Home > Publications

Publications

36701 - 36800 out of 41,680Page size: 100
  1. Conference contribution › Research
  2. Published

    Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks

    Xu, H., Sgandurra, D., Mayes, K., Li, P. & Wang, R., 2017, The 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. p. 291-301 11 p. (Lecture Notes in Computer Science; vol. 10658).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. E-pub ahead of print

    Analysing the security of Google's implementation of OpenID Connect

    Li, W. & Mitchell, C. J., 12 Jun 2016, (E-pub ahead of print) Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Donostia-San Sebastián, Spain, July 7-8, 2016, Proceedings. Caballero, J., Zurutuza, U. & Rodriguez, R. J. (eds.). Springer-Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science; vol. 9721).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform

    Ren, Y., Dmochowski, P. A. & Komisarczuk, P., 2010, 5th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2010, Cannes, France, June 9-11, 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Analysis of an innovation-driven supply chain using supply chain innovations from a “low-tech” sector: a perspective from the composites materials sector

    Coronado Mondragon, A. E. & Coronado Mondragon, C. E., 6 Aug 2014, 2014 International Conference on Business Information and Cultural Creativity Industry. Tsai, J. (ed.). Taipei, Taiwan, 11 p. 229

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Analysis of faunal remains: insect analysis

    Elias, S., 2008, Encyclopedia of Archaeology. Persall, D. M. (ed.). Elsevier Science Publishers B.V. (North-Holland), p. 1521-1524

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715. p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Analysis of the Bit-Search Generator and sequence compression techniques

    Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer-Verlag, Vol. 3557. p. 196-214 19 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Analyzing ‘IS in developing countries’ research: A bibliometric study

    Choudrie, J. & Harindranath, G., 2011, Proceedings of the 11th IFIP TC 9/WG 9.4 International Conference on Social Implications of Computers in Developing Countries, Kathmandu, Nepal. IFIP9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Analyzing and Synthesizing Genomic Logic Functions

    Paoletti, N., Yordanov, B., Hamadi, Y., Wintersteiger, C. M. & Kugler, H., 2014, Computer Aided Verification. p. 343-357 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Analyzing Multi-key Security Degradation

    Luykx, A., Mennink, B. & Paterson, K. G., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer-Verlag, Vol. 10625 LNCS. p. 575-605 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10625 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web

    Fett, D., Küsters, R. & Schmitz, G., 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Ryan, P. Y. A., Pernul, G. & Weippl, E. (eds.). Springer-Verlag, p. 43-65 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Anatomy of Drive-by Download Attack

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013. p. 49-58 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Anomalous Taint Detection (Extended Abstract)

    Cavallaro, L. & Sekar, R., 2008, 11th International Symposium on Recent Advances in Intrusion Detection.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013. Springer-Verlag, p. 321-335

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Anomaly Detection of Trajectories with Kernel Density Estimation by Conformal Prediction

    Smith, J., Nouretdinov, I., Craddock, R., Offer, C. & Gammerman, A., 19 Sep 2014, Artificial Intelligence Applications and Innovations: AIAI2014 Workshops. Rhodes, Greece: Springer, p. 271-280 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. E-pub ahead of print

    Anonymity and Rewards in Peer Rating Systems

    Garms, L., Ng, S-L., Quaglia, E. & Traverso, G., 7 Sep 2020, (E-pub ahead of print) Security and Cryptography for Networks: 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 277-297 21 p. (Lecture Notes in Computer Science; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E., 2012, Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293. p. 206-224 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing

    Xu, Z. & Martin, K. M., 2014, The 6th IEEE International Conference on Cloud Computing Technology and Science. IEEE, p. 358-365

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Another Look at Privacy Threats in 3G Mobile Telephony

    Alam, S. & Mitchell, C. J., 2014, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Susilo, W. & Mu, Y. (eds.). Berlin: Springer-Verlag, p. 386-396 11 p. (Lecture Notes in Computer Science; vol. 8544).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing

    Pietro, R. D., Lombardi, F., Martinelli, F. & Sgandurra, D., 1 Dec 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing. p. 371-379 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Anything but not food: Acculturation and food consumption practices amongst Chinese students in the UK

    Cappellini, B. & Yen, D. A., 2010, Global Marketing conference proceedings .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Aperture Measurements with AC Dipole at the Large Hadron Collider

    Fuster-Martinez, N., Bruce, R., Dilly, J., Maclean, E., Persson, T., Redaelli, S., Tomás, R. & Nevay, L., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 212-215 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Application of conformal predictors to tea classification based on electronic nose

    Nouretdinov, I., Li, G., Gammerman, A. & Luo, Z., 2010, Artificial Intelligence Applications and Innovations. Springer, p. 303-310

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008. p. 1426-1432 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    APPLICATION OF GENETIC ALGORITHMS TO INFINITE IMPULSE-RESPONSE ADAPTIVE FILTERS

    FLOCKTON, S. J. & WHITE, M. S., 1993, SCIENCE OF ARTIFICIAL NEURAL NETWORKS II. Ruck, DW. (ed.). BELLINGHAM: SPIE - INT SOC OPTICAL ENGINEERING, p. 414-419 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Application of Inductive Confidence Machine to ICMLA competition data

    Nouretdinov, I., Burford, B. & Gammerman, A., 2009, Proceedings of The Eighth International Conference on Machine Learning and Applications. p. 435-438 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Application of optical diffraction radiation to a non-invasive low-emittance high-brightness beam diagnostics

    Karataev, P., Hamatsu, R., Muto, T., Araki, S., Hayano, H., Urakawa, J., Naumenko, G., Potylitsyn, A. & Hirose, T., 2004, QUANTUM ASPECTS OF BEAM PHYSICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 111-118 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Application of Value Stream Mapping in Global Manufacturing Environment

    Shah, S. & Goh, C., 15 Nov 2021, 2021 26th International Conference on Automation and Computing (ICAC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Applications of reinforcement learning to cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Workshops (ICC), 2010 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Applying Conformal Prediction to the Bovine TB Diagnosing

    Adamskiy, M., Nouretdinov, I., Mitchell, A., Coldham, N. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15--18, 2011, Proceedings , Part II. . p. 449-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Applying hierarchial and role-based access control to XML documents

    Crampton, J., 2004, Proceedings of 2004 ACM Workshop on Secure Web Services. ACM Press, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Approaches to integration of uncertain and temporal information in diagnostic reasoning

    Bigham, J., Luo, Z., Cayrac, D., Nordbo, I. & Bouyssounous, B., 1994, Proceedings of Information Processing and the Management of Uncertainty in Knowledge Based Systems. p. 250-255

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. E-pub ahead of print

    Approximation algorithms for general cluster routing problem

    Zhang, X., Du, D., Gutin, G., Ming, Q. & Sun, J., 27 Aug 2020, (E-pub ahead of print) Computing and Combinatorics : 26th International Conference, COCOON 2020, Atlanta, GA, USA, August 29–31, 2020, Proceedings. Kim, D., Uma, R. N., Cai, Z. & Lee, D. H. (eds.). Springer, p. 472-483 12 p. (Lecture Notes in Computer Science; vol. 12273).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    APRIL: Interactively Learning to Summarise by Combining Active Preference Learning and Reinforcement Learning

    Gao, Y., Meyer, C. M. & Gurevych, I., 31 Oct 2018, Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Brussels, Belgium: Association for Computational Linguistics, p. 4120-4130 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Architectural Handling of Management Concerns in Service-Driven Business Processes

    Al-Ghamdi, A. & Fiadeiro, J. L., 2006, MSVVEIS. INSTICC Press, p. 111-120 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Architecture Migration driven by Code Categorization

    Correia, R., Matos, C., Heckel, R. & El-Ramly, M., 2007, Proceedings of the European Conference on Software Architecture (ECSA). Oquendo, F. (ed.). Springer-Verlag, Vol. 4758. p. 115-122 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Architecture of the ATLAS online physics-selection software at LHC

    Armstrong, S., Baines, J. T., Bee, C. P., Biglietti, M., Bogaerts, A., Boisvert, V., Bosman, M., Brandt, S., Caron, B., Casado, P., Cataldi, G., Cavalli, D., Cervetto, M., Comune, G., Corso-Radu, A., Di Mattia, A., Gomez, M. D., dos Anjos, A., Drohan, J., Ellis, N. & 58 others, Elsing, M., Epp, B., Etienne, F., Falciano, S., Farilla, A., George, S., Ghete, V., Gonzalez, S., Grothe, M., Kaczmarska, A., Karr, K., Khomich, A., Konstantinidis, N., Krasny, W., Li, W., Lowe, A., Luminari, L., Ma, H., Meessen, C., Mello, A. G., Merino, G., Morettini, P., Moyse, E., Nairz, A., Negri, A., Nikitin, N., Nisati, A., Padilla, C., Parodi, F., Perez-Reale, V., Pinfold, J. L., Pinto, P., Polesello, G., Qian, Z., Rajagopalan, S., Resconi, S., Rosati, S., Scannicchio, D. A., Schiavi, C., Schoerner-Sadenius, T., Segura, E., de Seixas, J. M., Shears, T., Sivoklokov, S., Smizanska, M., Soluk, R., Stanescu, C., Tapprogge, S., Touchard, F., Vercesi, V., Watson, A., Wengler, T., Werner, P., Wheeler, S., Wickens, F. J., Wiedenmann, W., Wielers, M. & Zobernig, H., 2004, ASTROPARTICLE, PARTICLE AND SPACE PHYSICS , DETECTORS AND MEDICAL PHYSICS APPLICATIONS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 255-259 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Are Dynamic Capabilities Idiosyncratic? A Mixed Method Study of UK High-Tech SMEs

