Home > Publications

Publications

37351 - 37375 out of 40,623Page size: 25
  1. Conference contribution › Research
  2. Published

    Reconstruction of Structural Controllability over Erdös-Rényi Graphs via Power Dominating Sets

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14). ACM Press, p. 57 60 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Recovering from Lost Digital Wallet

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13). Y. Xiang, F. G. M. & Ruj, S. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths

    Walter, C. D., 2008, CHES 2008. Oswald, E. & Rohatgi, P. (eds.). Springer, Vol. 5154. p. 214-227 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs in the Presence of Compromised Nodes

    Alwasel, B. & Wolthusen, S., 18 May 2016, Proceedings of the 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015). Springer-Verlag, Vol. 9578. p. 105-119 15 p. (Lecture Notes in Computer Science; vol. 9578).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs via Partial Control Structure Re-Use

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th International Conference on Critical Information Infrastructures Security (CRITIS 2014). Springer-Verlag, p. 293-307

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Recovery of Structural Controllability for Process Control Systems

    Alcaraz, C. & Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47 63 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. E-pub ahead of print

    Recurrent Auto-Encoder Model for Large-Scale Industrial Sensor Signal Analysis

    Wong, T. & Luo, Z., 27 Jul 2018, (E-pub ahead of print) International Conference on Engineering Applications of Neural Networks: EANN 2018. Pimenidis, E. & Jayne, C. (eds.). Springer, p. 203-216 14 p. (Communications in Computer and Information Science; vol. 893).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Reducing Normative Conflicts in Information Security

    Pieters, W. & Coles-Kemp, L., 2011, NSPW '11: Proceedings of the 2011 New security paradigms workshop, 12-15 Sep 2011, Marin County, CA. . ACM, p. 11-24 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Reducing the Space Requirements of Instant Replay

    Levrouw, L. J. & Audenaert, K., 1993, Proc. of the ACM/ONR Workshop on Parallel and Distributed Debugging. San Diego: ACM, p. 205-207

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Re-Evaluating SMEs IT Readiness in the Age of the Cloud

    Dyerson, R. & Spinelli, R., Sep 2017, 2017 Proceedings of the European Conference on Information Management and Evaluation, Genoa.. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Refining Process Descriptions from Execution Data in Hybrid Planning Domain Models

    Linday, A., Franco Aixela, S., Reya, R. & McCluskey, L., 1 Jun 2020, Proceedings of the Thirtieth International Conference on Automated Planning and Scheduling, Nancy, France, October 26-30, 2020. AAAI Press, Vol. 30 (2020). p. 469-477 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Regional consecutive leader election in mobile ad-hoc networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2010, Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cambridge, Massachusetts, USA, September 16, 2010. p. 81-90 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Regular Strategies in Pushdown Reachability Games

    Hague, M. & Carayol, A., 2014, 8th International Workshop on Reachability Problems 2014. 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Re-imagining the disruptive innovation theory in the digital platforms era

    Elbanna, A., Jun 2017, IFIP 8.6 Working Conference 2017: Re-Imagining Diffusion of Information Technology. Guimarães, Portugal

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Related Randomness Attacks for Public Key Encryption

    Paterson, K. G., Schuldt, J. C. N. & Sibborn, D. L., 2014, PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383. p. 465-482 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Related-Key Impossible-Differential Attack on Reduced-Round Skinny

    Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G., 2017, Applied Cryptography and Network Security. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Kanazawa, Japan: Springer International Publishing, Vol. 10355. p. 208-228 21 p. (Lecture Notes in Computer Science; vol. 10355, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G., 2014, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616. p. 77-94 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things

    Heath, C. P., Crivellaro, C. & Coles-Kemp, L., 2 May 2019, CHI Conference on Human Factors in Computing Systems Proceedings: CHI 2019. ACM, p. 1-12 12 p. 308

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Unpublished

    Relationship between illiquidity and monetary conditions within the United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Corporate Finance Decisions in a Changing Global Environment, International Finance and Banking Society (IFABS) Asia 2016 Brunei Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J., 1 Jun 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June. p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Reliable Classification of Acute Leukaemia from Gene Expression Data using Confidence Machines

    Bellotti, T., Luo, Z. & Gammerman, A., 2006, IEEE International Conference on Granular Computing. IEEE, p. 148-153

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Reliable complex event detection for pervasive computing

    O'Keeffe, D. & Bacon, J., 2010, Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, DEBS 2010, Cambridge, United Kingdom, July 12-15, 2010. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Reliable probabilistic classification and its application to Internet traffic

    Dashevskiy, M. & Luo, Z., 2008, Lecture Notes in Computer Science. Vol. 5226. p. 380-388

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Reliable Probability Estimates Based on Support Vector Machines for Large Multiclass Datasets

    Lambrou, A., Papadopoulos, H., Nouretdinov, I. & Gammerman, A., Sep 2012, Artificial Intelligence Applications and Innovations - AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW, and WADTMB, Proceedings.. Halkidiki, Greece, Vol. II. p. 182-191 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Relieved at last: cataloguing with LibraryThing

    Kanyundo, A. & Kapondera, S. K., 2016, Standing Conference of the Eastern, Central and Southern Africa Librarians and Institutions . p. 73-79 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution