Home > Publications

Publications

37601 - 37700 out of 41,077Page size: 100
  1. Conference contribution › Research
  2. Published

    Performance Appraisal: Much ado about nothing

    Edwards, P. & Sen Gupta, S., 2017, Society for Advancement of Socio Economics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K., 20 Feb 2015, 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Peroxy radical intercomparison exercise: A joint TOR/OCTA Experiment at Schauinsland 1994

    VoltThomas, A., Gilge, S., Heitlinger, M., Mihelcic, D., Musgen, P., Patz, H. W., Schultz, M., Borrell, P., Borrell, P. M., Slemr, J., Behmann, T., Burrows, J. P., Weissenmayer, M., Arnold, T., Klupfel, T., Perner, D., Cantrell, C. A., Shetter, R., Carpenter, L. J., Clemitshaw, K. C. & 1 others, Penkett, S. A., 1997, PROCEEDINGS OF EUROTRAC SYMPOSIUM '96 - TRANSPORT AND TRANSFORMATION OF POLLUTANTS IN THE TROPOSPHERE, VOL 2. SOUTHAMPTON: COMPUTATIONAL MECHANICS PUBLICATIONS LTD, p. 621-626 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Pervasive Healthcare Using Self-Healing Agent Environments

    Bromuri, S., Ignaz Schumacher, M. & Stathis, K., 2011, HIGHLIGHTS IN PRACTICAL APPLICATIONS OF AGENTS AND MULTIAGENT SYSTEMS. Perez, JB., Corchado, JM., Moreno, MN., Julian, V., Mathieu, P., CanadaBago, J., Ortega, A. & Caballero, AF. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 159-166 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. E-pub ahead of print

    Philanthropy on the Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K., 21 Jun 2018, (E-pub ahead of print) The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, p. 25-38 14 p. (Lecture Notes in Computer Science (LNCS); vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Phoenix: DGA-Based Botnet Tracking and Intelligence

    Schiavoni, S., Maggi, F., Cavallaro, L. & Zanero, S., 10 Jul 2014, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). London: Springer, Vol. 8550. p. 192-211 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Photonic Crystal Fibre Laser for Electron Beam Emittance Measurement

    Corner, L., Nevay, L. J. & Walczak, R., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. p. 577-579 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Photoproduction of neutral strange hadrons at ZEUS

    Boogert, S. & ZEUS Collaboration, 2001, PHOTON 2001. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids

    Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 52-68 17 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Physiological vs. Social complexity in software design

    Fiadeiro, J. L., 1 Jan 2006, Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS. p. 3 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Picking vs. Guessing Secrets: A Game-Theoretic Analysis

    Khouzani, A., Mardziel, P., Cid, C. & Srivatsa, M., 2015, IEEE 28th Computer Security Foundations Symposium. p. 243-257 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    PKI implementation issues in B2B e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2003, EICAR Conference Best Paper Proceedings, Copenhagen, Denmark, May 2003. Gattiker, U. E. (ed.). 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Placing and scaling ethical choices: ethical consumption and ethical public procurement

    Kleine, D., 2013, Proceedings of the 11th Congress of the European Society for Agricultural and Food Ethics. EurSafe

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Plaintext Recovery Attacks Against SSH

    Albrecht, M. R., Paterson, K. G. & Watson, G. J., 2009, Proceedings of the 2009 30th IEEE Symposium on Security and Privacy: 17-20 May 2009 / Berkley, CA, US. IEEE Computer Society, p. 16-26 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Plaintext Recovery Attacks Against WPA/TKIP

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. p. 325-349 25 p. (Lecture Notes in Computer Science; vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR

    Paterson, K. G. & Watson, G. J., 2010, Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010: Proceedings. Gilbert, H. (ed.). Springer, p. 345-361 17 p. (Lecture Notes in Computer Science; vol. 6110).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Plaintext-Recovery Attacks Against Datagram TLS

    Alfardan, N. & Paterson, K., 2012, Network and Distributed System Security Symposium. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Plant macrofossils from rodent middens

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 3. p. 2356-2367

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Unpublished

    Platforming place narratives with location-based games: playful and participatory storytelling using What3Words

    Lowe, J., 12 Jun 2020, (Unpublished) 20 Years of Seeing with GPS: Perspectives and Future Directions.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Unpublished

    Platformization of Technology dominance: the case study of developing cryptocurrencies on GitHub

    Eshraghian, F. & Hafezieh, N., 2019, (Unpublished) The 6th Innovation in Information Infrastructures Workshop, University of Surrey, Surrey, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Playing with Agent Coordination Patterns in MAGE

    Urovi, V. & Stathis, K., 2010, Lecture Notes in Computer Science. Springer, Vol. 6069. p. 86-101 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Plug-in martingales for testing exchangeability on-line

    Fedorova, V., Gammerman, A., Nouretdinov, I. & Vovk, V., 2012, Proceedings of the 29th International Conference on Machine Learning (ICML-12). Langford, J. & Pineau, J. (eds.). Omnipress, p. 1639-1646 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    POLE-ZERO SYSTEM-IDENTIFICATION USING GENETIC ALGORITHMS

    FLOCKTON, S. J. & WHITE, M. S., 1993, PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON GENETIC ALGORITHMS. Forrest, S. (ed.). SAN MATEO: MORGAN KAUFMANN PUB INC, p. 531-535 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Policy Conflict Resolution in IoT via Planning

    Göynügür, E., Bernardini, S., de Mel, G., Talamadupula, K. & Şensoy, M., 2017, Canadian Conference on Artificial Intelligence: AI 2017: Advances in Artificial Intelligence. Springer, Vol. 10233. p. 169-175 7 p. (Lecture Notes in Computer Science; vol. 10233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem

    Gutin, G., Kratsch, S. & Wahlström, M., 2014, Proceedings of IPEC 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Polynomial Time Learning of Some Multiple Context-Free Languages with a Minimally Adequate Teacher

    Yoshinaka, R. & Clark, A., 2010, Proceedings of Formal Grammar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Polynomially Closed Co-clones

    Lagerkvist, V. & Wahlström, M., 2014, Proceedings of ISMVL 2014: IEEE 44th International Symposium on Multiple-Valued Logic. IEEE, p. 85-90 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Position Statement on the Psychological Aspects of Diabetes Education and Care

    Gallichan, M., Anderson, B., Bradley, C., Kilmartin, J., Peyrot, M. & Dunning, T., 2000, International Consensus Position Statements for Diabetes Education. London: Class publishing

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Postglacial Beetle Records from North America

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 275-286

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Post-Quantum Certificates for Electronic Travel Documents

    Pradel, G. & Mitchell, C. J., 24 Dec 2020, Proceedings of DETIPS 2020 (Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy), September 18 2020. Springer, p. 56-73 18 p. (Lecture Notes in Computer Science; vol. 12580).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Posturography Platform and Balance Control Training and Research System Based on FES and Muscle Synergies

    Galeano Galeano, D., Brunetti, F., Torricelli, D., Piazza, S. & Pons, J. L., 2013, Neurotechnology, Electronics, and Informatics. Londral, A. R., Encarnação, P. & Pons Rovira, J. L. (eds.). Springer-Verlag, Vol. 13. ( Springer Series in Computational Neuroscience; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Potential based reward shaping for hierarchical reinforcement learning

    Gao, Y. & Toni, F., 25 Jul 2015, IJCAI'15 Proceedings of the 24th International Conference on Artificial Intelligence. AAAI Press, p. 3504-3510 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.

    Francis, L., Hancke, G. P., Mayes, K. & Markantonakis, K., 2009, ICITST'09. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Aug 2017, USENIX Workshop on Offensive Technologies (WOOT). USENIX, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Power Quality Ancillary Services Support from Customer-owned Electric Vehicles in Low Voltage Distribution Networks

    Luo, H. & Nduka, O., 13 Oct 2020, 2020 IEEE PES Asia-Pacific Power & Energy Engineering Conference (APPEEC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. E-pub ahead of print

    Practical Attacks Against the Walnut Digital Signature Scheme

    Beullens, W. & Blackburn, S., 27 Oct 2018, (E-pub ahead of print) Advances in Cryptology - ASIACRYPT 2018. Springer, p. 35-61 27 p. (Lecture Notes in Computer Science; vol. 11272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Practical attacks on proximity identification systems

    Hancke, G., 2006, IEEE Symposium on Security and Privacy . p. 328-333

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Practical Automated Vulnerability Monitoring Using Program State Invariants

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 23 Jun 2013, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '13). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Practical investment with the long-short game

    Al-Baghdadi, N., Lindsay, D., Kalnishkan, Y. & Lindsay, S., Sep 2020, Conformal and Probabilistic Prediction and Applications: COPA 2020. Proceedings of Machine Learning Research, Vol. 128. p. 209-228 20 p. (Proceedings of Machine Learning Research ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Ors Yalcin, S. (ed.). Springer Berlin / Heidelberg, Vol. 6370. p. 35-49 15 p. (Lecture Notes in Computer Science; vol. 6370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Practical solutions to key escrow and regulatory aspects

    Jefferies, N., Mitchell, C. J. & Walker, M., 1996, Proceedings of Public Key Solutions '96, Zurich, Switzerland, September/October 1996.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Practical 'what-if?' modelling for resource management of corporate voice-data networks

    Pitts, J., Luo, Z. & Cosmas, J., 1999, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3842. p. 132-141

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Practice Makes Perfect: Motivating Confident Privacy Protection Practices

    Coles-Kemp, L. & Kani-Zabihi, E., 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE, p. 866-871 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Submitted

    Precarity Amongst Service Managers in the NHS: a review in the midst of austerity and Brexit

    Zahmatkesh, M., 2017, (Submitted) 20th Annual Irish Academy of Management Conference 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Precise Bounds for Montgomery Modular Multiplication and some Potentially Insecure RSA Moduli

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 30-39 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K., 5 May 2014, Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434. p. 129-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Precise parameter synthesis for stochastic biochemical systems

    Ceska, M., Dannenberg, F., Kwiatkowska, M. & Paoletti, N., 2014, Computational Methods in Systems Biology. p. 86-98 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Precise static analysis of untrusted driver binaries

    Kinder, J. & Veith, H., 2010, Proc. 10th Int. Conf. Formal Methods in Computer Aided Design (FMCAD 2010). p. 43-50

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Precision Modelling of Energy Deposition in the LHC using BDSIM

    Walker, S., Abramov, A., Boogert, S., Gibson, S., Pikhartova, H. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. MOPRB064

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Predicting Cognitive Recovery of Stroke Patients from the Structural MRI Connectome Using a Naïve Bayesian Tree Classifier

    Dacosta-Aguayo, R., Stephan-Otto, C., Auer, T., Clemente, I., Davalos, A., Bargallo, N., Mataro, M. & Klados, M. A., 2017, Proceedings - 2017 IEEE 30th International Symposium on Computer-Based Medical Systems, CBMS 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-June. p. 413-418 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Prediction of long-range dependent time series data with performance guarantee

    Dashevskiy, M. & Luo, Z., 2009, Stochastic Algorithms: Foundations and Applications, Lecture Notes in Computer Science. Vol. 5792. p. 31-45

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Prediction of Metabolic Transformations using Cross Venn-ABERS Predictors

    Arvidsson, S., Spjuth, O., Carlsson, L. & Toccaceli, P., 31 May 2017, Proceedings of Machine Learning Research. Vol. 60. p. 118-131 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Prediction with advice of unknown number of experts

    Chernov, A. & Vovk, V., 2010, Proceedings of the Twenty Sixth Conference on Uncertainty in Articial Intelligence. Grunwald, P. & Spirtes, P. (eds.). Arlington, VA: AUAI Press, p. 117-125 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Prediction with Confidence Based on a Random Forest Classifier

    Devetyarov, D. & Nouretdinov, I., 2010, Aritificial Intelligence and Innovations: Proceedings od 6th IFIP WG 12.5 International Conference. p. 37-44 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Prediction with expert advice for the Brier game

    Vovk, V. & Zhdanov, F., 2008, Proceedings of the Twenty Fifth International Conference on Machine Learning. McCallum, A. & Roweis, S. (eds.). New York: ACM Press, p. 1104-1111 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Prediction with Expert Advice for Value at Risk

    Dzhamtyrova, R. & Kalnishkan, Y., 28 Sep 2020, Proceedings of The 2020 International Joint Conference on Neural Networks (IJCNN 2020). IEEE, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Prediction with Expert Evaluators' Advice

    Chernov, A. & Vovk, V., 2009, Proceedings of the Twentieth International Conference on Algorithmic Learning Theory. Gavalda, R., Lugosi, G., Zeugmann, T. & Zilles, S. (eds.). Springer, p. 8-22 15 p. (Lecture Notes in Artificial Intelligence; vol. 5809).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Predictions with confidence in applications,

    Dashevskiy, M. & Luo, Z., 2009, Lecture Notes in Computer Science. Vol. 5632. p. 775-786

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Predmetnyi mir v romane D.S. Merezhkovskogo 'Piotr i Aleksei' (iz trilogii 'Khristos i Antikhrist')

    Poljakowa, N., 2005, Stavropol'skii almanakh rossiiskogo obshchestva intellektual'noi istorii: Materialy mezhdunarodnoi nauchnoi konferentsii ''Fakt-Sobytie' v razlichnykh diskursakh' (Piatigorsk, 26-27 Marta 2005. Special Edition ed. Stavropol': Izdatel'stvo Stavropol'skogo Gosudarstvennogo Universiteta, Vol. 8. p. 208-214

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Preferred Cross-continental Strategies

    Aboutalebi, R. & Lobo, R., 27 Jun 2016, In: AIB (Academy of International Business), 58th annual conference of AIB: The Locus of Global Innovation. 27-30 June 2016, New Orleans, Louisiana, U.S.A.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Preforming of fibre bridging for improved damage tolerance

    Potluri, P., Arshad, M., Jetavat, D., Jamshidi, P. & Hogg, P., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Preprocessing of Min Ones Problems: A Dichotomy

    Kratsch, S. & Wahlström, M., 2010, Automata, Languages and Programming : 37th International Colloquium, ICALP 2010. Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F. & Spirakis, P. G. (eds.). Bordeaux, France: Springer, Vol. 6198. p. 653-665 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Prequential probability: game-theoretic = measure-theoretic

    Vovk, V., 2009, Proceedings of the 2009 Joint Statistical Meetings: Section on Risk Analysis, Session on Predictive and Prequential Statistics. Alexandria, VA: American Statistical Association, p. 3859-3872 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection

    Deo, A., Dash, S., Suarez de Tangil Rotaeche, G., Vovk, V. & Cavallaro, L., 28 Oct 2016, ACM Workshop on Artificial Intelligence and Security. Vienna, Austria: ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Preservation and Reflection in Specification

    Lopes, A. & Fiadeiro, J. L., 1997, AMAST. Springer, Vol. 1349. p. 380-394 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Preservation of coralline-algal reef frameworks

    Bosence, D., 1985, Proceedings of The Fifth International Coral Reef Congress. Gabrie, C. & Harmelin, M. (eds.). Vol. 6. p. 623-628 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    PRESS - a probabilistic reasoning expert system shell

    Luo, Z. & Gammerman, A., 1991, European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Lecture Notes in Computer Science. Kruse, R. & Siegel, P. (eds.). Springer-Verlag, Vol. 548. p. 232-237

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Preventing Failure of Strategy Implementation

    Aboutalebi, R., 28 Oct 2015, In: EAMSA (Euro-Asia Management Studies Association), the 32nd Annual Conference of EAMSA: Theory and Practice in Bringing Europe and Asia- Contemporary Challenges in International Marketing. 28-31 October 2015, SOAS, University of London, England, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Preventing phishing attacks using trusted computing technology

    Alsaid, A. & Mitchell, C. J., 2006, Proceedings of INC 2006, Sixth International Network Conference, Plymouth, UK, July 2006. p. 221-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Preventing relay attacks in mobile transactions using infrared light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K., 3 Apr 2017, SAC '17 Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, p. 1724-1731 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Prime and Prejudice: Primality Testing Under Adversarial Conditions

    Albrecht, M., Massimo, J., Paterson, K. & Somorovsky, J., 8 Oct 2018, CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. p. 281-298 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Priorities in corporate sustainability reporting: Does East meet West, does South converge on North?

    Barkemeyer, R. & Preuss, L., Aug 2011, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Priors in Quantum Bayesian Inference

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J. -A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 255-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. E-pub ahead of print

    PRISM-PSY: Precise GPU-Accelerated Parameter Synthesis for Stochastic Systems

    Ceska, M., Pilar, P., Paoletti, N., Brim, L. & Kwiatkowska, M., 9 Apr 2016, (E-pub ahead of print) Tools and Algorithms for the Construction and Analysis of Systems. Chechik, M. & Raskin, J-F. (eds.). p. 367-384 18 p. (Lecture Notes in Computer Science; vol. 9636).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Privacy Risks in Resource Constrained Smart Micro-Grids

    Ambassa, P. L., Kayem, A. V. D. M., Wolthusen, S. D. & Meinel, C., 23 Jul 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2018. Ogiela, L., Enokido, T., Ogiela, M. R., Javaid, N., Barolli, L. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 527-532 6 p. 8418124

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Privacy Violations in Constrained Micro-Grids: Adversarial Cases

    Ambassa, P., Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 19 May 2016, Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (AINA 2016). IEEE Press, p. 601-606 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Forthcoming

    Privacy-preserving biometric matching using homomorphic encryption

    Pradel, G. & Mitchell, C., 6 Jun 2021, (Accepted/In press) Proceedings of IEEE TrustCom 2021: August 2021. IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Private Outsourced Kriging Interpolation

    Alderman, J., Curtis, B., Farràs Ventura, O., Martin, K. & Ribes-González, J., 7 Apr 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 75-90 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Probabilistic Contract Compliance for Mobile Applications

    Dini, G., Martinelli, F., Saracino, A. & Sgandurra, D., 1 Sep 2013, 2013 International Conference on Availability, Reliability and Security. p. 599-606 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Probabilistic Naming of Functions in Stripped Binaries

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Dec 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, Inc, p. 373-385 13 p. 3427265. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Probabilistic Reasoning in Mixed Models Using Bayesian Belief Networks and Its Application

    Luo, Z., 1992, Proceedings of 10th European Conference on Artificial Intelligence (ECAI 92),. p. 3-7

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion

    Al-Kuwari, S. & Wolthusen, S. D., May 2010, Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference (CMS 2010). Springer-Verlag, p. 16-27

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Probability theory for the Brier game

    Vovk, V., 1997, Proceedings of the Workshop on Algorithmic Learning Theory. Li, M. & Maruoka, A. (eds.). Springer, p. 323-338 16 p. (Lecture Notes in Computer Science; vol. 1316).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Procrustes Analysis of Diffusion Tensor Data

    Zhou, D., Dryden, IL., Koloydenko, A. & Bai, L., 2009, Proceedings 17th Scientific Meeting, International Society for Magnetic Resonance in Medicine.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Producing Enactable Protocols in Artificial Agent Societies

    Lekeas, G., Kloukinas, C. & Stathis, K., 18 Nov 2011, Agents in Principle, Agents in Practice (PRIMA'11). p. 311-322 (Lecture Notes in Computer Science; vol. 7047/2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Program specification and data refinement in type theory