    Senaratne, P., Wang, C. L. & Sarma, M., 2015, British Academy of Management Annual Conference. Portsmouth

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Are SMEs Ready for Industry 4.0 Technologies: An Exploratory Study of i 4.0 Technological Impacts

    Menon, S. & Shah, S., 2 Apr 2020, Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020. Institute of Electrical and Electronics Engineers Inc., p. 203-208 6 p. 9051550. (Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C., Nov 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Arguing over Motivations within the V3A-Architecture for Self-Adaptation

    Morge, M., Stathis, K. & Vercouter, L., 2009, ICAART 2009: Proceedings of the International Conference on Agents and Artificial Intelligence. SETUBAL: INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL, p. 214-219 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Argumentation accelerated reinforcement learning for cooperative multi-agent systems

    Gao, Y. & Toni, F., 18 Aug 2014, ECAI'14 Proceedings of the Twenty-first European Conference on Artificial Intelligence. IOS Press, p. 333-338 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Argumentation sur les motivations propres dans l'architecture V3A pour des agents auto-adaptatifs

    Morge, M., Stathis, K. & Vercouter, L., 2008, Actes des 16ème Journées Francophones sur les Systèmes Multi-Agen ts (JFSMA). France: Cepudes

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Argumentation-Based Multi-Agent Decision Making with Privacy Preserved

    Gao, Y., Toni, F., Wang, H. & Xu, F., 9 May 2016, Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, p. 1153-1161 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries

    Sivakumaran, P. & Blasco, J., 6 Dec 2021, Proceedings of the 37th Annual Computer Security Applications Conference: ACSAC 2021. Association for Computing Machinery (ACM), p. 861-876 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Ariosto o Boiardo? Giovan Battista Giraldi Cinzio critico dell’Orlando furioso

    Jossa, S., 2011, Volteggiando in su le carte. Ludovico Ariosto e i suoi lettori. Garavelli, E. (ed.). University of Helsinki Press, p. 45-72 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Art, finance, politics, and the art museum as a public institution

    Chong, D., 2018, Market orientation of cultural institutions (University of Borås).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K., 29 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 1-10 10 p. 5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Artistic versus the commercial logics: A comparitive analysis of the UK and Indian creative and media industry

    Sen Gupta, S., 2011, Society for the Advancement of Socio Economics, Madrid Spain.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Sep 2013, ESORICS 2013. Springer, Vol. 8134. p. 381-399 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Aspects of terrorism and martyrdom: Seminar one - What roles are played by religious beliefs and identity in supporting views of violent activists as terrorists or martyrs?

    Cinnirella, M., Ansari, H., Rogers, M. B., Lewis, C. A. & Loewenthal, K. M., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. Rogers, M. B., Lewis, C. A., Loewenthal, K. M., Cinnirella, M., Amlot, R. & Ansari, H. (eds.). (eCOMMUNITY: International Journal of Mental Health & Addiction).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Aspects of terrorism and martyrdom: Seminar three - Exploring organisational contributory factors and socio-religious outcomes of terrorism and martyrdom

    Cinnirella, M., Ansari, H., Lewis, C. A., Rogers, M. B., Amlot, R. & Loewenthal, K. M., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. (eCOMMUNITY: International Journal of Mental Health & Addiction).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Assessing Electronic Portfolios -- Now that we have them, what can we do with them?

    Bures, E. & Bentley, C., 2007, Proceedings from World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007. Bastiaens, T. & Carliner, S. (eds.). AACE, p. 7030-7038

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Asymmetric Sneutrino Dark Matter

    West, S., 13 May 2006, 41st Rencontres de Moriond on Electroweak Interactions and Unified Theories.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Asymptotic optimality of transductive confidence machine

    Vovk, V., 2002, Lecture Notes in Articial Intelligence. Vol. 2533. p. 336-350 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Asynchronous Binary Byzantine Consensus over Graphs with Power Law Degree Sequence

    Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 263 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs

    Weldehawaryat, G. & Wolthusen, S. D., 2013, Proceedings of the 2013 IEEE 2nd International Workshop on Network Science (NSW 2013). IEEE Computer Society Press, p. 9-15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Attacks against GSMA’s M2M Remote Provisioning

    Quaglia, E., Smyth, B. & Meyer, M., 2018, Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Attacks on time-of-flight distance bounding channels

    Hancke, G. P. & Kuhn, M. G., 2008, Proceedings of the first ACM conference on Wireless network security. New York, NY, USA: ACM, p. 194-202 9 p. (WiSec '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS

    Garman, C., Paterson, K. & Van Der Merwe, T., Aug 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 113-128 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Attainment, ability and adjustment in a metropolitan setting. I: The prevalence of...

    Berger, M. & Yule, W., 1972, Conference, Nottingham.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Forthcoming

    Attention Guidance Agents with Eye-tracking: A use-case based on the MATBII cockpit task

    Durant, S., Wilkins, B., Woods, C., Uliana, E. & Stathis, K., 3 Oct 2021, (Accepted/In press) Post-Proceedings of EMAS'21. Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Crampton, J. & Williams, C., 7 Jun 2017, SACMAT'17: Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. ACM Press, p. 79-90 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Attribute-Based Encryption for Access Control Using Elementary Operations

    Crampton, J. & Pinto, A., 2014, 27th Computer Security Foundations Symposium. IEEE, p. 125-139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Unpublished

    Audience familiarity and children's understanding of disclaimers

    Watling, D. & Nesbit, R., 2015, (Unpublished) Audience familiarity and children's understanding of disclaimers.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    AudioNode : Prototypical Affective Modelling in Experience-driven Procedural Music Generation

    Plans, E., Morelli, D. & Plans, D., 28 Jun 2015, COMPUTATIONAL CREATIVITY & GAMES WORKSHOP.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Authenticated-Encryption with Padding: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2012, Cryptography and Security. Naccache, D. (ed.). Springer, Vol. 6805. p. 83-107 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Authentication with Weaker Trust Assumptions for Voting Systems

    Quaglia, E. & Smyth, B., 2018, Progress in Cryptology – AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Springer, p. 322-343 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Authorization and Certificates: Are We Pushing When We Should Be Pulling?

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of IASTED Conference on Network and Information Security. p. 62-66 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Authorization recycling in RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Automated Debugging for Arbitrarily Long Executions

    Zamfir, C., Kasikci, B., Kinder, J., Bugnion, E. & Candea, G., May 2013, Proc. 14th Workshop on Hot Topics in Operating Systems (HotOS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. E-pub ahead of print

    Automated peripheral neuropathy assessment of diabetic patients using optical imaging and binary processing techniques

    Siddiqui, H. U. R., Alty, S. R., Spruce, M. & Dudley, S. E., 14 Feb 2013, (E-pub ahead of print) IEEE EMBS Special Topic Conference on Point-of-Care (POC) Healthcare Technologies: Synergy Towards Better Global Healthcare, PHT 2013. p. 200-203 4 p. 6461319

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Automated Planning for Urban Traffic Management

    McCluskey, T. L., Vallati, M. & Franco, S., 2017, Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI 2017, Melbourne, Australia, August 19-25, 2017. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 5238-5240 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Automated Semmes Weinstein monofilament examination replication using optical imaging and mechanical probe assembly

    Siddiqui, H. U. R., Spruce, M., Alty, S. R. & Dudley, S., 21 Jul 2015, 2015 IEEE 12th International Symposium on Biomedical Imaging, ISBI 2015. IEEE Computer Society, Vol. 2015-July. p. 552-555 4 p. 7163933

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Automated taxonomy extraction from semantic business process models

    De Cesare, S., Juric, D. & Lycett, M., 7 Mar 2016, Proceedings of the 49th Annual Hawaii International Conference on System Sciences, HICSS 2016. IEEE Computer Society, Vol. 2016-March. p. 4394-4403 10 p. 7427732

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Automated Transformation of PDDL Representations

    Riddle, P. J., Barley, M. W., Franco, S. & Douglas, J., 14 May 2015, Proceedings of the Eighth Annual Symposium on Combinatorial Search, SOCS 2015: 11-13 June 2015, Ein Gedi, the Dead Sea, Israel. Lelis, L. & Stern, R. (eds.). AAAI Press, p. 214-215 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Automated Workflows using Dialectical Argumentation

    McGinnis, J., Bromuri, S., Urovi, V. & Stathis, K., 1 May 2007, German e-Science Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Automatic cyclic termination proofs for recursive procedures in separation logic

