Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Chapter (peer-reviewed)
  2. Published

    Human and Organizational Issues for Resilient Communications

    Anderson, T., Busby, J., Gouglidis, A., Hough, K., Hutchison, D. & Rouncefield, M., 2020, Guide to Disaster-Resilient Communication Networks. Rak, J. & Hutchison, D. (eds.). Cham: Springer, p. 791-807 17 p. (Computer Communications and Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  3. Published

    Increasing Light Absorption and Collection Using Engineered Structures

    Noori, Y., Woodhead, C. S. & Young, R. J., 4/04/2018, Two-dimensional Materials for Photodetector. Nayak, P. K. (ed.). InTech, p. 193-212 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  4. Published

    Verbal lie detection

    Vrij, A., Taylor, P. J. & Picornell, I., 13/11/2015, Communication in investigative and legal contexts: integrated approaches from forensic psychology, linguistics and law enforcement. Oxburgh, G., Myklebust, T., Grant, T. & Milne, R. (eds.). Wiley, (Psychology of Crime, Policing and Law).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  5. Published

    Trust-based approaches to safety and production

    Conchie, S. M., Woodcock, H. E. & Taylor, P. J., 6/11/2015, The Wiley Blackwell handbook of the psychology of occupational safety and workplace health. Clarke, S., Probst, T., Guldenmund, F. & Passmore, J. (eds.). Chichester: Wiley-Blackwell, p. 111-132 22 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  6. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  7. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  8. Published

    The role of language in conflict and conflict resolution

    Taylor, P. J., 2014, The Oxford handbook of language and social psychology. Holtgraves, T. (ed.). Oxford: Oxford University Press, p. 459-470 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  9. Published

    Cross-cultural deception detection

    Taylor, P., Larner, S., Conchie, S. & Van der Zee, S., 2014, Deception detection: current challenges and cognitive approaches. Granhag, P. A., Vrij, A. & Verschuere, B. (eds.). Chichester: Wiley Blackwell, p. 175-202 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  10. Published

    Antimonide quantum dot nanostructures for novel photonic device applications

    Krier, A., Carrington, P., Zhuang, Q., Young, R., Hayne, M., Lu, Q., James Asirvatham, J., Wagener, M., Botha, J. R., Koenraad, P. M. & Smakman, E. P., 5/11/2013, The wonder of nanotechnology: quantum optoelectronic devices and applications . SPIE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  11. Published

    Crisis negotiation: from suicide to terrorism intervention

    Wells, S., Taylor, P. & Giebels, E., 2013, Handbook of research in negotiation. Olekalns, M. & Adair, W. (eds.). London: Edward Elgar, p. 473-498 26 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  12. Published

    Technological solutions to offending

    Rashid, A., Greenwood, P., Walkerdine, J., Baron, A. & Rayson, P., 03/2012, Understanding and preventing online sexual exploitation of children. Quayle, E. & Ribisl, K. (eds.). London: Willan, p. 228-243

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  13. Published

    Tuning into the right wavelength: The importance of culture for effective crisis negotiation

    Giebels, E. & Taylor, P., 2012, The psychology of crisis intervention for law enforcement officers. St-Yves, M. & Collins, P. (eds.). Toronto: Carswell, p. 277-294 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  14. Published

    Autonomous Machine Learning (ALMA): generating rules from data streams

    Angelov, P., 19/09/2011, Proceedings of the Special International Conference on Complex Systems, COSY-2011: 16-19 September 2011. Ohrid, FYR of Macedonia, p. 249-256 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  15. Published

    Single-photon and entangled-photon sources for quantum information

    Ritchie, D. A., Stevenson, M., Young, R., Hudson, A., Salter, C., Ellis, D., Bennett, A., Atkinson, P., Cooper, K., Farrer, I., Nicoll, C. A. & Shields, A. J., 2010, 2010 Conference on Optoelectronic and Microelectronic Materials and Devices. IEEE, p. 229-230 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  16. Published

    Interaction patterns of social influence in crisis negotiation

    Giebels, E. & Taylor, P., 2010, Contemporary theory, research, and practice of crisis and hostage negotiation. Rogan, R. & Lanceley, F. (eds.). Cresskill, NJ: Hampton Press, p. 59-76 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  17. Published

    Être sur la même longueur d'onde : la communication interculturelle en contexte de négociation de crise

    Giebels, E. & Taylor, P., 2010, Psychologie de l'intervention policière en situation de crise. St-Yves, M. & Collins, P. (eds.). Editions Yvon Blais

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  18. Published

    Supporting atomic user actions on the table

    Aliakseyeu, D., Subramanian, S. & Alexander, J., 2010, Tabletops - Horizontal Interactive Displays. London: Springer Verlag London Ltd, 25 p. (Human-Computer Interaction Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  19. Published

    Entangled photon generation by quantum dots

    Shields, A. J., Stevenson, R. M. & Young, R., 1/01/2009, Single Semiconductor Quantum Dots. Michler, P. (ed.). Berlin: Springer, p. 227-266 40 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  20. Published

    Investigative sense-making in criminal contexts

    Ormerod, T. C., Barrett, E. & Taylor, P. J., 07/2008, Naturalistic decision making and macrocognition. Shraagen, J. M., Militello, L., Ormerod, T. C. & Lipshitz, R. (eds.). London: Ashgate

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  21. Published

    Quantum Dots in Planar Cavities

    Young, R., Stevenson, R. M., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 1/01/2008, Advances in Solid State Physics 46. Haug, R. (ed.). Berlin: Springer, p. 55-64 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  22. Published

    Entangled Photon Pair Emission and Interference from Single Quantum Dots

    Stevenson, R. M., Young, R. & Shields, A. J., 2008, Semiconductor Quantum Bits. Henneberger, F. & Benson, O. (eds.). Singapore: Pan Stanford, p. 369-388 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  23. Published

    Generating triggered single and entangled photons with a semiconductor source

    Young, R., Stevenson, R. M., Hudson, A., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 1/01/2007, Quantum Communication and Security. Żukowski, M., Kilin, S. & Kowalik, J. (eds.). IOS Press, p. 146-154 9 p. (NATO Science for Peace and Security Series - D: Information and Communication Security Volume 11; vol. 11).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  24. Published

    Investigative psychology

    Donald, I. J. & Taylor, P., 2007, Encyclopedia of law and society: American and global perspectives. Clark, D. S. (ed.). London: Sage

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  25. Published

    Quantum dots for single photon and photon pair technology

    Stevenson, R. M., Young, R., Thompson, R. M., Yuan, Z., Kardynal, B. E., Farrer, I., Ward, M. B., Ritchie, D. A. & Shields, A. J., 2006, Quantum Computing in Solid State Systems. Ruggiero, B., Delsing, P., Granata, C., Pashkin, Y. & Silvestrini, P. (eds.). New York: Springer, p. 288-297 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  26. Published

    Hostage negotiation opens up

    Taylor, P. & Donohue, W. A., 2006, The negotiator's fieldbook: the desk reference for the experienced negotiator. Schneider, A. & Honeymoon, C. (eds.). Chicago: American Bar Association, p. 667-674 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  27. Published

    IPv6 Transitioning Management Laying the Foundation for Managed IPv4/IPv6 Interoperation

    Mackay, M. & Edwards, C., 7/06/2004, TERENA networking conference 2004 .

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  28. Published

    Problems of classification in investigative psychology

    Taylor, P., Bennell, C. & Snook, B., 2002, Classification, clustering, and data analysis: Recent advances and applications. Jajuga, K., Sokolowski, A. & Bock, H-H. (eds.). Heidelberg: Springer Verlag, p. 479-487 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  29. Chapter
  30. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  31. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  32. Published

    Big Data and Natural Language Processing for Analysing Railway Safety

    Syeda, K. N., Shirazi, S. N. U. H., Naqvi, S. A. A., Parkinson, H. J. & Bamford, G., 11/2017, Innovative Applications of Big Data in the Railway Industry. Kohli, D. S., Kumar, D. A. V. S., Easton, D. J. M. & Roberts, P. C. (eds.). IGI Global Publishing, p. 240-267 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  33. Published

    Lessons from the extreme: what business negotiators can learn from hostage negotiations

    Taylor, P. J. & Donohue, W. A., 15/03/2017, The negotiator's desk reference. Honeymoon, C. & Schneider, A. (eds.). DRI Press, ( Negotiator's Desk Reference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  34. Published

    Prediction of the attention area in ambient intelligence tasks

    Shafi, J., Angelov, P. P. & Umair, M., 3/02/2016, Innovative issues in intelligent systems. Sgurev, V., Yager, R., Kacprzyk, J. & Jotsov, V. (eds.). Berlin: Springer, p. 33-56 24 p. (Studies in Computational Intelligence; vol. 623).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  35. Published

    ARTOD: Autonomous Real Time Objects Detection by a moving camera using recursive density estimation

    Sadeghi Tehran, P. & Angelov, P., 28/01/2016, Novel applications of intelligent systems. Hadjiski, M., Kasabov, N., Filev, D. & Jotsov, V. (eds.). Cham: Springer Verlag, p. 123-138 16 p. (Studies in Computational Intelligence; vol. 586).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  36. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  37. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  38. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  39. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  40. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  41. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  42. Published

    Attack pattern recognition through correlating cyber situational awareness in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 1/03/2014, Cyberpatterns: unifying design patterns with security and attack patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 125-134 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  43. Published

    Crossing boundaries: using GIS in literary studies, history and beyond

    Gregory, I. N., Baron, A., Cooper, D., Hardie, A., Murrieta-Flores, P. & Rayson, P. E., 2014, Keys for architectural history research in the digital era. Hueber, J. & Mendes da Silva, A. (eds.). Institut national d'histoire de l'art, (Actes de colloques).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  44. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2014, SMS communication: a linguistic approach. Cougnon, L-A. & Fairon, C. (eds.). John Benjamins Publishing Company, p. 217-237 21 p. (Benjamins Current Topics; vol. 61).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  45. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  46. Published

    Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  47. Published

    Quality Evaluation in Peer-to-Peer IPTV Services

    Mu, M., Knowles, W., Georgopoulos, P., Simpson, S., Cerqueira, E., Race, N., Mauthe, A. & Hutchison, D., 2013, Data Traffic Monitoring and Analysis: From Measurement, Classification and Anomaly Detection to Quality of Experience. Biersack, E., Callegari, C. & Matijasevic, M. (eds.). Berlin: Springer, p. 302-319 18 p. (Lecture Notes in Computer Science; vol. 7754).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  48. Published

    Attacks and Vulnerabilities of Trust and Reputation Models

    Such, J. M., 2013, Agreement Technologies. Ossowski, S. (ed.). Dordrecht: Springer Verlag, p. 467-477 11 p. (Law, Governance and Technology Series; vol. 8).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  49. Published

    Security issues in cloud federations

    Rak, M., Ghani, H., Ficco, M., Suri, N., Luna, J., Panica, S. & Petcu, D., 2012, Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. IGI Global, p. 176-194 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  50. Published

    Compressive sensing for wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 2012, Intelligent Sensor Networks: The Integration of Sensor Networks, Signal Processing and Machine Learning. CRC Press, p. 379-396 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  51. Published

    Monitoring and evaluation of semantic rooms

    Gönczy, L., Csertán, G., Urbanics, G., Ghani, H., Khelil, A. & Suri, N., 2012, Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware. Springer Berlin / Heidelberg, p. 99-116 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  52. Published

    Brief announcement: MP-state: State-aware software model checking of message-passing systems

    Muftuoglu, C. A., Bokor, P. & Suri, N., 2012, Stabilization, Safety, and Security of Distributed Systems: 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings. Vol. 7596 LNCS. p. 183-186 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  53. Published

    Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    Khelil, A., Germanus, D. & Suri, N., 2012, Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer, Vol. 7130. p. 177-196 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  54. Published

    Grid access control models and architectures

    Gouglidis, A. & Mavridis, I., 1/12/2011, Computational and data grids: principles, applications and design. IGI Global, p. 217-234 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  55. Published

    Wireless Sensor Cooperation for a Sustainable Quality of Information

    Khelil, A., Reinl, C., Ayari, B., Shaikh, F. K., Szczytowski, P., Ali, A. & Suri, N., 2011, Pervasive Computing and Networking. John Wiley and Sons, p. 71-100 30 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  56. Published

    Service Design, New Media and Community Development

    Bury, S., Cheverst, K., Ishmael, J., Mitchell, K., Race, N., Rouncefield, M., Smith, P. & Taylor, N., 2011, Design for services. Meroni, A. & Sangiorgi, D. (eds.). Farnham: Gower, p. 125-130 6 p. (Design for social responsibility).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  57. Published

    Automatic error tagging of spelling mistakes in learner corpora

    Rayson, P. & Baron, A., 2011, A Taste for Corpora: In honour of Sylviane Granger. Meunier, F., De Cock, S., Gilquin, G. & Paquot, M. (eds.). Amsterdam: John Benjamins, Vol. 45. p. 109-126 28 p. (Studies in Corpus Linguistics; vol. 45).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  58. Published

    Fork-consistent constructions from registers

    Majuntke, M., Dobre, D., Cachin, C. & Suri, N., 2011, Principles of Distributed Systems: 15th International Conference, OPODIS 2011, Toulouse, France, December 13-16, 2011. Proceedings. Vol. 7109 LNCS. p. 283-298 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  59. Published

    GINSENG: Performance Control in Wireless Sensor Networks

    O'Donovan, T., Brown, J., Roedig, U., Sreenan, C., doO, J., Dunkles, A., Klein, A., Silva, J. S., Vassiliou, V. & Wolf, L., 07/2010, 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON), 2010 . Boston: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  60. Published

    Evolving Takagi-Sugeno fuzzy systems from data streams (eTS+).

    Angelov, P., 04/2010, Evolving intelligent systems : methodology and applications. Angelov, P., Filev, D. & Kasabov, N. (eds.). New York, USA: John Wiley and Sons and IEEE Press, p. 21-50 30 p. (IEEE Press series in Computational Intelligence).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  61. Published

    Evolving intelligent sensors in chemical industry.

    Angelov, P. & Kordon, A., 04/2010, Evolving intelligent systems : methodology and applications. Angelov, P., Filev, D. & Kasabov, N. (eds.). New York, USA: John Wiley and Sons and IEEE Press, p. 313-336 24 p. (IEEE Press series in Computational Intelligence).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  62. Published

    Applications of evolving intelligent systems to oil and gas industry.

    Macias Hernandez, J. & Angelov, P., 04/2010, Evolving intelligent systems : methodology and applications. Angelov, P., Filev, D. & Kasabov, N. (eds.). New York, USA: John Wiley and Sons and IEEE Press, p. 401-422 22 p. (IEEE Press series in Computational Intelligence).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  63. Published

    Improving the precision of corpus methods: The standardized version of Early Modern English Medical Texts

    Lehto, A., Baron, A., Ratia, M. & Rayson, P., 2010, Early Modern English Medical Texts: Corpus description and studies. Taavitsainen, I. & Pahta, P. (eds.). Amsterdam: John Benjamins, p. 279-289 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  64. Published

    Increasing the resilience of critical SCADA systems using peer-to-peer overlays

    Germanus, D., Khelil, A. & Suri, N., 2010, Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Springer, Vol. 6150 LNCS. p. 161-178 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  65. Published

    INDEXYS, a logical step beyond GENESYS

    Eckel, A., Milbredt, P., Al-Ars, Z., Schneele, S., Vermeulen, B., Csertán, G., Scheerer, C., Suri, N., Khelil, A., Fohler, G., Obermaisser, R. & Fidi, C., 2010, Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings. Springer, Vol. 6351 LNCS. p. 431-451 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  66. Published

    MPM: Map based Predictive Monitoring for Wireless Sensor Networks

    Ali, A., Khelil, A., Shaikh, F. K. & Suri, N., 2010, Autonomic Computing and Communications Systems: Third International ICST Conference, Autonomics 2009, Limassol, Cyprus, September 9-11, 2009, Revised Selected Papers. Springer, Vol. 23 LNICST. p. 79-95 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  67. Published

    On efficient models for model checking message-passing distributed protocols

    Bokor, P., Serafini, M. & Suri, N., 2010, Formal Techniques for Distributed Systems: Joint 12th IFIP WG 6.1 International Conference, FMOODS 2010 and 30th IFIP WG 6.1 International Conference, FORTE 2010, Amsterdam, The Netherlands, June 7-9, 2010. Proceedings. Springer, Vol. 6117 LNCS. p. 216-223 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  68. Published

    Towards benchmarking of P2P technologies from a SCADA systems protection perspective

    Khelil, A., Jeckel, S., Germanus, D. & Suri, N., 2010, Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Springer, Vol. 45 LNICST. p. 400-414 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  69. Published

    Evolving Fuzzy Systems.

    Angelov, P., 06/2009, Encyclopedia of Complexity and System Science. Mayers, R. (ed.). Berlin/Heidelberg: Springer, Vol. Articl. 10370 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  70. Published

    Wireless Mesh Networks: Middleware for Network Eccentric and Mobile Applications

    Ishmael, J. & Race, N., 2009, Middleware for Network Eccentric and Mobile Applications. Garbinato, B., Miranda, H. & Rodrigues, L. (eds.). Springer Berlin Heidelberg, p. 149-166 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  71. Published

    Abortable fork-linearizable storage

    Majuntke, M., Dobre, D., Serafini, M. & Suri, N., 2009, Principles of Distributed Systems: 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. Springer, Vol. 5923 LNCS. p. 255-269 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  72. Published

    Efficient robust storage using secret tokens

    Dobre, D., Majuntke, M., Serafini, M. & Suri, N., 2009, Stabilization, Safety, and Security of Distributed Systems: 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings. Springer, Vol. 5873 LNCS. p. 269-283 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  73. Published

    INcreasing security and protection through infrastructure REsilience: The INSPIRE project

    D'Antonio, S., Romano, L., Khelil, A. & Suri, N., 2009, Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October13-15, 2008. Revised Papers. Springer, Vol. 5508 LNCS. p. 109-118 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  74. Published

    Role-based symmetry reduction of fault-tolerant distributed protocols with language support

    Bokor, P., Serafini, M., Suri, N. & Veith, H., 2009, Formal Methods and Software Engineering: 11th International Conference on Formal Engineering Methods ICFEM 2009, Rio de Janeiro, Brazil, December 9-12, 2009. Proceedings. Springer, Vol. 5885 LNCS. p. 147-166 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  75. Published

    Map-based design for autonomic wireless sensor networks

    Khelil, A., Shaikh, F. K., Szczytowski, P., Ayari, B. & Suri, N., 2009, Autonomic Communication. Tsinghua University Press & Springer-Verlag, p. 309-326 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  76. Published

    A mobile healthcare system using IMS and the HL7 framework

    Nikolidakis, S., Giotsas, V., Vergados, D. & Douligeris, C., 2009, ANCS '09 Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems. New York: ACM Press, p. 187-188 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  77. Published

    Brief Announcement: Efficient Model Checking of Fault-Tolerant Distributed Protocols Using Symmetry Reduction

    Bokor, P., Serafini, M., Suri, N. & Veith, H., 2009, Distributed Computing: 23rd International Symposium, DISC 2009, Elche, Spain, September 23-25, 2009. Proceedings. Springer, p. 289-290 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  78. Published

    A retrospective comparative study of three data modelling techniques in anticoagulation therapy.

    McDonald, S., Angelov, P. & Xydeas, C., 28/05/2008, BMEI 2008. International Conference on BioMedical Engineering and Informatics, 2008.. Sanya, China: IEEE, p. 219-225 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  79. Published

    Using NEMO to Extend the Functionality of MANETs.

    McCarthy, B., Edwards, C. & Dunmore, M., 05/2008, IEEE International Conference on Communications Workshops, 2008. ICC Workshops '08.. IEEE, p. 455-460 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  80. Published

    Protocols to efficiently support nested NEMO (NEMO+).

    McCarthy, B., Jakeman, M., Edwards, C. & Thubert, P., 2008, Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture. New York: ACM, p. 43-48 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  81. Published

    Travelling through time with corpus annotation software

    Rayson, P., Archer, D., Baron, A. & Smith, N., 2008, Corpus linguistics, computer tools, and applications - state of the art. Lewandowska-Tomaszczyk, B. (ed.). Frankfurt am Main: Peter Lang, Vol. 17. p. 29-46 18 p. (Studies In Language).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  82. Published

    Robustness Evaluation of Operating Systems

    Johansson, A. & Suri, N., 2008, Information Assurance: The Morgan Kaufmann Series in Networking. Elsevier Inc., p. 349-375 27 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  83. Published

    Delay-aware mobile transactions

    Ayari, B., Khelil, A. & Suri, N., 2008, Software Technologies for Embedded and Ubiquitous Systems: 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedings. Springer, Vol. 5287 LNCS. p. 280-291 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  84. Published

    Execution path profiling for OS device drivers: Viability and methodology

    Sârbu, C., Johansson, A. & Suri, N., 2008, Service Availability: 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedings. Vol. 5017 LNCS. p. 90-109 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  85. Published

    On the time-complexity of robust and amnesic storage

    Dobre, D., Majuntke, M. & Suri, N., 2008, Principles of Distributed Systems: 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedings. Springer, Vol. 5401 LNCS. p. 197-216 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  86. Published

    A Common Architecture for Cross Layer and Network Context Awareness

    Sifalakis, M., Fry, M. & Hutchison, D., 08/2007, Self-Organizing Systems. 2007 ed. Springer-Verlag, Vol. 4725. p. 103-118 16 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  87. Published

    Evolving Fuzzy Classifier for Real-time Novelty Detection and Landmark Recognition by a Mobile Robot

    Angelov, P. & Zhou, X., 2007, Mobile Robots: The Evolutionary Approach. Nedja, N., Coelho, L. & Mourelle, L. (eds.). Berlin/Heidelberg: Springer, Vol. 50. p. 95-124 30 p. (Studies in Computational Intelligence).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  88. Published

    Algorithms for Real-Time Clustering and Generation of Rules from Data

    Filev, D. & Angelov, P., 2007, Advances in Fuzzy Clustering and Its Applications. de Oliveira, J. V. & Pedrycz, W. (eds.). Chichester: John Willey and Sons, p. 353-370 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  89. Published

    Risk Migration- where next?

    Alcock, R. E. & Busby, J., 2007, Society for Risk Analysis Conference. 2007. The Hague, Netherlands 24th June 2007. Taylor & Francis

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  90. Published

    Advances in MANEMO: Definition of the Problem Domain and the Design of a NEMO-Centric Approach

    McCarthy, B., Edwards, C. & Dunmore, M., 2007, Applications and the Internet Workshops, 2007. SAINT Workshops 2007. International Symposium on . Hiroshima: IEEE, Vol. 0. p. 47-47 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  91. Published

    A multi variable optimization approach for the design of integrated dependable real-time embedded systems

    Islam, S. & Suri, N., 2007, Embedded and Ubiquitous Computing: International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007. Proceedings. Springer, Vol. 4808 LNCS. p. 517-530 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  92. Published

    Gossiping: Adaptive and reliable broadcasting in MANETs

    Khelil, A. & Suri, N., 2007, Dependable Computing: Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings. Springer, Vol. 4746 LNCS. p. 123-141 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  93. Published

    Improving robustness testing of COTS OS extensions

    Sârbu, C., Johansson, A., Fraikin, F. & Suri, N., 2006, Service Availability: Third International Service Availability Symposium, ISAS 2006, Helsinki, Finland, May 15-16, 2006. Revised Selected Papers. Springer-Verlag, Vol. 4328 LNCS. p. 120-139 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  94. Published

    Applying NEMO to a mountain rescue domain

    McCarthy, B., Edwards, C. & Dunmore, M., 2006, Information Networking Advances in Data Communications and Wireless Networks. Chong, I. & Kawahara, K. (eds.). Springer, p. 11-20 9 p. (Lecture Notes in Computer Science; vol. 3961).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  95. Published

    Distributed Computing - GRID Computing

    Mauthe, A. & Heckmann, O., 01/2005, Lecture Notes in Computer Science: Steinmetz, Ralf and Wehrle, Klaus. Springer Berlin / Heidelberg, p. 193-206

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  96. Published

    Accounting in Peer-to-Peer Systems

    Mauthe, A., Liebau, N., Darlagiannis, V. & Heckmann, O., 01/2005, EPRINTS-BOOK-TITLE.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  97. Published

    Designing efficient fail-safe multitolerant systems

    Jhumka, A. & Suri, N., 2005, Formal Techniques for Networked and Distributed Systems - FORTE 2005 . Springer, Vol. 3731 LNCS. p. 428-422 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  98. Published

    On enhancing the robustness of commercial operating systems

    Johansson, A., Sârbu, A., Jhumka, A. & Suri, N., 2005, Service Availability: First International Service Availability Symposium, ISAS 2004, Munich, Germany, May 13-14, 2004, Revised Selected Papers. Springer, p. 148-159 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  99. Published

    An approach to on-line design of fuzzy controllers with evolving structure

    Angelov, P., 10/2004, Applications and Science in Soft Computing. Ahmad, L. & Garibaldi, J. M. (eds.). Berlin/Heidelberg: Springer, p. 63-68 6 p. (Advances in Soft Computing).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  100. Published

    Optimal design synthesis of component-based systems using intelligent techniques

    Angelov, P., Zhang, Y. & Wright, J. A., 2004, Do Smart Adaptive Systems Exist?. Gabrys, B., Leviska, K. & Strackelijan, J. (eds.). 173 ed. Berlin/Heidelberg: Springer, Vol. 173. p. 267-284 18 p. (Studies in Fuzziness and Soft Computing).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  101. Published

    Automatic design synthesis and optimization of component-based systems by evolutionary algorithms

    Angelov, P. P., Zhang, Y., Wright, J. A., Hanby, V. I. & Buswell, R. A., 07/2003, Genetic and Evolutionary Computation. Cantu-Paz, E., Foster, J. A., Deb, K., Davis, L. D., Roy, R., O'Reilly, U-M., Beyer, H. G., Standish, R., Kendall, G., Willson, S., Harman, M., Dasgupta, D., Potter, M. A., Schultz, A. C., Jonoska, N. & Miller, J. (eds.). 2724 ed. Berlin/Heidelberg: Springer, Vol. 2. p. 1938-1950 13 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  102. Published

    On-line Design of Takagi-Sugeno Models.

    Angelov, P. & Filev, D., 2003, Fuzzy Sets and Systems – IFSA 2003. Biglic, T., de Baets, B. & Kaynak, O. (eds.). 2715/2 ed. Berlin/Heidelberg: Springer, Vol. 2715/2. p. 576-584 9 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  103. Published

    A framework for the design and validation of efficient fail-safe fault-tolerant programs

    Jhumka, A., Suri, N. & Hiller, M., 2003, Software and Compilers for Embedded Systems . Springer-Verlag, Vol. 2826. p. 182-197 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  104. Published

    Baseband processing for SDR

    Lund, D. & Honary, B., 2002, Software defined radio : enabling technology. Tuttlebee, W. H. W. (ed.). New York: Wiley, p. 201-232 32 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  105. Published

    Component-based synthesis of dependable embedded software

    Jhumka, A., Hiller, M. & Suri, N., 2002, Formal Techniques in Real-Time and Fault-Tolerant Systems. Springer-Verlag, Vol. 2469. p. 111-128 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  106. Published

    Vulnerabilities and security limitations of current IP telephony systems

    Ackermann, R., Schumacher, M., Roedig, U. & Steinmetz, R., 1/05/2001, Communications and multimedia security issues of the new century. Steinmetz, R., Dittman, J. & Steinebach, M. (eds.). Kluwer Academic Publishers, p. 53-66 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  107. Published

    Automatic generation of fuzzy rule-based models from data by genetic algorithms

    Angelov, P., Hanby, V. I., Buswell, R. A. & Wright, J. A., 2001, Developments in Soft Computing. John, R. I. & Birkenhead, R. (eds.). Berlin/Heidelberg: Springer, p. 31-40 10 p. (Advances in Soft Computing).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  108. Conference contribution/Paper
  109. Published

    Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity

    Al-Salami, N. & Zhang, B., 6/10/2020, 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS). IEEE, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  110. Published

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 12/08/2020, USENIX Security '20 Proceedings. USENIX Association, p. 289-305 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  111. Published

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 7/07/2020, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2020. . Springer, p. 67-88 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  112. Published

    An analytical model of trilateration localization error

    Farooq-I-Azam, M., Ni, Q. & Dong, M., 27/02/2020, 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  113. Published

    PRISM: An Experiment Framework for Straggler Analytics within Containerized Clusters

    Lindsay, D., Gill, S. & Garraghan, P., 1/12/2019, WoC 2019 Fifth International Workshop on Container Technologies and Container Clouds. ACM, p. 13-18 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  114. Published

    Weighted Tradeoff between Spectral Efficiency and Energy Efficiency in Energy Harvesting Systems

    Siddiqui, A. M., Musavian, L., Aissa, S. & Ni, Q., 21/11/2019, 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  115. Published

    Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search

    Zhang, J., Zhang, B. & Lin, J., 19/08/2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 211-219 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  116. Published

    Energy-Efficient Multi-User Mobile-Edge Computation Offloading in Massive MIMO Enabled HetNets

    Hao, Y., Ni, Q., Li, H. & Hou, S., 15/07/2019, IEEE International Conference on Communications (ICC 2019). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  117. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  118. Published

    Defending Adversarial Attacks on Cloud-aided Automatic Speech Recognition Systems

    Zhang, J., Zhang, B. & Zhang, B., 2/07/2019, SCC '19 Proceedings of the Seventh International Workshop on Security in Cloud Computing. New York: ACM, p. 23-31 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  119. Published

    Adversarial Machine Learning in Smart Energy Systems

    Bor, M., Marnerides, A., Molineux, A., Wattam, S. & Roedig, U., 25/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 413-415 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  120. Published

    Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Blair, L., Becker, I., Noble, J., Sasse, A. & Rashid, A., 25/05/2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice Track. Sharpe, H. & Whalen, M. (eds.). IEEE, p. 41-50 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  121. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 23/05/2019, SafeThings 2019 : IEEE Workshop on the Internet of Safe Things. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  122. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X. & Ni, Q., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8762016. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  123. Published

    A Framework for Measuring the Costs of Security at Runtime

    Ivkic, I., Pichler, H., Zsilak, M., Mauthe, A. & Tauber, M., 05/2019, CLOSER 2019 : International Conference on Cloud Computing and Services Science.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  124. Published

    Maximum Achievable Sum Rate in Highly Dynamic Licensed Shared Access

    Onidare, S., Navaie, K. & Ni, Q., 28/04/2019, 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring). IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  125. Published

    MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  126. Published

    Location Assisted Subcarrier and Power Allocation in Underlay Mobile Cognitive Radio Networks

    Farooq-I-Azam, M., Yu, W., Ni, Q., Dong, M. & Ul Quddus, A., 19/02/2019, 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 6 p. 8644427

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  127. Published

    InfoLeak: Scheduling-based information leakage

    Vateva-Gurova, T., Manzoor, S., Huang, Y. & Suri, N., 11/02/2019, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 44-53 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  128. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  129. Published

    Towards a Security Cost Model for Cyber-Physical Systems

    Ivkic, I., Mauthe, A. & Tauber, M., 11/01/2019, 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  130. Published

    Robust Transmit Designs for Secrecy Rate Constrained MISO NOMA System

    Su, B., Ni, Q. & He, B., 20/12/2018, 29th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  131. Published

    Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  132. Published

    Low Latency Driven Effective Capacity Analysis for Non-Orthogonal and Orthogonal Spectrum Access

    Yu, W., Musavian, L., Quddus, A. U., Ni, Q. & Xiao, P., 13/12/2018, 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  133. Published

    Interference-Aware Radio Resource Allocation for 5G Ultra-Reliable Low-Latency Communication

    Malik, H., Alam, M. M., Le Moullec, Y. & Ni, Q., 9/12/2018, 2018 IEEE Globecom Workshops, GC Wkshps 2018 - Proceedings. IEEE, 6 p. 8644301

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  134. Published

    Joint Antenna and User Selection for Untrusted Relay Networks

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 9/12/2018, 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings. IEEE, 6 p. 8647350

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  135. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B-C., Li, S-C., Huang, Y., Suri, N. & Wang, P-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  136. Published

    FastFI: Accelerating software fault injections

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 193-202 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  137. Published

    On the detection of side-channel attacks

    Vateva-Gurova, T. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 185-186 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  138. Published

    Foreign Currency Exchange Rate Prediction using Neuro-Fuzzy Systems

    Yong, Y. L., Lee, Y., Gu, X., Angelov, P. P., Ling Ngo, D. C. & Shafipour Yourdshahi, E., 1/12/2018, Procedia Computer Science. Elsevier, Vol. 144. p. 232-238 7 p. (Procedia Computer Science; vol. 144).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  139. Published

    On the sustainability of blockchain funding

    Zhang, B. & Balogun, H., 20/11/2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, p. 89-96 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  140. Published

    Towards Reactive Acoustic Jamming for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 15/10/2018, 2nd International Workshop on Multimedia Privacy and Security. ACM Press, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  141. Published

    A Deep Rule-based Approach for Satellite Scene Image Analysis

    Gu, X. & Angelov, P. P., 7/10/2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, p. 2778-2783 6 p. (2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  142. Published

    ReasoNet: Inferring Network Policies Using Ontologies

    Rotsos, C., Farshad, A., King, D. & Hutchison, D., 13/09/2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft). IEEE, p. 159-167 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  143. Published

    Flashlight: A novel monitoring path identification schema for securing cloud services

    Zhang, H., Luna, J., Suri, N. & Trapero, R., 27/08/2018, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 10 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  144. Published

    Design and Analysis of Secure Quantum Network System with Trusted Repeaters

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 511-514 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  145. Published

    Quantum Key Distribution Random Access Network

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 174-178 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  146. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  147. Published

    Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Gouglidis, A., Grompanopoulos, C. & Mavridou, A., 25/06/2018, Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018). Bliudze, S. & Bensalem, S. (eds.). EPTCS, p. 52-64 13 p. (EPTCS; vol. 272).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  148. Published

    Whetstone: Reliable monitoring of cloud services

    Zhang, H., Luna, J., Trapero, R. & Suri, N., 18/06/2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, p. 115-122 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  149. Published

    A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  150. Published

    ActuEating: Designing, Studying and Exploring Actuating Decorative Artefacts

    Nabil, S., Everitt, A., Sturdee, M. A., Alexander, J. M., Bowen, S., Wright, P. & Kirk, D., 8/06/2018, DIS '18 Proceedings of the 2018 Designing Interactive Systems Conference. New York: ACM, p. 327-339 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  151. Published

    Lancaster at SemEval-2018 Task 3: Investigating Ironic Features in English Tweets

    Dearden, E. & Baron, A., 6/06/2018, Proceedings of the 12th International Workshop on Semantic Evaluation (SemEval-2018). Association for Computational Linguistics, p. 587-593 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  152. Published

    Siren: A platform for deploying virtual network services in the cloud to Fog continuum

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 31/05/2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, p. 202-207 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  153. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  154. Published

    Sketch & The Lizard King: Supporting Image Inclusion in HCI Publishing

    Sturdee, M. A., Alexander, J. M., Coulton, P. & Carpendale, S., 23/04/2018, CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. New York: ACM, 10 p. alt15

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  155. Published

    Grand Challenges in Shape-Changing Interface Research

    Alexander, J., Roudaut, A., Steimle, J., Hornbaek, K., Bruns Alonso, M., Follmer, S. & Merritt, T., 23/04/2018, CHI '18 Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. New York: ACM, 14 p. 299

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  156. Published

    Monitoring path discovery for supporting indirect monitoring of cloud services

    Zhang, H., Manzoor, S., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 274-277 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  157. Published

    Threat modeling and analysis for the cloud ecosystem

    Manzoor, S., Zhang, H., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 278-281 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  158. Published

    Appliance-level Short-term Load Forecasting using Deep Neural Networks

    Ud Din, G. M., Mauthe, A. U. & Marnerides, A., 8/03/2018, 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 53-57 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  159. Published

    Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization

    Tian, D., Zhou, J., Chen, M., Sheng, Z., Ni, Q. & Leung, V. C. M., 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. IEEE, p. 90-98 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  160. Published

    Navigating Diverse Data Science Learning: Critical Reflections Towards Future Practice

    Elkhatib, Y., 11/12/2017, Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, p. 357-362 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  161. Published

    Using DSML for Handling Multi-tenant Evolution in Cloud Applications

    Jumagaliyev, A., Whittle, J. N. D. & Elkhatib, Y., 11/12/2017, Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, p. 272-279 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  162. Published

    Charting an Intent Driven Network

    Elkhatib, Y., Coulson, G. & Tyson, G., 26/11/2017, 2017 13th International Conference on Network and Service Management (CNSM). IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  163. Published

    Modeling Server Workloads for Campus Email Traffic Using Recurrent Neural Networks

    Boukoros, S., Nugaliyadde, A., Marnerides, A., Vassilakis, C., Koutsakis, P. & Wai Wong, K., 14/11/2017, Neural Information Processing. ICONIP 2017. Liu, D., Xie, S., Li, Y., Zhou, D. & El-Alfy, E. S. (eds.). Cham: Springer, p. 57-66 10 p. (Lecture Notes in Computer Science; vol. 10638).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  164. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  165. Published

    Inferring BGP blackholing activity in the Internet

    Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A. & Berger, A., 1/11/2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 1-14 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  166. Published

    A Stitch in Time: Supporting Android Developers in Writing Secure Code

    Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C. A. F. & Fahl, S., 30/10/2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1065-1077 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  167. Published

    TrEKer: Tracing error propagation in operating system kernels

    Coppik, N., Schwahn, O., Winter, S., Suri, N., T.N., N. (ed.), G., R. & M., D. P., 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 377-387 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  168. Published

    Quick verification of concurrent programs by iteratively relaxed scheduling

    Metzler, P., Saissi, H., Bokor, P., Suri, N., T.N., N. (ed.), G., R. (ed.) & M., D. P. (ed.), 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 776-781 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  169. Published

    A cascade of deep learning fuzzy rule-based image classifier and SVM

    Angelov, P. P. & Gu, X., 5/10/2017, Systems, Man, and Cybernetics (SMC), 2017 IEEE International Conference on: Human Intelligence for Systems and Cybernetics. IEEE, p. 746-751 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  170. Published

    Developers Need Support, Too: A Survey of Security Advice for Software Developers

    Acar, Y., Stransky, C., Wermke, D., Weir, C. A. F., Mazurek, M. & Fahl, S., 24/09/2017, Proceedings of the IEEE Secure Development Conference 2017. Jaeger, T. (ed.). IEEE, p. 22-26 5 p. 17

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  171. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  172. Published

    Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study

    Kibirige Mukisa, S. & Rashid, A., 4/09/2017, 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  173. Published

    C'MON: Monitoring the compliance of cloud services to contracted properties

    Alboghdady, S., Winter, S., Taha, A., Zhang, H. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 6 36

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  174. Published

    Towards DDoS attack resilient wide area monitoring systems

    Demir, K. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 7 p. 99

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  175. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (ed.), Tonetta, S. (ed.) & Schoitsch, E. (ed.), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  176. Published

    Detecting peering infrastructure outages in the wild

    Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A. & Aben, E., 7/08/2017, SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication. New York: Association for Computing Machinery, Inc, p. 446-459 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  177. Published

    Fake it till you make it: Fishing for Catfishes

    Magdy, W., Elkhatib, Y., Tyson, G., Joglekar, S. & Sastry, N., 31/07/2017, ASONAM '17 Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017. New York: ACM, p. 497-504 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  178. Published

    Distributed, multi-level network anomaly detection for datacentre networks

    Iordache, M., Jouet, S., Marnerides, A. & Pezaros, D., 31/07/2017, IEEE International Conference on Communications (ICC) 2017. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  179. Published

    Brief announcement: statement voting and liquid democracy

    Zhang, B. & Zhou, H., 25/07/2017, PODC '17 Proceedings of the ACM Symposium on Principles of Distributed Computing. New York: ACM, p. 359-361 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  180. Published

    SDQ: Enabling rapid QoE experimentation using Software Defined Networking

    Fawcett, L., Mu, M., Broadbent, M. H., Hart, N. P. & Race, N. J. P., 24/07/2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon, Portugal: IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  181. Published

    A programmable SDN+NFV-based architecture for UAV telemetry monitoring

    White, K., Denney, E., Knudson, M. D., Marnerides, A. & Pezaros, D., 20/07/2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, p. 522-527 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  182. Published

    Multi-level resilience in networked environments: concepts and principles

    Ariffin, M. A. M., Marnerides, A. & Mauthe, A. U., 20/07/2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, p. 272-275 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  183. Published

    The shadow warriors: in the no man’s land between industrial control systems and enterprise IT systems

    Zanutto, A., Shreeve, B. O., Follis, K., Busby, J. S. & Rashid, A., 12/07/2017, 3rd Workshop on Security Information Workers (WSIW 2017): In conjunction with 13th Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  184. Published

    "I feel stupid I can't delete...": a study of users' cloud deletion practices and coping strategies

    Ramokapane, K. M., Rashid, A. & Such, J., 12/07/2017, Proceedings of SOUPS 2017 Thirteenth Symposium on Usable Privacy and Security. USENIX Association, p. 241-256 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  185. Published

    LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems

    Le, A. T., Roedig, U. & Rashid, A., 4/07/2017, Engineering Secure Software and Systems: 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings. Bodden, E., Payer, M. & Athanasopoulos, E. (eds.). Cham: Springer, p. 36-52 17 p. (Lecture Notes in Computer Science; vol. 10379).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  186. Published

    Human action recognition using transfer learning with deep representations

    Bux, A., Wang, X., Angelov, P. P. & Habib, Z., 3/07/2017, 2017 International Joint Conference on Neural Networks (IJCNN). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  187. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  188. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (ed.) & M., L. (ed.), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  189. Published

    DeQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

    Zhang, H., Trapero, R., Luna, J., Suri, N., X., L. & U., B., 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  190. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  191. Published

    MICE: Multi-layer multi-model images classifier ensemble

    Angelov, P. P. & Gu, X., 22/06/2017, The 3rd IEEE International Conference on Cybernetics. IEEE, p. 436-443 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  192. Published

    Countering contextual bias in TV watching behavior: introducing social trend as external contextual factor in TV recommenders

    Lorenz, F., Yuan, J., Lommatzsch, A., Mu, M., Race, N., Hopfgartner, F. & Albayrak, S., 14/06/2017, Proceedings of the 2017 ACM International Conference on Interactive Experiences for TV and Online Video. New York, NY, USA: ACM, p. 21-30 10 p. (TVX '17).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  193. Published

    SketchingDIS: Hand-drawn Sketching in HCI

    Lewis, M., Sturdee, M. A., Alexander, J. M., Van Dijk, J., Kirkegård Rasmussen, M. & Hoang, T., 14/06/2017, DIS '17 Companion Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems. New York: ACM, p. 356-359 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  194. Published

    LoRa Transmission Parameter Selection

    Bor, M. & Roedig, U., 5/06/2017, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  195. Published

    Autonomous anomaly detection

    Gu, X. & Angelov, P. P., 31/05/2017, IEEE Conference on Evolving and Adaptive Intelligent Systems. p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  196. Published

    Autonomous Learning Multi-Model Classifier of 0-Order (ALMMo-0)

    Angelov, P. P. & Gu, X., 31/05/2017, IEEE Conference on Evolving and Adaptive Intelligent Systems 2017. p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  197. Published

    A randomized neural network for data streams

    Pratama, M., Angelov, P. P., Lu, J., Lughofer, E., Seera, M. & Lim, C. P., 19/05/2017, Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN). USA: IEEE, p. 3423-3430 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  198. Published

    I'd Like to Have an Argument, Please: Using Dialectic for Effective App Security

    Weir, C., Rashid, A. & Noble, J., 29/04/2017, EuroUSEC 2017: the 2nd European Workshop on Usable Security. Reston, VA: Internet Society, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  199. Published

    Challenges and approaches in securing safety-relevant railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S. & Suri, N., 26/04/2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 139-145 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  200. Published

    Modeling social risk amplification during recall crises

    Liu, Y., Busby, J. S. & Onggo, B. S. S., 23/04/2017, ADS '17 Proceedings of the Agent-Directed Simulation Symposium. San Diego: Society for Computer Simulation International, 12 p. 4

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  201. Published

    Siren: a platform for deployment of VNFs in distributed infrastructures

    Fawcett, L. & Race, N. J. P., 3/04/2017, SOSR '17 Proceedings of the Symposium on SDN Research. New York: ACM, p. 201-202 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  202. Published

    Verification of Resilience Policies that Assist Attribute Based Access Control

    Gouglidis, A., Hu, V. C., Busby, J. S. & Hutchison, D., 24/03/2017, ABAC '17 Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control. New York: ACM, p. 43-52 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  203. Published

    Towards zero packet loss with LISP Mobile Node

    Isah, M., Simpson, S., Sani, Y. & Edwards, C. J., 13/03/2017, 2017 International Conference on Computing, Networking and Communications (ICNC): Wireless Networks. IEEE, p. 265-271 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  204. Published

    IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants

    Chan, A., Winter, S., Saissi, H., Pattabiraman, K. & Suri, N., 13/03/2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, p. 184-195 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  205. Published

    Ceremonies for end-to-end verifiable elections

    Kiayias, A., Zacharias, T. & Zhang, B., 03/2017, PKC 2017: Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Editors (view affiliations). Springer, p. 305-334 30 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  206. Published

    Mitigating Inter-Network Interference in LoRa Networks

    Voigt, T., Bor, M., Roedig, U. & Alonso, J., 20/02/2017, EWSN ’17 Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks. New York: ACM Press, p. 323-328 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  207. Published

    Short term power load forecasting using Deep Neural Networks

    Ud Din, G. M. & Marnerides, A., 26/01/2017, 2017 International Conference on Computing, Networking and Communications (ICNC). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  208. Published

    SeReCP: A secure and reliable communication platform for the smart grid

    Demir, K., Suri, N., M., K. (ed.), D.S., K. (ed.) & V., V. (ed.), 22/01/2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 175-184 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  209. Published

    A Situation Aware Information Infrastructure (SAI^2) Framework

    Marnerides, A., Pezaros, D., Jose, J., Mauthe, A. U. & Hutchison, D., 2017, Smart Objects and Technologies for Social Good Second International Conference, GOODTECHS 2016, Venice, Italy, November 30 – December 1, 2016, Proceedings. Gaggi, O., Manzoni, P., Palazzi, C., Bujari, A. & Marquez-Barja, J. (eds.). Cham: Springer, p. 186-194 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 195).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  210. Published

    A Distributed Caching Approach for Improved Data Availability in Rural Wireless Mesh Networks

    Ajayi, A. O., Edwards, C. J. & Roedig, U., 16/12/2016, Computational Science and Computational Intelligence (CSCI), 2016 International Conference on. 16772962: IEEE, p. 904 - 910 7 p. 16772962

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  211. Published

    Baguette: towards end-to-end service orchestration in heterogeneous networks

    Rotsos, C., Farshad, A., Hart, N. P., Aguado, A., Bidkar, S., Sideris, K., King, D., Fawcett, L., Bird, J., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 15/12/2016, International Conference on Ubiquitous Computing and Communications (IUCC'16). IEEE, p. 196-203 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  212. Published

    GazeArchers: playing with individual and shared attention in a two-player look&shoot tabletop game

    Pfeuffer, K., Alexander, J. & Gellersen, H., 12/12/2016, MUM '16 : Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia. New York: ACM, p. 213-216 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  213. Published

    Local modes-based free-shape data partitioning

    Angelov, P. P. & Gu, X., 9/12/2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  214. Published

    Self-Adaptive Power Control Mechanism in D2D Enabled Hybrid Cellular Network with mmWave Small Cells: An Optimization Approach

    Raza, S. A., Hassan, S. A., Pervaiz, H. B., Ni, Q. & Musavian, L., 4/12/2016, Globecom Workshops (GC Wkshps), 2016 IEEE. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  215. Published

    Indistinguishable proofs of work or knowledge

    Baldimtsi, F., Kiayias, A., Zacharias, T. & Zhang, B., 4/12/2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. Cheon, J. H. & Takagi, T. (eds.). Heidelberg: Springer, p. 902-933 32 p. (Lecture Notes in Computer Science; vol. 10032).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  216. Published

    project SENSE – multimodal simulation with full-body real-time verbal and nonverbal interactions

    Miri, H., Kolkmeier, J., Taylor, P. J., Poppe, R. & Heylen, D., 15/11/2016, Intelligent Technologies for Interactive Entertainment: 8th International Conference, INTETAIN 2016, Utrecht, The Netherlands, June 28–30, 2016, Revised Selected Papers. Poppe, R., Meyer, J-J., Veltkamp, R. & Dastani, M. (eds.). Springer, p. 279-284 6 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 178).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  217. Published

    Do LoRa low-power wide-area networks scale?

    Bor, M., Roedig, U., Voigt, T. & Alonso, J., 14/11/2016, MSWiM '16 Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York: ACM Press, p. 59-67 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  218. Published

    BGPStream: A software framework for live and historical BGP data analysis

    Orsini, C., King, A., Giordano, D., Giotsas, V. & Dainotti, A., 14/11/2016, IMC '16 Proceedings of the 2016 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 429-444 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  219. Published

    Reaching the Masses: A New Subdiscipline of App Programmer Education

    Weir, C., Rashid, A. & Noble, J., 13/11/2016, FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York: ACM, p. 936-939 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  220. Published

    Assured deletion in the cloud: requirements, challenges and future directions

    Ramokapane, M., Rashid, A. & Such, J. M., 28/10/2016, CCSW '16 Proceedings of the 2016 ACM on Cloud Computing Security Workshop. New York: ACM, p. 97-108 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  221. Published

    Achieving ICS resilience and security through granular data flow management

    Green, B., Krotofil, M. & Hutchison, D., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 93-101 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  222. Published

    Parallel computing TEDA for high frequency streaming data clustering

    Gu, X., Angelov, P. P., Gutierrez, G., Iglesias, J. A. & Sanchi, A., 23/10/2016, Advances in Big Data: Proceedings of the 2nd INNS Conference on Big Data, October 23-25, 2016, Thessaloniki, Greece. Angelov, P., Manolopoulos, Y., Iliadis, L., Roy, A. & Vellasco, M. (eds.). Cham: Springer, p. 238-253 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  223. Published

    Malicious peers eviction for P2P overlays

    Ismail, H., Germanus, D. & Suri, N., 17/10/2016, 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, p. 216-224 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  224. Published

    Evolving multi-tenant SaaS cloud applications using model-driven engineering

    Jumagaliyev, A., Whittle, J. N. D. & Elkhatib, Y. S. S. A., 13/10/2016, 10th International Workshop on Models and Evolution. CEUR-WS.org, p. 60-64 5 p. (CEUR Workshop Proceedings; vol. 1706).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  225. Published

    Combinatorial Auction-Based Resource Allocation in the Fog

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 10/10/2016, Fifth European Workshop on Software Defined Networks (EWSDN), 2016. IEEE, p. 62-67 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  226. Published

    Modelling security risk in critical utilities: the system at risk as a three player game and agent society

    Busby, J. S., Gouglidis, A., Rass, S. & König, S., 9/10/2016, Proceedings of SMC 2016. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  227. Published

    Autonomous data-driven clustering for live data stream

    Gu, X. & Angelov, P. P., 9/10/2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2016). IEEE, p. 1128-1135 8 p. 1303

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  228. Published

    Empirical data analysis: a new tool for data analytics

    Angelov, P. P., Gu, X., Principe, J. & Kangin, D., 9/10/2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, p. 52-59 8 p. 1008

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  229. Published

    Efficient verification of program fragments: Eager POR

    Metzler, P., Saissi, H., Bokor, P., Hess, R., Suri, N., Artho, C. (ed.), Peled, D. (ed.) & Legay, A. (ed.), 22/09/2016, Automated Technology for Verification and Analysis: 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings. Springer-Verlag, Vol. 9938 LNCS. p. 375-391 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  230. Published

    Energy Efficient Resource Allocation in 5G Hybrid Heterogeneous Networks: A Game Theoretic Approach

    Munir, H., Hassan, S. A., Pervaiz, H. B., Ni, Q. & Musavian, L., 18/09/2016, 2016 IEEE 84th Vehicular Technology Conference (VTC2016-Fall). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  231. Published

    Towards policy refinement for resilience management in cloud

    Shirazi, S. N. U. H., Simpson, S., Syeda, K. N., Mauthe, A. U. & Hutchison, D., 13/09/2016, 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM). IEEE, p. 260-266 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  232. Published

    Threat awareness for critical infrastructures resilience

    Gouglidis, A., Green, B., Busby, J. S., Rouncefield, M. F., Hutchison, D. & Schauer, S., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on. 9781467390248: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  233. Published

    Technology-related disasters: a survey towards disaster-resilient software defined networks

    Machuca, C. M., Secci, S., Vizaretta, P., Kuipers, F., Gouglidis, A., Hutchison, D., Jouet, S., Pezaros, D., Elmokashfi, A., Heegaard, P., Ristov, S. & Gusev, M., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on . IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  234. Published

    Detecting anomalous behaviour using heterogeneous data

    Mohd Ali, A., Angelov, P. P. & Gu, X., 7/09/2016, Advances in Computational Intelligence Systems: Contributions Presented at the 16th UK Workshop on Computational Intelligence, September 7–9, 2016, Lancaster, UK. Angelov, P., Gegov, A., Jayne, C. & Shen, Q. (eds.). Springer, p. 253-276 24 p. (Advances in Intelligent Systems and Computing; vol. 513).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  235. Published

    Vision based human activity recognition: a review

    Bux, A., Angelov, P. P. & Habib, Z., 7/09/2016, Advances in Computational Intelligence Systems: Contributions Presented at the 16th UK Workshop on Computational Intelligence, September 7–9, 2016, Lancaster, UK. Angelov, P., Gegov, A., Jayne, C. & Shen, Q. (eds.). Springer, p. 341-371 30 p. (Advances in Intelligent Systems and Computing; vol. 513).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  236. Published

    A privacy preserving approach to energy theft detection in smart grids

    Richardson, C., Race, N. & Smith, P., 1/09/2016, 2016 IEEE International Smart Cities Conference (ISC2). IEEE, p. 1-4 4 p. (Smart Cities Conference (ISC2), 2016 IEEE International).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  237. Published

    Efficient interference mitigation in mmWave backhaul network for high data rate 5G wireless communications

    Shi, J., Ni, Q., Paoloni, C. & Magne, F., 09/2016, Proceedings of the 12th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2016). London: IET Press, p. 382-387 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  238. Published

    Practical Formal Verification for Model Based Development of Cyber-Physical Systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  239. Published

    Reliable Memory Efficient Name Forwarding in Named Data Networking

    Saxena, D., Raychoudhury, V., Becker, C. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 48-55 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  240. Published

    SENTRY: A novel approach for mitigating application layer DDoS threats

    Zhang, H., Taha, A., Trapero, R., Luna, J. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 465-472 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  241. Published

    Trust validation of cloud IaaS: A customer-centric approach

    Manzoor, S., Taha, A. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 97-104 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  242. Published

    IMPROVE: Identifying Minimal PROfile VEctors for similarity based access control

    Misra, G., Such, J. M. & Balogun, H., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/I​SPA. IEEE, p. 868-875 8 p. (2016 IEEE Trustcom/BigDataSE/I​SPA).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  243. Published

    Mimicry in online conversations: an exploratory study of linguistic analysis techniques

    Carrick, T., Rashid, A. & Taylor, P. J., 18/08/2016, Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  244. Published

    Non-sharing communities? an empirical study of community detection for access control decisions

    Misra, G., Such, J. M. & Balogun, H., 18/08/2016, Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  245. Published

    Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience

    Shirazi, S. N. U. H., Gouglidis, A., Syeda, K. N., Simpson, S., Mauthe, A. U., Stephanakis, I. M. & Hutchison, D., 16/08/2016, Resilience Week (RWS), 2016. IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  246. Published

    Unsupervised classification of data streams based on typicality and eccentricity data analytics

    Costa, B. S. J., Bezerra, C. G., Guedes, L. A. & Angelov, P. P., 24/07/2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ). Vancouver Canada: IEEE, p. 58-63 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  247. Published

    A general purpose intelligent surveillance system for mobile devices using deep learning

    Antoniou, A. & Angelov, P. P., 24/07/2016, 2016 International Joint Conference on Neural Networks (IJCNN). Vancouver Canada: IEEE, p. 2879-2886 8 p. (Neural Networks (IJCNN), 2016 International Joint Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  248. Published

    A bio-inspired HTTP-based Adaptive Streaming Player

    Sani, Y., Mauthe, A. U., Edwards, C. J. & Mu, M., 11/07/2016, Multimedia & Expo Workshops (ICMEW), 2016 IEEE International Conference on. IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  249. Published

    RECODIS: resilient communication services protecting end-user applications from disaster-based failures

    Rak, J., Hutchison, D., Calle, E., Gomes, T. & Gunkel, M., 10/07/2016, 2016 18th International Conference on Transparent Optical Networks (ICTON). IEEE, 4 p. (2016 18th International Conference on Transparent Optical Networks (ICTON)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  250. Published

    Beamforming optimization for full-duplex cooperative cognitive radio networks

    Hu, S., Ding, Z., Ni, Q. & Yuan, Y., 3/07/2016, Signal Processing Advances in Wireless Communications (SPAWC), 2016 IEEE 17th International Workshop on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  251. Published

    Anomaly detection in the cloud using data density

    Shirazi, S. N. U. H., Simpson, S., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 27/06/2016, Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on. IEEE, p. 616-623 8 p. 7820324. (Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  252. Published

    D-DEMOS: a distributed, end-to-end verifiable, internet voting system

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 27/06/2016, Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016) . IEEE, p. 711-720 10 p. (2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  253. Published

    How to Improve the Security Skills of Mobile App Developers: Comparing and Contrasting Expert Views

    Weir, C., Rashid, A. & Noble, J., 22/06/2016, Proceedings of the 2016 ACM Workshop on Security Information Workers. Biddle, R., Chu, B., Lipford, H. & Murphy-Hill, E. (eds.). New York: USENIX Association, 7 p. 1

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  254. Published

    Enabling crowdsourced live event coverage with adaptive collaborative upload strategies

    Richerzhagen, B., Wulfheide, J., Koeppl, H., Mauthe, A. U., Nahrstedt, K. & Steinmetz, R., 21/06/2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  255. Published

    Mapping cross-cloud systems: challenges and opportunities

    Elkhatib, Y. S. S. A., 20/06/2016, The 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '16). USENIX Association, 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  256. Published

    Three-point interaction: combining bi-manual direct touch with gaze

    Simeone, A. L., Bulling, A., Alexander, J. & Gellersen, H., 7/06/2016, AVI '16 Proceedings of the International Working Conference on Advanced Visual Interfaces. New York: ACM, p. 168-175 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  257. Published

    Cloud instance management and resource prediction for computation-as-a-service platforms

    Doyle, J., Giotsas, V., Anam, M. A. & Andreopoulos, Y., 2/06/2016, Proceedings - 2016 IEEE International Conference on Cloud Engineering, IC2E 2016: Co-located with the 1st IEEE International Conference on Internet-of-Things Design and Implementation, IoTDI 2016. Institute of Electrical and Electronics Engineers Inc., p. 89-98 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  258. Published

    Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  259. Published

    Online evolving fuzzy rule-based prediction model for high frequency trading financial data stream

    Gu, X., Angelov, P. P., Mohd Ali, A., Gruver, W. A. & Gaydadjiev, G., 25/05/2016, Evolving and Adaptive Intelligent Systems (EAIS), 2016 IEEE Conference on. IEEE, p. 169-175 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  260. Published

    Performance analysis of hybrid 5G cellular networks exploiting mmWave capabilities in suburban areas

    Omar, M. S., Anjum, M. A., Hassan, S. A., Pervaiz, H. B. & Ni, Q., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, p. 1-6 6 p. (2016 IEEE International Conference on Communications (ICC)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  261. Published

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Hashem-Eiza, M., Shi, Q., Marnerides, A. & Owens, T., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, 6 p. 7510934

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  262. Published

    Query processing for the internet-of-things: Coupling of device energy consumption and cloud infrastructure billing

    Renna, F., Doyle, J., Andreopoulos, Y. & Giotsas, V., 17/05/2016, Internet-of-Things Design and Implementation (IoTDI), 2016 IEEE First International Conference on. Institute of Electrical and Electronics Engineers Inc., p. 83-94 12 p. 7471353

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  263. Published

    A game theoretical network-assisted user-centric design for resource allocation in 5G heterogeneous networks

    Munir, H., Hassan, S. A., Pervaiz, H. B. & Ni, Q., 15/05/2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  264. Published

    On the role of latent design conditions in cyber-physical systems security

    Frey, S., Rashid, A., Zanutto, A., Busby, J. S. & Szmagalska-Follis, K., 14/05/2016, SEsCPS '16 Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systemss, SEsCPS 2015, Austin, Texas. New York: ACM, p. 43-46 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  265. Published

    Partially-indirect Bimanual Input with Gaze, Pen, and Touch for Pan, Zoom, and Ink Interaction

    Pfeuffer, K., Alexander, J. & Gellersen, H., 7/05/2016, CHI '16 Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. New York: ACM Press, p. 2845-2856 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  266. Published

    ShapeCanvas: an exploration of shape-changing content generation by members of the public

    Everitt, A., Taher, F. & Alexander, J., 7/05/2016, CHI '16 Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. New York: ACM Press, p. 2778-2782 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  267. Published

    Providing producer mobility support in NDN through proactive data replication

    Lehmann, M., Barcellos, M. & Mauthe, A. U., 25/04/2016, 2016 IEEE/IFIP Network Operations and Management Symposium 2016 (NOMS 2016). NOMS 2016 will be held 25-29 April 2016 in Istanbul, Turkey. Oktug, S., Ulema, M., Cavdar, C., Zambenedetti Granville, L. & dos Santos, C. R. P. (eds.). IEEE, p. 383-391 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  268. Published

    Daleel: simplifying cloud instance selection using machine learning

    Samreen, F., El Khatib, Y., Rowe, M. C. & Blair, G. S., 25/04/2016, Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP. IEEE, (Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  269. Published

    Towards resilience metrics for future cloud applications

    Novak, M., Shirazi, S. N. U. H., Hudic, A., Hecht, T., Tauber, M., Hutchison, D., Maksuti, S. & Bicaku, A., 23/04/2016, Proceedings of the 6th International Conference on Cloud Computing and Services Science. Cardoso, J., Ferguson, D., Méndez Muñoz, V. & Helfert, M. (eds.). SCITEPRESS – Science and Technology Publications, p. 295-301 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  270. Published

    Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  271. Published

    Harmonized monitoring for high assurance clouds

    Bicaku, A., Balaban, S., Tauber, M., Hudic, A., Mauthe, A. U. & Hutchison, D., 8/04/2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). IEEE, p. 118-123 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  272. Published

    It bends but would it break? topological analysis of BGP infrastructures in Europe

    Frey, S. A. F., El Khatib, Y., Rashid, A., Szmagalska-Follis, K., Vidler, J. E., Race, N. J. P. & Edwards, C. J., 21/03/2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, p. 423-438 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  273. Published

    Analysing radiative and non-radiative recombination in InAs quantum dots grown on Si substrates for integrated laser applications

    Orchard, J., Woodhead, C., Shutts, S., Wu, J., Sobiesierski, A., Young, R. J., Beanland, R., Liu, H., Smowton, P. & Mowbray, D., 15/03/2016, Proceedings Volume 9758, Quantum Dots and Nanostructures: Growth, Characterization, and Modeling XIII. Huffaker, D. L., Eisele, H. & Dick, K. A. (eds.). SPIE, Vol. 9758. 7 p. 975809. (Proceedings of SPIE).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  274. Published

    Sibyl: A Practical Internet Route Oracle

    Cunha, I., Marchetta, P., Calder, M., Chiu, Y-C., Machado, B. V. A., Pescapè, A., Giotsas, V., Madhyastha, H. V. & Katz-Bassett, E., 03/2016, 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, p. 325-344 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  275. Published

    LoRa for the Internet of Things

    Bor, M., Vidler, J. E. & Roedig, U., 15/02/2016, EWSN '16 Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. Canada: Junction Publishing, p. 361-366 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  276. Published

    Analysis and characterisation of botnet scan traffic

    Marnerides, A. & Mauthe, A. U., 15/02/2016, 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  277. Published

    Tangible Data, explorations in data physicalization

    Hogan, T., Hornecker, E., Stusak, S., Jansen, Y., Alexander, J. M., Van Moere, A., Hinrichs, U. & Nolan, K., 14/02/2016, Proceedings of the TEI '16: Tenth International Conference on Tangible, Embedded, and Embodied Interaction . New York: ACM, p. 753-756 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  278. Published

    FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes

    Ali, A., Khelil, A. & Suri, N., 7/01/2016, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  279. Published

    QoE-aware inter-stream synchronization in open N-Screens cloud

    Mu, M., Simpson, S., Stokking, H. & Race, N., 1/01/2016, 2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC). IEEE, p. 907-915 9 p. (Consumer Communications & Networking Conference (CCNC), 2016 13th IEEE Annual).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  280. Published

    Periscope: Unifying looking glass querying

    Giotsas, V., Dhamdhere, A. & Claffy, K. C., 2016, PAM 2016: Passive and Active Measurement : 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings. Karagiannis, T. & Dimitropoulos, X. (eds.). Cham: Springer, p. 177-189 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9631).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  281. Published

    A Multi-commodity network flow model for cloud service environments

    Stephanakis, I. M., Shirazi, S. N. U. H., Gouglidis, A. & Hutchison, D., 2016, Engineering Applications of Neural Networks: 17th International Conference, EANN 2016, Aberdeen, UK, September 2-5, 2016, Proceedings. Jayne, C. & Iliadis, L. (eds.). Cham: Springer, p. 186-197 12 p. (Communications in Computer and Information Science; vol. 629).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  282. Published

    Poster: RI-MAC enhancements for interference resilience

    King, A. & Roedig, U., 2016, Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. USA: Junction Publishing, p. 283-284 2 p. (EWSN '16).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  283. Published

    Competition: ContikiMAC with differentiating clear channel assessment

    King, A., Hadley, J. & Roedig, U., 2016, Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. USA: Junction Publishing, p. 301-302 2 p. (EWSN '16).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  284. Published

    Modelling video rate evolution in adaptive bitrate selection

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 14/12/2015, Proceedings of IEEE International Symposium on Multimedia, ISM 2015. IEEE, p. 89-94 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  285. Published

    Improving interactive TV experience using second screen mobile applications

    Mu, M., Knowles, W., Mauthe, A. U., Sani, Y. & Race, N. J. P., 14/12/2015, Proceedings of IEEE International Symposium on Multimedia, ISM 2015. IEEE, p. 373-376 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  286. Published

    Detecting and mitigating P2P eclipse attacks

    Ismail, H., Germanus, D. & Suri, N., 14/12/2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 224-231 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  287. Published

    Holons: Towards a systematic approach to composing systems of systems

    Blair, G. S., Bromberg, Y-D., Coulson, G., El Khatib, Y., Réveillère, L., B. Ribeiro, H., Rivière, E. & Taïani, F. G. D., 7/12/2015, ARM 2015 Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware. New York: ACM, p. 5:1 5 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  288. Published

    Using Channel State Information for Tamper Detection in the Internet of Things

    Bagci, I. E., Roedig, U., Martinovic, I., Schulz, M. & Hollick, M., 5/12/2015, ACSAC 2015 Proceedings of the 31st Annual Computer Security Applications Conference. New York: ACM, p. 131-140 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  289. Published

    Analysis of adaptation law of the robust evolving cloud-based controller

    Andonovski, G., Blazic, S., Angelov, P. P. & Skrjanc, I., 3/12/2015, Proceedings 2015 IEEE International Conference on Evolving and Adaptive Intelligent Systems (EAIS). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  290. Published

    Mapping peering interconnections to a facility

    Giotsas, V., Smaragdakis, G., Huffaker, B., Luckie, M. & Claffy, K. C., 1/12/2015, CoNEXT '15 Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. New York: Association for Computing Machinery, Inc, 13 p. 37

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  291. Published

    Adaptive materials: utilising additive manufactured scaffolds to control self-organising material aggregation

    Blaney, A., Alexander, J. M., Dunn, N. S., Richards, D. C., Rennie, A. E. W. & Anwar, J., 12/2015, Proceedings of the 14th Rapid Design, Prototyping and Manufacturing Conference. Rennie, A. & Bibb, R. (eds.). Loughborough: Lancaster University, p. 49-57 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  292. Published

    Building cloud applications for challenged networks

    El Khatib, Y., 21/11/2015, Embracing Global Computing in Emerging Economies: First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. Horne, R. (ed.). Cham: Springer Verlag, p. 1-10 10 p. (Communications in Computer and Information Science; vol. 514).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  293. Published

    MultiBox: lightweight containers for vendor-independent multi-cloud deployments

    Hadley, J., El Khatib, Y., Blair, G. & Roedig, U., 21/11/2015, Embracing Global Computing in Emerging Economies: First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. Horne, R. (ed.). Springer Verlag, p. 79-90 12 p. (Communications in Computer and Information Science ; vol. 514).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  294. Published

    SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications

    Granby, B., Askwith, R. & Marnerides, A., 10/11/2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP). IEEE, p. 463-466 4 p. (2015 IEEE 23rd International Conference on Network Protocols (ICNP)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  295. Published

    Gaze-shifting: direct-indirect input with pen and touch modulated by gaze

    Pfeuffer, K., Alexander, J., Chong, M. K., Zhang, Y. & Gellersen, H., 11/2015, UIST '15 Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. New York: ACM, p. 373-383 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  296. Published

    ReForm: integrating physical and digital design through bidirectional fabrication

    Weichel, C., Hardy, J., Alexander, J. & Gellersen, H., 11/2015, UIST '15 Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. New York: ACM, p. 93-102 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  297. Published

    Prospects for software defined networking and network function virtualization in media and broadcast

    Ellerton, J., Lord, A., Gunning, P., Farrow, K., Wright, P., King, D. & Hutchison, D., 27/10/2015, Annual Technical Conference and Exhibition, SMPTE 2015. Hollywood, California: IEEE, 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  298. Published

    Energy-efficient location estimation using variable range beacons in wireless sensor networks

    Farooq-I-Azam, M., Ni, Q. & Pervaiz, H. B., 26/10/2015, Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on. IEEE, p. 1074-1079 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  299. Published

    Towards a context aware multipath-TCP

    Withnell, R. & Edwards, C. J., 26/10/2015, Local Computer Networks (LCN), 2015 IEEE 40th Conference on. IEEE, p. 225-228 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  300. Published

    Estimating node lifetime in interference environments

    King, A., Brown, J., Vidler, J. & Roedig, U., 26/10/2015, Local Computer Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th. IEEE, p. 796-803 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  301. Published

    Performance of a tiered architecture to support end-host mobility in a locator identity split environment

    Mungur, A. & Edwards, C. J., 26/10/2015, Local Computer Networks (LCN), 2015 IEEE 40th Conference on . Florida: IEEE, p. 446-449 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  302. Published

    The impact of hypervisor scheduling on compromising virtualized environments

    Vateva-Gurova, T., Suri, N., Mendelson, A., Atzori, L. (ed.), Jin, X. (ed.), Jarvis, S. (ed.), Liu, L. (ed.), Calvo, R. A. (ed.), Hu, J. (ed.), Min, G. (ed.), Georgalas, N. (ed.) & Wu, Y. (ed.), 26/10/2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, p. 1910-1917 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  303. Published

    DEMOS-2: scalable E2E verifiable elections without random oracles

    Kiayias, A., Zacharias, T. & Zhang, B., 12/10/2015, CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 352-363 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  304. Published

    HABOS: an exploratory study of haptic-audio based online shopping for the visually impaired

    Wong, E. J., Yap, K. M., Alexander, J. M. & Karnik, A., 11/10/2015, Haptic, Audio and Visual Environments and Games (HAVE), 2015 IEEE International Symposium on . Ottawa, Ontario: IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  305. Published

    Edge flow

    Morris, G. & Angelov, P. P., 9/10/2015, Proceedings of the 2015 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, p. 1942-1948 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  306. Published

    Efficient mobility and multihoming support for mountain rescue

    Alsukayti, I. & Edwards, C., 5/10/2015, 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, p. 128-135 8 p. 1570179155

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  307. Published

    Energy and spectrum efficiency trade-off for green small cell networks

    Pervaiz, H. B., Musavian, L. & Ni, Q., 1/10/2015, IEEE International Conference on Communications (ICC), 2015. IEEE, p. 5410-5415 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  308. Published

    Area energy and area spectrum efficiency trade-off in 5G heterogeneous networks

    Pervaiz, H. B., Musavian, L. & Ni, Q., 1/10/2015, Communication Workshop (ICCW), 2015 IEEE International Conference on . IEEE, p. 1178-1183 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  309. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  310. Published

    Inter-domain mobility with LISP-MN: a performance comparison with MIPv6

    Isah, M. & Edwards, C. J., 10/2015, IFIP Wireless and Mobile Networking Conference (WMNC), 2015 8th. IEEE, p. 80-87 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  311. Published

    PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation

    Germanus, D., Ismail, H. & Suri, N., 28/09/2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 74-83 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  312. Published

    Having Fun With Evaluation

    Rouncefield, M. F., Race, N. J. P. & Hutchinson, J., 9/09/2015, Proceedings of the 28th International BCS Human Computer Interaction Conference (HCI 2014). BCS, p. 359-364 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  313. Published

    Energy efficiency in energy harvesting cooperative networks with self-energy recycling

    Hu, S., Ding, Z., Ni, Q., Yu, W. & Song, Z., 9/09/2015, 20th IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks. IEEE, p. 59-63 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  314. Published

    Towards an architecture to support complex multihomed mobility scenarios

    Alsukayti, I. & Edwards, C., 7/09/2015, MobiArch '15 Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture . New York: ACM, p. 51-56 6 p. 6

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  315. Published

    On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms

    Piper, T., Winter, S., Suri, N. & Fuhrman, T. E., 7/09/2015, 2015 11th European Dependable Computing Conference (EDCC). IEEE, p. 85-96 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  316. Published

    Throughput and backhaul energy efficiency analysis in two-tier HetNets: a multiobjective approach

    Pervaiz, H. B., Song, Z., Musavian, L. & Ni, Q., 09/2015, 20th IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks. IEEE, p. 69-74 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  317. Published

    Robust evolving cloud-based controller in normalized data space for heat-exchanger plant

    Andonovski, G., Blazic, S., Angelov, P. & Skrjanc, I., 09/2015, Fuzzy Systems (FUZZ-IEEE), 2015 IEEE International Conference on. IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  318. Published

    Interactions under the desk: a characterisation of foot movements for input in a seated position

    Velloso, E., Alexander, J., Bulling, A. & Gellersen, H., 30/08/2015, Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part . Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. & Winckler, M. (eds.). Cham: Springer International Publishing, p. 384-401 18 p. (Lecture Notes in Computer Science; vol. 9296).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  319. Published

    An empirical investigation of gaze selection in mid-air gestural 3D manipulation

    Velloso, E., Turner, J., Alexander, J., Bulling, A. & Gellersen, H., 30/08/2015, Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part II. Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. & Winckler, M. (eds.). Cham: Springer International Publishing, p. 315-330 16 p. (Lecture Notes in Computer Science ; vol. 9297).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  320. Published

    Gaze+touch vs. touch: what’s the trade-off when using gaze to extend touch to remote displays?

    Pfeuffer, K., Alexander, J. M. & Gellersen, H-W. G., 30/08/2015, Human-Computer Interaction -- INTERACT 2015. Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. & Winckler, M. (eds.). Springer International Publishing, p. 349-367 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  321. Published

    Multimedia over massive MIMO wireless systems

    Wang, H., Ge, X., Zi, R., Zhang, J. & Ni, Q., 28/08/2015, Wireless Communications and Mobile Computing Conference (IWCMC), 2015 International. IEEE, p. 1492-1497 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  322. Published

    HABOS: Towards a platform of haptic-audio based online shopping for the visually impaired

    Wong, E. J., Yap, K. M., Alexander, J. M. & Karnik, A., 24/08/2015, Open Systems (ICOS), 2015 IEEE Confernece on . Melaka, p. 62-67 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  323. Published

    Adaptive monitoring for mobile networks in challenging environments

    Richerzhagen, N., Stingl, D., Mauthe, A. U. & Steinmetz, R., 3/08/2015, Proceedings of 24th International Conference on Computer Communications and Networks, ICCCN 2015. IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  324. Published

    A comparative study of autonomous learning outlier detection methods applied to fault detection

    Bezerra, C. G., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 08/2015, Proceedings of the 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) . IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  325. Published

    Ethical challenges in collaborative storytelling

    Mu, M., Rouncefield, M. F., El Khatib, Y., Simpson, S., Race, N. J. P. & Taal, J., 08/2015, NS Ethics '15 Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research. New York: ACM, p. 29-32 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  326. Published

    Does the internet deserve everybody?

    Elkhatib, Y., Tyson, G. & Sathiaseelan, A., 08/2015, NS Ethics '15 Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research . New York: ACM, p. 5-8 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  327. Published

    Typicality distribution function: a new density-based data analytics tool

    Angelov, P., 12/07/2015, Neural Networks (IJCNN), 2015 International Joint Conference on. IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  328. Published

    Online fault detection based on typicality and eccentricity data analytics

    Costa, B. S. J., Bezerra, C. G., Guedes, L. A. & Angelov, P. P., 12/07/2015, Proceedings of the 2015 International Joint Conference on Neural Networks (IJCNN). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  329. Published

    Evolving clustering, classification and regression with TEDA

    Kangin, D. & Angelov, P. P., 12/07/2015, Proceedings of the 2015 International Joint Conference on Neural Networks (IJCNN). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  330. Published

    Tool support for the evaluation of anomaly traffic classification for network resilience

    da Silva, A., Wickboldt, J., Schaeffer-Filho, A., Marnerides, A. & Mauthe, A. U., 6/07/2015, Proceedings of 20th IEEE Symposium on Computers and Communications, ISCC2015. IEEE, p. 514-519 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  331. Published

    Perceptual video quality estimation by regression with myopic experts

    Giotsas, V., Deligiannis, N., Fisher, P. & Andreopoulos, Y., 2/07/2015, 2015 7th International Workshop on Quality of Multimedia Experience, QoMEX 2015. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. 7148115

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  332. Published

    A new online clustering approach for data in arbitrary shaped clusters

    Hyde, R. & Angelov, P., 24/06/2015, Cybernetics (CYBCONF), 2015 IEEE 2nd International Conference on . IEEE, p. 228-233 6 p. 78

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  333. Published

    Comparison approaches for identification of all-data cloud-based evolving systems

    Blazic, S., Angelov, P. & Skrjanc, I., 22/06/2015, IFAC ESCIT. IFAC Conference on Embedded Systems, Computational Intelligence and Telematics in Control ESCIT, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  334. Published

    User-level fairness delivered: network resource allocation for adaptive video streaming

    Mu, M., Farshad, A., Simpson, S., Ni, Q. & Race, N. J. P., 15/06/2015, 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS). IEEE, p. 85-94 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  335. Published

    ENGAGE: early insights in measuring multi-device engagements

    Jones, R., Clinch, S., Alexander, J., Davies, N. & Mikusz, M., 10/06/2015, PerDis '15 Proceedings of the 4th International Symposium on Pervasive Displays. New York: ACM, p. 31-37 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  336. Published

    Energy efficiency optimization with energy harvesting using harvest-use approach

    Siddiqui, A., Musavian, L. & Ni, Q., 8/06/2015, Communication Workshop (ICCW), 2015 IEEE International Conference on. IEEE, p. 1982-1987 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  337. Published

    Multi-carrier link-layer energy efficiency and effective capacity tradeoff

    Yu, W., Musavian, L. & Ni, Q., 06/2015, Communication Workshop (ICCW), 2015 IEEE International Conference on. IEEE, p. 2763-2768 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  338. Published

    Weighted tradeoff between effective capacity and energy efficiency

    Yu, W., Musavian, L. & Ni, Q., 06/2015, Communications (ICC), 2015 IEEE International Conference on. IEEE, p. 238-243 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  339. Published

    Similitude: decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A-M., Maddock, C., Mauthe, A. U., Roman, P-L. & Taiani, F., 06/2015, Distributed Applications and Interoperable Systems: 15th IFIP WG 6.1 International Conference, DAIS 2015, Held as Part of the 10th International Federated Conference on Distributed Computing Techniques, DisCoTec 2015, Grenoble, France, June 2-4, 2015, Proceedings. Bessani, A. & Bounchenak, S. (eds.). Springer, p. 51-65 15 p. (Lecture Notes in Computer Science; vol. 9038).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  340. Published

    A cell specific reference signal interference cancellation scheme for LTE cellular access systems

    Li, W., Zhang, Y., Huang, L., Cosmas, J. & Ni, Q., 06/2015, Broadband Multimedia Systems and Broadcasting (BMSB), 2015 IEEE International Symposium on . IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  341. Published

    The design of a generalised approach to the programming of systems of systems

    Coulson, G., Blair, G., Elkhatib, Y. & Mauthe, A., 06/2015, World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2015 IEEE 16th International Symposium on a . IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  342. Published

    GRINDER: On Reusability of Fault Injection Tools

    Winter, S., Piper, T., Schwahn, O., Natella, R., Suri, N. & Cotroneo, D., 23/05/2015, 2015 IEEE/ACM 10th International Workshop on Automation of Software Test. IEEE, p. 75-79 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  343. Published

    No PAIN, No Gain? The utility of parallel fault injections

    Winter, S., Schwahn, O., Natella, R., Suri, N., Cotroneo, D., J., K. (ed.) & U., Z. (ed.), 16/05/2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, p. 494-505 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  344. Published

    Multihomed mobile network architecture

    Alsukayti, I. & Edwards, C., 05/2015, IFIP Networking Conference (IFIP Networking) 2015. IFIP, p. 195-203 9 p. 1570067595

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  345. Published

    Argumentation for multi-party privacy management

    Fogues, R. L., Murukanniah, P., Such, J. M., Espinosa, A., Garcia-Fornes, A. & Singh, M., 05/2015, The Second International Workshop on Agents and CyberSecurity (ACySe). p. 3-6 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  346. Published

    A multi-level resilience framework for unified networked environments

    Marnerides, A., Bhandari, A., Murthy, H. & Mauthe, A. U., 05/2015, Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on. IEEE, p. 1369-1372 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  347. Published

    Exploring interactions with physically dynamic bar charts

    Taher, F., Hardy, J., Karnik, A., Weichel, C., Jansen, Y., Hornbaek, K. & Alexander, J., 18/04/2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 3237-3246 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  348. Published

    ShapeClip: towards rapid prototyping with shape-changing displays for designers

    Hardy, J., Weichel, C., Taher, F., Vidler, J. & Alexander, J., 18/04/2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 19-28 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  349. Published

    OpenCache: a software-defined content caching platform

    Broadbent, M., King, D., Baildon, S., Georgalas, N. & Race, N., 13/04/2015, Network Softwarization (NetSoft), 2015 1st IEEE Conference on. IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  350. Published

    Mitigating timing error propagation in mixed-criticality automotive systems

    Piper, T., Winter, S., Schwahn, O., Bidarahalli, S. & Suri, N., 13/04/2015, 2015 IEEE 18th International Symposium on Real-Time Distributed Computing. IEEE, p. 102-109 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  351. Published

    Shape Display Shader Language (SDSL): a new programming model for shape changing displays

    Weichel, C., Alexander, J. & Hardy, J., 04/2015, CHI EA '15 Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. New York: ACM, p. 1121-1126 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  352. Published

    Opportunities and challenges for data physicalization

    Jansen, Y., Dragicevic, P., Isenberg, P., Alexander, J., Karnik, A., Kildal, J., Subramanian, S. & Hornbaek, K., 04/2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 3227-3236 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  353. Published

    End-to-end verifiable elections in the standard model

    Kiayias, A., Zacharias, T. & Zhang, B., 17/03/2015, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Oswald, E. & Fischlin, M. (eds.). Springer, Vol. II. p. 468-498 31 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  354. Published

    Malware detection in the cloud under ensemble empirical mode decomposition

    Marnerides, A., Spachos, P., Chatzimisios, P. & Mauthe, A. U., 02/2015, Proceedings of 6th International Conference on Computing, Networking and Communications, IEEE ICNC 2015. IEEE, p. 82-88 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  355. Published

    Gaze-supported gaming: MAGIC techniques for first person shooters

    Velloso, E., Fleming, A., Alexander, J. & Gellersen, H., 2015, CHI PLAY '15 Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. New York: ACM, p. 343-347 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  356. Published

    Horizon 2020 TWEETHER project for W-band high data rate wireless communications

    Paoloni, C., Letizia, R., Napoli, F., Ni, Q., Rennie, A., Zimmerman, R., Andre, F., Pham, K., Krozer, V., Magne, F., Burciu, I., Ramirez, A., Rocchi, M., Marilier, M. & Vilar, R., 2015, Vacuum Electronics Conference (IVEC), 2015 IEEE International . IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  357. Published

    A public ideation of shape-changing applications

    Sturdee, M., Hardy, J., Dunn, N. & Alexander, J., 2015, ITS '15 Proceedings of the 2015 International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 219-228 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  358. Published

    Anomaly detection in secure cloud environments using a Self-Organizing Feature Map (SOFM) model For clustering sets of R-ordered vector-structured features

    Shirazi, S. N. U. H., Stephanakis, I. M., Chochliouros, I. P. & Sfakianakis, E., 2015, EANN '15: Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS). Iliadis, L. (ed.). ACM, 9 p. 27

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  359. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  360. Published

    Inter-cell collaborative spectrum monitoring for cognitive cellular networks in fading environment

    Deepak, G. C., Navaie, K. & Ni, Q., 2015, IEEE International Conference on Communications (ICC), 2015 . IEEE, p. 7498-7503 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  361. Published

    SPATA: Spatio-tangible tools for fabrication-aware design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 2015, TEI '15 Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. New York: ACM, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  362. Published

    Incremental anomaly identification in flight data analysis by adapted one-class SVM method

    Kolev, D., Suvorov, M., Morozov, E., Markarian, G. & Angelov, P., 2015, Artificial neural networks: methods and applications in bio-/neuroinformatics. Koprinkova-Hristova, P., Mladenov, V. & Kasabov, N. K. (eds.). Springer, p. 373-391 19 p. (Springer Series in Bio-/Neuroinformatics; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  363. Published

    ATDT: Autonomous Template-based Detection and Tracking of objects from airborne camera

    Sadeghi Tehran, P. & Angelov, P., 2015, Intelligent Systems 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland, Volume 2: Tools, Architectures, Systems, Applications. Filev, D., Jabłkowski, J., Kacprzyk, J., Krawczak, M., Popchev, I., Rutkowski, L., Sgurev, V., Sotirova, E., Szynkarczyk, P. & Zadrozny, S. (eds.). Springer, p. 555-565 11 p. (Advances in Intelligent Systems and Computing; vol. 323).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  364. Published

    Gaze+RST: integrating Gaze and multitouch for remote Rotate-Scale-Translate tasks

    Turner, J., Alexander, J., Bulling, A. & Gellersen, H., 2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 4179-4188 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  365. Published

    Are People Really Social on Porn 2.0?

    Tyson, G., Elkhatib, Y., Sastry, N. & Uhlig, S., 2015, Proceedings of the AAAI Conference on Web and Social Media (ICWSM). AAAI, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  366. Published

    Towards implicit contextual integrity

    Criado, N. & Such, J. M., 2015, The Second International Workshop on Agents and CyberSecurity (ACySE). p. 23-26 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  367. Published

    Social computing privacy and online relationships

    Misra, G. & Such, J. M., 2015, AISB Social Aspects of Cognition and Computing Symposium. p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  368. Published

    Leveraging SDN to provide an in-network QoE measurement framework

    Farshad, A., Georgopoulos, P., Broadbent, M., Mu, M. & Race, N., 2015, Computer Communications Workshops (INFOCOM WKSHPS), 2015 IEEE Conference on. IEEE, p. 239-244 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  369. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  370. Published

    Recursive SVM based on TEDA

    Kangin, D. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Cham: Springer, p. 156-168 13 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  371. Published

    RDE with forgetting: an approximate solution for large values of k with an application to fault detection problems

    Bezerra, C. G., Costa, B., Guedes, L. A. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 169-178 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  372. Published

    IPv6 AS relationships, cliques, and congruence

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 2015, Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Mirkovic, J. & Liu, Y. (eds.). Berlin: Springer, p. 111-122 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  373. Published

    Video Clarity: High Speed Data Mining for Video

    Fisher, P., Alhabib, A., Giotsas, V. & Andreopoulos, I., 2015, IBC 2015. London: Institution of Engineering and Technology, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  374. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  375. Published

    A fully autonomous data density based clustering algorithm

    Hyde, R. & Angelov, P., 9/12/2014, Evolving and Autonomous Learning Systems (EALS), 2014 IEEE Symposium on. Piscataway, N.J.: IEEE, p. 116-123 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  376. Published

    RTSDE: recursive total-sum-distances-based density estimation approach and its application for autonomous real-time video analytics

    Angelov, P. & Wilding, A., 9/12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE, p. 81-86 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  377. Published

    Editorial message: CrossCloud Brokers 2014

    Elkhatib, Y. & Walraven, S., 8/12/2014, CrossCloud Brokers 2014: proceedings of the 2nd International Workshop on Cross-Cloud Systems . New York: ACM

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  378. Published

    Event pattern discovery on IDS traces of cloud services

    Huang, S-Y., Huang, Y. & Suri, N., 3/12/2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. IEEE, p. 25-32 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  379. Published

    Anomaly detection based on eccentricity analysis

    Angelov, P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE Press, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  380. Published

    A multi-layer and multi-tenant cloud assurance evaluation methodology

    Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E. R., 12/2014, Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE, p. 386-393 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  381. Published

    Using agent-based simulation to analyse the effect of broadcast and narrowcast on public perception: a case in social risk amplification

    Onggo, S., Busby, J. & Liu, Y., 12/2014, Proceedings of the 2014 Winter Simulation Conference. IEEE, p. 322-333 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  382. Published

    A real-time approach for autonomous detection and tracking of moving objects from UAV

    Sadeghi Tehran, P., Clarke, C. & Angelov, P. P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Piscataway, N. J.: IEEE, p. 43-49 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  383. Published

    Inferring complex AS relationships

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 5/11/2014, IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  384. Published

    Robust and real-time communication on heterogeneous networks for smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 3/11/2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 386-391 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  385. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  386. Published

    Characterising the physicality of everyday buttons

    Alexander, J., Hardy, J. & Wattam, S., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 205-208 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  387. Published

    Just browsing? understanding user journeys in online TV

    Elkhatib, Y., Killick, R., Mu, M. & Race, N., 11/2014, MM '14 Proceedings of the ACM International Conference on Multimedia. New York: ACM, p. 965-968 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  388. Published

    Mitigating eclipse attacks in peer-to-peer networks

    Germanus, D., Roos, S., Strufe, T. & Suri, N., 29/10/2014, 2014 IEEE Conference on Communications and Network Security. Springer-Verlag, p. 400-408 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  389. Published

    Real-time novelty detection in video using background subtraction techniques: state of the art a practical review

    Morris, G. & Angelov, P., 8/10/2014, 2014 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE Press, p. 537-543 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  390. Published

    DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence

    King, A., Brown, J. & Roedig, U., 1/10/2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, p. 45-50 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  391. Published

    Adaptation for the masses: towards decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A-M., Maddock, C., Mauthe, A. & Taïani, F., 10/2014, ARM '14 Proceedings of 13th Workshop on Adaptive and Reflective Middleware. New York: ACM, 6 p. 4

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  392. Published

    Assessing the impact of intra-cloud live migration on anomaly detection

    Shirazi, S. N. U. H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A. & Hutchison, D., 10/2014, Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE, p. 52-57 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  393. Published

    Gaze-touch: combining gaze with multi-touch for interaction on the same surface

    Pfeuffer, K., Alexander, J., Chong, M. K. & Gellersen, H., 10/2014, UIST '14 Proceedings of the 27th annual ACM symposium on User interface software and technology. New York: ACM, p. 509-518 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  394. Published

    5G communications: race for more capacity triggers LTE in unlicensed band

    Al-Dulaimi, A., Al-Rubaye, S., Ni, Q. & Sousa, E., 24/09/2014, 33rd Wireless World Research Forum Proceedings. Guildford, Surrey: WWRF, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  395. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  396. Published

    Socio-technical security analysis of Industrial Control Systems (ICS)

    Green, B., Prince, D., Roedig, U., Busby, J. & Hutchison, D., 11/09/2014, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. Janicke, H. (ed.). Swindon: BCS Learning and Development Limited, p. 10-14 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  397. Published

    Data density based clustering

    Hyde, R. & Angelov, P., 8/09/2014, Computational Intelligence (UKCI), 2014 14th UK Workshop on. IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  398. Published

    Estimating packet reception rate in noisy environments

    Brown, J., Roedig, U., Boano, C. A. & Roemer, K., 8/09/2014, Proceedings of the 39rd IEEE Conference on Local Computer Networks, 2014. LCN 2014. IEEE, p. 583-591 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  399. Published

    Dataset on usage of a live & VoD P2P IPTV service

    Elkhatib, Y., Mu, M. & Race, N., 09/2014, 14th IEEE International Conference on Peer-to-Peer Computing (P2P). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  400. Published

    A survey of rural Wireless Mesh Network (WMN) deployments

    Ajayi, A. O., Roedig, U., Edwards, C. & Race, N., 28/08/2014, Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, p. 119-125 7 p. 14664869

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  401. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  402. Published

    Practical use of formal verification for safety critical cyber-physical systems: A case study

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 25/08/2014, 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications. IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  403. Published

    Designing Mobile Augmented Reality interfaces for locative games and playful experiences

    Burnett, D., Coulton, P., Murphy, E. & Race, N., 6/08/2014, Proceedings of Digital Games Research Conference 2014. Digital Games Research Association - DiGRA, 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  404. Published

    Towards continuous cloud service assurance for critical infrastructure IT

    Hudic, A., Hecht, T., Mauthe, A. & Tauber, M., 08/2014, Proceedings of 2nd International Conference on Future Internet of Things and Cloud (FiCloud-2014. IEEE, p. 175-182 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  405. Published

    Short paper: gathering tamper evidence in wi-fi networks based on channel state information

    Bagci, I. E., Roedig, U., Schulz, M. & Hollick, M., 23/07/2014, WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. New York: ACM Press, p. 183-188 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  406. Published

    An empirical study of injected versus actual interface errors

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 21/07/2014, Proceedings of the 2014 International Symposium on Software Testing and Analysis. ACM, p. 397-408 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  407. Published

    Dynamically evolving fuzzy classifier for real-time classification of data streams

    Dutta Baruah, R., Angelov, P. & Baruah, D., 6/07/2014, Fuzzy Systems (FUZZ-IEEE), 2014 IEEE International Conference on. IEEE, p. 383-389 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  408. Published

    A new unsupervised approach to fault detection and identification

    Costa, B., Angelov, P. & Guedes, L. A., 07/2014, Neural Networks (IJCNN), 2014 International Joint Conference on. IEEE, p. 1557-1564 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  409. Published

    Agile sink selection in wireless sensor networks

    Mahmudimanesh, M. & Suri, N., 30/06/2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, p. 390-398 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  410. Published

    Dynamically evolving clustering for data streams

    Dutta Baruah, R., Angelov, P. & Baruah, D., 2/06/2014, Proceedings 2014 IEEE Symposium on Evolving and Intelligent Systems, EAIS2014. IEEE Xplore, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  411. Published

    Robust evolving cloud-based PID control adjusted by gradient learning method

    Skrjanc, I., Blazic, S. & Angelov, P., 2/06/2014, Proceedings 2014 IEEE Symposium on Evolving and Intelligent Systems, EAIS-2014. IEEE Xplore, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  412. Published

    Delay-QoS-driven spectrum and energy efficiency tradeoff

    Musavian, L. & Ni, Q., 06/2014, IEEE International Conference on Communications (ICC 2014). IEEE, p. 4981-4986 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  413. Published

    Symbol recognition with a new autonomously evolving classifier autoclass

    Angelov, P., Kangin, D., Xiaowei, Z. & Kolev, D., 06/2014, 2014 IEEE Conference on Evolving and Adaptive Intelligent Systems. 9781479933471: IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  414. Published

    Can SPDY really make the web faster?

    Elkhatib, Y., Tyson, G. & Welzl, M., 06/2014, Networking Conference, 2014 IFIP. IFIP, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  415. Published

    Efficient agile sink selection in wireless sensor networks based on compressed sensing

    Mahmudimanesh, M., Naseri, A. & Suri, N., 26/05/2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, p. 193-200 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  416. Published

    Robust compressive data gathering in wireless sensor networks with linear topology

    Mahmudimanesh, M. & Suri, N., 26/05/2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, p. 179-186 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  417. Published

    Cyber-security challenges of agent technology in intelligent transportation systems

    Kibirige Mukisa, S. & Rashid, A., 6/05/2014, ACySE '14 Proceedings of the 1st International Workshop on Agents and CyberSecurity. New York: ACM, 4 p. 9

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  418. Published

    Management patterns: SDN-enabled network resilience management

    Smith, P., Schaeffer-Filho, A., Hutchison, D. & Mauthe, A., 1/05/2014, Network Operations and Management Symposium (NOMS), 2014 IEEE. IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  419. Published

    Vision social TV: towards personalised media experience and community atmosphere

    Mu, M., Trench-Jellicoe, J. & Race, N., 05/2014, ACM TVX2014. 2 p. D111

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  420. Published

    The use of surrounding visual context in handheld AR: device vs. user perspective rendering

    Čopič Pucihar, K., Coulton, P. & Alexander, J., 28/04/2014, CHI '14 Proceedings of the 32nd annual ACM conference on Human factors in computing systems. New York: ACM, p. 197-206 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  421. Published

    Content Relevance Opportunistic Routing for Wireless Multimedia Sensor Networks

    Spachos, P., Marnerides, A. & Hatzinakos, D., 27/04/2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, p. 263-268 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  422. Published

    ThumbReels: query sensitive web video previews based on temporal, crowdsourced, semantic tagging

    Craggs, B., Kilgallon Scott, M. & Alexander, J., 26/04/2014, CHI '14 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM, p. 1217-1220 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  423. Published

    Feet movement in desktop 3D interaction

    Simeone, A. L., Velloso, E., Alexander, J. & Gellersen, H., 26/04/2014, 3D User Interfaces (3DUI), 2014 IEEE Symposium on. IEEE, p. 71-74 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  424. Published

    Evaluating the effectiveness of physical shape-change for in-pocket mobile device notifications

    Dimitriadis, P. & Alexander, J., 26/04/2014, CHI '14 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM, p. 2589-2592 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  425. Published

    TempLab: a testbed infrastructure to study the impact of temperature on wireless sensor networks

    Boano, C. A., Zuniga, M. A., Brown, J., Roedig, U., Keppitiyagama, C. & Roemer, K., 15/04/2014, Proceedings of the 13th International Conference on Information Processing in Sensor Networks (IPSN '14). New York: ACM, p. 95-106 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  426. Published

    WiP abstract: A framework on profiling cross-domain noise propagation in control CPS

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 14/04/2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS). IEEE, p. 224 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  427. Published

    OpenCache: leveraging SDN to demonstrate a customisable and configurable cache

    Broadbent, M., Georgopoulos, P., Kotronis, V., Plattner, B. & Race, N., 04/2014, Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on. Piscataway, N.J.: IEEE, p. 151-152 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  428. Published

    Cross-device gaze-supported point-to-point content transfer

    Turner, J., Bulling, A., Alexander, J. & Gellersen, H., 26/03/2014, ETRA '14 Proceedings of the Symposium on Eye Tracking Research and Applications. New York: ACM, p. 19-26 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  429. Published

    Demo abstract: A testbed infrastructure to study the impact of temperature on WSN

    Boano, C. A., Roemer, K., Brown, J., Roedig, U. & Zúñiga, M. A., 24/03/2014, Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on. IEEE, p. 154-156 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  430. Published

    Performance evaluation of congestion window validation for DASH transport

    Nazir, S., Hossain, Z., Secchi, R., Broadbent, M., Petlund, A. & Fairhurst, G., 19/03/2014, NOSSDAV '14 Proceedings of Network and Operating System Support on Digital Audio and Video Workshop. New York: ACM, 6 p. 67

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  431. Published

    Management patterns for network resilience: design and verification of policy configurations

    Schaeffer-Filho, A., Smith, P., Mauthe, A. & Hutchison, D., 2014, Cyberpatterns: unifying design patterns with security and attack patterns. Switzerland: Springer International Publishing, Vol. 3. p. 85-95 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  432. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 2014, 23rd International Conference on Computer Communications and Networks (ICCCN 2014). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  433. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  434. Published

    Adaptive conflict resolution mechanism for multi-party privacy management in social media

    Such, J. M. & Criado, N., 2014, WPES '14 Proceedings of the 13th Workshop on Privacy in the Electronic Society. New York: ACM, p. 69-72 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  435. Published

    Requirements fixation

    Mohanani, R., Ralph, P. & Shreeve, B., 2014, ICSE 2014 Proceedings of the 36th International Conference on Software Engineering . New York: ACM, p. 895-906 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  436. Published

    Metaphor, popular science, and semantic tagging: distant reading with the historical thesaurus of English

    Alexander, M., Anderson, J., Baron, A., Dallachy, F., Kay, C., Piao, S. & Rayson, P., 2014, Digital Humanities 2014 Conference Abstracts.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  437. Published

    Digital approaches to understanding the geographies in literary and historical texts

    Gregory, I., Donaldson, C., Murrieta-Flores, P., Rupp, C. J., Baron, A., Hardie, A. & Rayson, P., 2014, Digital Humanities 2014 Conference Abstracts.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  438. Published

    User-centric security assessment of software configurations: A case study

    Ghani, H., Luna Garcia, J., Petkov, I. & Suri, N., 2014, Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Springer-Verlag, Vol. 8364 LNCS. p. 196-212 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  439. Published

    Neighborhood watch: on network coding throughput and key sharing

    Strohmeier, M., Martinovic, I., Roedig, U., Defrawy, K. E. & Schmitt, J., 9/12/2013, Global Communications Conference (GLOBECOM), 2013 IEEE . IEEE Xplore, p. 849-854 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  440. Published

    Evaluating dual-view perceptual issues in handheld augmented reality: device vs. user perspective rendering

    Čopič Pucihar, K., Coulton, P. & Alexander, J., 9/12/2013, ICMI '13 Proceedings of the 15th ACM on International conference on multimodal interaction. New York: ACM, p. 381-388 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  441. Published

    Eye Drop: an interaction concept for gaze-supported point-to-point content transfer

    Turner, J., Bulling, A., Alexander, J. & Gellersen, H., 2/12/2013, MUM '13 Proceedings of the 12th International Conference on Mobile and Ubiquitous Multimedia. New York: ACM, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  442. Published

    Security as a service using an SLA-based approach via SPECS

    Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V. & Villano, U., 2/12/2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  443. Published

    A use-based approach for enhancing UCON

    Grompanopoulos, C., Gouglidis, A. & Mavridis, I., 1/12/2013, Security and Trust Management. Jøsang, A., Samarati, P. & Petrocchi, M. (eds.). Berlin: Springer Verlag, p. 81-96 16 p. (Lecture Notes in Computer Science ; vol. 7783 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  444. Published

    Malware analysis in cloud computing: network and system characteristics

    Marnerides, A., Watson, M., Shirazi, S. N. U. H., Mauthe, A. & Hutchison, D., 12/2013, Globecom Workshops (GC Wkshps), 2013 IEEE. Piscataway, N.J.: IEEE, p. 482-487 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  445. Published

    PoWerStore: Proofs of writing for efficient and robust storage

    Dobre, D., Karame, G., Li, W., Majuntke, M., Suri, N. & Vukolić, M., 4/11/2013, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, p. 285-297 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  446. Published

    A practical approach of VLC architecture for smart city

    Ayub, S., Honary, M., Kariyawasam Katukolihe Gamage, S. & Honary, B., 11/2013, Antennas and Propagation Conference (LAPC), 2013 Loughborough . IEEE, p. 106-111 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  447. Published

    Visible light ID system for indoor localization

    Ayub, S., Kariyawasam Katukolihe Gamage, S., Honary, M. & Honary, B., 11/2013, Wireless, Mobile and Multimedia Networks (ICWMMN 2013), 5th IET International Conference on . IEEE, p. 254-257 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  448. Published

    Synchronising video playback information within a distributed framework

    Bojko, C., Mu, M. & Race, N., 28/10/2013, Media Synchronization Workshop (MediaSync) 2013. Nantes, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  449. Published

    Predictive vulnerability scoring in the context of insufficient information availability

    Ghani, H., Luna, J., Khelil, A., Alkadri, N. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  450. Published

    Quantitative assessment of software vulnerabilities based on economic-driven security metrics

    Ghani, H., Luna, J. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  451. Published

    Coral: Reliable and low-latency P2P convergecast for critical sensor data collection

    Germanus, D., Khelil, A., Schwandke, J. & Suri, N., 21/10/2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 300-305 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  452. Published

    Demystifying porn 2.0: a look into a major adult video streaming website

    Tyson, G., Elkhatib, Y., Sastry, N. & Uhlig, S., 10/2013, http://dl.acm.org/citation.cfm?doid=2504730.2504739. New York: ACM, p. 417-426 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  453. Published

    Efficient verification of distributed protocols using stateful model checking

    Saissi, H., Bokor, P., Muftuoglu, C. A., Suri, N. & Serafini, M., 30/09/2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems. IEEE, p. 133-142 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  454. Published

    Joint user association and energy-efficient resource allocation with minimum-rate constraints in two-tier HetNets

    Pervaiz, H., Musavian, L. & Ni, Q., 8/09/2013, Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th International Symposium on. IEEE, p. 1634-1639 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  455. Published

    Towards an autonomous resilience strategy the implementation of a self evolving rate limiter

    Ali, A., Hutchinson, D., Angelov, P. & Smith, P., 09/2013, 13th UK Workshop on Computational Intelligence (UKCI), 2013 . Guildford, UK: UKCI 2013, p. 299-304 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  456. Published

    Creating a stereoscopic magic-lens to improve depth perception in handheld augmented reality

    Čopič Pucihar, K., Coulton, P. & Alexander, J., 27/08/2013, Proceedings of Mobile HCI 2013. ACM, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  457. Published

    Incremental anomaly identification by adapted SVM method

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 08/2013, International Joint Conference on Neural Networks, IJCNN-2013, Dallas, TX, USA, 3-9 August, 2013. Piscataway, N.J.: IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  458. Published

    Towards network-wide QoE fairness using openflow-assisted adaptive video streaming

    Georgopoulos, P., Elkhatib, Y., Broadbent, M., Mu, M. & Race, N., 08/2013, FhMN '13 : Proceedings of the 2013 ACM SIGCOMM workshop on Future human-centric multimedia networking. New York: ACM, p. 15-20 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  459. Published

    On the comprehension of DSL SyncTrap events in IPTV networks

    Marnerides, A., Malinowski, S., Morla, R., Rodrigues, M. R. D. & Kim, H. S., 7/07/2013, 2013 IEEE Symposium on Computers and Communications (ISCC) . IEEE, p. 670-675 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  460. Published

    A multilevel approach towards challenge detection in cloud computing

    Shirazi, S. N. U. H., Watson, M., Marnerides, A., Mauthe, A. & Hutchison, D., 07/2013, Cyberpatterns 2013 : Proceedings of the Second International Workshop on Cyberpatterns . Oxford: Oxford Brookes University, p. 103-107 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  461. Published

    Combined secure storage and communication for the Internet of Things

    Bagci, I. E., Raza, S., Chung, A., Roedig, U. & Voigt, T., 24/06/2013, 10th Annual IEEE Communications Society Conference on Sensing, Communication, and Networking (SECON 2013). Piscataway, N.J.: IEEE, p. 523-531 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  462. Published

    Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach

    Tan, F., Wang, Y., Wang, Q., Bu, L., Zheng, R. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  463. Published

    SimFI: From single to simultaneous software fault injections

    Winter, S., Tretter, M., Sattler, B. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  464. Published

    Internet traffic classification using energy time-frequency distributions

    Marnerides, A., Pezaros, D., Kim, H. & Hutchison, D., 9/06/2013, 2013 IEEE International Conference on Communications (ICC). IEEE, p. 2513-2518 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  465. Published

    Verification of secure inter-operation properties in multi-domain RBAC systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 06/2013, Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on . IEEE, p. 35-44 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  466. Published

    An ILNP-based solution for future heterogeneous wireless networks

    Isah, M. & Edwards, C. J., 06/2013, PGNET 2013: Proceedings of the 14th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting. Liverpool, United Kingdom: Liverpool John Moores University, School of Computing & Mathematical Sciences, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  467. Published

    PReSET: a toolset for the evaluation of network resilience strategies

    Schaeffer-Filho, A., Mauthe, A., Hutchison, D., Smith, P., Yu, Y. & Fry, M., 1/05/2013, Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on. Piscataway, N.J.: IEEE, p. 202-209 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  468. Published

    Simulation and evaluation of network resilience with PReSET

    Schaeffer-Filho, A., Mauthe, A., Hutchison, D., Smith, P., Yu, Y. & Fry, M., 1/05/2013, Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on. Piscataway, N.J.: IEEE, p. 1086-1087 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  469. Published

    Information quality aware co-design of sampling and transport in wireless sensor networks

    Sachidananda, V., Khelil, A., Noack, D. & Suri, N., 23/04/2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  470. Published

    Defend Your Home! Jamming Unsolicited Messages in the Smart Home

    Brown, J., Bagci, I. E., King, A. & Roedig, U., 19/04/2013, HotWiSec '13 Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy. New York: ACM Press, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  471. Published

    Trading transport timeliness and reliability for efficiency in wireless sensor networks

    Sachidananda, V., Khelil, A., Umap, D., Majuntke, M. & Suri, N., 10/04/2013, 2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC). I. B. Tauris, p. 720-727 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  472. Published

    Experiences of using a hybrid cloud to construct an environmental virtual observatory

    Elkhatib, Y., Blair, G. & Surajbali, B., 04/2013, CloudDP '13: Proceedings of the 3rd International Workshop on Cloud Data and Platforms . New York: ACM, p. 13-18 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  473. Published

    Sampling and transport co-design in Wireless Sensor Networks

    Sachidananda, V., Khelil, A., Noack, D. & Suri, N., 18/03/2013, 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS). IEEE, p. 98-100 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  474. Published

    Negotiating and brokering Cloud resources based on Security Level Agreements

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & Liccardo, L., 2013, Proceedings of the 3rd International Conference on Cloud Computing and Services Science - Volume 1. SciTePress, p. 533-541 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  475. Published

    Eye pull, eye push: moving objects between large screens and personal devices with gaze and touch

    Turner, J., Alexander, J., Bulling, A., Schmidt, D. & Gellersen, H., 2013, Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part II. Kotzé, P., Marsden, G., Lindgaard, G., Wesson, J. & Winckler, M. (eds.). Berlin: Springer, p. 170-186 17 p. (Lecture Notes in Computer Science; vol. 8118).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  476. Published

    HomeVisor: adapting home network environments

    Frątczak, T., Broadbent, M., Georgopoulos, P. & Race, N., 2013, Second European Workshop on Software Defined Networks (EWSDN). Piscataway, N.J.: IEEE, p. 32-37 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  477. Published

    Service-centric networking extensions

    Braun, T., Mauthe, A. & Siris, V., 2013, SAC '13 Proceedings of the 28th Annual ACM Symposium on Applied Computing. New York: ACM, p. 583-590 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  478. Published

    Outrageous opinion panel: do we really have to consider the human factor in networking?

    Mauthe, A. & Monteiro, E., 2013, FhMN '13 Proceedings of the 2013 ACM SIGCOMM workshop on Future human-centric multimedia networking. New York: ACM, p. 59-60 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  479. Published

    Online learning and prediction of data streams using dynamically evolving fuzzy approach

    Dutta Baruah, R. & Angelov, P., 2013, Proceedings of the 2013 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2013). Piscataway, N.J.: IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  480. Published

    OSA: one-class recursive SVM algorithm with negative samples for fault detection

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 2013, Artificial neural networks and machine learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 194-207 14 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  481. Published

    Vehicle plate recognition using improved neocognitron neural network

    Kangin, D., Kolev, G. & Angelov, P., 2013, Artificial Neural Networks and Machine Learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 628-640 13 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  482. Published

    ARFA: automated real-time flight data analysis using evolving clustering, classifiers and recursive density estimation

    Kolev, D., Angelov, P., Markarian, G., Suvorov, M. & Lysanov, S., 2013, Evolving and Adaptive Intelligent Systems (EAIS), 2013 IEEE Conference on. Piscataway, N.J.: IEEE Press, p. 91-97 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  483. Published

    Robust evolving cloud-based controller for a hydraulic plant

    Angelov, P., Skrjanc, I. & Blazic, S., 2013, Proceedings of the 2013 IEEE Symposium Series on Computational Intelligence, SSCI-2013,16-19 April 2013, Singapore. Piscataway, N.J.: IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  484. Published

    A practical implementation of self-evolving cloud-based control of a pilot plant

    Costa, B., Skrjanc, I., Blazic, S. & Angelov, P., 2013, 2013 IEEE International Conference on Cybernetics, CYBCONF-2013, Lausanne, Switzerland13-15 June, 2013. Piscataway, N.J.: IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  485. Published

    Node identification using clock skew

    Bagci, I. E. & Roedig, U., 2013, Real-World Wireless Sensor Networks: Proceedings of the 5th International Workshop, REALWSN 2013, Como (Italy), September 19-20, 2013. Langendoen, K., Hu, W., Ferrari, F., Zimmerling, M. & Mottola, L. (eds.). Berlin: Springer Verlag, p. 111-123 13 p. (Lecture Notes in Electrical Engineering; vol. 281).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  486. Published

    A retrospective analysis of QoS deployment, operation and use in enterprise and provider networks

    Mackay, M. & Edwards, C., 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Barolli, L., Xhafa, F., Takizawa, M., Enokido, T. & Hsu, H. H. (eds.). New York: IEEE, p. 583-588 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  487. Published

    Customising geoparsing and georeferencing for historical texts

    Rupp, C. J., Rayson, P., Baron, A., Donaldson, C., Gregory, I., Hardie, A. & Murrieta-Flores, P., 2013, Proceedings of the 2013 IEEE International Conference on Big Data. IEEE, p. 59-62 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  488. Published

    HomeFlow: inferring device usage with network traces

    Bates, O. & Broadbent, M., 2013, UbiComp '13 Adjunct Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. New York: ACM, p. 815-820 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  489. Published

    Geographical Text Analysis Mapping and spatially analysing corpora

    Gregory, I., Baron, A., Murrieta-Flores, P., Hardie, A. & Rayson, P., 2013, Corpus Linguistics 2013 Abstracts. Hardie, A. & Love, R. (eds.). UCREL, p. 105-108 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  490. Published

    Integrating corpus linguistics and spatial technologies for the analysis of literature

    Murrieta-Flores, P., Gregory, I., Cooper, D., Donaldson, C., Baron, A., Hardie, A. & Rayson, P., 2013, Corpus Linguistics 2013 Abstracts. Hardie, A. & Love, R. (eds.). UCREL, p. 222-225 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  491. Published

    Geographical text analysis: GIS approaches to analysing large volumes of texts

    Gregory, I., Baron, A., Murrieta-Flores, P., Hardie, A., Rayson, P. & Rupp, C. J., 2013, Proceedings of GISRUK 2013.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  492. Published

    Improving the discovery of IXP peering links through passive BGP measurements

    Giotsas, V. & Zhou, S., 2013, 2013 Proceedings IEEE INFOCOM . IEEE, p. 3249-3254 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  493. Published

    AS relationships, customer cones, and validation

    Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V. & Claffy, K., 2013, IMC '13 Proceedings of the 2013 conference on Internet measurement conference. New York: ACM, p. 243-256 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  494. Published

    Inferring multilateral peering

    Giotsas, V., Zhou, S., Luckie, M. & Claffy, K., 2013, CoNEXT '13 Proceedings of the ninth ACM conference on Emerging networking experiments and technologies. New York: ACM, p. 247-258 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  495. Published

    Toolkit support for interactive projected displays

    Hardy, J. & Alexander, J., 4/12/2012, MUM '12 Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia. New York: ACM

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  496. Published

    Towards the improvement of diagnostic metrics Fault diagnosis for DSL-Based IPTV networks using the Rényi entropy

    Marnerides, A., Malinowski, S., Morla, R., Rodrigues, M. R. D. & Kim, H. S., 3/12/2012, 2012 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 2779-2784 6 p. (2012 IEEE Global Communications Conference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  497. Published

    Understanding Your Needs: An Adaptive VoD System

    Mu, M., Knowles, W. & Race, N., 12/2012, Multimedia (ISM), 2012 IEEE International Symposium on. IEEE, p. 255-260 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  498. Published

    Benchmarking cloud security level agreements using quantitative policy trees

    Luna, J., Langenberg, R. & Suri, N., 19/10/2012, Proceedings of the 2012 ACM Workshop on Cloud computing security workshop. ACM, p. 103-112 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  499. Published

    Privacy-by-design based on quantitative threat modeling

    Luna, J., Suri, N. & Krontiris, I., 10/10/2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  500. Published

    Balanced spatio-temporal compressive sensing for multi-hop wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 8/10/2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012). IEEE, p. 389-397 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  501. Published

    Susceptibility analysis of structured P2P systems to localized eclipse attacks

    Germanus, D., Langenberg, R., Khelil, A. & Suri, N., 8/10/2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems. IEEE, p. 11-20 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  502. Published

    ARTOT: Autonomous Real-Time Object detection and Tracking by a moving camera

    Angelov, P., Gude, C., Sadeghi-Tehran, P. & Ivanov, T., 09/2012, Intelligent Systems (IS), 2012 6th IEEE International Conference. IEEE, p. 446-452 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  503. Published

    Pedestrian Direction of Movement Determination using Smartphone

    Ayub, S., Momahed Heravi, B., Bahraminasab, A. & Honary, B., 09/2012, Next Generation Mobile Applications, Services and Technologies (NGMAST), 2012 6th International Conference on. Paris, France : IEEE, p. 64-69

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 Next

Back to top