Home > Research > Browse

Results for Security

Publications & Outputs

  1. These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 30/06/2024, In: IEEE Transactions on Network and Service Management. 21, 3, p. 3623-3635 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. PoMC: An Efficient Blockchain Consensus Mechanism for Agricultural Internet of Things. An Efficient Blockchain Consensus Mechanism for the Agricultural Internet of Things

    Xiong, S., Wang, Z., Ni, Q. & Han, X., 1/05/2024, In: IEEE Internet of Things Journal. 11, 9, p. 15193-15204 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. SMART: A Secure Remote Sensing Solution for Smart Cities’ Urban Areas

    Rathee, G., Kerrache, C. A., Calafate, C. T., Bilal, M. & Song, H., 1/04/2024, In: IEEE Sensors Journal. 24, 7, p. 11553-11561

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Blockchain-assisted Server Placement with Elitist Preserved Genetic Algorithm in Edge Computing

    Li, Z., Li, G., Bilal, M., Liu, D., Huang, T. & Xu, X., 15/12/2023, In: IEEE Internet of Things Journal. 10, 24, p. 21401 - 21409

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Security Responses in Software Development

    Lopez, T., Sharp, H., Tun, T., Bandara, A., Levine, M. & Nuseibeh, B., 31/07/2023, In: ACM Transactions on Software Engineering and Methodology. 32, 3, p. 1-29 29 p., 64.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Triggering Empathy out of Malicious Intent: The Role of Empathy in Social Engineering Attacks

    Distler, V., Abdrabou, Y., Dietz, F. & Alt, F., 18/05/2023, Proceedings of the 2nd Empathy-Centric Design Workshop, EmpathiCH 2023 - Collocated with ACM CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery (ACM), p. 1-6 6 p. 2. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Blockchain Based Security and Trust Mechanisms for Vehicular Ad hoc Networks

    Alharthi, A., 22/02/2023, Lancaster University. 119 p.

    Research output: ThesisDoctoral Thesis

  8. Do You Speak Cyber? Talking Security with Developers of Health Systems and Devices

    Weir, C., Dyson, A. & Prince, D., 31/01/2023, In: IEEE Security and Privacy Magazine. 21, 1, p. 27-36 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Iraq: A Self-Fulfilling Prophecy: The Saudi Struggle for Iraq, by Katherine Harvey (book review)

    Bordón, J., 31/08/2022, In: The Middle East Journal . 76, 2, p. 277-278 2 p.

    Research output: Contribution to Journal/MagazineBook/Film/Article reviewpeer-review

  10. LAKE-BSG: Lightweight authenticated key exchange scheme for blockchain-enabled smart grids

    Badshah, A., Waqas, M., Abbas, G., Muhammad, F., Abbas, Z. H., Vimal, S. & Bilal, M., 31/08/2022, In: Sustainable Energy Technologies and Assessments. 52, 102248.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

More results »

Activities

  1. Creating Sustainable Internet of Things Futures Workshop @ ACM Designing Interactive Systems 2024

    Stead, M. (Organiser)

    2/07/2024

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

  2. Computers, Privacy & Data Protection (CPDP), 7th International Conference: Reforming Data Protection: The Global Perspective

    Gunnarsdottir, K. (Invited speaker)

    21/01/201423/01/2014

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience

  3. 4S Annual Meeting 2013

    Gunnarsdottir, K. (Speaker)

    9/10/201312/10/2013

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience

  4. Routledge (Publisher)

    Prince, D. (Editor)

    2013

    Activity: Publication peer-review and editorial work typesEditorial activity

  5. Mobilizing Emergency/Disaster Response Workshop

    Buscher, M. (Host)

    10/09/2012

    Activity: Other activity typesTypes of Business and Community - Hosting of external, non-academic visitor

  6. ITEC 2012

    Prince, D. (Invited speaker)

    23/05/2012

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience

  7. Challenges of ICT for Public Policy

    Gunnarsdottir, K. (Member of programme committee)

    23/03/2011

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

  8. Human Security in the context of Ambient Intelligence: In search of a shared Ethical, Social and Legal Approach

    Gunnarsdottir, K. (Speaker)

    26/11/201027/11/2010

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course