Home > Publications

Publications

36351 - 36400 out of 39,647Page size: 50
  1. Conference contribution › Research
  2. Published

    Perceiving the Gravitational Vertical in 3D-Space

    Arshad, I., Gallagher, M. & Ferrè, E. R., Jan 2018, Poster presented at the Experimental Psychology Society January 2019 Meeting, London, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Perceiving the Gravitational-Vertical: Head Versus Torso Contributions to the Aubert Effect

    Arshad, I., Gallagher, M. & Ferrè, E. R., Jan 2018, Poster presented at the Experimental Psychology Society January 2018 Meeting, London, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Perceptions of martyrdom and terrorism amongst British Muslims

    Ansari, H., Cinnirella, M., Rogers, M. B., Loewenthal, K. M. & Lewis, C. A., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. Rogers, M. B., Lewis, C. A., Loewenthal, K. M., Cinnirella, M., Amlôt, R. & Ansari, H. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Performance Analysis of Reinforcement Learning for Achieving Context Awareness and Intelligence in Mobile Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Performance analysis of Reinforcement Learning for achieving context-awareness and intelligence in Cognitive Radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings. p. 1046-1053 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Performance Appraisal: Much ado about nothing

    Edwards, P. & Sen Gupta, S., 2017, Society for Advancement of Socio Economics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K., 20 Feb 2015, 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Peroxy radical intercomparison exercise: A joint TOR/OCTA Experiment at Schauinsland 1994

    VoltThomas, A., Gilge, S., Heitlinger, M., Mihelcic, D., Musgen, P., Patz, H. W., Schultz, M., Borrell, P., Borrell, P. M., Slemr, J., Behmann, T., Burrows, J. P., Weissenmayer, M., Arnold, T., Klupfel, T., Perner, D., Cantrell, C. A., Shetter, R., Carpenter, L. J., Clemitshaw, K. C. & 1 others, Penkett, S. A., 1997, PROCEEDINGS OF EUROTRAC SYMPOSIUM '96 - TRANSPORT AND TRANSFORMATION OF POLLUTANTS IN THE TROPOSPHERE, VOL 2. SOUTHAMPTON: COMPUTATIONAL MECHANICS PUBLICATIONS LTD, p. 621-626 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Pervasive Healthcare Using Self-Healing Agent Environments

    Bromuri, S., Ignaz Schumacher, M. & Stathis, K., 2011, HIGHLIGHTS IN PRACTICAL APPLICATIONS OF AGENTS AND MULTIAGENT SYSTEMS. Perez, JB., Corchado, JM., Moreno, MN., Julian, V., Mathieu, P., CanadaBago, J., Ortega, A. & Caballero, AF. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 159-166 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. E-pub ahead of print

    Philanthropy on the Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K., 21 Jun 2018, The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, p. 25-38 14 p. (Lecture Notes in Computer Science (LNCS); vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Phoenix: DGA-Based Botnet Tracking and Intelligence

    Schiavoni, S., Maggi, F., Cavallaro, L. & Zanero, S., 10 Jul 2014, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). London: Springer, Vol. 8550. p. 192-211 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Photonic Crystal Fibre Laser for Electron Beam Emittance Measurement

    Corner, L., Nevay, L. J. & Walczak, R., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. p. 577-579 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Photoproduction of neutral strange hadrons at ZEUS

    Boogert, S. & ZEUS Collaboration, 2001, PHOTON 2001. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids

    Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 52-68 17 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Physiological vs. Social complexity in software design

    Fiadeiro, J. L., 1 Jan 2006, Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS. p. 3 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Picking vs. Guessing Secrets: A Game-Theoretic Analysis

    Khouzani, A., Mardziel, P., Cid, C. & Srivatsa, M., 2015, IEEE 28th Computer Security Foundations Symposium. p. 243-257 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    PKI implementation issues in B2B e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2003, EICAR Conference Best Paper Proceedings, Copenhagen, Denmark, May 2003. Gattiker, U. E. (ed.). 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Placing and scaling ethical choices: ethical consumption and ethical public procurement

    Kleine, D., 2013, Proceedings of the 11th Congress of the European Society for Agricultural and Food Ethics. EurSafe

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Plaintext Recovery Attacks Against SSH

    Albrecht, M. R., Paterson, K. G. & Watson, G. J., 2009, Proceedings of the 2009 30th IEEE Symposium on Security and Privacy: 17-20 May 2009 / Berkley, CA, US. IEEE Computer Society, p. 16-26 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Plaintext Recovery Attacks Against WPA/TKIP

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. p. 325-349 25 p. (Lecture Notes in Computer Science; vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR

    Paterson, K. G. & Watson, G. J., 2010, Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010: Proceedings. Gilbert, H. (ed.). Springer, p. 345-361 17 p. (Lecture Notes in Computer Science; vol. 6110).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Plaintext-Recovery Attacks Against Datagram TLS

    Alfardan, N. & Paterson, K., 2012, Network and Distributed System Security Symposium. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Plant macrofossils from rodent middens

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 3. p. 2356-2367

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Unpublished

    Platforming place narratives with location-based games: playful and participatory storytelling using What3Words

    Lowe, J., 12 Jun 2020, (Unpublished) 20 Years of Seeing with GPS: Perspectives and Future Directions.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Playing with Agent Coordination Patterns in MAGE

    Urovi, V. & Stathis, K., 2010, Lecture Notes in Computer Science. Springer, Vol. 6069. p. 86-101 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Plug-in martingales for testing exchangeability on-line

    Fedorova, V., Gammerman, A., Nouretdinov, I. & Vovk, V., 2012, Proceedings of the 29th International Conference on Machine Learning (ICML-12). Langford, J. & Pineau, J. (eds.). Omnipress, p. 1639-1646 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    POLE-ZERO SYSTEM-IDENTIFICATION USING GENETIC ALGORITHMS

    FLOCKTON, S. J. & WHITE, M. S., 1993, PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON GENETIC ALGORITHMS. Forrest, S. (ed.). SAN MATEO: MORGAN KAUFMANN PUB INC, p. 531-535 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Policy Conflict Resolution in IoT via Planning

    Göynügür, E., Bernardini, S., de Mel, G., Talamadupula, K. & Şensoy, M., 2017, Canadian Conference on Artificial Intelligence: AI 2017: Advances in Artificial Intelligence. Springer, Vol. 10233. p. 169-175 7 p. (Lecture Notes in Computer Science; vol. 10233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem

    Gutin, G., Kratsch, S. & Wahlström, M., 2014, Proceedings of IPEC 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Polynomial Time Learning of Some Multiple Context-Free Languages with a Minimally Adequate Teacher

    Yoshinaka, R. & Clark, A., 2010, Proceedings of Formal Grammar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Polynomially Closed Co-clones

    Lagerkvist, V. & Wahlström, M., 2014, Proceedings of ISMVL 2014: IEEE 44th International Symposium on Multiple-Valued Logic. IEEE, p. 85-90 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Position Statement on the Psychological Aspects of Diabetes Education and Care

    Gallichan, M., Anderson, B., Bradley, C., Kilmartin, J., Peyrot, M. & Dunning, T., 2000, International Consensus Position Statements for Diabetes Education. London: Class publishing

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Postglacial Beetle Records from North America

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 275-286

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Forthcoming

    Post-Quantum Certificates for Electronic Travel Documents

    Pradel, G. & Mitchell, C. J., 3 Aug 2020, (Accepted/In press) Proceedings of DETIPS 2020 (Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy), September 18 2020. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Posturography Platform and Balance Control Training and Research System Based on FES and Muscle Synergies

    Galeano Galeano, D., Brunetti, F., Torricelli, D., Piazza, S. & Pons, J. L., 2013, Neurotechnology, Electronics, and Informatics. Londral, A. R., Encarnação, P. & Pons Rovira, J. L. (eds.). Springer-Verlag, Vol. 13. ( Springer Series in Computational Neuroscience; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Potential based reward shaping for hierarchical reinforcement learning

    Gao, Y. & Toni, F., 25 Jul 2015, IJCAI'15 Proceedings of the 24th International Conference on Artificial Intelligence. AAAI Press, p. 3504-3510 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.

    Francis, L., Hancke, G. P., Mayes, K. & Markantonakis, K., 2009, ICITST'09. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Aug 2017, USENIX Workshop on Offensive Technologies (WOOT). USENIX, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Power Quality Ancillary Services Support from Customer-owned Electric Vehicles in Low Voltage Distribution Networks

    Luo, H. & Nduka, O., 13 Oct 2020, 2020 IEEE PES Asia-Pacific Power & Energy Engineering Conference (APPEEC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. E-pub ahead of print

    Practical Attacks Against the Walnut Digital Signature Scheme

    Beullens, W. & Blackburn, S., 27 Oct 2018, Advances in Cryptology - ASIACRYPT 2018. Springer, p. 35-61 27 p. (Lecture Notes in Computer Science; vol. 11272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Practical attacks on proximity identification systems

    Hancke, G., 2006, IEEE Symposium on Security and Privacy . p. 328-333

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Practical Automated Vulnerability Monitoring Using Program State Invariants

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 23 Jun 2013, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '13). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Practical investment with the long-short game

    Al-Baghdadi, N., Lindsay, D., Kalnishkan, Y. & Lindsay, S., Sep 2020, Conformal and Probabilistic Prediction and Applications: COPA 2020. Proceedings of Machine Learning Research, Vol. 128. p. 209-228 20 p. (Proceedings of Machine Learning Research ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Ors Yalcin, S. (ed.). Springer Berlin / Heidelberg, Vol. 6370. p. 35-49 15 p. (Lecture Notes in Computer Science; vol. 6370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Practical solutions to key escrow and regulatory aspects

    Jefferies, N., Mitchell, C. J. & Walker, M., 1996, Proceedings of Public Key Solutions '96, Zurich, Switzerland, September/October 1996.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Practical 'what-if?' modelling for resource management of corporate voice-data networks

    Pitts, J., Luo, Z. & Cosmas, J., 1999, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3842. p. 132-141

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Practice Makes Perfect: Motivating Confident Privacy Protection Practices

    Coles-Kemp, L. & Kani-Zabihi, E., 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE, p. 866-871 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Submitted

    Precarity Amongst Service Managers in the NHS: a review in the midst of austerity and Brexit

    Zahmatkesh, M., 2017, (Submitted) 20th Annual Irish Academy of Management Conference 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Precise Bounds for Montgomery Modular Multiplication and some Potentially Insecure RSA Moduli

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 30-39 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution