Home > Research > Browse

Results for Security

Publications & Outputs

  1. Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots

    Maesschalck, S., Giotsas, V. & Race, N., 7/12/2021.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  3. Designing in Complex Security Contexts: Enabling Frame Awareness through Sharks, Dollar Signs, and Police Badges

    Zweibelson, B., Wetzel, J. & Landis, T., 31/10/2021, In: She Ji. 7, 3, p. 435-461 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Signing Information in the Quantum Era

    Longmate, K., Ball, E., Dable-Heath, E. & Young, R., 1/12/2020, In: AVS Quantum Science. 2, 4, 27 p., 044101.

    Research output: Contribution to Journal/MagazineReview articlepeer-review

  5. Spectrum on Demand: A Competitive Open Market Model for Spectrum Sharing for UAV-Assisted Communications

    Ansari, R. I., Ashraf, N., Hassan, S. A., C., D. G., Pervaiz, H. & Politis, C., 30/11/2020, In: IEEE Network. 34, 6, p. 318-324 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Cross-VM Network Channel Attacks and Countermeasures within Cloud Computing Environments

    Saeed, A., Garraghan, P. & Asad Hussain, S., 10/11/2020, (E-pub ahead of print) In: IEEE Transactions on Dependable and Secure Computing. 19, 3, p. 1783-1794 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 1/01/2020, In: IEEE Transactions on Communications. 68, 1, p. 569-581 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Taking the Middle Path: Learning About Security Through Online Social Interaction

    Lopez, T., Thein Than Tun, Bandara, A., Levine, M., Nuseibeh, B. & Sharp, H., 1/01/2020, In: IEEE Software. 37, 1, p. 25-30 6 p., 8854988.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Scalable and responsive SDN monitoring and remediation for the Cloud-to-Fog continuum

    Fawcett, L., 26/09/2019, Lancaster University. 220 p.

    Research output: ThesisDoctoral Thesis

  10. Race relations, Nationalism and the Humanitarian Rohingya Crisis in Contemporary Myanmar

    Mukherjee, K., 1/07/2019, In: Asian Journal of Political Science. 27, 2, p. 235-251 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

    Demir, K., Nayyer, F. & Suri, N., 1/06/2019, In: International Journal of Critical Infrastructure Protection. 25, p. 84-101 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

More results »

Activities

  1. Computers, Privacy & Data Protection (CPDP), 7th International Conference: Reforming Data Protection: The Global Perspective

    Kristrun Gunnarsdottir (Invited speaker)

    21/01/201423/01/2014

    Activity: Participating in or organising an event typesParticipation in conference

  2. 4S Annual Meeting 2013

    Kristrun Gunnarsdottir (Speaker)

    9/10/201312/10/2013

    Activity: Participating in or organising an event typesParticipation in conference

  3. Routledge (Publisher)

    Daniel Prince (Editor)

    2013

    Activity: Publication peer-review and editorial work typesEditorial activity

  4. Mobilizing Emergency/Disaster Response Workshop

    Monika Buscher (Host)

    10/09/2012

    Activity: Other activity typesTypes of Business and Community - Hosting of external, non-academic visitor

  5. ITEC 2012

    Daniel Prince (Invited speaker)

    23/05/2012

    Activity: Participating in or organising an event typesParticipation in conference

  6. Challenges of ICT for Public Policy

    Kristrun Gunnarsdottir (Member of programme committee)

    23/03/2011

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

  7. Human Security in the context of Ambient Intelligence: In search of a shared Ethical, Social and Legal Approach

    Kristrun Gunnarsdottir (Speaker)

    26/11/201027/11/2010

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course