Home > Publications

Publications

37551 - 37600 out of 42,611Page size: 50
  1. Conference contribution › Research
  2. Published

    Analyzing and Synthesizing Genomic Logic Functions

    Paoletti, N., Yordanov, B., Hamadi, Y., Wintersteiger, C. M. & Kugler, H., 2014, Computer Aided Verification. p. 343-357 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Analyzing Multi-key Security Degradation

    Luykx, A., Mennink, B. & Paterson, K. G., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer-Verlag, Vol. 10625 LNCS. p. 575-605 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10625 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web

    Fett, D., Küsters, R. & Schmitz, G., 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Ryan, P. Y. A., Pernul, G. & Weippl, E. (eds.). Springer-Verlag, p. 43-65 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Anatomy of Drive-by Download Attack

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013. p. 49-58 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Anomalous Taint Detection (Extended Abstract)

    Cavallaro, L. & Sekar, R., 2008, 11th International Symposium on Recent Advances in Intrusion Detection.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013. Springer-Verlag, p. 321-335

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Anomaly Detection of Trajectories with Kernel Density Estimation by Conformal Prediction

    Smith, J., Nouretdinov, I., Craddock, R., Offer, C. & Gammerman, A., 19 Sep 2014, Artificial Intelligence Applications and Innovations: AIAI2014 Workshops. Rhodes, Greece: Springer, p. 271-280 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. E-pub ahead of print

    Anonymity and Rewards in Peer Rating Systems

    Garms, L., Ng, S-L., Quaglia, E. & Traverso, G., 7 Sep 2020, (E-pub ahead of print) Security and Cryptography for Networks: 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 277-297 21 p. (Lecture Notes in Computer Science; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E., 2012, Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293. p. 206-224 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing

    Xu, Z. & Martin, K. M., 2014, The 6th IEEE International Conference on Cloud Computing Technology and Science. IEEE, p. 358-365

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Another Look at Privacy Threats in 3G Mobile Telephony

    Alam, S. & Mitchell, C. J., 2014, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Susilo, W. & Mu, Y. (eds.). Berlin: Springer-Verlag, p. 386-396 11 p. (Lecture Notes in Computer Science; vol. 8544).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing

    Pietro, R. D., Lombardi, F., Martinelli, F. & Sgandurra, D., 1 Dec 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing. p. 371-379 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Anything but not food: Acculturation and food consumption practices amongst Chinese students in the UK

    Cappellini, B. & Yen, D. A., 2010, Global Marketing conference proceedings .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Aperture Measurements with AC Dipole at the Large Hadron Collider

    Fuster-Martinez, N., Bruce, R., Dilly, J., Maclean, E., Persson, T., Redaelli, S., Tomás, R. & Nevay, L., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 212-215 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Application of conformal predictors to tea classification based on electronic nose

    Nouretdinov, I., Li, G., Gammerman, A. & Luo, Z., 2010, Artificial Intelligence Applications and Innovations. Springer, p. 303-310

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008. p. 1426-1432 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    APPLICATION OF GENETIC ALGORITHMS TO INFINITE IMPULSE-RESPONSE ADAPTIVE FILTERS

    FLOCKTON, S. J. & WHITE, M. S., 1993, SCIENCE OF ARTIFICIAL NEURAL NETWORKS II. Ruck, DW. (ed.). BELLINGHAM: SPIE - INT SOC OPTICAL ENGINEERING, p. 414-419 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Application of Inductive Confidence Machine to ICMLA competition data

    Nouretdinov, I., Burford, B. & Gammerman, A., 2009, Proceedings of The Eighth International Conference on Machine Learning and Applications. p. 435-438 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Application of optical diffraction radiation to a non-invasive low-emittance high-brightness beam diagnostics

    Karataev, P., Hamatsu, R., Muto, T., Araki, S., Hayano, H., Urakawa, J., Naumenko, G., Potylitsyn, A. & Hirose, T., 2004, QUANTUM ASPECTS OF BEAM PHYSICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 111-118 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Application of Value Stream Mapping in Global Manufacturing Environment

    Shah, S. & Goh, C., 15 Nov 2021, 2021 26th International Conference on Automation and Computing (ICAC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Applications of reinforcement learning to cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Workshops (ICC), 2010 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Applying Conformal Prediction to the Bovine TB Diagnosing

    Adamskiy, M., Nouretdinov, I., Mitchell, A., Coldham, N. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15--18, 2011, Proceedings , Part II. . p. 449-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Applying hierarchial and role-based access control to XML documents

    Crampton, J., 2004, Proceedings of 2004 ACM Workshop on Secure Web Services. ACM Press, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Approaches to integration of uncertain and temporal information in diagnostic reasoning

    Bigham, J., Luo, Z., Cayrac, D., Nordbo, I. & Bouyssounous, B., 1994, Proceedings of Information Processing and the Management of Uncertainty in Knowledge Based Systems. p. 250-255

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. E-pub ahead of print

    Approximation algorithms for general cluster routing problem

    Zhang, X., Du, D., Gutin, G., Ming, Q. & Sun, J., 27 Aug 2020, (E-pub ahead of print) Computing and Combinatorics : 26th International Conference, COCOON 2020, Atlanta, GA, USA, August 29–31, 2020, Proceedings. Kim, D., Uma, R. N., Cai, Z. & Lee, D. H. (eds.). Springer, p. 472-483 12 p. (Lecture Notes in Computer Science; vol. 12273).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    APRIL: Interactively Learning to Summarise by Combining Active Preference Learning and Reinforcement Learning

    Gao, Y., Meyer, C. M. & Gurevych, I., 31 Oct 2018, Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Brussels, Belgium: Association for Computational Linguistics, p. 4120-4130 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Architectural Handling of Management Concerns in Service-Driven Business Processes

    Al-Ghamdi, A. & Fiadeiro, J. L., 2006, MSVVEIS. INSTICC Press, p. 111-120 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Architecture Migration driven by Code Categorization

    Correia, R., Matos, C., Heckel, R. & El-Ramly, M., 2007, Proceedings of the European Conference on Software Architecture (ECSA). Oquendo, F. (ed.). Springer-Verlag, Vol. 4758. p. 115-122 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Architecture of the ATLAS online physics-selection software at LHC

    Armstrong, S., Baines, J. T., Bee, C. P., Biglietti, M., Bogaerts, A., Boisvert, V., Bosman, M., Brandt, S., Caron, B., Casado, P., Cataldi, G., Cavalli, D., Cervetto, M., Comune, G., Corso-Radu, A., Di Mattia, A., Gomez, M. D., dos Anjos, A., Drohan, J., Ellis, N. & 58 others, Elsing, M., Epp, B., Etienne, F., Falciano, S., Farilla, A., George, S., Ghete, V., Gonzalez, S., Grothe, M., Kaczmarska, A., Karr, K., Khomich, A., Konstantinidis, N., Krasny, W., Li, W., Lowe, A., Luminari, L., Ma, H., Meessen, C., Mello, A. G., Merino, G., Morettini, P., Moyse, E., Nairz, A., Negri, A., Nikitin, N., Nisati, A., Padilla, C., Parodi, F., Perez-Reale, V., Pinfold, J. L., Pinto, P., Polesello, G., Qian, Z., Rajagopalan, S., Resconi, S., Rosati, S., Scannicchio, D. A., Schiavi, C., Schoerner-Sadenius, T., Segura, E., de Seixas, J. M., Shears, T., Sivoklokov, S., Smizanska, M., Soluk, R., Stanescu, C., Tapprogge, S., Touchard, F., Vercesi, V., Watson, A., Wengler, T., Werner, P., Wheeler, S., Wickens, F. J., Wiedenmann, W., Wielers, M. & Zobernig, H., 2004, ASTROPARTICLE, PARTICLE AND SPACE PHYSICS , DETECTORS AND MEDICAL PHYSICS APPLICATIONS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 255-259 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Are Dynamic Capabilities Idiosyncratic? A Mixed Method Study of UK High-Tech SMEs

    Senaratne, P., Wang, C. L. & Sarma, M., 2015, British Academy of Management Annual Conference. Portsmouth

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Are SMEs Ready for Industry 4.0 Technologies: An Exploratory Study of i 4.0 Technological Impacts

    Menon, S. & Shah, S., 2 Apr 2020, Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020. Institute of Electrical and Electronics Engineers Inc., p. 203-208 6 p. 9051550. (Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C., Nov 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Arguing over Motivations within the V3A-Architecture for Self-Adaptation

    Morge, M., Stathis, K. & Vercouter, L., 2009, ICAART 2009: Proceedings of the International Conference on Agents and Artificial Intelligence. SETUBAL: INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL, p. 214-219 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Argumentation accelerated reinforcement learning for cooperative multi-agent systems

    Gao, Y. & Toni, F., 18 Aug 2014, ECAI'14 Proceedings of the Twenty-first European Conference on Artificial Intelligence. IOS Press, p. 333-338 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Argumentation sur les motivations propres dans l'architecture V3A pour des agents auto-adaptatifs

    Morge, M., Stathis, K. & Vercouter, L., 2008, Actes des 16ème Journées Francophones sur les Systèmes Multi-Agen ts (JFSMA). France: Cepudes

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Argumentation-Based Multi-Agent Decision Making with Privacy Preserved

    Gao, Y., Toni, F., Wang, H. & Xu, F., 9 May 2016, Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, p. 1153-1161 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries

    Sivakumaran, P. & Blasco, J., 6 Dec 2021, Proceedings of the 37th Annual Computer Security Applications Conference: ACSAC 2021. Association for Computing Machinery (ACM), p. 861-876 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Ariosto o Boiardo? Giovan Battista Giraldi Cinzio critico dell’Orlando furioso

    Jossa, S., 2011, Volteggiando in su le carte. Ludovico Ariosto e i suoi lettori. Garavelli, E. (ed.). University of Helsinki Press, p. 45-72 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Art, finance, politics, and the art museum as a public institution

    Chong, D., 2018, Market orientation of cultural institutions (University of Borås).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K., 29 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 1-10 10 p. 5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Artistic versus the commercial logics: A comparitive analysis of the UK and Indian creative and media industry

    Sen Gupta, S., 2011, Society for the Advancement of Socio Economics, Madrid Spain.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Sep 2013, ESORICS 2013. Springer, Vol. 8134. p. 381-399 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Aspects of terrorism and martyrdom: Seminar one - What roles are played by religious beliefs and identity in supporting views of violent activists as terrorists or martyrs?

    Cinnirella, M., Ansari, H., Rogers, M. B., Lewis, C. A. & Loewenthal, K. M., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. Rogers, M. B., Lewis, C. A., Loewenthal, K. M., Cinnirella, M., Amlot, R. & Ansari, H. (eds.). (eCOMMUNITY: International Journal of Mental Health & Addiction).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Aspects of terrorism and martyrdom: Seminar three - Exploring organisational contributory factors and socio-religious outcomes of terrorism and martyrdom

    Cinnirella, M., Ansari, H., Lewis, C. A., Rogers, M. B., Amlot, R. & Loewenthal, K. M., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. (eCOMMUNITY: International Journal of Mental Health & Addiction).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Assessing Electronic Portfolios -- Now that we have them, what can we do with them?

    Bures, E. & Bentley, C., 2007, Proceedings from World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007. Bastiaens, T. & Carliner, S. (eds.). AACE, p. 7030-7038

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Asymmetric Sneutrino Dark Matter

    West, S., 13 May 2006, 41st Rencontres de Moriond on Electroweak Interactions and Unified Theories.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution