Home > Research > Browse

Results for Security

Activities

  1. Interviewed by i (newspaper) on vulnerability of the global supply chains

    Germond, B. (Consultant)

    18/09/2024

    Activity: Expert Knowledge and Consultancy typesExpert Opinion

  2. Creating Sustainable Internet of Things Futures Workshop @ ACM Designing Interactive Systems 2024

    Stead, M. (Organiser)

    2/07/2024

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

  3. Computers, Privacy & Data Protection (CPDP), 7th International Conference: Reforming Data Protection: The Global Perspective

    Gunnarsdottir, K. (Invited speaker)

    21/01/201423/01/2014

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience

  4. 4S Annual Meeting 2013

    Gunnarsdottir, K. (Speaker)

    9/10/201312/10/2013

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience

  5. Routledge (Publisher)

    Prince, D. (Editor)

    2013

    Activity: Publication peer-review and editorial work typesEditorial activity

  6. Mobilizing Emergency/Disaster Response Workshop

    Buscher, M. (Host)

    10/09/2012

    Activity: Other activity typesTypes of Business and Community - Hosting of external, non-academic visitor

  7. ITEC 2012

    Prince, D. (Invited speaker)

    23/05/2012

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience

  8. Challenges of ICT for Public Policy

    Gunnarsdottir, K. (Member of programme committee)

    23/03/2011

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

  9. Human Security in the context of Ambient Intelligence: In search of a shared Ethical, Social and Legal Approach

    Gunnarsdottir, K. (Speaker)

    26/11/201027/11/2010

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

Publications & Outputs

  1. Creating Sustainable Internet of Things Futures: Aligning Legal and Design Research Agendas

    Urquhart, L., Lechelt, S., Terras, M., Sailaja, N., Rezk, A. M., Castle-Green, T., Paris Darzentas, D., Primlani, N., Owen, V. & Stead, M., 1/07/2024, DIS '24 Companion: Companion Publication of the 2024 ACM Designing Interactive Systems Conference. New York: ACM, p. 372-376 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 30/06/2024, In: IEEE Transactions on Network and Service Management. 21, 3, p. 3623-3635 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. PoMC: An Efficient Blockchain Consensus Mechanism for Agricultural Internet of Things. An Efficient Blockchain Consensus Mechanism for the Agricultural Internet of Things

    Xiong, S., Wang, Z., Ni, Q. & Han, X., 1/05/2024, In: IEEE Internet of Things Journal. 11, 9, p. 15193-15204 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. SMART: A Secure Remote Sensing Solution for Smart Cities’ Urban Areas

    Rathee, G., Kerrache, C. A., Calafate, C. T., Bilal, M. & Song, H., 1/04/2024, In: IEEE Sensors Journal. 24, 7, p. 11553-11561

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Blockchain-assisted Server Placement with Elitist Preserved Genetic Algorithm in Edge Computing

    Li, Z., Li, G., Bilal, M., Liu, D., Huang, T. & Xu, X., 15/12/2023, In: IEEE Internet of Things Journal. 10, 24, p. 21401 - 21409

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Security Responses in Software Development

    Lopez, T., Sharp, H., Tun, T., Bandara, A., Levine, M. & Nuseibeh, B., 31/07/2023, In: ACM Transactions on Software Engineering and Methodology. 32, 3, p. 1-29 29 p., 64.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Triggering Empathy out of Malicious Intent: The Role of Empathy in Social Engineering Attacks

    Distler, V., Abdrabou, Y., Dietz, F. & Alt, F., 18/05/2023, Proceedings of the 2nd Empathy-Centric Design Workshop, EmpathiCH 2023 - Collocated with ACM CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery (ACM), p. 1-6 6 p. 2. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Generalizing universal adversarial perturbations for deep neural networks

    Zhang, Y., Ruan, W., Wang, F. & Huang, X., 22/03/2023, (E-pub ahead of print) In: Machine Learning.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Blockchain Based Security and Trust Mechanisms for Vehicular Ad hoc Networks

    Alharthi, A., 22/02/2023, Lancaster University. 119 p.

    Research output: ThesisDoctoral Thesis

  10. Do You Speak Cyber? Talking Security with Developers of Health Systems and Devices

    Weir, C., Dyson, A. & Prince, D., 31/01/2023, In: IEEE Security and Privacy Magazine. 21, 1, p. 27-36 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Iraq: A Self-Fulfilling Prophecy: The Saudi Struggle for Iraq, by Katherine Harvey (book review)

    Bordón, J., 31/08/2022, In: The Middle East Journal . 76, 2, p. 277-278 2 p.

    Research output: Contribution to Journal/MagazineBook/Film/Article reviewpeer-review

More results »