    Rowe, R. & Brotherston, J., 16 Jan 2017, CPP 2017 Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs. ACM, p. 53-65 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Automatic path generation for multirotor descents through varying air masses above Ascension Island

    Greatwood, C., Richardson, T., Freer, J., Thomas, R., Brownlow, R., Lowry, D., Fisher, R. E. & Nisbet, E. G., 2016, AIAA Atmospheric Flight Mechanics Conference. American Institute of Aeronautics and Astronautics Inc, AIAA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Automating Malware Scanning Using Workflows

    Stirling, D., Welch, I., Komisarczuk, P. & Seifert, C., 2009, 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009. p. 562-567 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Automating the evaluation of trustworthiness

    Sel, M. & Mitchell, C. J., 1 Sep 2021, Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, September 2021, Proceedings. Fischer-Huebner, S., Lambrinoudakis, C., Kotsis, G., Min Tjoa, A. & Khalil, I. (eds.). Springer-Verlag, p. 18-31 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Autonomous Building of Structures in Unstructured Environments via AI Planning

    Roberts, J., Franco Aixela, S., Stokes, A. & Bernardini, S., 17 May 2021, The 31st International Conference on Automated Planning and Scheduling (ICAPS 2021).. 1 ed. Vol. 31. p. 491-499 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J., 7 Dec 2017, 2017 International Carnahan Conference on Security Technology (ICCST): Proceedings. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Avoiding key redistribution in key assignment schemes

    Rowe, H. & Crampton, J., 2007, Proceedings of the Fourth International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. p. 127-140 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J., 2018, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Back to basics: Sharing goals and developing trust in global virtual teams

    Tucker, R. & Panteli, N., 2003, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 126. p. 85-98 14 p. (IFIP Advances in Information and Communication Technology; vol. 126).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Backoff protocols for distributed mutual exclusion and ordering

    Chockler, G., Malkhi, D. & Reiter, M. K., 1 Jan 2001, Proceedings of the 21st IEEE International Conference on Distributed Computing Systems (ICDCS '01). p. 11-20 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Ballistic impact of composite laminates: Experiments and simulations

    Guild, F. J., El-Habti, M. & Hogg, P. J., 1 Dec 2007, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Bank Mergers’ Risks: the Macro and Micro Prudential approaches and their determinants

    Hassan, M. & Giouvris, E., 18 Jun 2019, The 12th International Risk Management Conference. Altman, E., Brenner, M., Dalocchio, M. & Gabbi, G. (eds.). Italy: The Risk, Banking and Finace Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Bark beetle fossils from two early post-glacial age sites at high altitude in the Colorado Rocky Mountains

    Elias, S., 1982, Journal of Paleontology: 1982 North American Paleontological Convention Proceedings Volume . Vol. 1. p. 53-57

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Barriers to Absorptive Capacity and Capability Upgrading in Developing Country Multinationals

    Cuervo-Cazurra, A. & Rui, H., 2013, Proceedings of the 55th Annual Meeting of the Academy of International Business: "Bridging the Divide: Linking IB to Complementary Disciplines and Practice". McDougall-Covin, P. & Kiyak, T. (eds.). 2013 Academy of International Business, p. 263 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Basin-scale salt tectonic processes of the Laurentian Basin, Eastern Canada: insights from integrated regional 2D seismic interpretation and 4D physical experiments

    Adam, J. & Krezsek, C., 2012, Salt tectonics, Sediments and Prospectivity. Alsop, G. I., Archer, S. G., Grant, N. T. & Hodgkinson, R. (eds.). Geological Society of London Special Publication, Vol. 363. p. 331 360 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Bayesian probability in quantum mechanics

    Schack, R., 2007, Bayesian Statistics 8: Proceedings of the Eighth Valencia International Meeting. Bernardo, J. M., Bayarri, M. J., Berger, J. O., Dawid, A. P., Heckerman, D., Smith, A. F. M. & West, M. (eds.). Oxford: Oxford University Press, p. 453-464

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Bayesian versus frequentist predictions in quantum tomography

    Schack, R., 2007, Foundations of Probability and Physics 4: AIP Conference Proceedings Vol.~889. Adenier, G., Fuchs, C. A. & Khrennikov, A. (eds.). Melville, New York: American Institute of Physics, p. 230-234

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    BBOB: Nelder-Mead with resize and halfruns

    Doerr, B., Fouz, M., Schmidt, M. & Wahlström, M., 2009, Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference (GECCO 2009). Rothlauf, F. (ed.). Montreal, Québec, Canada: ACM, p. 2239-2246 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution