Home > Research > Cyber Security Research Centre (Security Group) > Publications & Outputs
View graph of relations

Cyber Security Research Centre (Security Group)

  1. Published

    The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things

    Antrobus, R., Green, B., Frey, S. A. F. & Rashid, A., 1/05/2019, Living in the Internet of Things 2019. IET, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Distributed, end-to-end verifiable, and privacy-preserving internet voting systems

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 1/06/2019, In: Computers and Security. 83, p. 268-299 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 7/07/2020, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2020. . Springer, p. 67-88 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

    Demir, K., Nayyer, F. & Suri, N., 1/06/2019, In: International Journal of Critical Infrastructure Protection. 25, p. 84-101 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    "Talking a different Language": Anticipating adversary attack cost for cyber risk assessment

    Derbyshire, R., Green, B. & Hutchison, D., 1/04/2021, In: Computers and Security. 103, 24 p., 102163.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    To me, to you: Towards Secure PLC Programming through a Community-Driven Open-Source Initiative

    Derbyshire, R., Maesschalck, S., Staves, A., Green, B. & Hutchison, D., 31/07/2023, IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 358-362 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Proofs of Writing for Robust Storage

    Dobre, D., Karame, G., Li, W., Majuntke, M., Suri, N. & Vukolic, M., 27/05/2019, In: IEEE Transactions on Parallel and Distributed Systems. 30, 11, p. 2547-2566 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    The influence of geopolitics on polar research – Options for HM Government

    Germond, B. & Suri, N., 8/06/2023

    Research output: Exhibits, objects and web-based outputsBlog

  10. Published

    PCaaD: Towards automated determination and exploitation of industrial systems

    Green, B., Derbyshire, R., Krotofil, M., Knowles, W., Prince, D. & Suri, N., 30/11/2021, In: Computers and Security. 110, 19 p., 102424.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Towards everlasting privacy and efficient coercion resistance in remote electronic voting

    Grontas, P., Pagourtzis, A., Zacharakis, A. & Zhang, B., 2019, FC 2018 International Workshops, VOTING 18: International Conference on Financial Cryptography and Data Security. Bracciali, A., Pintore, F., Clark, J., Eyal, I., Zohar, A., Teague, V. & Sala, M. (eds.). Cham: Springer Verlag, p. 210-231 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10958 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  12. Published

    Security Requirements Engineering in Safety-Critical Railway Signalling Networks.

    Heinrich, M., Vateva-Gurova, T., Arul, T., Katzenbeisser, S., Suri, N., Birkholz, H., Fuchs, A., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Tverdyshev, S. & Schlehuber, C., 14/07/2019, In: Security and Communication Networks. 2019, 14 p., 8348925.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Communication standards for distributed renewable energy sources integration in future electricity distribution networks

    Jindal, A., Marnerides, A., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 12/05/2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, p. 8390-8393 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots

    Maesschalck, S., Giotsas, V. & Race, N., 7/12/2021.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  16. E-pub ahead of print

    These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 5/02/2024, (E-pub ahead of print) In: IEEE Transactions on Network and Service Management.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Identifying infected energy systems in the wild

    Marnerides, A., Giotsas, V. & Mursch, T., 25/06/2019, e-Energy 2019 - Proceedings of the 10th ACM International Conference on Future Energy Systems. New York: ACM, p. 263-267 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  20. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  21. Published

    Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems

    Miller, T., Staves, A., Maesschalck, S., Sturdee, M. & Green, B., 31/12/2021, In: International Journal of Critical Infrastructure Protection. 35, 100464.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Forthcoming

    Exploring the Representation of Cyber-Risk Data Through Sketching

    Miller, T., Sturdee, M. & Prince, D., 22/10/2023, (Accepted/In press). 11 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  23. Published

    Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems

    Sailer, P., Ivkic, I., Tauber, M., Mauthe, A. & Gouglidis, A., 30/06/2021, 17th IFIP/IEEE International Symposium on Integrated Network Management (IM 2021): 2nd IEEE/IFIP International Workshop on Management for Industry 4.0 (MFI 4.0). IEEE, p. 908-913 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Learning to Walk: Towards Assessing the Maturity of OT Security Control Standards and Guidelines

    Staves, A., Maesschalck, S., Derbyshire, R., Green, B. & Hutchison, D., 24/07/2023, 2023 IFIP Networking Conference (IFIP Networking). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. E-pub ahead of print

    Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology

    Staves, A., Gouglidis, A., Maesschalck, S. & Hutchison, D., 30/06/2024, In: Safety Science. 174, 106481.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    InfoLeak: Scheduling-based information leakage

    Vateva-Gurova, T., Manzoor, S., Huang, Y. & Suri, N., 11/02/2019, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 44-53 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  30. Published

    Defending Adversarial Attacks on Cloud-aided Automatic Speech Recognition Systems

    Zhang, J., Zhang, B. & Zhang, B., 2/07/2019, SCC '19 Proceedings of the Seventh International Workshop on Security in Cloud Computing. New York: ACM, p. 23-31 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search

    Zhang, J., Zhang, B. & Lin, J., 19/08/2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 211-219 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top