Home > Publications

Publications

37501 - 37550 out of 42,611Page size: 50
  1. Conference contribution › Research
  2. Published

    An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    An Efficient Toolkit for Computing Private Set Operations

    Davidson, A. & Cid, C., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II. Pieprzyk, J. & Suriadi, S. (eds.). Springer Heidelberg, Vol. 2. p. 261-278 18 p. (Lecture Notes in Computer Science; vol. 10343).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    An electronic array on liquid helium

    Rees, D. G., Glasson, P., Antonov, V., Bennett, R., Fozooni, P., Frayne, P. G., Lea, M. J., Meeson, P. J., Simkins, L. & Mukharsky, Y., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 1464-1465 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    An Emerging research Program on Employment Relations in Small Firms in Advanced Capitalist Economies

    Edwards, P., Sen Gupta, S. & Tsai, C-J., 2006, Academy of Management Conference (AOM), Atlanta.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    An Empirical Study of Messaging Passing Concurrency in Go Projects

    Dilley, N. & Lange, J., 18 Mar 2019, SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering. Shihab, E., Lo, D. & Wang, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 377-387 11 p. 8668036. (SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. An evaluation of demand focused chain contribution to industrial sustainability

    Naghi Ganji, E., Shah, S. & Coutroubis, A., 15 Nov 2017, Advances in Manufacturing Technology XXXI : Proceedings of the 15th International Conference on Manufacturing Research, ICMR 2017, Incorporating the 32nd National Conference on Manufacturing Research. El Souri, M., Gao, J. & Keates, S. (eds.). United Kingdom: IOS Press BV, Vol. 6. p. 359-364 6 p. (Advances in Transdisciplinary Engineering; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    An examination of computer-mediated communication for engineering-related tasks

    Lee, J. Y. H. & Panteli, N., 2010, Proceedings of the Annual Hawaii International Conference on System Sciences. 5428613

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    An Examination of the Impacts of a Learning Management System: A Case from Jamaica

    Craig, J. & Harindranath, G., Aug 2015, Proceedings of the 2015 Americas Conference on Information Systems (AMCIS), Puerto Rico, Auguest..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    An experimental comparison of different carbon and glass laminates for ballistic protection

    Zhou, F., Zhang, C., Chen, X., Zhu, C. & Hogg, P. J., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    An Exploration of Consumers' Use of Disposing Practices in their Daily Lives

    Türe, M. & Ger, G., 2011, NA - Advances in Consumer Research. Vol. 39. p. 32-33

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    An exploration of the dependence relationships between self-reported aggression and interpersonal style

    Glorney, E., Lyons, E. & Fritzon, K., 2006, Proceedings of the Conference of the European Association of Psychology and Law: University of Liverpool.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. E-pub ahead of print

    An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

    Shepherd, C., Petitcolas, F., Akram, R. N. & Markantonakis, K., 27 Jul 2017, (E-pub ahead of print) Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lopez, J., Fischer-Hübner, S. & Lambrinoudakis, C. (eds.). Springer-Verlag, p. 164-179 16 p. (Lecture Notes in Computer Science; vol. 10442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    An Exploratory Analysis on Drug Target Locality

    Caceres Silva, J. & Paccanaro, A., Sep 2017, AGRANDA - Simposio Argentino de GRANdes DAtos 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. An Exploratory Study to Examine Big Data Application on Services and SCM

    Shah, S. & Theodosoulaki, A., 15 Apr 2019, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 155-159 5 p. 8691279. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System

    Fett, D., Küsters, R. & Schmitz, G., 13 Nov 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 673-688 16 p. 6956594. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    An extensible, self contained, layered approach to context acquisition

    Kramer, D., Kocurova, A., Oussena, S., Clark, T. & Komisarczuk, P., 2011, Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing. p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    An Identity for Kernel Ridge Regression

    Zhdanov, F. & Kalnishkan, Y., 2010, Learning Theory 21st International Conference, ALT 2010, Proceedings: volume 6331 of Lecture Notes in Computer Science. Springer, p. 405-419 (Lecture Notes in Computer Science; vol. 6331).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data

    Swift, S., Tucker, A., Crampton, J. & Garway-Heath, D., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 2174-2181 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 13 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 2601-2617 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    An information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Classical Correspondence: Proceedings of the 4th Drexel Symposium on Quantum Nonintegrability. Feng, D. H. & Hu, B. L. (eds.). Cambridge, Massachusetts: International Press, p. 339-353

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    An Innovative Heuristic for Planning-Based Urban Traffic Control

    Franco, S., Lindsay, A., Vallati, M. & McCluskey, T. L., 2018, Computational Science - ICCS 2018: 18th International Conference, Wuxi, China, June 11–13, 2018, Proceedings, Part I. Shi, Y., Fu, H., Tian, Y., Krzhizhanovskaya, V. V., Lees, M. H., Dongarra, J. J. & Sloot, P. M. A. (eds.). Springer, p. 181-193 13 p. (Lecture Notes in Computer Science; vol. 10860).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    An institutionalist perspective of IT-enabled change of Health Management Information Systems in Africa: implications for the Open-Source Software

    Bernardi, R., 2009, 10th International Conference on Social Implications of Computers in Developing Countries: Assessing the Contribution of ICT to Development Goals. Byrne, E., Nicholson, B. & Salem, F. (eds.). IFIP WG9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    An Interactive Evolution Strategy based Deep Convolutional Generative Adversarial Network for 2D Video Game Level Procedural Content Generation

    Jiang, M. & Zhang, L., 20 Sep 2021, 2021 International Joint Conference on Neural Networks (IJCNN). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    An interface theory for service-oriented design

    Fiadeiro, J. L. & Lopes, A., 1 Jan 2011, Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Giannakopoulou, D. & Orejas, F. (eds.). p. 18-33 16 p. (Lecture Notes in Computer Science; vol. 6603).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    An NFC based consumer-level counterfeit detection framework

    Saeed, Q., Walter, C. & Bilal, Z., 2013, The 11th International Conference on Privacy, Security and Trust (PST 2013). IEEE, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    An Obfuscation-Based Approach against Injection Attacks

    Baiardi, F. & Sgandurra, D., 1 Aug 2011, 2011 Sixth International Conference on Availability, Reliability and Security. p. 51-58 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    An online secret sharing scheme which identifies all cheaters

    Yeun, C. Y., Mitchell, C. J. & Burmester, M., 1998, Proceedings of NORDSEC '98, Trondheim, Norway, November 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    An optimal-control application of two paradigms of on-line learning

    Vovk, V., 1994, Proceedings of the Seventh Annual Workshop on Computational Learning Theory. New York: ACM Press, p. 98-109 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    An Optimization Approach to Robust Goal Obfuscation

    Bernardini, S., Fagnani, F. & Franco, S., Sep 2020, Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoningg. International Joint Conferences on Artificial Intelligence, p. 119-129 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    An overview of change management within manufacturing environment

    Syed, M. H. & Shah, S., 2013, Manufacturing Science and Technology (ICMST2013). p. 1205-1209 5 p. (Advanced Materials Research; vol. 816-817).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    An Overview of RFID Technology in Field Material Transfer Management

    Shah, S. & Shim, J., Aug 2021, IEEE International Conference on Management in Emerging Markets.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. An Overview of Smart Manufacturing for Competitive and Digital Global Supply Chains

    Menon, S., Shah, S. & Coutroubis, A., 2 Jul 2018, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 178-183 6 p. 8691224. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. An overview of sustainable practices in food processing supply chain environments

    Ojo, O. O., Shah, S. & Coutroubis, A., 9 Feb 2018, 2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017. IEEE Computer Society Press, p. 1792-1796 5 p. (IEEE International Conference on Industrial Engineering and Engineering Management; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    An RFID distance bounding protocol

    Hancke, G. & Kuhn, M. G., 2005, Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm). p. 67-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    An upgraded scanning wire beam profile monitoring system for the ISIS high energy drift space

    Harryman, D., Sep 2017, International Beam Instrumentation Conference 2017. p. 401-405 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    An Upper Bound for Aggregating Algorithm for Regression with Changing Dependencies

    Kalnishkan, Y., 2016, Algorithmic Learning Theory : 27th International Conference, ALT 2016, Bari, Italy, October 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9925. p. 238-252 15 p. (Lecture Notes in Computer Science; vol. 9925).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Analysing and modelling the growth and efficiency of urban transportation infrastructures

    Mohajeri, N., Gudmundsson, A. & Scartezzini, J., 2014, Symposium on Applied Urban Modelling-Planning Urban Infrustructure, Cambridge University.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Analysing evolvable cell design for optimisation of routing options

    Ellin, D. & Flockton, S., Jul 2007, Proceedings Genetic and Evolutionary Computation Conference 2007 (GECCO2007). p. 2687-2694 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Analysing Mu‐Calculus Properties of Pushdown Systems (Tool Presentation)

    Hague, M. & Ong, C-H. L., 2010, SPIN.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Analysing the IOBC Authenticated Encryption Mode

    Mitchell, C. J., 2013, Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, QLD, Australia, July 2013, Proceedings. Boyd, C. & Simpson, L. (eds.). Springer-Verlag, Vol. 7959. p. 1-12 12 p. (Lecture Notes in Computer Science; vol. 7959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks

    Xu, H., Sgandurra, D., Mayes, K., Li, P. & Wang, R., 2017, The 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. p. 291-301 11 p. (Lecture Notes in Computer Science; vol. 10658).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. E-pub ahead of print

    Analysing the security of Google's implementation of OpenID Connect

    Li, W. & Mitchell, C. J., 12 Jun 2016, (E-pub ahead of print) Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Donostia-San Sebastián, Spain, July 7-8, 2016, Proceedings. Caballero, J., Zurutuza, U. & Rodriguez, R. J. (eds.). Springer-Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science; vol. 9721).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform

    Ren, Y., Dmochowski, P. A. & Komisarczuk, P., 2010, 5th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2010, Cannes, France, June 9-11, 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Analysis of an innovation-driven supply chain using supply chain innovations from a “low-tech” sector: a perspective from the composites materials sector

    Coronado Mondragon, A. E. & Coronado Mondragon, C. E., 6 Aug 2014, 2014 International Conference on Business Information and Cultural Creativity Industry. Tsai, J. (ed.). Taipei, Taiwan, 11 p. 229

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Analysis Of Electronic Voting Schemes In The Real World

    Augoye, V. & Tomlinson, A., 12 Feb 2020, Social Transformation - Proceedings of the 23rd {UK} Academy for Information Systems Conference. 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Analysis of faunal remains: insect analysis

    Elias, S., 2008, Encyclopedia of Archaeology. Persall, D. M. (ed.). Elsevier Science Publishers B.V. (North-Holland), p. 1521-1524

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715. p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Analysis of the Bit-Search Generator and sequence compression techniques

    Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer-Verlag, Vol. 3557. p. 196-214 19 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Analyzing ‘IS in developing countries’ research: A bibliometric study

    Choudrie, J. & Harindranath, G., 2011, Proceedings of the 11th IFIP TC 9/WG 9.4 International Conference on Social Implications of Computers in Developing Countries, Kathmandu, Nepal. IFIP9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution