture Notes in Computer Science - LNCS; vol. 6584).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Algebraic Proof Complexity: Progress, Frontiers and Challenges

    Pitassi, T. & Tzameret, I., 2017, Electronic Colloquium on Computation Complexity .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Algebraic Proofs over Noncommutative Formulas

    Tzameret, I., 2010, 7th Annual Conference on Theory and Applications of Models of Computation. Berlin, Vol. 6108. p. 60 71 p. (Lecture Notes in Computer Science (LNCS)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Algebraic Semantics of Coordination or What Is in a Signature

    Fiadeiro, J. L. & Lopes, A., 1999, AMAST. Springer, Vol. 1548. p. 293-307 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Algebraic Software Architecture Reconfiguration

    Wermelinger, M. & Fiadeiro, J. L., 1999, ESEC / SIGSOFT FSE. Springer, Vol. 1687. p. 393-409 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Algebraic Techniques in Differential Cryptanalysis

    Albrecht, M. & Cid, C., 2009, Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009: Revised Selected Papers. Dunkelman, O. (ed.). Springer, p. 193-208 16 p. (Lecture Notes in Computer Science - LNCS; vol. 5665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. E-pub ahead of print

    Algebras for Tree Decomposable Graphs

    Bruni, R., Montanari, U. & Sammartino, M., 23 Jun 2020, (E-pub ahead of print) Graph Transformation - 13th International Conference, ICGT 2020, Held as Part of STAF 2020, Proceedings. Gadducci, F. & Kehrer, T. (eds.). Springer, p. 203-220 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12150 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks

    Wolthusen, S. D. & Al-Kuwari, S., May 2010, Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference (MobiSec 2010). Springer-Verlag, p. 67-79

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Alternating Control Flow Reconstruction

    Kinder, J. & Kravchenko, D., Jan 2012, Proc. 13th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2012). Springer, p. 267-282

    Research output: Chapter in Book/Report/Conference proceedingConference contribution