Home > Publications

Publications

36401 - 36500 out of 41,680Page size: 100
  1. Conference contribution › Research
  2. Published

    A comparison of differential optical absorption spectrometers for measurements of NO2, O3, SO2, and HONO

    Coe, H., Jones, R. L., Colin, R., Carleer, M., Harrison, R. M., Peak, J., Plane, J. M. C., Smith, N., Allan, B., Clemitshaw, K. C., Burgess, R. A., Platt, U., Etzkorn, T., Stutz, J., Pommereau, J. P., Goutail, F., NunesPinharanda, M., Simon, P., Hermans, C. & Vandaele, A. C., 1997, PROCEEDINGS OF EUROTRAC SYMPOSIUM '96 - TRANSPORT AND TRANSFORMATION OF POLLUTANTS IN THE TROPOSPHERE, VOL 2. SOUTHAMPTON: COMPUTATIONAL MECHANICS PUBLICATIONS LTD, p. 757-762 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A comparison of social tagging designs and user participation

    Bentley, C. & Labelle, P., 2008, Proceedings from DC 2008: International Conference on Dublin Core and Metadata Applications. The Dublin Core Metadata Initiative, p. 205-205

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    A comparison of the cryptographic requirements for digital secure speech systems operating at different bit rates

    Mitchell, C. J., 1984, International conference on Secure Communication Systems, IEE, London, 22-23rd February 1984. IEE Press, p. 32-37 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A Comparison of Three Implementations of Multi-Label Conformal Prediction

    Wang, H., Liu, X., Nouretdinov, I. & Luo, Z., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 241-250 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    A Comparison of Trust Models

    Sel, M., 15 Sep 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Pohlmann, N., Reimer, H. & Schneider, W. (eds.). Springer-Verlag, p. 206-215 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A Comparison of Venn Machine with Platt's Method in Probabilistic Outputs

    Zhou, C., Nouretdinov, I., Luo, Z., Adamskiy, M., Coldham, N. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15-18, 2011, Proceedings , Part II. . p. 483-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Submitted

    A Complete Analysis of the BKZ Lattice Reduction Algorithm

    Li, J. & Nguyen, P. Q., 2020, (Submitted) TBC.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    A Completeness Theory for Polynomial (Turing) Kernelization

    Hermelin, D., Kratsch, S., Soltys, K., Wahlström, M. & Wu, X., 2013, IPEC. Springer, Vol. LNCS 8246. p. 202 215 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A Compositional Approach to Connector Construction

    Lopes, A., Wermelinger, M. & Fiadeiro, J. L., 2001, WADT. Springer, Vol. 2267. p. 201-220 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. A Comprehensive Formal Security Analysis of OAuth 2.0

    Fett, D., Küsters, R. & Schmitz, G., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1204-1215 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Forthcoming

    A Conceptual Framework for Managing Expectations in Green IS Implementation

    Jackson, S. & Fearon, C., 17 Mar 2016, (Accepted/In press) 22nd IEEE International Technology Management Conference, Trondheim, Norway.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    A Conceptual Framework for Smartphone Security Among Arab Millennials

    Shah, M. & Ameen, N., 2019, UK Academy of Information Systems (UKAIS). p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. A conceptual framework towards continuous transformation of sustainable food manufacturing and logistics

    Ojo, O. O. & Shah, S., Jan 2020, Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020. Institute of Electrical and Electronics Engineers Inc., p. 209-214 6 p. 9051539. (Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    A Constructive Approach for Proving Data Structures’ Linearizability

    Lev-Ari, K., Chockler, G. & Keidar, I., 5 Nov 2015, Distributed Computing 29th International Symposium, DISC 2015 Tokyo, Japan, October 7–9, 2015 Proceedings. Moses, Y. (ed.). Springer-Verlag, Vol. 9363. p. 356–370 15 p. 97. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2009, Hannover, Germany, June 22-24, 2009. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    A contingency approach to entrepreneurial leadership: an exploratory case study of two Chinese private enterprises

    Wang, C. L., Tee, D. D. & Ahmed, P. K., 2011, 34th Annual Institute for Small Business and Entrepreneurship Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    A contract-based event driven model for collaborative security in financial information systems

    Baldoni, R., Lodi, G., Chockler, G., Dekel, E., Mulcahy, B. P. & Martufi, G., 2010, ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems. p. 147-153 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    A Cooperative Information System for the Connected Communities

    Pitt, J., Mamdani, E. & Stathis, K., 1 May 1998, Proceedings of COOP'98: Improving the Design of Cooperative Systems. Darses, F. & Zarate, P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A cost bounded possibilistic ATMS

    Bigham, J., Luo, Z. & Banerjee, D., 1995, European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Lecture Notes in Computer Science . Froidevaux, C. & Kohlas, J. (eds.). Springer, Vol. 946. p. 52-59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    A cost bounded possibilistic ATMS

    Bigham, J., Luo, Z. & Banerjee, D., 1994, Proceedings of Expert Systems 94 . Bramer, M. A. & Macintosh, A. L. (eds.). p. 161-172

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A criterion for the existence of predictive complexity for binary games

    Kalnishkan, Y., Vovk, V. & Vyugin, M. V., 2004, Proceedings of the Fifteenth International Conference on Algorithmic Learning Theory. Ben-David, S., Case, J. & Maruoka, A. (eds.). Heidelberg: Springer, Vol. 3244. p. 249-263 15 p. (Lecture Notes in Artificial Intelligence; vol. 3244).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. E-pub ahead of print

    A Critique of Game-Based Definitions of Receipt-Freeness for Voting

    Fraser, A., Quaglia, E. & Smyth, B., 26 Sep 2019, (E-pub ahead of print) Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings. Springer, p. 189-205 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A Cryptographic Analysis of the WireGuard Protocol

    Dowling, B. & Paterson, K. G., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer-Verlag, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    A cultural theory analysis of information systems adoption

    Jackson, S., 2010, AMCIS 2010: 16th Americas Conference on Information Systems: Sustainable IT Collaboration around the Globe, Lima, PE, 12 - 15 Aug .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    A device management framework for secure ubiquitous service delivery

    Leung, A. & Mitchell, C. J., 2008, Proceedings: the Fourth International Symposium on Information Assurance and Security (IAS 2008), Naples, Italy, September 2008. Los Alamitos, CA: IEEE Computer Society Press, p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    A dialectic architecture for computational autonomy

    Witkowski, M. & Stathis, K., 2004, Agents and computational autonomy: potential, risks, and solutions. Springer-Verlag, Vol. 2969. p. 261-273 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    A Distributed Treatment of Exceptions in Multiagent Contracts (Preliminary Report)

    Kafali, O. & Yolum, P., 2011, Proceedings of the 9th International Workshop on Declarative Agent Languages and Technologies (DALT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation

    Walter, C. D., 2012, CT-RSA. Dunkelman, O. (ed.). Springer, Vol. 7178. p. 84-97 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins

    Zhang, Q., Markantonakis, K. & Mayes, K., 2007, A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. China: Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    A Fair Biometric Enabled M-Payment Solution with Anonymity Support

    Zhang, Q., Mayes, K. & Markantonakis, K., 2005, A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    A FAST Front End Application

    Stathis, K., 1 Apr 1994, Proceedings of the 2nd International Conference on the Practical Applications of Prolog (PAP'94). Sterling, L. (ed.). p. 537-548 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    A Fast Glimpse of Knowledge-Based Front-Ends as Games

    Stathis, K. & Sergot, M. J., 1 Oct 1996, Proc. of 1st International Conference on Successes and Failures of Knowledge-Based Systems in Real World Applications. Batanov, D. & Brezillon, P. (eds.). Bangkok, Thailand: AIT Press, p. 19-33 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    A Faster Fixed-Parameter Approach to Drawing Binary Tanglegrams

    Böcker, S., Hüffner, F., Truss, A. & Wahlström, M., 2009, Parameterized and Exact Computation : 4th International Workshop, IWPEC 2009. Chen, J. & Fomin, F. V. (eds.). Copenhagen, Denmark: Springer, Vol. 5917. p. 38-49 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    A Fibre Coupled, Low Power Laserwire Emittance Scanner at CERN LINAC4

    Gibson, S., Boorman, G., Bosco, A., Kruchinin, K., Hofmann, T., Roncarolo, F., Pozimski, J., Gabor, C. & Letchford, A., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 3725-3728 4 p. THPME190

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    A flexible object-oriented system for teaching and learning structured IR

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2007, Proceedings of the First International Workshop on Teaching and Learning of Information Retrieval. London (UK), 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. E-pub ahead of print

    A Formal Model for Checking Cryptographic API Usage in JavaScript

    Mitchell, D. & Kinder, J., 15 Sep 2019, (E-pub ahead of print) ESORICS'19: Proceedings of the 24th European Symposium on Research in Computer Security. Springer, Vol. 11735. p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Forthcoming

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 3 Jul 2021, (Accepted/In press) 43rd IEEE Symposium on Security and Privacy (S&P 2022). Institute of Electrical Engineers

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    A formal transformation and refinement method for re-engineering concurrent programs

    Younger, E., Bennett, K. & Luo, Z., 1997, Proc of IEEE Inter. Conf. on Software Maintenance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    A four-element framework for research on the composite materials supply chain

    Mastrocinque, E., Coronado Mondragon, A. E. & Hogg, P., 16 Jun 2015, Engineering Technology, Engineering Education and Engineering Management: Proceedings of the International Conference on Engineering Technologies, Engineering Education and EngineeringManagement (ETEEEM 2014), Hong Kong, 15-16 November 2014. Tan, D. (ed.). CRC Press, p. 423-426 4 p. 94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. E-pub ahead of print

    A Framework for Cloud ERP System Implementation in Developing Countries: Learning from Lower Local Governments in Uganda

    Mpanga, D. & Elbanna, A., 19 May 2019, (E-pub ahead of print) IFIP WG 8.6 Conference 2019. p. 274-292 19 p. (AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. A Framework for Improving the Sharing of Manufacturing Knowledge through Micro-Blogging

    Evans, R. D., Gao, J. X., Owodunni, O., Shah, S., Mahdikhah, S., Messaadia, M. & Baudry, D., 24 Sep 2014, Advances in Production Management Systems: Innovative and Knowledge-Based Production Management in a Global-Local World - IFIP WG 5.7 International Conference, APMS 2014, Proceedings. PART 1 ed. Springer New York LLC, p. 19-26 8 p. (IFIP Advances in Information and Communication Technology; vol. 438, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N., 7 Jun 2017, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. E-pub ahead of print

    A framework for understanding the empowerment effects of telecentres on rural communities in developing countries

    Kapondera, S. K., Bernadi, R. & Panteli, N., 26 Apr 2019, (E-pub ahead of print) Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D: 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1–3, 2019, Proceedings, Part I. Nielsen, P. & Kimaro, H. C. (eds.). Springer, p. 104-115 12 p. (IFIP Advances in Information and Communication Technology; vol. 551).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    A Full Operational Semantics for Asynchronous Relational Networks

    Vissani, I., Lopez Pombo, C., Tutu, I. & Fiadeiro, J. L., 30 Dec 2015, Recent Advances in Algebraic Development Techniques. Springer, p. 131-150 20 p. (Lecture Notes in Computer Science; vol. 9463).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. E-pub ahead of print

    A Functional Perspective on Machine Learning via Programmable Induction and Abduction

    Cheung, S., Davariu, V., Ghica, D., Muroya, K. & Rowe, R., 24 Apr 2018, (E-pub ahead of print) FLOPS 2018: Functional and Logic Programming. Springer, Vol. 10818. p. 84-98 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    A game of prediction with expert advice

    Vovk, V., 1995, Proceedings of the Eighth Annual Conference on Computational Learning Theory . Maass, W. (ed.). New York: ACM Press, p. 51-60

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Unpublished

    A Gender Agenda

    Broadbent, J., 2015, (Unpublished) Meditari Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment

    Opperman, C. & Hancke, G., 2011, IEEE International Workshop on Near Field Communication . IEEE, p. 44-49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    A graph based architectural (re)configuration language

    Wermelinger, M., Lopes, A. & Fiadeiro, J. L., 1 Jan 2001, 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001. p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs

    Bilal, Z. & Martin, K. M., 2014, Foundations and Practice of Security. Springer, Vol. 8352. p. 291-305 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    A High Power Fibre Laser for Electron Beam Emittance Measurements

    Corner, L., Nevay, L. J. & Walczak, R., 1 Dec 2010, IPAC 2010 - 1st International Particle Accelerator Conference. p. 3227-3229 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    A Holistic Approach to Simulating Beam Losses in the Large Hadron Collider Using BDSIM

    Walker, S., Abramov, A., Boogert, S., Garcia Morales, H., Gibson, S., Nevay, L., Pikhartova, H. & Shields, W., 4 May 2019, 13th International Computational Accelerator Physics Conference: ICAP2018, Key West, FL, USA. JACoW Publishing, p. 221-226 6 p. TUPAF15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    A Hybrid Model for International Strategy Implementation

    Aboutalebi, R. & Tan, H., 23 Jun 2014, In: AIB (Academy of International Business), 56th annual conference of AIB: International Business, Local Contexts in Global Business. 23-26 June 2014, Beedie School of Business, Simon Fraser University, Vancouver, Canada..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    A knowledge management perspective on a corporate portal implementation: A case study of a global IT-management consultancy firm

    Le Nguyen, K., Harindranath, G. & Dyerson, R., 2008, Proceedings of the 2008 European Conference on Information Systems (ECIS), Galway, Ireland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    A Lambek Calculus with Dependent Types

    Luo, Z., 2015, Types for Proofs and Programs.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    A learnable representation for syntax using residuated lattices

    Clark, A., 2009, Proceedings of the Conference on Formal Grammar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    A Lightweight Service Registry for Unstable Ad-hoc Networks

    Goncalves, P., Stathis, K. & Peach, N., 16 Nov 2011, Proceedings of the International Joint Conference on Ambient Intelligence (AmI 2011). p. 136-140 (Lecture Notes in Computer Science; vol. 7040/2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. E-pub ahead of print

    A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts

    Karafili, E., Sgandurra, D. & Lupu, E., 24 Nov 2018, (E-pub ahead of print) 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, p. 73-87 15 p. (Lecture Notes in Computer Science; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    A long-range self-similarity approach to segmenting DJ mixed music streams

    Scarfe, T., Koolen, W. M. & Kalnishkan, Y., 2013, Artificial Intelligence Applications and Innovations: Proceedings of the 9th IFIP WG 12.5 International Conference, AIAI 2013, Paphos, Cyprus, September 30 – October 2, 2013. Papadopoulos, H., Andreou, A. S., Iliadis, L. & Maglogiannis, I. (eds.). Springer, p. 235-244 10 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    A Lower Bound for a Prediction Algorithm under the Kullback-Leibler Game

    Dzhamtyrova, R. & Kalnishkan, Y., Sep 2021, Conformal and Probabilistic Prediction and Applications 2021. Carlsson, L., Luo, Z., Cherubin, G. & An Nguyen, K. (eds.). Proceedings of Machine Learning Research, Vol. 152. p. 39-51 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    A methodological approach to visual reasoning

    Liu, X., Zhang, G. & Luo, Z., 1989, Proceeding of International workshop on industrial applications of machine intelligence and vision. Japan, p. 50-55

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Unpublished

    A micromorphological assessment of Lateglacial Swedish clay varves from Svinstadsjön, Östergötland – understanding proglacial lake processes and refining a site varve chronology

    Devine, R., 2018, (Unpublished) Conference abstract - Poster presentation.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    A Middleware Framework for Robust Applications in Wireless Ad Hoc Networks

    Chockler, G., Demirbas, M., Gilbert, S. & Newport, C., Sep 2005, Proceeding of the 43rd Allerton Conference on Communication, Control, and Computing. Curran Associates

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    A mobile phone based personal narrative system

    Black, R., Waller, A., Tintarev, N., Reiter, E. & Reddington, J., 2011, The proceedings of the 13th international ACM SIGACCESS conference on Computers and accessibility. p. 171-178 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation

    Baiocco, A., Foglietta, C., Panzieri, S. & Wolthusen, S. D., 19 May 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C., 24 Oct 2016, WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    A Modular Hierarchy of Logical Frameworks

    Adams, R., 2004, Types for Proofs and Programs. Berardi, S., Coppo, M. & Damiani, F. (eds.). Springer, Vol. 3085. p. 1-16 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    A multi-agent based management system for future ATM networks

    Hayzelden, A., Bigham, J. & Luo, Z., 1999, Proceedings of the Fourth International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agents (PAAM'99). p. 179-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    A multi-agent based management system for service provider negotiation and charging

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 1999, Proceedings of IFIP TC6 Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    A Multi-Population FA for Automatic Facial Emotion Recognition

    Mistry, K., Rizvi, B., Rook, C., Iqbal, S., Zhang, L. & Joy, C. P., 28 Sep 2020, A Multi-Population FA for Automatic Facial Emotion Recognition. International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    A Multi-Robot Platform for the Autonomous Operation and Maintenance of Offshore Wind Farms

    Bernardini, S., Jovan, F., Jiang, Z., Watson, S., Weightman, A., Moradi, P., Richardson, T., Sadeghian, R. & Sareh, S., May 2020, International Conference on Autonomous Agents and Multi-Agent Systems 2020 . p. 1696-1700 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    A Multivocal and Multilevel Institutionalist Perspective to Analyse Information Technology Enabled Change in the Public Service in Africa

    Bernardi, R., 2008, IT in the Service Economy: Challenges and Possibilities for the 21st Century: IFIP International Federation for Information Processing. Barrett, M., Davidson, E., Middleton, C. & DeGross, J. (eds.). Boston: Springer, Vol. 267. p. 271-280

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Forthcoming

    A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles

    Vagal, V., Markantonakis, K. & Shepherd, C., 14 Apr 2021, (Accepted/In press) 40th IEEE Digital Avionics Systems Conference (DASC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, Progress in Cryptology – AFRICACRYPT 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings. Springer, p. 429-447 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    A New Efficient In Situ Sampling Model for Heuristic Selection in Optimal Search

    Franco, S., Barley, M. W. & Riddle, P. J., 2013, AI 2013: Advances in Artificial Intelligence : 26th Australasian Joint Conference, Dunedin, New Zealand, December 1-6, 2013. Proceedings. Cranefield, S. & Nayak, A. C. (eds.). Springer, p. 178-189 12 p. (Lecture Notes in Computer Science; vol. 8272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    A new look at user commitment towards information systems: Evidence from Amazon’s Mechanical Turk

    van der Heijden, H., 2012, Proceedings of the European Conference on Information Systems (ECIS). Barcelona, Spain

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    A new model to explain the occurrence of volcanism along caldera ring faults

    Browning, J. & Gudmundsson, A., 2014, The Volcanic and Magmatic Studies Group Proceedings 2014. Vol. VMSG 2014 A.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

    Razouk, W., Sgandurra, D. & Sakurai, K., 17 Oct 2017, International Conference on Internet of Things and Machine Learning. ACM, p. 1-8 8 p. 35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. E-pub ahead of print

    A Non-wellfounded, Labelled Proof System for Propositional Dynamic Logic

    Docherty, S. & Rowe, R., 14 Aug 2019, (E-pub ahead of print) TABLEAUX 2019: Automated Reasoning with Analytic Tableaux and Related Methods. Springer, p. 335-352 18 p. (Lecture Notes in Computer Science; vol. 11714).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    A novel method for sub-micrometer transverse electron beam size measurements using optical transition radiation

    Aryshev, A., Boogert, S. T., Howell, D., Karataev, P., Terunuma, N. & Urakawa, J., 2010, VIII INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2009). Strikhanov, MN. & Pivovarov, YL. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    A Novel Scoring Model to Detect Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. p. 254-263 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    A novel stateless authentication protocol

    Mitchell, C. J., 2013, Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009, Revised Selected Papers. Christianson, B., Malcolm, J. A., Matyas, V. & Roe, M. (eds.). Springer-Verlag, Vol. 7028. p. 269-274 6 p. (Lecture Notes in Computer Science; no. 7028).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    A paleoenvironmental setting for early Paleoindians in western North America: evidence from the insect fossil record

    Elias, S., 1995, Ancient Peoples and Landscapes. Johnson, E. (ed.). Lubbock, Texas: Texas Tech University Press, p. 255-272

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    A Parallel Architecture for Stateful, High-Speed Intrusion Detection

    Foschini, L., Thapliyal, A. V., Cavallaro, L., Kruegel, C. & Vigna, G., 2008, 4th International Conference on Information Systems Security (ICISS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    A Performant, Misuse-Resistant API for Primality Testing

    Massimo, J. & Kenneth G. Paterson, Oct 2020, Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020. p. 195-210 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    A person-to-person Internet payment system

    Al-Meaither, M. & Mitchell, C. J., 2001, Proceedings NordSec 2001 - 6th Nordic Workshop on Secure IT Systems, Lyngby, Denmark, November 2001. p. 5-17 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    A Pilot Study Investigating The Process of Risk Assessment and Re-Accreditation in UK Public Sector Systems

    Davies, M., Happa, J. & I, A., 2015, York Doctoral Symposium on Computer Science and Electronics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    A Pluralist Approach to Type-Theoretic Foundations.

    Luo, Z., 2013, Inter. Conf. on Type Theory, Homotopy Theory and Univalent Foundations. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    A polynomial kernel for 3-leaf power deletion

    Ahn, J., Eiben, E., Kwon, O. J. & Oum, S. I., 18 Aug 2020, 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020. Esparza, J., Kral�, D. & Kral�, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. MFCS-2020-5. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 170).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution