Home > Research > Security > Publications & Outputs
View graph of relations
  1. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    "Talking a different Language": Anticipating adversary attack cost for cyber risk assessment

    Derbyshire, R., Green, B. & Hutchison, D., 1/04/2021, In: Computers and Security. 103, 24 p., 102163.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In: IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A military design movement: Postmodern comedians of war

    Zweibelson, B., 5/01/2021, Lancaster University. 468 p.

    Research output: ThesisDoctoral Thesis

  8. Published

    A Multi-commodity network flow model for cloud service environments

    Stephanakis, I. M., Shirazi, S. N. U. H., Gouglidis, A. & Hutchison, D., 2016, Engineering Applications of Neural Networks: 17th International Conference, EANN 2016, Aberdeen, UK, September 2-5, 2016, Proceedings. Jayne, C. & Iliadis, L. (eds.). Cham: Springer, p. 186-197 12 p. (Communications in Computer and Information Science; vol. 629).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A Multi-Level Approach to Resilience of Critical Infrastructures and Services

    Gouglidis, A., Shirazi, S. N. U. H., Simpson, S., Smith, P. & Hutchison, D., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  10. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In: Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    A Passion for Security: Intervening to Help Software Developers

    Weir, C., Becker, I. & Blair, L., 25/05/2021, 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, p. 21-30 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems

    Birkholz, H., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Arul, T., Heinrich, M., Katzenbeisser, S., Suri, N., Vateva-Gurova, T. & Schlehuber, C., 25/06/2018. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  13. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (Editor), Tonetta, S. (Editor) & Schoitsch, E. (Editor), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    A Stitch in Time: Supporting Android Developers in Writing Secure Code

    Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C. A. F. & Fahl, S., 30/10/2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1065-1077 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. E-pub ahead of print

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 2018, (E-pub ahead of print) p. 1-34, 34 p.

    Research output: Working paper

  17. Published

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 25/02/2019. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    Access Control in Industrial Internet of Things

    Salonikias, S., Gouglidis, A., Mavridis, I. & Gritzalis, D., 2019, Security and Privacy Trends in the Industrial Internet of Things. Alcaraz, C. (ed.). Springer, p. 95-114 120 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  19. Published

    Achieving ICS resilience and security through granular data flow management

    Green, B., Krotofil, M. & Hutchison, D., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 93-101 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Adaptive hybrid compression for wireless sensor networks

    Ali, A., Khelil, A., Suri, N. & Mahmudimanesh, M., 1/12/2015, In: ACM Transactions on Sensor Networks. 11, 4, 36 p., 53.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Agile sink selection in wireless sensor networks

    Mahmudimanesh, M. & Suri, N., 30/06/2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, p. 390-398 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In: IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    An Efficient E2E Verifiable E-voting System without Setup Assumptions

    Kiayias, A., Zacharias, T. & Zhang, B., 1/05/2017, In: IEEE Security and Privacy Magazine. 15, 3, p. 14-23 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    An empirical study of injected versus actual interface errors

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 21/07/2014, Proceedings of the 2014 International Symposium on Software Testing and Analysis. ACM, p. 397-408 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems

    Sailer, P., Ivkic, I., Tauber, M., Mauthe, A. & Gouglidis, A., 30/06/2021, 17th IFIP/IEEE International Symposium on Integrated Network Management (IM 2021): 2nd IEEE/IFIP International Workshop on Management for Industry 4.0 (MFI 4.0). IEEE, p. 908-913 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In: Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In: IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Anomaly detection in the cloud using data density

    Shirazi, S. N. U. H., Simpson, S., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 27/06/2016, Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on. IEEE, p. 616-623 8 p. 7820324. (Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment

    Derbyshire, R., 2022, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  32. Published

    Assessing privacy capabilities of cloud service providers

    Del Alamo, J. M., Trapero, R., Martin, Y. S., Yelmo, J. C. & Suri, N., 1/11/2015, In: IEEE Latin America Transactions. 13, 11, p. 3634-3641 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  34. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Forthcoming

    Attributes and Dimensions of Trust in Secure Systems

    Bradbury, M., Prince, D., Marcinkiewicz, V. & Watson, T., 7/10/2022, (Accepted/In press) STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. Delft, Netherlands, (ACM Transactions on Internet of Things).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Unpublished

    Augmenting ICS cyber security risk assessments: assimilation of socio-technical characteristics and constructs

    Green, B., 2018, (Unpublished) Lancaster University. 314 p.

    Research output: ThesisDoctoral Thesis

  41. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In: IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    BGPStream: A software framework for live and historical BGP data analysis

    Orsini, C., King, A., Giordano, D., Giotsas, V. & Dainotti, A., 14/11/2016, IMC '16 Proceedings of the 2016 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 429-444 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Brief announcement: statement voting and liquid democracy

    Zhang, B. & Zhou, H.-S., 25/07/2017, PODC '17 Proceedings of the ACM Symposium on Principles of Distributed Computing. New York: ACM, p. 359-361 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Ceremonies for end-to-end verifiable elections

    Kiayias, A., Zacharias, T. & Zhang, B., 03/2017, PKC 2017: Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Editors (view affiliations). Springer, p. 305-334 30 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Challenges and approaches in securing safety-relevant railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S. & Suri, N., 26/04/2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 139-145 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, (E-pub ahead of print) In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Cloud instance management and resource prediction for computation-as-a-service platforms

    Doyle, J., Giotsas, V., Anam, M. A. & Andreopoulos, Y., 2/06/2016, Proceedings - 2016 IEEE International Conference on Cloud Engineering, IC2E 2016: Co-located with the 1st IEEE International Conference on Internet-of-Things Design and Implementation, IoTDI 2016. Institute of Electrical and Electronics Engineers Inc., p. 89-98 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    C'MON: Monitoring the compliance of cloud services to contracted properties

    Alboghdady, S., Winter, S., Taha, A., Zhang, H. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 6 36

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Communication standards for distributed renewable energy sources integration in future electricity distribution networks

    Jindal, A., Marnerides, A., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 12/05/2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, p. 8390-8393 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    CommunityWatch: The Swiss-Army Knife of BGP Anomaly Detection

    Giotsas, V., 16/07/2018, ANRW '18 Proceedings of the Applied Networking Research Workshop. New York: ACM, p. 24 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Composite vulnerabilities in Cyber Physical Systems

    Ciholas, P. & Such, J. M., 6/04/2016, p. 4-7. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  52. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published
  55. Published

    Cyber policing in the North West: regional and local co-ordination

    Prince, D. D. C., 4/09/2014, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  56. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  57. Published

    Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Livraga, G. (Editor), Torra, V. (Editor), Aldini, A. (Editor), Martinelli, F. (Editor) & Suri, N. (Editor), 2016, Springer.

    Research output: Book/Report/ProceedingsProceedings

  58. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (Editor), Herrera-Joancomartí, J. (Editor), Lupu, E. (Editor), Posegga, J. (Editor), Aldini, A. (Editor), Martinelli, F. (Editor) & Suri, N. (Editor), 2015, Springer. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  59. Published

    D-DEMOS: a distributed, end-to-end verifiable, internet voting system

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 27/06/2016, Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016) . IEEE, p. 711-720 10 p. (2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    Defending Adversarial Attacks on Cloud-aided Automatic Speech Recognition Systems

    Zhang, J., Zhang, B. & Zhang, B., 2/07/2019, SCC '19 Proceedings of the Seventh International Workshop on Security in Cloud Computing. New York: ACM, p. 23-31 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  62. Published

    DEMOS-2: scalable E2E verifiable elections without random oracles

    Kiayias, A., Zacharias, T. & Zhang, B., 12/10/2015, CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 352-363 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    DeQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

    Zhang, H., Trapero, R., Luna, J., Suri, N., X., L. & U., B., 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    Design and construction of an Industrial Control System testbed

    Green, B., Paske, B., Hutchison, D. & Prince, D., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  65. Published

    Designing in Complex Security Contexts: Enabling Frame Awareness through Sharks, Dollar Signs, and Police Badges

    Zweibelson, B., Wetzel, J. & Landis, T., 31/10/2021, In: She Ji. 7, 3, p. 435-461 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    Detecting and mitigating P2P eclipse attacks

    Ismail, H., Germanus, D. & Suri, N., 14/12/2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 224-231 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    Detecting peering infrastructure outages in the wild

    Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A. & Aben, E., 7/08/2017, SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication. New York: Association for Computing Machinery, Inc, p. 446-459 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

  69. Published

    Developer Essentials: Top Five Interventions to Support Secure Software Development

    Weir, C., Rashid, A. & Noble, J., 30/03/2017, Lancaster: Lancaster University. 9 p.

    Research output: Book/Report/ProceedingsCommissioned report

  70. Published

    Developers Need Support, Too: A Survey of Security Advice for Software Developers

    Acar, Y., Stransky, C., Wermke, D., Weir, C. A. F., Mazurek, M. & Fahl, S., 24/09/2017, Proceedings of the IEEE Secure Development Conference 2017. Jaeger, T. (ed.). IEEE, p. 22-26 5 p. 17

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Distributed, end-to-end verifiable, and privacy-preserving internet voting systems

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 1/06/2019, In: Computers and Security. 83, p. 268-299 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Published

    Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Efficient agile sink selection in wireless sensor networks based on compressed sensing

    Mahmudimanesh, M., Naseri, A. & Suri, N., 26/05/2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, p. 193-200 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    Efficient verification of program fragments: Eager POR

    Metzler, P., Saissi, H., Bokor, P., Hess, R., Suri, N., Artho, C. (Editor), Peled, D. (Editor) & Legay, A. (Editor), 22/09/2016, Automated Technology for Verification and Analysis: 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings. Springer-Verlag, Vol. 9938 LNCS. p. 375-391 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Unpublished

    EmerGen(e)tic: Exploring the use of genetic algorithms in emergent distributed systems

    Goldsworthy, B. & Porter, B. (Editor), 2017, (Unpublished) 47 p.

    Research output: Other contribution

  77. Published

    End-to-end verifiable elections in the standard model

    Kiayias, A., Zacharias, T. & Zhang, B., 17/03/2015, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Oswald, E. & Fischlin, M. (eds.). Springer, Vol. II. p. 468-498 31 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  79. Published

    Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience

    Shirazi, S. N. U. H., Gouglidis, A., Syeda, K. N., Simpson, S., Mauthe, A. U., Stephanakis, I. M. & Hutchison, D., 16/08/2016, Resilience Week (RWS), 2016. IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    Event pattern discovery on IDS traces of cloud services

    Huang, S.-Y., Huang, Y. & Suri, N., 3/12/2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. IEEE, p. 25-32 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B.-C., Li, S.-C., Huang, Y., Suri, N. & Wang, P.-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Forthcoming

    Exploring the Representation of Cyber-Risk Data Through Sketching

    Miller, T., Sturdee, M. & Prince, D., 22/10/2023, (Accepted/In press). 11 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  83. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  84. Published

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 7/07/2020, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2020. . Springer, p. 67-88 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    FastFI: Accelerating software fault injections

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 193-202 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    Flashlight: A novel monitoring path identification schema for securing cloud services

    Zhang, H., Luna, J., Suri, N. & Trapero, R., 27/08/2018, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 10 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    Foreword from the QASA 2014 program chairs

    Aldini, A., Martinelli, F., Suri, N., J., P. (Editor), N., S., E., L. (Editor), J., H.-J. (Editor), J., G.-A., F., M. & A., A., 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Springer-Verlag, Vol. 8872. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  88. Published

    Foreword from the QASA 2015 chairs

    Aldini, A., Martinelli, F., Suri, N., G., N.-A. (Editor), A., A., F., M., N., S. & J., G.-A. (Editor), 21/09/2015, Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers. Springer-Verlag, Vol. 9481. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  89. Published

    Foreword from the QASA 2016 program chairs

    Aldini, A., Martinelli, F., Suri, N., G., L. (Editor), A., A. (Editor), V., T. (Editor), F., M. (Editor) & N., S., 2016, Springer.

    Research output: Book/Report/ProceedingsBook

  90. Published

    Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Gouglidis, A., Grompanopoulos, C. & Mavridou, A., 25/06/2018, Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018). Bliudze, S. & Bensalem, S. (eds.). EPTCS, p. 52-64 13 p. (EPTCS; vol. 272).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 12/08/2020, USENIX Security '20 Proceedings. USENIX Association, p. 289-305 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes

    Ali, A., Khelil, A. & Suri, N., 7/01/2016, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  94. Published

    G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games

    Alshawish, A., Amine Abid, M., de Meer, H., Schauer, S., König, S., Gouglidis, A. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice . Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 129-156 28 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  95. Published

    GRINDER: On Reusability of Fault Injection Tools

    Winter, S., Piper, T., Schwahn, O., Natella, R., Suri, N. & Cotroneo, D., 23/05/2015, 2015 IEEE/ACM 10th International Workshop on Automation of Software Test. IEEE, p. 75-79 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code

    Schwahn, O., Winter, S., Coppik, N. & Suri, N., 1/11/2018, In: IEEE Transactions on Dependable and Secure Computing. 15, 6, p. 945-958 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    How to Improve the Security Skills of Mobile App Developers: An Analysis of Expert Knowledge

    Weir, C., 2017, Lancaster University. 135 p.

    Research output: ThesisMaster's Thesis

  98. Published

    How to Improve the Security Skills of Mobile App Developers: Comparing and Contrasting Expert Views

    Weir, C., Rashid, A. & Noble, J., 22/06/2016, Proceedings of the 2016 ACM Workshop on Security Information Workers. Biddle, R., Chu, B., Lipford, H. & Murphy-Hill, E. (eds.). New York: USENIX Association, 7 p. 1

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    I'd Like to Have an Argument, Please: Using Dialectic for Effective App Security

    Weir, C., Rashid, A. & Noble, J., 29/04/2017, EuroUSEC 2017: the 2nd European Workshop on Usable Security. Reston, VA: Internet Society, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  100. Published

    Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 Next

Back to top