Home > Publications

Publications

38626 - 38650 out of 42,811Page size: 25
  1. Conference contribution › Research
  2. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships.

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Identification of malicious web pages with static heuristics

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Identification of Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011. p. 33-40 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Identification of resource allocation trends in irregular ATM networks

    Cosmas, J., Pitts, J., Bocci, M., Luo, Z., Nyong, D. & Rai, S., Mar 1997, Proceeding of Fourth UKTS on Performance Modelling and Evaluation of ATM Networks. p. 24/1-24/12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Identifying and Analyzing Web Server Attacks

    Seifert, C., Endicott-Popovsky, B., Frincke, D. A., Komisarczuk, P., Muschevici, R. & Welch, I., 2008, Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008. p. 151-161 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Forthcoming

    Identifying Incentives for Extortion in Proof of Stake Consensus Protocols

    Bhudia, A., Cartwright, A., Cartwright, E., Hernandez-Castro, J. & Hurley-Smith, D., 22 Aug 2022, (Accepted/In press) The 3rd International Conference on Deep Learning, Big Data and Blockchain (DBB 2022). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Identifying manipulated images

    Nightingale, S., Wade, K. & Watson, D., Jun 2015, Society for Applied Research in Memory and Cognition.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Identifying patient experience from online resources via sentiment analysis and topic modelling

    Bahja, M. & Lycett, M., 6 Dec 2016, Proceedings - 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT 2016. Association for Computing Machinery, Inc, p. 94-99 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    IDENTIFYING THE RISKS ASSOCIATED WITH AGILE SOFTWARE DEVELOPMENT: AN EMPIRICAL INVESTIGATION

    Elbanna, A., 2014, ..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Igneous Intrusions in the Carnarvon Basin, NW Shelf, Australia

    McClay, K., Scarselli, N. & Jitmahantakul, S., 31 Aug 2013, Proceedings of the Western Australian Basins Conference. 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Il 'Furioso' spiritualizzato

    Anelotti, A., 2019, ‘Dreaming again on things already dreamed’: 500 years of 'Orlando Furioso' (1516-2016) . Dorigatti, M. & Pavlova, M. (eds.). Oxford-New York: Peter Lang

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Il Vicus Augustanus e la questione dell'insediamento coloniale del Laurentino

    Claridge, A., 10 Oct 2021, Il sistema ambientale della Tenuta presidenziale di Castelporziano: Ricerche sulla complessit¬a di un ecosistema forestale costiero mediterraneo. Rome: Accademia nazional delle scienze detta dei XL, Vol. 62.3. p. 889-992 33 p. (Scritti e documenti; vol. LXII (62), no. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Unpublished

    Illiquidity, investment styles and January returns in United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Corporate Finance Decisions in a Changing Global Environment, International Finance and Banking Society (IFABS) Asia 2016 Brunei Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. In preparation

    IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS

    Agyemang, G., Lehman, C. R. & Annisette, M., 9 Jul 2013, (In preparation) IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Impact Action-Oriented Research on Poverty and the Sustainable Development Goals

    Parkes, C., Hutton, M., Rosenbloom, A., Garcia de la Torre, C. & London, T., 2018, European Academy of Management, University of Iceland, Reykavik, 20th -23rd June 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Impacts of Social Media as Marketing Communication Tool on Digital Natives

    Samadi, S. & Shah, S., Aug 2021, IEEE International Conference on Management in Emerging Markets. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Implementable Internationalization Strategies for Companies from Emerging Economies

    Aboutalebi, R., 23 Nov 2011, In: EAMSA (Euro-Asia Management Studies Association), 28th Annual Conference: Strategies of international development in Euro-Asian Business. 23-26 November 2011, University of Gothenburg, Gothenburg, Sweden.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Implementation aspects of SET/EMV

    Jarupunphol, P. & Mitchell, C. J., 2002, Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002, Lisbon, Portugal, October 2002. Monteiro, J. L., Swatman, P. M. C. & Tavares, L. V. (eds.). Kluwer Academic Publishers, p. 305-315 11 p. (IFIP Conference Proceedings; no. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. E-pub ahead of print

    Implementation Correctness for Replicated Data Types, Categorically

    Gadducci, F., Melgratti, H., Roldán, C. & Sammartino, M., 25 Nov 2020, (E-pub ahead of print) Theoretical Aspects of Computing – ICTAC 2020 - 17th International Colloquium, 2020, Proceedings. Pun, V. K., Stolz, V. & Simao, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 283-303 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12545 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Implementation of a component-by-component algorithm to generate small low-discrepancy samples

    Doerr, B., Gnewuch, M. & Wahlström, M., 1 Jul 2009, Monte Carlo and Quasi-Monte Carlo Methods 2008. L'Ecuyer, P. & Owen, A. B. (eds.). Montreal, Canada: Springer, p. 323-338 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Implementation of agents for connection admission control on an ATM testbed

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 2000, On The Way to Information Society: Five Years of European ACTS Research on Intelligence in Services and Networks. IOS Press, p. 413-426

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Implementation of CERN Secondary Beam Lines T9 and T10 in BDSIM

    D'Alessandro, G. L., Boogert, S., Gibson, S., Nevay, L., Shields, W., Bernhard, J., Gerbershagen, A. & Rosenthal, M. S., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 3746-3748 3 p. THPGW069

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Implementation techniques for inductive types in Plastic

    Callaghan, P. & Luo, Z., 2000, Types for Proofs and Programs, Proc of Inter Conf of TYPES'99. LNCS 1956.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Implementing a Caching Service for Distributed CORBA Objects

    Chockler, G., Dolev, D., Friedman, R. & Vitenberg, R., 2000, Proceedings of the 2nd IFIP/ACM International Conference on Distributed systems platforms (Middleware '00). Springer-Verlag, p. 1-23 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Implementing a model checker for Lego

    Yu, S. & Luo, Z., 1997, Proc. of the 4th Inter Symp. of Formal Methods Europe, FME'97: Industrial Applications and Strengthened Foundations of Formal Methods. LNCS 1313.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution