Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    An analytical model of trilateration localization error

    Farooq-I-Azam, M., Ni, Q. & Dong, M., 27/02/2020, 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  2. Published

    Comment on "Space-time block codes based on coordinate symmetric orthogonal designs"

    Farrell, P. G., Giovaneli, C. L. & Honary, B., 22/01/2004, In : Electronics Letters. 40, 2, p. 133-135 3 p.

    Research output: Contribution to journalJournal article

  3. Published

    Leveraging SDN to provide an in-network QoE measurement framework

    Farshad, A., Georgopoulos, P., Broadbent, M., Mu, M. & Race, N., 2015, Computer Communications Workshops (INFOCOM WKSHPS), 2015 IEEE Conference on. IEEE, p. 239-244 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. Published

    Design and Analysis of Multicast-Based Publisher/Subscriber Models over Wireless Platforms for Smart Grid Communications

    Fateri, S., Ni, Q., Taylor, G. A., Panchadcharam, S. & Pisica, I., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1617-1623 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  5. Published

    Combinatorial Auction-Based Resource Allocation in the Fog

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 10/10/2016, Fifth European Workshop on Software Defined Networks (EWSDN), 2016. IEEE, p. 62-67 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  6. Published

    REF: Enabling Rapid Experimentation of Contextual Network Traffic Management using Software Defined Networking

    Fawcett, L., Mu, M., Hareng, B. & Race, N. J. P., 07/2017, In : IEEE Communications Magazine. 55, 7, p. 144-150 7 p.

    Research output: Contribution to journalJournal article

  7. Published

    Siren: a platform for deployment of VNFs in distributed infrastructures

    Fawcett, L. & Race, N. J. P., 3/04/2017, SOSR '17 Proceedings of the Symposium on SDN Research. New York: ACM, p. 201-202 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. Published

    Siren: A platform for deploying virtual network services in the cloud to Fog continuum

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 31/05/2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, p. 202-207 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  9. Published

    SDQ: Enabling rapid QoE experimentation using Software Defined Networking

    Fawcett, L., Mu, M., Broadbent, M. H., Hart, N. P. & Race, N. J. P., 24/07/2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon, Portugal: IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  10. Published

    A K-Anonymity Based Schema for Location Privacy Preservation

    Fei, F., Li, S., Dai, H., Hu, C., Dou, W. & Ni, Q., 1/04/2019, In : IEEE Transactions on Sustainable Computing. 4, 2, p. 156-167 12 p.

    Research output: Contribution to journalJournal article

  11. Published

    Practical aspects of IP take-over mechanisms

    Fetzer, C. & Suri, N., 1/10/2003, 2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. IEEE, p. 250-254 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  12. Published

    Algorithms for Real-Time Clustering and Generation of Rules from Data

    Filev, D. & Angelov, P., 2007, Advances in Fuzzy Clustering and Its Applications. de Oliveira, J. V. & Pedrycz, W. (eds.). Chichester: John Willey and Sons, p. 353-370 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Published

    Video Clarity: High Speed Data Mining for Video

    Fisher, P., Alhabib, A., Giotsas, V. & Andreopoulos, I., 2015, IBC 2015. London: Institution of Engineering and Technology, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  14. Published
  15. Published

    The future of maritime cyber security

    Fitton, O., Prince, D., Germond, B. & Lacy, M., 23/01/2015, Lancaster: Lancaster University. 36 p.

    Research output: Book/Report/ProceedingsOther report

  16. Published

    The future of mobile devices: security and mobility

    Fitton, O. & Prince, D., 17/11/2014, Lancaster: Lancaster University. 34 p.

    Research output: Book/Report/ProceedingsOther report

  17. Published

    BFF: a tool for eliciting tie strength and user communities in social networking services

    Fogues, R. L., Such, J. M., Espinosa, A. & Garcia-Fornes, A., 04/2014, In : Information Systems Frontiers . 16, 2, p. 225-237 13 p.

    Research output: Contribution to journalJournal article

  18. Published

    Open challenges in relationship-based privacy mechanisms for social network services

    Fogues, R. L., Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2015, In : International Journal of Human-Computer Interaction. 31, 5, p. 350-370 21 p.

    Research output: Contribution to journalJournal article

  19. Published

    Argumentation for multi-party privacy management

    Fogues, R. L., Murukanniah, P., Such, J. M., Espinosa, A., Garcia-Fornes, A. & Singh, M., 05/2015, The Second International Workshop on Agents and CyberSecurity (ACySe). p. 3-6 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  20. Published

    HomeVisor: adapting home network environments

    Frątczak, T., Broadbent, M., Georgopoulos, P. & Race, N., 2013, Second European Workshop on Software Defined Networks (EWSDN). Piscataway, N.J.: IEEE, p. 32-37 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  21. Published

    Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, Hollywood, CA, USA, October 7, 2012

    Freedman, M. J. (ed.) & Suri, N. (ed.), 2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  22. Published

    Adaptation for the masses: towards decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A-M., Maddock, C., Mauthe, A. & Taïani, F., 10/2014, ARM '14 Proceedings of 13th Workshop on Adaptive and Reflective Middleware. New York: ACM, 6 p. 4

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  23. Published

    It bends but would it break? topological analysis of BGP infrastructures in Europe

    Frey, S. A. F., El Khatib, Y., Rashid, A., Szmagalska-Follis, K., Vidler, J. E., Race, N. J. P. & Edwards, C. J., 21/03/2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, p. 423-438 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  24. Published

    Similitude: decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A-M., Maddock, C., Mauthe, A. U., Roman, P-L. & Taiani, F., 06/2015, Distributed Applications and Interoperable Systems: 15th IFIP WG 6.1 International Conference, DAIS 2015, Held as Part of the 10th International Federated Conference on Distributed Computing Techniques, DisCoTec 2015, Grenoble, France, June 2-4, 2015, Proceedings. Bessani, A. & Bounchenak, S. (eds.). Springer, p. 51-65 15 p. (Lecture Notes in Computer Science; vol. 9038).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  25. Published

    On the role of latent design conditions in cyber-physical systems security

    Frey, S., Rashid, A., Zanutto, A., Busby, J. S. & Szmagalska-Follis, K., 14/05/2016, SEsCPS '16 Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systemss, SEsCPS 2015, Austin, Texas. New York: ACM, p. 43-46 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  26. Published

    Reducible Rank Codes and Their Applications to Cryptography.

    Gabidulin, E. M., Ourivski, A. V., Honary, B. & Ammar, B., 1/01/2004, In : IEEE Transactions on Information Theory. 49, 12, p. 3289-3293 5 p.

    Research output: Contribution to journalJournal article

  27. Published

    Reducible Rank Codes and Applications to Cryptography

    Gabidulin, E. M., Ourivski, A. V., Ammar, B. & Honary, B., 2002, Information, coding and mathematics: proceedings of workshop honoring Prof. Bob McEliece on his 60th birthday. Blaum, M., Farrell, P. G. & van Tilborg, H. C. A. (eds.). Boston: Kluwer Academic Publishers, p. 121-132 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  28. Published

    A new family of rank codes and applications to cryptography

    Gabidulin, E. M., Ourivski, A. V., Honary, B. & Ammar, B., 07/2002, Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on. Lausanne, Switzerland : IEEE, p. 268 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  29. Published

    Information security in a random network coding network

    Gabidulin, E. M., Pilipchuk, N., Honary, B. & Rashwan, H., 04/2013, In : Problems of Information Transmission. 49, 2, p. 179-191 13 p.

    Research output: Contribution to journalJournal article

  30. Published

    The measurement and modeling of a P2P streaming video service

    Gao, P., Liu, T., Chen, Y., Wu, X., El-khatib, Y. & Edwards, C., 10/2008, Networks for Grid Applications : Second International Conference, GridNets 2008, Beijing, China, October 8-10, 2008, Revised Selected Papers. Vicat-Blanc Primet, P., Kudoh, T. & Mambretti, J. (eds.). Berlin: Springer, p. 24-34 11 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 2).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  31. Published

    Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  32. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X. & Ni, Q., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8762016. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  33. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 1/01/2020, In : IEEE Transactions on Communications. 68, 1, p. 569-581 13 p.

    Research output: Contribution to journalJournal article

  34. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (ed.), Herrera-Joancomartí, J. (ed.), Lupu, E. (ed.), Posegga, J. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2015, Springer-Verlag. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  35. Published

    On the security of machine learning in malware C & C detection: a survey

    Gardiner, J. & Nagaraja, S., 18/12/2016, In : ACM Computing Surveys. 49, 3, 39 p., 59.

    Research output: Contribution to journalJournal article

  36. Published

    Wireless sensor networks: design for real-life deployment and deployment experiences

    Gaura, E., Roedig, U. & Brusey, J., 2010, In : Measurement Science and Technology. 21, 12, 1 p., 120101.

    Research output: Contribution to journalEditorial

  37. Published

    5G multimedia massive MIMO communications systems

    Ge, X., Wang, H., Zi, R., Li, Q. & Ni, Q., 16/08/2016, In : Wireless Communications and Mobile Computing. 16, 11, p. 1377-1388 12 p.

    Research output: Contribution to journalJournal article

  38. Published

    Modulation of single quantum dot energy levels by a surface-acoustic-wave

    Gell, J. R., Ward, M. B., Young, R. J., Stevenson, R. M., Atkinson, P., Anderson, D., Jones, G. A. C., Ritchie, D. A. & Shields, A. J., 25/08/2008, In : Applied Physics Letters. 93, 8, p. - 3 p., 081115.

    Research output: Contribution to journalJournal article

  39. Published

    Location Awareness in a Mountain Rescue Domain

    Georgopoulos, P., Edwards, C. & Dunmore, M., 06/2008. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  40. Published

    Developing a Portable Wireless LAN Kit

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2010, JANET.

    Research output: Working paper

  41. Published

    Theoretical and Practical Survey of Backhaul Connectivity Options

    Georgopoulos, P., Rocha Sa e Moura, J. A., Md Noor, R., McCarthy, B. & Edwards, C., 2010, JANET.

    Research output: Working paper

  42. Published

    Towards a Secure and Seamless Host Mobility for the real world

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2011, Wireless On-Demand Network Systems and Services (WONS), 2011 Eighth International Conference on. IEEE, p. 134-141 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  43. Published

    Location Awareness Rescue System : Support for Mountain Rescue Teams

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2010, 9th IEEE International Symposium on Network Computing and Applications (NCA), 2010 . IEEE, p. 243-246 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  44. Published

    Providing secure and accountable privacy to roaming 802.11 mobile devices

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2012, MPM '12: Proceedings of the First Workshop on Measurement, Privacy, and Mobility. New York, NY, USA: ACM, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  45. Published

    A collaborative AAA architecture to enable secure real-world network mobility

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2011, NETWORKING'11: 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part I. Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A. & Scoglio, C. (eds.). Berlin: Springer-Verlag, p. 212-226 15 p. (Lecture Notes in Computer Science; vol. 6640).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  46. Published

    Towards network-wide QoE fairness using openflow-assisted adaptive video streaming

    Georgopoulos, P., Elkhatib, Y., Broadbent, M., Mu, M. & Race, N., 08/2013, FhMN '13 : Proceedings of the 2013 ACM SIGCOMM workshop on Future human-centric multimedia networking. New York: ACM, p. 15-20 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  47. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 2014, 23rd International Conference on Computer Communications and Networks (ICCCN 2014). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  48. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 08/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  49. Published

    Using software defined networking to enhance the delivery of video-on-demand

    Georgopoulos, P., Broadbent, M., Farshad, A., Plattner, B. & Race, N., 15/09/2015, In : Computer Communications. 69, p. 79-87 9 p.

    Research output: Contribution to journalJournal article

  50. Published

    Increasing the resilience of critical SCADA systems using peer-to-peer overlays

    Germanus, D., Khelil, A. & Suri, N., 2010, Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Springer, Vol. 6150 LNCS. p. 161-178 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  51. Published

    Leveraging the next-generation power grid: Data sharing and associated partnerships

    Germanus, D., Dionysiou, I., Gjermundrød, H., Khelil, A., Suri, N., Bakken, D. E. & Hauser, C., 11/10/2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  52. Published

    Susceptibility analysis of structured P2P systems to localized eclipse attacks

    Germanus, D., Langenberg, R., Khelil, A. & Suri, N., 8/10/2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems. IEEE, p. 11-20 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  53. Published

    Coral: Reliable and low-latency P2P convergecast for critical sensor data collection

    Germanus, D., Khelil, A., Schwandke, J. & Suri, N., 21/10/2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 300-305 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  54. Published

    Mitigating eclipse attacks in peer-to-peer networks

    Germanus, D., Roos, S., Strufe, T. & Suri, N., 29/10/2014, 2014 IEEE Conference on Communications and Network Security. Springer-Verlag, p. 400-408 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  55. Published

    PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation

    Germanus, D., Ismail, H. & Suri, N., 28/09/2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 74-83 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  56. Published

    Vehicle-Driver Communication using Off-The-Shelf Transceivers

    Ghamari, M., Chung, A., Roedig, U., Honary, B. & Pickering, C. A., 09/2010, IEEE 72nd Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 . IEEE, p. 1-2 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  57. Published

    Improving transmission reliability of low-power medium access control protocols using average diversity combining

    Ghamari, M., Heravi, B. M., Roedig, U., Honary, B. & Pickering, C. A., 1/12/2012, In : IET Wireless Sensor Systems. 2, 4, p. 377-384 8 p.

    Research output: Contribution to journalJournal article

  58. Published

    Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols

    Ghamari, M., Momahed Heravi, B., Roedig, U. & Honary, B., 12/2014, In : IET Networks. 3, 4, p. 284-292 9 p.

    Research output: Contribution to journalJournal article

  59. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In : Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to journalJournal article

  60. Published

    Predictive vulnerability scoring in the context of insufficient information availability

    Ghani, H., Luna, J., Khelil, A., Alkadri, N. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  61. Published

    Quantitative assessment of software vulnerabilities based on economic-driven security metrics

    Ghani, H., Luna, J. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  62. Published

    User-centric security assessment of software configurations: A case study

    Ghani, H., Luna Garcia, J., Petkov, I. & Suri, N., 2014, Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Springer-Verlag, Vol. 8364 LNCS. p. 196-212 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  63. Published

    Interaction Patterns in Crisis Negotiations: Persuasive Arguments and Cultural Differences

    Giebels, E. & Taylor, P. J., 01/2009, In : Journal of Applied Psychology. 94, 1, p. 5-19 15 p.

    Research output: Contribution to journalJournal article

  64. Published

    Interaction patterns of social influence in crisis negotiation

    Giebels, E. & Taylor, P., 2010, Contemporary theory, research, and practice of crisis and hostage negotiation. Rogan, R. & Lanceley, F. (eds.). Cresskill, NJ: Hampton Press, p. 59-76 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  65. Published

    Être sur la même longueur d'onde : la communication interculturelle en contexte de négociation de crise

    Giebels, E. & Taylor, P., 2010, Psychologie de l'intervention policière en situation de crise. St-Yves, M. & Collins, P. (eds.). Editions Yvon Blais

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  66. Published

    Tuning into the right wavelength: The importance of culture for effective crisis negotiation

    Giebels, E. & Taylor, P., 2012, The psychology of crisis intervention for law enforcement officers. St-Yves, M. & Collins, P. (eds.). Toronto: Carswell, p. 277-294 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  67. Published

    Expanding the horizons of terrorism and political violence research

    Giebels, E. & Taylor, P., 08/2012, In : Negotiation and Conflict Management Research. 5, 3, p. 235-238 4 p.

    Research output: Contribution to journalJournal article

  68. Published

    The cultural dimension of uncertainty avoidance impacts police-civilian interaction

    Giebels, E., Oostinga, M., Taylor, P. J. & Curtis, J. L., 1/02/2017, In : Law and Human Behavior. 41, 1, p. 93-102 10 p.

    Research output: Contribution to journalJournal article

  69. Published

    Transformative Effects of IoT, Blockchain and Artificial Intelligence on Cloud Computing: Evolution, Vision, Trends and Open Challenges

    Gill, S., Tuli, S., Xu, M., Singh, I., Singh, K., Lindsay, D., Tuli, S., Smirnova, D., Singh, M., Jain, U., Pervaiz, H., Sehgal, B., Kaila, S. S., Misra, S., Aslanpour, M. S., Mehta, H., Stankovski, V. & Garraghan, P., 1/12/2019, In : Internet of Things. 8, 26 p., 100118.

    Research output: Contribution to journalJournal article

  70. Published

    Message from the program chairs

    Gill, C., Suri, N. & Hong, Y-S., 2005, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. IEEE, 1 p. (Proc. Int. Workshop Object Oriented Real Time Dependable Syst. WORDS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  71. Published

    Perceptual video quality estimation by regression with myopic experts

    Giotsas, V., Deligiannis, N., Fisher, P. & Andreopoulos, Y., 2/07/2015, 2015 7th International Workshop on Quality of Multimedia Experience, QoMEX 2015. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. 7148115

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  72. Published

    Detecting and assessing the hybrid IPv4/IPv6 as relationships

    Giotsas, V. & Zhou, S., 2011, SIGCOMM '11 Proceedings of the ACM SIGCOMM 2011 conference. New York: ACM, p. 424-425 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  73. Published

    Valley-free violation in Internet routing: analysis based on BGP Community data

    Giotsas, V. & Zhou, S., 2012, 2012 IEEE International Conference on Communications, ICC 2012. IEEE, p. 1193-1197 5 p. 6363987

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  74. Published

    Improving the discovery of IXP peering links through passive BGP measurements

    Giotsas, V. & Zhou, S., 2013, 2013 Proceedings IEEE INFOCOM . IEEE, p. 3249-3254 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  75. Published

    Inferring multilateral peering

    Giotsas, V., Zhou, S., Luckie, M. & Claffy, K., 2013, CoNEXT '13 Proceedings of the ninth ACM conference on Emerging networking experiments and technologies. New York: ACM, p. 247-258 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  76. Published

    Inferring complex AS relationships

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 5/11/2014, IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  77. Published

    IPv6 AS relationships, cliques, and congruence

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 2015, Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Mirkovic, J. & Liu, Y. (eds.). Berlin: Springer, p. 111-122 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  78. Published

    Mapping peering interconnections to a facility

    Giotsas, V., Smaragdakis, G., Huffaker, B., Luckie, M. & Claffy, K. C., 1/12/2015, CoNEXT '15 Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. New York: Association for Computing Machinery, Inc, 13 p. 37

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  79. Published

    Periscope: Unifying looking glass querying

    Giotsas, V., Dhamdhere, A. & Claffy, K. C., 2016, PAM 2016: Passive and Active Measurement : 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings. Karagiannis, T. & Dimitropoulos, X. (eds.). Cham: Springer, p. 177-189 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9631).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  80. Published

    Inferring BGP blackholing activity in the Internet

    Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A. & Berger, A., 1/11/2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 1-14 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  81. Published

    Detecting peering infrastructure outages in the wild

    Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A. & Aben, E., 7/08/2017, SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication. New York: Association for Computing Machinery, Inc, p. 446-459 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  82. Unpublished

    Inferring Internet AS Relationships Based on BGP Routing Policies

    Giotsas, V. & Zhou, S., 2011, (Unpublished).

    Research output: Working paperOther

  83. Published

    Improving the Accuracy of the Internet Cartography

    Giotsas, V., 2014

    Research output: ThesisDoctoral Thesis

  84. Published

    IEEE Transactions on Dependable an Secure Computing: Editorial

    Gligor, V. D., Meadows, C. & Suri, N., 8/02/2008, In : IEEE Transactions on Dependable and Secure Computing. 5, 1, p. 4-5 2 p.

    Research output: Contribution to journalEditorial

  85. Published

    An evolving approach to unsupervised and Real-Time fault detection in industrial processes

    Gomes Bezerra, C., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 30/11/2016, In : Expert Systems with Applications. 63, p. 134-144 11 p.

    Research output: Contribution to journalJournal article

  86. Published

    Monitoring and evaluation of semantic rooms

    Gönczy, L., Csertán, G., Urbanics, G., Ghani, H., Khelil, A. & Suri, N., 2012, Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware. Springer Berlin / Heidelberg, p. 99-116 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  87. Published

    Security policy verification for multi-domains in cloud systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 1/04/2014, In : International Journal of Information Security. 13, 2, p. 97-111 15 p.

    Research output: Contribution to journalJournal article

  88. Published

    DomRBAC: an access control model for modern collaborative systems

    Gouglidis, A. & Mavridis, I., 06/2012, In : Computers and Security. 31, 4, p. 540-556 17 p.

    Research output: Contribution to journalJournal article

  89. Published

    On the definition of access control requirements for grid and cloud computing systems

    Gouglidis, A. & Mavridis, I., 1/12/2010, Networks for Grid Applications: Third International ICST Conference, GridNets 2009, Athens, Greece, September 8-9, 2009, Revised Selected Papers. Doulamis, A., Mambretti, J., Tomkos, I. & Varvarigou, T. (eds.). Berlin: Springer Verlag, p. 19-26 8 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 25).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  90. Published

    Grid access control models and architectures

    Gouglidis, A. & Mavridis, I., 1/12/2011, Computational and data grids: principles, applications and design. IGI Global, p. 217-234 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  91. Published

    A foundation for defining security requirements in grid computing

    Gouglidis, A. & Mavridis, I., 4/12/2009, PCI 2009 - 13th Panhellenic Conference on Informatics. IEEE, p. 180-184 5 p. 5298349

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  92. Published

    Verification of secure inter-operation properties in multi-domain RBAC systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 06/2013, Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on . IEEE, p. 35-44 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  93. Published

    A methodology for the development and verification of access control systems in cloud computing

    Gouglidis, A. & Mavridis, I., 2013, Collaborative, Trusted and Privacy-Aware e/m-Services. Douligeris, C., Polemi, N., Karantjias, A. & Lamersdorf, W. (eds.). Berlin: Springer Verlag, p. 88-99 12 p. (IFIP Advances in Information and Communication Technology ; vol. 399).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  94. Published

    Role-based secure inter-operation and resource usage management in mobile grid systems

    Gouglidis, A. & Mavridis, I., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. Ardagna, C. A. & Zhou, J. (eds.). Berlin: Springer Verlag, p. 38-53 16 p. (Lecture Notes in Computer Science; vol. 6633).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  95. Published

    A Multi-Level Approach to Resilience of Critical Infrastructures and Services

    Gouglidis, A., Shirazi, S. N. U. H., Simpson, S., Smith, P. & Hutchison, D., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  96. Published

    Threat awareness for critical infrastructures resilience

    Gouglidis, A., Green, B., Busby, J. S., Rouncefield, M. F., Hutchison, D. & Schauer, S., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on. 9781467390248: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  97. Published

    Verification of Resilience Policies that Assist Attribute Based Access Control

    Gouglidis, A., Hu, V. C., Busby, J. S. & Hutchison, D., 24/03/2017, ABAC '17 Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control. New York: ACM, p. 43-52 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  98. Published

    Protection against Cyber Attacks: Introducing Resilience for SCADA Networks

    Gouglidis, A. & Hutchison, D., 03/2017, 1 p. AIT Austrian Institute of Technology GmbH.

    Research output: Other contribution

  99. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  100. Published

    Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience

    Gouglidis, A. & Hutchison, D., 10/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

Previous 1...3 4 5 6 7 8 9 10 ...20 Next

Back to top