    Luo, Z., 1991, Proc. of the Fourth Inter. Joint Conf. on the Theory and Practice of Software Development (TAPSOFT), LNCS 493.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Programmable Hash Functions in the Multilinear Setting

    Freire, E. S. V., Hofheinz, D., Paterson, K. G. & Striecks, C., Aug 2013, CRYPTO 2013 (1). Canetti, R. & J. G. (eds.). Springer, Vol. 8042. p. 513-530 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    PROGRESS TOWARDS AN ELECTRONIC ARRAY ON LIQUID HELIUM

    Rees, D. G., Glasson, P., Meeson, P. J., Simkins, L. R., Antonov, V., Frayne, P. G. & Lea, M. J., 2008, CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPRINTRONICS. Takayanagi, H., Nitta, J. & Nakano, H. (eds.). SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 353-358 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. E-pub ahead of print

    Proof Assistants for Natural Language Semantics

    Chatzikyriakidis, S. & Luo, Z., 10 Nov 2016, (E-pub ahead of print) Logical Aspects of Computational Linguistics. Celebrating 20 Years of LACL (1996–2016) : 9th International Conference, LACL 2016, Nancy, France, December 5-7, 2016, Proceedings. Springer Heidelberg, Vol. 10054. p. 85-98 14 p. (Lecture Notes in Computer Science; vol. 10054).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Proof complexity lower bounds from algebraic circuit complexity

    Forbes, M., Shpilka, A., Tzameret, I. & Wigderson, A., 19 May 2016, 31st Conference on Computational Complexity (CCC 2016). Dagstuhl, Germany: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 50. p. 1-17 17 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 50).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Proof-theoretic conceptual modeling – the NIAM case-study

    SERNADAS, C., FIADEIRO, J., MEERSMAN, R. & SERNADAS, A., 1989, INFORMATION SYSTEM CONCEPTS : AN IN-DEPTH ANALYSIS. FALKENBERG, ED. (ed.). AMSTERDAM: ELSEVIER SCIENCE PUBL B V, p. 1-30 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    PROSOCS: a platform for programming software agents in computational logic

    Stathis, K., Kakas, A. C., Lu, W., emetriou, N. D., Endriss, U. & Bracciali, A., 1 Apr 2004, Proceedings of the Fourth International Symposium ``From Agent Th eory to Agent Implementation'' (AT2AI-4 -- EMCSR'2004 Session M). Müller, J. & Petta, P. (eds.). p. 523-528 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. E-pub ahead of print

    Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting

    Fraser, A. & Quaglia, E., 8 Oct 2020, (E-pub ahead of print) SAC 2020 proceedings. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    PROTOSS: A run time tool for detecting PRivacy viOlaTions in Online Social networkS (Short Paper)

    Kafali, O., Gunay, A. & Yolum, P., 2012, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Prototyping symbolic execution engines for interpreted languages

    Bucur, S., Kinder, J. & Candea, G., Feb 2014, ASPLOS '14: Proceedings of the 19th international conference on Architectural support for programming languages and operating systems. ACM, p. 239-254 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 3 Apr 2021, Security and Privacy: Select Proceedings of ICSP 2020. Stănică, P., Gangopadhyay, S. & Debnath, S. K. (eds.). Singapore: Springer-Verlag, p. 151-162 12 p. (LNEE; vol. 744).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Provably Secure Key Assignment Schemes from Factoring

    Freire, E. S. V. & Paterson, K. G., 2011, ACISP. Parampalli, U. & Hawkes, P. (eds.). Springer, Vol. 6812. p. 292-309 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Provenance of Mesozoic sandstones in the Banda Arc, Indonesia

    Zimmermann, S. & Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-301 1-13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Proving memory safety of floating-point computations by combining static and dynamic program analysis

    Godefroid, P. & Kinder, J., 2010, Proc. 19th Int. Symp. Software Testing and Analysis (ISSTA 2010). ACM, p. 1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution