Home > Research > Browse

Results for Security

Publications & Outputs

  1. Blockchain-assisted Server Placement with Elitist Preserved Genetic Algorithm in Edge Computing

    Li, Z., Li, G., Bilal, M., Liu, D., Huang, T. & Xu, X., 15/12/2023, In: IEEE Internet of Things Journal. 10, 24, p. 21401 - 21409

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Security Responses in Software Development

    Lopez, T., Sharp, H., Tun, T., Bandara, A., Levine, M. & Nuseibeh, B., 31/07/2023, In: ACM Transactions on Software Engineering and Methodology. 32, 3, p. 1-29 29 p., 64.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Triggering Empathy out of Malicious Intent: The Role of Empathy in Social Engineering Attacks

    Distler, V., Abdrabou, Y., Dietz, F. & Alt, F., 18/05/2023, Proceedings of the 2nd Empathy-Centric Design Workshop, EmpathiCH 2023 - Collocated with ACM CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery (ACM), p. 1-6 6 p. 2. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Blockchain Based Security and Trust Mechanisms for Vehicular Ad hoc Networks

    Alharthi, A., 22/02/2023, Lancaster University. 119 p.

    Research output: ThesisDoctoral Thesis

  5. Do You Speak Cyber? Talking Security with Developers of Health Systems and Devices

    Weir, C., Dyson, A. & Prince, D., 31/01/2023, In: IEEE Security and Privacy Magazine. 21, 1, p. 27-36 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Iraq: A Self-Fulfilling Prophecy: The Saudi Struggle for Iraq, by Katherine Harvey (book review)

    Bordón, J., 31/08/2022, In: The Middle East Journal . 76, 2, p. 277-278 2 p.

    Research output: Contribution to Journal/MagazineBook/Film/Article reviewpeer-review

  7. LAKE-BSG: Lightweight authenticated key exchange scheme for blockchain-enabled smart grids

    Badshah, A., Waqas, M., Abbas, G., Muhammad, F., Abbas, Z. H., Vimal, S. & Bilal, M., 31/08/2022, In: Sustainable Energy Technologies and Assessments. 52, 102248.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Stealthy Verification Mechanism to Defend SDN Against Topology Poisoning

    Zamin Khan, B., Ghani, A., Khan, I., Ali Khan, M. & Bilal, M., 15/01/2022, Internet of Things. Springer Science and Business Media Deutschland GmbH, p. 235-246 12 p. (Internet of Things).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots

    Maesschalck, S., Giotsas, V. & Race, N., 7/12/2021.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  11. Smart home security: challenges, issues and solutions at different IoT layers

    Touqeer, H., Zaman, S., Amin, R., Hussain, M., Al-Turjman, F. & Bilal, M., 12/2021, In: Journal of Supercomputing. 77, 12, p. 14053-14089 37 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

More results »

Activities

  1. Computers, Privacy & Data Protection (CPDP), 7th International Conference: Reforming Data Protection: The Global Perspective

    Kristrun Gunnarsdottir (Invited speaker)

    21/01/201423/01/2014

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience

  2. 4S Annual Meeting 2013

    Kristrun Gunnarsdottir (Speaker)

    9/10/201312/10/2013

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience

  3. Routledge (Publisher)

    Daniel Prince (Editor)

    2013

    Activity: Publication peer-review and editorial work typesEditorial activity

  4. Mobilizing Emergency/Disaster Response Workshop

    Monika Buscher (Host)

    10/09/2012

    Activity: Other activity typesTypes of Business and Community - Hosting of external, non-academic visitor

  5. ITEC 2012

    Daniel Prince (Invited speaker)

    23/05/2012

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience

  6. Challenges of ICT for Public Policy

    Kristrun Gunnarsdottir (Member of programme committee)

    23/03/2011

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

  7. Human Security in the context of Ambient Intelligence: In search of a shared Ethical, Social and Legal Approach

    Kristrun Gunnarsdottir (Speaker)

    26/11/201027/11/2010

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course