Home > Publications

Publications

37301 - 37400 out of 42,442Page size: 100
  1. Conference contribution › Research
  2. Published

    Adopting a ‘Search’ Lens in Exploration of How Organisations Transform Digitally

    Hafezieh, N. & Eshraghian, F., 2022, European Conference on Information Systems. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Adoption of Additive Manufacturing Approaches: The Case of Manufacturing SMEs

    Shah, S. & Mattiuzza, S., 13 Aug 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. IEEE, 8436257. (2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Adoption of mobile technologies in Malawian academic libraries: the case of Mzuzu University Library

    Kapondera, S. K. & Ngalande, E., 2016, Standing Conference of Eastern, Central and Southern African Library and Information Associations. p. 165-174 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Advanced technology integration in food manufacturing supply chain environment: Pathway to sustainability and companies' prosperity

    Ojo, O. O., Shah, S., Zigan, S. & Orchard, J., Jun 2019, 2019 IEEE Technology and Engineering Management Conference, TEMSCON 2019. Institute of Electrical and Electronics Engineers Inc., 8813713. (2019 IEEE Technology and Engineering Management Conference, TEMSCON 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Adventures with Lucos Cozza: a conduit beneath the grounds of the Villa Wolkonsky - the Lateran branch of the Acqua Felice (1586-88)

    Claridge, A., 20 Apr 2014, Scritti in onore di Lucos Cozza. Coates-Stephens, R. & Cozza, L. (eds.). Rome: Edizioni Quasar Rome, p. 192-197 5 p. (Lexicon Topographicum Urbis Romae Supplementum; vol. VII).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols

    Nweke, L. O., Kahsay Weldehawaryat, G. & Wolthusen, S. D., 11 May 2020, (E-pub ahead of print) 2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 9089346. (2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Unpublished

    Aesthetics of Conventionalisation and the Contributions to Xiqu's Intercultural Communication

    Li, X., 2018, (Unpublished) Intercultural Communications, Translation, and Methods of Teaching Foreign Languages.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Affordance Theory in Social Media Research: Systematic Review and Synthesis of The Literature

    Hafezieh, N. & Eshraghian, F., 2017, European Conference on Information Systems Proceedings. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    'Affordance’-what does this mean?

    Hafezieh, N. & Harwood, S., 2017, Proceedings of Twenty Second UK Academy of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    After Beckett: Edward Bond’s Post-Auschwitz Dramaturgy of Ruins

    Chen, C-C., 5 Sep 2016, TaPRA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Unpublished

    Agency and institutions in MNC research: the contribution of critical realism

    Rees, C., Jul 2012, (Unpublished) 28th European Group for Organizational Studies (EGOS) Colloquium. Helsinki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Unpublished

    Agency Issues and Investment: A Comparative Analysis of the UK and Pakistani Listed firms

    Naeem, K. & Li, M. C., 2018, (Unpublished) Proceedings of New York International Business and Social Science Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Aggregating strategies

    Vovk, V., 1990, Proceedings of the Third Annual Workshop on Computational Learning Theory. Fulk, M. & Case, J. (eds.). San Mateo, CA: Morgan Kaufmann, p. 371-383 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Aggregation Algorithm vs. Average For Time Series Prediction

    Jamil, W., Kalnishkan, Y. & Bouchachia, H., 23 Sep 2016, Proceedings of the ECML PKDD 2016 Workshop on Large-scale Learning from Data Streams in Evolving Environments, STREAMEVOLV-2016. p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Agreement in Directed Dynamic Networks

    Biely, M., Robinson, P. & Schmid, U., 2012, Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30-July 2, 2012, Revised Selected Papers. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Algebraic Cryptanalysis and RFID Authentication

    Cid, C., Ferreira, L., Procter, G. & Robshaw, M., 21 Nov 2015, The 11th Workshop on RFID Security - RFIDSec 2015. Springer, p. 104-121 18 p. (Lecture Notes in Computer Science; vol. 9440).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. E-pub ahead of print

    Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

    Albrecht, M., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 22 Nov 2019, (E-pub ahead of print) ASIACRYPT 2019. p. 371-397 17 p. (Lecture Notes in Computer Science; vol. 11923).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Algebraic Knowledge Representation: The Unification of Procedure, Logic and Structure

    Sernadas, A., Sernadas, C. & Fiadeiro, J. L., 1986, ADT.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Albrecht, M., Cid, C., Dullien, T., Faugere, J-C. & Perret, L., 2010, Information Security and Cryptology - 6th International Conference, Inscrypt 2010. Springer, Vol. 6584. p. 387-403 17 p. (Lecture Notes in Computer Science - LNCS; vol. 6584).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Algebraic Proof Complexity: Progress, Frontiers and Challenges

    Pitassi, T. & Tzameret, I., 2017, Electronic Colloquium on Computation Complexity .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Algebraic Proofs over Noncommutative Formulas

    Tzameret, I., 2010, 7th Annual Conference on Theory and Applications of Models of Computation. Berlin, Vol. 6108. p. 60 71 p. (Lecture Notes in Computer Science (LNCS)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Algebraic Semantics of Coordination or What Is in a Signature

    Fiadeiro, J. L. & Lopes, A., 1999, AMAST. Springer, Vol. 1548. p. 293-307 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Algebraic Software Architecture Reconfiguration

    Wermelinger, M. & Fiadeiro, J. L., 1999, ESEC / SIGSOFT FSE. Springer, Vol. 1687. p. 393-409 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Algebraic Techniques in Differential Cryptanalysis

    Albrecht, M. & Cid, C., 2009, Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009: Revised Selected Papers. Dunkelman, O. (ed.). Springer, p. 193-208 16 p. (Lecture Notes in Computer Science - LNCS; vol. 5665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. E-pub ahead of print

    Algebras for Tree Decomposable Graphs

    Bruni, R., Montanari, U. & Sammartino, M., 23 Jun 2020, (E-pub ahead of print) Graph Transformation - 13th International Conference, ICGT 2020, Held as Part of STAF 2020, Proceedings. Gadducci, F. & Kehrer, T. (eds.). Springer, p. 203-220 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12150 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks

    Wolthusen, S. D. & Al-Kuwari, S., May 2010, Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference (MobiSec 2010). Springer-Verlag, p. 67-79

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Alternating Control Flow Reconstruction

    Kinder, J. & Kravchenko, D., Jan 2012, Proc. 13th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2012). Springer, p. 267-282

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Amino acids in the asteroidal water-bearing salt crystals hosted in the Zag meteorite

    Chan, QHS., Zolensky, ME., Burton, AS. & Locke, DR., 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Amnesic distributed storage

    Chockler, G., Guerraoui, R. & Keidar, I., 1 Jan 2007, Proceedings of the 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007. Vol. 4731 LNCS. p. 139-151 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries

    Kinder, J., Zuleger, F. & Veith, H., 2009, Proc. 10th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2009). Springer, p. 214-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    An Agent Architecture for Concurrent Bilateral Negotiations

    Alrayes, B. & Stathis, K., 2014, Lecture Notes in Business Information Processing: Impact of Decision Support Systems for Global Environments. Springer, p. 79-89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    An Agent Development Framework based on Social Positions

    Lekeas, G. K. & Stathis, K., 1 Oct 2004, IEEE Interantional Conference on Systems, Man and Cybernetics. Thiessen, W. & Wieringa, P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems

    Mcevoy, R. & Wolthusen, S. D., May 2010, Proceedings of the 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 125-133

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    An Algebraic Approach to the Analysis of Constrained Workflow Systems

    Crampton, J., 2004, Proceedings of 3rd Workshop on Foundations of Computer Security (FCS'04). p. 61-74 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    An Algebraic Theory of Complexity for Valued Constraints: Establishing a Galois Connection

    Cohen, D. A., Creed, P., Jeavons, P. G. & Živný, S., 2011, Mathematical Foundations of Computer Science 2011: 36th International Symposium, MFCS 2011, Warsaw, Poland, August 22-26, 2011: Proceedings. Springer, p. 231-242 (Lecture Notes in Computer Science; vol. 6907).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    An Algorithm for the SAT Problem for Formulae of Linear Length

    Wahlström, M., 2005, ESA. p. 107-118 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    An Analysis of Cyclical Interdependencies in Critical Infrastructures

    Svendsen, N. & Wolthusen, S. D., 3 Oct 2007, Proc. Second International Workshop on Critical Information Infrastructures Security (CRITIS 2007). Springer-Verlag, p. 25-36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    An Analysis of DepenDNS

    Alfardan, N. & Paterson, K., 2010, Information Security. Springer, Vol. 6531. p. 31-37 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    An analysis of the 3gpp-MAC scheme

    Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    An Analysis of the Hermes8 Stream Ciphers

    Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems (UKAIS)

    Ameen, N. & Willis, R., 2018, An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    An Analysis of the Perceived Value of Using Knowledge Management Systems in Supporting Decision Making Processes

    Abdelrahman, M., Papamichail, K. & French, S., 2010, 11th European Conference on Knowledge Management ECKM . p. 1115-1128

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    An Analysis of the XSL Algorithm

    Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    An anonymous and undeniable payment scheme

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of the First International Conference on Information and Communications Security, ICICS '97, Beijing, China, November 1997. Han, Y., Okamoto, T. & Qing, S. (eds.). Springer-Verlag, p. 478-482 5 p. (Lecture Notes in Computer Science; no. 1334).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    An Architecture for Audit Logging in a Smart Card Environment

    Markantonakis, K., Mar 1999, An Architecture for Audit Logging in a Smart Card Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    An Argumentative Model for Service-oriented Agents

    Morge, M., McGinnis, J., Bromuri, S., Mancarella, P. & Stathis, K., 1 Mar 2008, Proc. of the International Symposium on Architectures for Intelligent Theory-Based Agents. Balduccini, M. & Baral, C. (eds.). p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.

    Rantos, K. & Markantonakis, K., 2004, SEC'04. p. 351-366 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Forthcoming

    An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms

    McEvoy, R. & Wolthusen, S. D., 2014, (Accepted/In press) Proceedings of the 9th International Workshop on Critical Information Infrastructures Security. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    An authorization framework resilient to policy evaluation failures

    Crampton, J. & Huth, M., 2010, Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010: Proceedings. Springer, p. 472-487 16 p. (Lecture Notes in Computer Science; vol. 6345).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    An Auto-Delegation Mechanism for Access Control Systems

    Crampton, J. & Morisset, C., 2010, Proceedings of 6th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    An Efficient Toolkit for Computing Private Set Operations

    Davidson, A. & Cid, C., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II. Pieprzyk, J. & Suriadi, S. (eds.). Springer Heidelberg, Vol. 2. p. 261-278 18 p. (Lecture Notes in Computer Science; vol. 10343).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. E-pub ahead of print

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    An electronic array on liquid helium

    Rees, D. G., Glasson, P., Antonov, V., Bennett, R., Fozooni, P., Frayne, P. G., Lea, M. J., Meeson, P. J., Simkins, L. & Mukharsky, Y., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 1464-1465 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    An Emerging research Program on Employment Relations in Small Firms in Advanced Capitalist Economies

    Edwards, P., Sen Gupta, S. & Tsai, C-J., 2006, Academy of Management Conference (AOM), Atlanta.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    An Empirical Study of Messaging Passing Concurrency in Go Projects

    Dilley, N. & Lange, J., 18 Mar 2019, SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering. Shihab, E., Lo, D. & Wang, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 377-387 11 p. 8668036. (SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. An evaluation of demand focused chain contribution to industrial sustainability

    Naghi Ganji, E., Shah, S. & Coutroubis, A., 15 Nov 2017, Advances in Manufacturing Technology XXXI : Proceedings of the 15th International Conference on Manufacturing Research, ICMR 2017, Incorporating the 32nd National Conference on Manufacturing Research. El Souri, M., Gao, J. & Keates, S. (eds.). United Kingdom: IOS Press BV, Vol. 6. p. 359-364 6 p. (Advances in Transdisciplinary Engineering; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    An examination of computer-mediated communication for engineering-related tasks

    Lee, J. Y. H. & Panteli, N., 2010, Proceedings of the Annual Hawaii International Conference on System Sciences. 5428613

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    An Examination of the Impacts of a Learning Management System: A Case from Jamaica

    Craig, J. & Harindranath, G., Aug 2015, Proceedings of the 2015 Americas Conference on Information Systems (AMCIS), Puerto Rico, Auguest..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    An experimental comparison of different carbon and glass laminates for ballistic protection

    Zhou, F., Zhang, C., Chen, X., Zhu, C. & Hogg, P. J., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    An Exploration of Consumers' Use of Disposing Practices in their Daily Lives

    Türe, M. & Ger, G., 2011, NA - Advances in Consumer Research. Vol. 39. p. 32-33

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    An exploration of the dependence relationships between self-reported aggression and interpersonal style

    Glorney, E., Lyons, E. & Fritzon, K., 2006, Proceedings of the Conference of the European Association of Psychology and Law: University of Liverpool.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. E-pub ahead of print

    An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

    Shepherd, C., Petitcolas, F., Akram, R. N. & Markantonakis, K., 27 Jul 2017, (E-pub ahead of print) Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lopez, J., Fischer-Hübner, S. & Lambrinoudakis, C. (eds.). Springer-Verlag, p. 164-179 16 p. (Lecture Notes in Computer Science; vol. 10442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    An Exploratory Analysis on Drug Target Locality

    Caceres Silva, J. & Paccanaro, A., Sep 2017, AGRANDA - Simposio Argentino de GRANdes DAtos 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. An Exploratory Study to Examine Big Data Application on Services and SCM

    Shah, S. & Theodosoulaki, A., 15 Apr 2019, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 155-159 5 p. 8691279. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System

    Fett, D., Küsters, R. & Schmitz, G., 13 Nov 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 673-688 16 p. 6956594. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    An extensible, self contained, layered approach to context acquisition

    Kramer, D., Kocurova, A., Oussena, S., Clark, T. & Komisarczuk, P., 2011, Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing. p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    An Identity for Kernel Ridge Regression

    Zhdanov, F. & Kalnishkan, Y., 2010, Learning Theory 21st International Conference, ALT 2010, Proceedings: volume 6331 of Lecture Notes in Computer Science. Springer, p. 405-419 (Lecture Notes in Computer Science; vol. 6331).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data

    Swift, S., Tucker, A., Crampton, J. & Garway-Heath, D., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 2174-2181 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 13 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 2601-2617 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    An information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Classical Correspondence: Proceedings of the 4th Drexel Symposium on Quantum Nonintegrability. Feng, D. H. & Hu, B. L. (eds.). Cambridge, Massachusetts: International Press, p. 339-353

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    An Innovative Heuristic for Planning-Based Urban Traffic Control

    Franco, S., Lindsay, A., Vallati, M. & McCluskey, T. L., 2018, Computational Science - ICCS 2018: 18th International Conference, Wuxi, China, June 11–13, 2018, Proceedings, Part I. Shi, Y., Fu, H., Tian, Y., Krzhizhanovskaya, V. V., Lees, M. H., Dongarra, J. J. & Sloot, P. M. A. (eds.). Springer, p. 181-193 13 p. (Lecture Notes in Computer Science; vol. 10860).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    An institutionalist perspective of IT-enabled change of Health Management Information Systems in Africa: implications for the Open-Source Software

    Bernardi, R., 2009, 10th International Conference on Social Implications of Computers in Developing Countries: Assessing the Contribution of ICT to Development Goals. Byrne, E., Nicholson, B. & Salem, F. (eds.). IFIP WG9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    An Interactive Evolution Strategy based Deep Convolutional Generative Adversarial Network for 2D Video Game Level Procedural Content Generation

    Jiang, M. & Zhang, L., 20 Sep 2021, 2021 International Joint Conference on Neural Networks (IJCNN). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    An interface theory for service-oriented design

    Fiadeiro, J. L. & Lopes, A., 1 Jan 2011, Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Giannakopoulou, D. & Orejas, F. (eds.). p. 18-33 16 p. (Lecture Notes in Computer Science; vol. 6603).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    An NFC based consumer-level counterfeit detection framework

    Saeed, Q., Walter, C. & Bilal, Z., 2013, The 11th International Conference on Privacy, Security and Trust (PST 2013). IEEE, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    An Obfuscation-Based Approach against Injection Attacks

    Baiardi, F. & Sgandurra, D., 1 Aug 2011, 2011 Sixth International Conference on Availability, Reliability and Security. p. 51-58 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    An online secret sharing scheme which identifies all cheaters

    Yeun, C. Y., Mitchell, C. J. & Burmester, M., 1998, Proceedings of NORDSEC '98, Trondheim, Norway, November 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    An optimal-control application of two paradigms of on-line learning

    Vovk, V., 1994, Proceedings of the Seventh Annual Workshop on Computational Learning Theory. New York: ACM Press, p. 98-109 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    An Optimization Approach to Robust Goal Obfuscation

    Bernardini, S., Fagnani, F. & Franco, S., Sep 2020, Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoningg. International Joint Conferences on Artificial Intelligence, p. 119-129 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    An overview of change management within manufacturing environment

    Syed, M. H. & Shah, S., 2013, Manufacturing Science and Technology (ICMST2013). p. 1205-1209 5 p. (Advanced Materials Research; vol. 816-817).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    An Overview of RFID Technology in Field Material Transfer Management

    Shah, S. & Shim, J., Aug 2021, IEEE International Conference on Management in Emerging Markets.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. An Overview of Smart Manufacturing for Competitive and Digital Global Supply Chains

    Menon, S., Shah, S. & Coutroubis, A., 2 Jul 2018, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 178-183 6 p. 8691224. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. An overview of sustainable practices in food processing supply chain environments

    Ojo, O. O., Shah, S. & Coutroubis, A., 9 Feb 2018, 2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017. IEEE Computer Society Press, p. 1792-1796 5 p. (IEEE International Conference on Industrial Engineering and Engineering Management; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    An RFID distance bounding protocol

    Hancke, G. & Kuhn, M. G., 2005, Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm). p. 67-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    An upgraded scanning wire beam profile monitoring system for the ISIS high energy drift space

    Harryman, D., Sep 2017, International Beam Instrumentation Conference 2017. p. 401-405 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    An Upper Bound for Aggregating Algorithm for Regression with Changing Dependencies

    Kalnishkan, Y., 2016, Algorithmic Learning Theory : 27th International Conference, ALT 2016, Bari, Italy, October 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9925. p. 238-252 15 p. (Lecture Notes in Computer Science; vol. 9925).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Analysing and modelling the growth and efficiency of urban transportation infrastructures

    Mohajeri, N., Gudmundsson, A. & Scartezzini, J., 2014, Symposium on Applied Urban Modelling-Planning Urban Infrustructure, Cambridge University.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Analysing evolvable cell design for optimisation of routing options

    Ellin, D. & Flockton, S., Jul 2007, Proceedings Genetic and Evolutionary Computation Conference 2007 (GECCO2007). p. 2687-2694 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Analysing Mu‐Calculus Properties of Pushdown Systems (Tool Presentation)

    Hague, M. & Ong, C-H. L., 2010, SPIN.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Analysing the IOBC Authenticated Encryption Mode

    Mitchell, C. J., 2013, Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, QLD, Australia, July 2013, Proceedings. Boyd, C. & Simpson, L. (eds.). Springer-Verlag, Vol. 7959. p. 1-12 12 p. (Lecture Notes in Computer Science; vol. 7959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks

    Xu, H., Sgandurra, D., Mayes, K., Li, P. & Wang, R., 2017, The 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. p. 291-301 11 p. (Lecture Notes in Computer Science; vol. 10658).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. E-pub ahead of print

    Analysing the security of Google's implementation of OpenID Connect

    Li, W. & Mitchell, C. J., 12 Jun 2016, (E-pub ahead of print) Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Donostia-San Sebastián, Spain, July 7-8, 2016, Proceedings. Caballero, J., Zurutuza, U. & Rodriguez, R. J. (eds.). Springer-Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science; vol. 9721).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform

    Ren, Y., Dmochowski, P. A. & Komisarczuk, P., 2010, 5th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2010, Cannes, France, June 9-11, 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Analysis of an innovation-driven supply chain using supply chain innovations from a “low-tech” sector: a perspective from the composites materials sector

    Coronado Mondragon, A. E. & Coronado Mondragon, C. E., 6 Aug 2014, 2014 International Conference on Business Information and Cultural Creativity Industry. Tsai, J. (ed.). Taipei, Taiwan, 11 p. 229

    Research output: Chapter in Book/Report/Conference proceedingConference contribution