Home > Publications

Publications

37451 - 37500 out of 42,619Page size: 50
  1. Conference contribution › Research
  2. Published

    Addressing privacy issues in location-based collaborative and distributed environments

    Saracino, A., Sgandurra, D. & Spagnuelo, D., 2014, 2014 International Conference on Collaboration Technologies and Systems, CTS 2014. IEEE Computer Society, p. 166-172 7 p. 6867560

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Addressing Threats to Real-World Identity Management Systems

    Li, W. & Mitchell, C., 16 Oct 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Wiesbaden: Springer Vieweg, p. 251-259 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Administrative scope and hierarchy operations

    Crampton, J. & Loizou, G., 2002, Proceedings of 7th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 145-154 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Adopting a ‘Search’ Lens in Exploration of How Organisations Transform Digitally

    Hafezieh, N. & Eshraghian, F., 2022, European Conference on Information Systems. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Adoption of Additive Manufacturing Approaches: The Case of Manufacturing SMEs

    Shah, S. & Mattiuzza, S., 13 Aug 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. IEEE, 8436257. (2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Adoption of mobile technologies in Malawian academic libraries: the case of Mzuzu University Library

    Kapondera, S. K. & Ngalande, E., 2016, Standing Conference of Eastern, Central and Southern African Library and Information Associations. p. 165-174 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Advanced technology integration in food manufacturing supply chain environment: Pathway to sustainability and companies' prosperity

    Ojo, O. O., Shah, S., Zigan, S. & Orchard, J., Jun 2019, 2019 IEEE Technology and Engineering Management Conference, TEMSCON 2019. Institute of Electrical and Electronics Engineers Inc., 8813713. (2019 IEEE Technology and Engineering Management Conference, TEMSCON 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Adventures with Lucos Cozza: a conduit beneath the grounds of the Villa Wolkonsky - the Lateran branch of the Acqua Felice (1586-88)

    Claridge, A., 20 Apr 2014, Scritti in onore di Lucos Cozza. Coates-Stephens, R. & Cozza, L. (eds.). Rome: Edizioni Quasar Rome, p. 192-197 5 p. (Lexicon Topographicum Urbis Romae Supplementum; vol. VII).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. E-pub ahead of print

    Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols

    Nweke, L. O., Kahsay Weldehawaryat, G. & Wolthusen, S. D., 11 May 2020, (E-pub ahead of print) 2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 9089346. (2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Unpublished

    Aesthetics of Conventionalisation and the Contributions to Xiqu's Intercultural Communication

    Li, X., 2018, (Unpublished) Intercultural Communications, Translation, and Methods of Teaching Foreign Languages.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Affordance Theory in Social Media Research: Systematic Review and Synthesis of The Literature

    Hafezieh, N. & Eshraghian, F., 2017, European Conference on Information Systems Proceedings. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    'Affordance’-what does this mean?

    Hafezieh, N. & Harwood, S., 2017, Proceedings of Twenty Second UK Academy of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    After Beckett: Edward Bond’s Post-Auschwitz Dramaturgy of Ruins

    Chen, C-C., 5 Sep 2016, TaPRA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Unpublished

    Agency and institutions in MNC research: the contribution of critical realism

    Rees, C., Jul 2012, (Unpublished) 28th European Group for Organizational Studies (EGOS) Colloquium. Helsinki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Unpublished

    Agency Issues and Investment: A Comparative Analysis of the UK and Pakistani Listed firms

    Naeem, K. & Li, M. C., 2018, (Unpublished) Proceedings of New York International Business and Social Science Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Aggregating strategies

    Vovk, V., 1990, Proceedings of the Third Annual Workshop on Computational Learning Theory. Fulk, M. & Case, J. (eds.). San Mateo, CA: Morgan Kaufmann, p. 371-383 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Aggregation Algorithm vs. Average For Time Series Prediction

    Jamil, W., Kalnishkan, Y. & Bouchachia, H., 23 Sep 2016, Proceedings of the ECML PKDD 2016 Workshop on Large-scale Learning from Data Streams in Evolving Environments, STREAMEVOLV-2016. p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Agreement in Directed Dynamic Networks

    Biely, M., Robinson, P. & Schmid, U., 2012, Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30-July 2, 2012, Revised Selected Papers. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Algebraic Cryptanalysis and RFID Authentication

    Cid, C., Ferreira, L., Procter, G. & Robshaw, M., 21 Nov 2015, The 11th Workshop on RFID Security - RFIDSec 2015. Springer, p. 104-121 18 p. (Lecture Notes in Computer Science; vol. 9440).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

    Albrecht, M., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 22 Nov 2019, (E-pub ahead of print) ASIACRYPT 2019. p. 371-397 17 p. (Lecture Notes in Computer Science; vol. 11923).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Algebraic Knowledge Representation: The Unification of Procedure, Logic and Structure

    Sernadas, A., Sernadas, C. & Fiadeiro, J. L., 1986, ADT.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Albrecht, M., Cid, C., Dullien, T., Faugere, J-C. & Perret, L., 2010, Information Security and Cryptology - 6th International Conference, Inscrypt 2010. Springer, Vol. 6584. p. 387-403 17 p. (Lecture Notes in Computer Science - LNCS; vol. 6584).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Algebraic Proof Complexity: Progress, Frontiers and Challenges

    Pitassi, T. & Tzameret, I., 2017, Electronic Colloquium on Computation Complexity .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Algebraic Proofs over Noncommutative Formulas

    Tzameret, I., 2010, 7th Annual Conference on Theory and Applications of Models of Computation. Berlin, Vol. 6108. p. 60 71 p. (Lecture Notes in Computer Science (LNCS)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Algebraic Semantics of Coordination or What Is in a Signature

    Fiadeiro, J. L. & Lopes, A., 1999, AMAST. Springer, Vol. 1548. p. 293-307 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Algebraic Software Architecture Reconfiguration

    Wermelinger, M. & Fiadeiro, J. L., 1999, ESEC / SIGSOFT FSE. Springer, Vol. 1687. p. 393-409 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Algebraic Techniques in Differential Cryptanalysis

    Albrecht, M. & Cid, C., 2009, Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009: Revised Selected Papers. Dunkelman, O. (ed.). Springer, p. 193-208 16 p. (Lecture Notes in Computer Science - LNCS; vol. 5665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. E-pub ahead of print

    Algebras for Tree Decomposable Graphs

    Bruni, R., Montanari, U. & Sammartino, M., 23 Jun 2020, (E-pub ahead of print) Graph Transformation - 13th International Conference, ICGT 2020, Held as Part of STAF 2020, Proceedings. Gadducci, F. & Kehrer, T. (eds.). Springer, p. 203-220 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12150 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks

    Wolthusen, S. D. & Al-Kuwari, S., May 2010, Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference (MobiSec 2010). Springer-Verlag, p. 67-79

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Alternating Control Flow Reconstruction

    Kinder, J. & Kravchenko, D., Jan 2012, Proc. 13th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2012). Springer, p. 267-282

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Amino acids in the asteroidal water-bearing salt crystals hosted in the Zag meteorite

    Chan, QHS., Zolensky, ME., Burton, AS. & Locke, DR., 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Amnesic distributed storage

    Chockler, G., Guerraoui, R. & Keidar, I., 1 Jan 2007, Proceedings of the 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007. Vol. 4731 LNCS. p. 139-151 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries

    Kinder, J., Zuleger, F. & Veith, H., 2009, Proc. 10th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2009). Springer, p. 214-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    An Agent Architecture for Concurrent Bilateral Negotiations

    Alrayes, B. & Stathis, K., 2014, Lecture Notes in Business Information Processing: Impact of Decision Support Systems for Global Environments. Springer, p. 79-89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    An Agent Development Framework based on Social Positions

    Lekeas, G. K. & Stathis, K., 1 Oct 2004, IEEE Interantional Conference on Systems, Man and Cybernetics. Thiessen, W. & Wieringa, P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems

    Mcevoy, R. & Wolthusen, S. D., May 2010, Proceedings of the 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 125-133

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    An Algebraic Approach to the Analysis of Constrained Workflow Systems

    Crampton, J., 2004, Proceedings of 3rd Workshop on Foundations of Computer Security (FCS'04). p. 61-74 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    An Algebraic Theory of Complexity for Valued Constraints: Establishing a Galois Connection

    Cohen, D. A., Creed, P., Jeavons, P. G. & Živný, S., 2011, Mathematical Foundations of Computer Science 2011: 36th International Symposium, MFCS 2011, Warsaw, Poland, August 22-26, 2011: Proceedings. Springer, p. 231-242 (Lecture Notes in Computer Science; vol. 6907).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    An Algorithm for the SAT Problem for Formulae of Linear Length

    Wahlström, M., 2005, ESA. p. 107-118 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    An Analysis of Cyclical Interdependencies in Critical Infrastructures

    Svendsen, N. & Wolthusen, S. D., 3 Oct 2007, Proc. Second International Workshop on Critical Information Infrastructures Security (CRITIS 2007). Springer-Verlag, p. 25-36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    An Analysis of DepenDNS

    Alfardan, N. & Paterson, K., 2010, Information Security. Springer, Vol. 6531. p. 31-37 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    An analysis of the 3gpp-MAC scheme

    Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    An Analysis of the Hermes8 Stream Ciphers

    Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems (UKAIS)

    Ameen, N. & Willis, R., 2018, An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    An Analysis of the Perceived Value of Using Knowledge Management Systems in Supporting Decision Making Processes

    Abdelrahman, M., Papamichail, K. & French, S., 2010, 11th European Conference on Knowledge Management ECKM . p. 1115-1128

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    An Analysis of the XSL Algorithm

    Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution