Home > Research > Browse

Results for cybersecurity

Publications & Outputs

  1. Decoding Risk in the Digital Age: What You Need to Know

    Weir, C., 30/09/2024

    Research output: Exhibits, objects and web-based outputsBlog

  2. Content Censorship in the InterPlanetary File System

    Sridhar, S., Ascigil, O., Keizer, N., Genon, F., Pierre, S., Psaras, Y., Rivière, E. & Król, M., 1/03/2024, Proceedings of the The Network and Distributed System Security (NDSS) Symposium. The Network and Distributed System Security (NDSS) Symposium, 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review

    Dutkowska-Zuk, A., Bourne, J., An, C., Gao, X., Cetinkaya, O., Novitzky, P., Ogunniye, G., Cooper, R., De Roure, D., McCann, J., Watson, J., Watson, T., Jones, E., Vasconcelos, J. D. (Editor), Barbosa, H. (Editor) & Cordeiro, C. (Editor), 31/01/2024, In: Information. 15, 2, 80.

    Research output: Contribution to Journal/MagazineReview articlepeer-review

  4. A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software

    Weir, C., Dyson, A. & Prince, D., 25/09/2023, (E-pub ahead of print) Proceedings of the 2023 IEEE Secure Development Conference (SecDev). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Incorporating Software Security: Using Developer Workshops to Engage Product Managers

    Weir, C., Becker, I. & Blair, L., 31/03/2023, In: Empirical Software Engineering. 28, 2, 33 p., 21.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Hipster Impact Case Study: Spark

    Dyson, A. & Weir, C. (Other), 8/03/2023

    Research output: Exhibits, objects and web-based outputsBlog

  7. Cyber Risk Management is an Innovation Process

    Prince, D. & Weir, C., 2/02/2023

    Research output: Exhibits, objects and web-based outputsBlog

  8. Exploring the Shift in Security Responsibility

    Weir, C., Migues, S. & Williams, L., 30/11/2022, In: IEEE Security and Privacy Magazine. 20, 6, p. 8-17 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Talking Cybersecurity with Health IoT Developers

    Weir, C., Dyson, A. & Prince, D., 29/09/2022.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  10. Cybersecurity, Race, and the Politics of Truth

    Whyte, J., 1/08/2022, In: Security Dialogue. 53, 4, p. 342-362 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. A Visual Exploration of Cybersecurity Concepts

    Sturdee, M., Thornton, L., Wimasaliri, B. & Patil, S., 22/06/2021, C&C '21: Creativity and Cognition. New York: ACM, 10 p. 46

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

More results »

Activities

  1. 2013 IEEE International Conference on Cybernetics, CYBCO-2013

    Angelov, P. (Chair)

    2013

    Activity: Participating in or organising an event typesParticipation in conference -Mixed Audience