Home > Research > Computing and Communications > Publications & Outputs
View graph of relations

Computing and Communications

  1. Published

    Scalable Database Indexing and Fast Image Retrieval Based on Deep Learning and Hierarchically Nested Structure Applied to Remote Sensing and Plant Biology

    Sadeghi-Tehran, P., Angelov, P. P., Virlet, N. & Hawkesford, M., 1/03/2019, In: Journal of Imaging. 5, 3, p. 1-21 21 p., 33.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Scalable dynamic business process discovery with the constructs competition miner

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), Milan, Italy, November 19-21, 2014.. Accorsi, R., Ceravolo, P. & Russo, B. (eds.). p. 91-107 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection

    Jiang, Z., Li, J., Hu, Q., Meng, W., Pedrycz, W. & Su, Z., 15/08/2024, In: IEEE Internet of Things Journal. 11, 16, p. 26955-26969 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Scalable Precomputed Search Trees

    Lau, M. & Kuffner, J., 2010, Motion in Games Third International Conference, MIG 2010, Utrecht, The Netherlands, November 14-16, 2010. Proceedings. Boulic, R., Chrysanthou , Y. & Komura, T. (eds.). Dordrecht: Springer Verlag, p. 70-81 (LECTURE NOTES IN COMPUTER SCIENCE; vol. 6459).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Scale Up Event Extraction Learning via Automatic Training Data Generation

    Zeng, Y., Feng, Y., Ma, R., Wang, Z., Yan, R., Shi, C. & Zhao, D., 1/01/2018, The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18). Palo Alto: AAAI, p. 6045-6052 8 p. (AAAI ; vol. 32).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Scale-free topology for pervasive networks

    Saffre, F., Jovanovic, H., Hoile, C. & Nicolas, S., 07/2004, In: BT Technology Journal. 22, 3, p. 200-208 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Forthcoming

    Scale-Invariant Reinforcement Learning in Real-Time Strategy Games

    Harry Diniz Lemos, M. L., Vieira, R. E. S., Rocha Tavares, A., Soriano Marcolino, L. & Chaimowicz, L., 25/08/2023, (Accepted/In press) Proceedings of SBGames 2023.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Scaling out for extreme scale corpus data

    Coole, M., Rayson, P. E. & Mariani, J. A., 2015, Big Data (Big Data), 2015 IEEE International Conference on. IEEE, p. 1643-1649 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Scamming the scammers: towards automatic detection of persuasion in advance fee frauds

    Edwards, M. J., Peersman, C. & Rashid, A., 3/04/2017, Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017) co-located with International Conference on World Wide Web (WWW). New York: ACM, p. 1291-1299 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Scan-less line field optical coherence tomography, with automatic image segmentation, as a measurement tool for automotive coatings

    Lawman, S., Williams, B. M., Zhang, J., Shen, Y. C. & Zheng, Y., 1/04/2017, In: Applied Sciences. 7, 4, 13 p., 351.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Scarecrows, robots and time machines

    Coulton, P., Race, N. & Burnett, D., 4/11/2013. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  12. Published

    SCArVeS: Services, Clouds, and Alternative Design Strategies for Variant-Rich Software Systems: Workshop at SPLC 2012

    Villela, K., Cohen, S., Baresi, L., Lee, J. & Schmid, K., 2012. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Other

  13. Published

    Scatterbox: context-aware message management

    Knox, S., Shannon, R., Coyle, L., Clear, A., Dobson, S., Quigley, A. & Nixon, P., 09/2008, In: Revue d'Intelligence Artificielle. 22, 5, p. 549-568 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Scenario Modeling with Aspects.

    Whittle, J. & Araujo, J., 08/2004, In: IEE Proceedings - Software. 151, 4, p. 157-171 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Scenarios and use cases in Tweether: W-band for Internet Everywhere

    Paoloni, C., Letizia, R., Ni, Q., Krozer, V., Andre, F., Magne, F., Marilier, M., Zimmerman, R., Ramirez, A., Vilar, R. & Burciu, I., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  16. Published

    Scenarios for an autonomic micro smart grid

    Frey, S., Huguet, F., Mivielle, C., Menga, D. & Diaconescu, A., 2012, Proceedings of the 1st International Conference on Smart Grids and Green IT Systems (SmartGreens 2012). 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Scénarios pour un Micro Smart Grid Autonomique

    Frey, S., 2011.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    Scheduling and admission testing for jitter-constrained periodic threads

    Mauthe, A. & Coulson, G., 09/1997, In: Multimedia Systems. 5, 5, p. 337-346 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Scheduling Content in Pervasive Display Systems

    Clinch, S., Mikusz, M., Elhart, I., Davies, N. & Langheinrich, M., 1/12/2019, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 3, 4, 37 p., 129.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Schelling Meshes

    Power, L. & Lau, M. C. M., 16/09/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  21. Published

    Science : experimental sensibilities in practice.

    Roberts, C. & Mackenzie, A., 05/2006, In: Theory, Culture and Society. 23, 2-3, p. 157-162 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Scientists and software - surveying the species distribution modelling community

    Ahmed, S. E., Mcinerny, G., O'Hara, K., Harper, R., Salido, L., Emmott, S. & Joppa, L. N., 03/2015, In: Diversity and Distributions. 21, 3, p. 258-267 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Scoping the Design Space for Data Supported Decision-Making Tools in Respiratory Care: Needs, Barriers and Future Aspirations

    Tendedez, H., McNaney, R., Ferrario, M. A. F. C. & Whittle, J. N. D., 21/05/2018, PervasiveHealth '18 Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare. New York: ACM, p. 217-226 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Unpublished

    ScrapComp challenge part deux

    Sheridan, J., Kember, S. & Phillips, P., 11/2004, (Unpublished)

    Research output: Other contribution

  25. Published

    Scrapheap software development: lessons from an experiment on opportunistic reuse

    Kotonya, G., Lock, S. & Mariani, J., 03/2011, In: IEEE Software. 28, 2, p. 68-74 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Screening COVID-19 Based on CT/CXR Images & Building a Publicly Available CT-scan Dataset of COVID-19

    Dialameh, M., Hamzeh, A., Rahmani, H., Radmard, A. R. & Dialameh, S., 28/12/2020, In: arxiv.org.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas

    Serafini, M., Bokor, P., Dobre, D., Majuntke, M. & Suri, N., 28/06/2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN). IEEE, p. 353-362 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    SDM-assist software to design site-directed mutagenesis primers introducing "silent" restriction sites

    Karnik, A., Karnik, R. & Grefen, C., 03/2013, In: BMC Bioinformatics. 14, 9 p., 105.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    SDN Heading North: Towards a Declarative Intent-based Northbound Interface

    Alalmaei, S., Elkhatib, Y., Bezahaf, M., Broadbent, M. & Race, N., 30/11/2020, 2020 16th International Conference on Network and Service Management (CNSM). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    SDN-based control and operation of the IP Ran in 4G and LTE environments

    Chen, H., Zhao, Q. & King, D., 20/11/2013, MPLS SDN 2013: ISOCORE.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications

    Granby, B., Askwith, R. & Marnerides, A., 10/11/2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP). IEEE, p. 463-466 4 p. (2015 IEEE 23rd International Conference on Network Protocols (ICNP)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    SDQ: Enabling rapid QoE experimentation using Software Defined Networking

    Fawcett, L., Mu, M., Broadbent, M. H., Hart, N. P. & Race, N. J. P., 24/07/2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon, Portugal: IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    SE in ES: Opportunities for Software Engineering and Cloud Computing in Environmental Science

    Simm, W. A., Samreen, F., Bassett, R., Ferrario, M. A. F. C., Blair, G. S., Young, P. J. & Whittle, J. N. D., 3/06/2018, ICSE-SEIS '18 Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Society. New York: ACM, p. 61-70 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Search Light Interactions with Personal Projector

    Molineux, A., Greaves, A. & Rukzio, E., 2009. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  35. Published

    Search+: A resource efficient Peer-to-Peer service discovery mechanism

    Skjegstad, M., Roedig, U. & Johnsen, F. T., 10/2009, IEEE Military Communications Conference, 2009. MILCOM 2009. . IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Unpublished

    Searching in public versus re-finding in private: are they the same

    Kamaruddin, A. & Dix, A., 10/2005, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  37. Unpublished

    Seasonal Adjustment - Interactive Installation

    Kember, S., Lock, S., Phillips, P., Sheridan, J. & Lindsay, A., 01/2003, (Unpublished)

    Research output: Other contribution

  38. Published

    SECCRIT: Secure Cloud Computing for High Assurance Services

    Bless, R., Hutchison, D., Schöller, M., Smith, P. & Tauber, M. G., 13/10/2013, In: ERCIM News. 2013, 95, 95.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  40. Published

    Second International Workshop on Location and the Web (LocWeb 2009)

    Wilde, E., Boll, S., Cheverst, K., Fröhlich, P., Purves, R. & Schöning, J., 2009, LOCWEB '09: Proceedings of the 2nd International Workshop on Location and the Web. New York: ACM, p. 1-2 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Second International Workshop on Models@run.time

    Bencomo, N., France, R. & Blair, G. S., 2008, Models in Software Engineering Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papers. Giese, H. (ed.). Berlin: Springer-Verlag, p. 206-211 6 p. (Lecture Notes in Computer Science; vol. 5002).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Second International Workshop on Physicality

    Ramduny-Ellis, D., Dix, A., Hare, J. & Gill, S., 09/2007, p. 217-218. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  43. Published

    Second International Workshop on Physicality (workshop abstract)

    Ramduny-Ellis, D., Dix, A. & Gill, S., 09/2007.

    Research output: Contribution to conference - Without ISBN/ISSN Other

  44. Published

    Secrecy outage analysis for massive MIMO-Enabled multi-tier 5G hybrid hetnets

    Umer, A., Hassan, S. A., Pervaiz, H., Ni, Q., Musavian, L. & Ahmed, S. H., 3/07/2018, 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018 - Proceedings).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Secrecy Outage Probability for RSMA-based ISATNs with Imperfect Hardware

    Guo, K., Li, X., Bilal, M., Nauman, A., Wu, M. & Zhou, F., 20/08/2024, ICC 2024 - IEEE International Conference on Communications. Valenti, M., Reed, D. & Torres, M. (eds.). IEEE, p. 5147-5152 6 p. (IEEE International Conference on Communications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer

    Chu, Z., Cumanan, K., Ding, Z., Johnston, M. & Le Goff, S. Y., 1/05/2015, In: IEEE Transactions on Vehicular Technology. 64, 5, p. 1833-1847 15 p., 6848758.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Secrecy Spectrum and Energy Efficiency Analysis in Massive MIMO-enabled Multi-Tier Hybrid HetNets

    Umer, A., Hassan, S. A., Pervaiz, H., Musavian, L., Ni, Q. & Imran, M. A., 1/03/2020, In: IEEE Transactions on Green Communications and Networking. 4, 1, p. 246-262 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Secrecy sum rate maximization in non-orthogonal multiple access

    Zhang, Y., Wang, H.-M., Yang, Q. & Ding, Z., 9/05/2016, In: IEEE Communications Letters. 20, 5, p. 930-933 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    Secrecy Wireless-Powered Sensor Networks for Internet of Things

    Li, J., Zhao, H., Chen, X., Chu, Z., Zhen, L., Jiang, J. & Pervaiz, H., 22/09/2020, In: Wireless Communications and Mobile Computing. 2020, 12 p., 8859264.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Secure and privacy-aware cloud-assisted video reporting service in 5G enabled vehicular networks

    Hashem Eiza, M., Ni, Q. & Shi, Q., 10/2016, In: IEEE Transactions on Vehicular Technology. 65, 10, p. 7868-7881 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Hashem-Eiza, M., Shi, Q., Marnerides, A. & Owens, T., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, 6 p. 7510934

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    Secure and Privacy-preserving Data Sharing in the Cloud based on Lossless Image Coding

    Khelifi, F., Brahimi, T., Han, J. & Li, X., 07/2018, In: Signal Processing. 148, p. 91-101 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Published

    Secure and robust multi-constrained QoS aware routing algorithm for VANETs

    Hashem Eiza, M., Owens, T. & Ni, Q., 01/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 1, p. 32-45 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    Secure Cloud Computing Algorithms for Discrete Constrained Potential Games

    Lu, Y. & Zhu, M., 11/09/2015, IFAC Workshop on Distributed Estimation and Control in Networked Systems. 22 ed. Elsevier, Vol. 48. p. 180-185 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In: Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    Secure communication in cooperative network with wireless information and power transfer

    Hu, S. & Ding, Z., 12/2015, In: Signal Processing. 9, 9, p. 663-669 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    Secure Communication Protocol for Mobile Multimedia Applications

    Komninos, N., Honary, B. & Darnell, M., 11/2000, 3rd International Symposium on Wireless Personal Multimedia Communications (WPMC 2000) . Bangkok, p. 1011–1014 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Secure crowd-sensing protocol for fog-based vehicular cloud

    Nkenyereye, L., Islam, S. M. R., Bilal, M., Abdullah-Al-Wadud, M., Alamri, A. & Nayyar, A., 07/2021, In: Future Generation Computer Systems. 120, p. 61-75 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Secure Distribution of Protected Content in Information-Centric Networking

    Bilal, M. & Pack, S., 06/2020, In: IEEE Systems Journal. 14, 2, p. 1921-1932 12 p., 8798748.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Secure facial recognition in the encrypted domain using a local ternary pattern approach

    Khan, F. A., Bouridane, A., Boussakta, S., Jiang, R. & Almaadeed, S., 30/06/2021, In: Journal of Information Security and Applications. 59

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  61. Published

    Secure File Transmission over Multi-User Networking Environments

    Samarakoon, M. I., Honary, B. & Sweeney, P., 1997, Proceedings of the Fourth International Symposium on Communications Theory and Applications. Lancaster: HW Communications Limited, p. 121-127 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Secure messaging and real time media streaming using enterprise PKI and ECC based certificates

    Ashraf, S., Shirazi, S. N., Nadeem, M. A. & Ikram, N., 2010, Computational Technologies in Electrical and Electronics Engineering (SIBIRCON), 2010 IEEE Region 8 International Conference on. IEEE, p. 159-161 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    Secure MISO-NOMA Transmission With Artificial Noise

    Lv, L., Ding, Z., Ni, Q. & Chen, J., 07/2018, In: IEEE Transactions on Vehicular Technology. 67, 7, p. 6700-6705 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Published

    Secure multicast communications with private jammers

    Cumanan, K., Ding, Z., Xu, M. & Poor, H. V., 3/07/2016, 2016 IEEE 17th International Workshop on Processing Advances in Wireless Communications (SPAWC). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    Secure perception-driven control of mobile robots using chaotic encryption

    Zhang, X., Yuan, Z., Xu, S., Lu, Y. & Zhu, M., 30/04/2024, In: IEEE Transactions on Automatic Control. 69, 4, p. 2429-2436 8 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    Secure Perception-Driven Control of Mobile Robots Using Chaotic Encryption

    Zhang, X., Yuan, Z., Xu, S., Lu, Y. & Zhu, M., 28/07/2021, 2021 American Control Conference (ACC). IEEE, p. 2575-2580 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    Secure Smart Grids or Say ‘Goodnight Vienna!'.

    Skopik, F., Smith, P. & Bleier, T., 16/01/2013, In: ERCIM News. 2013, 92, 92.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    Secure Source-Relay Link Based Threshold DF Relaying Scheme

    Yao, J., Ye, J., Wang, D., Lei, H. & Pan, G., 02/2018, In: AEÜ - International Journal of Electronics and Communications. 85, p. 144-149 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping

    Su, B., Yu, W., Liu, H., Chorti, A. & Poor, H. V., 31/05/2022, In: IEEE Wireless Communications Letters. 11, 5, p. 878-882 5 p.

    Research output: Contribution to Journal/MagazineLetterpeer-review

  70. Published

    SecureComm: A Secure Data Transfer Framework for Neural Network Inference on CPU-FPGA Heterogeneous Edge Devices

    Chen, T., Tan, Y.-A., Li, C., Zhang, Z., Meng, W. & Li, Y., 31/12/2024, In: IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 14, 4, p. 811-812 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    Securely Storing and Sharing Memory Cues in Memory Augmentation Systems: A Practical Approach

    Bexheti, A., Langheinrich, M., Elhart, I. & Davies, N. A. J., 11/03/2019, 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Securing Aspect Composition

    Camilleri, A., Blair, L. & Coulson, G., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing. New York: ACM, p. 278-279 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    Securing Communication in 6LoWPAN with Compressed IPsec

    Raza, S., Duquennoy, S., Chung, A., Yazar, D., Voigt, T. & Roedig, U., 1/06/2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Securing cyber-physical social interactions on wrist-worn devices

    Shen, Y., Du, B., Xu, W., Luo, C., Wei, B., Cui, L. & Wen, H., 31/05/2020, In: ACM Transactions on Sensor Networks (TOSN). 16, 2, p. 1-22 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. Published

    Securing GSM voice through scrambling

    Naeem, I. A., Rauf, U., Ahmad, S. F. & Shirazi, S. N., 2010, Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE, p. 156-158 3 p. 5555330

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Securing internet coordinate embedding systems

    Kaafar, M. A., Mathy, L., Barakat, C., Salamatian, K., Turletti, T. & Dabbous, W., 2007, In: Computer Communication Review. 37, 4, p. 61-72 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Securing Internet Coordinate Systems

    Kaafar, D., Mathy, L., Salamatian, K., Barakat, C., Turletti, T. & Dabbous, W., 2007, Sustainable Internet Third Asian Internet Engineering Conference, AINTEC 2007, Phuket, Thailand, November 27-29, 2007. Proceedings. Fdida, S. & Sugiura, K. (eds.). Berlin: Springer Verlag, p. 167-168 2 p. (Lecture Notes in Computer Science; vol. 4866).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Securing Machine Learning (ML) in the Cloud: A Systematic Review of Cloud ML Security

    Qayyum, A., Aneeqa, I., Usama, M., Iqbal, W., Qadir, J., Elkhatib, Y. & Al-Fuqaha, A., 12/11/2020, In: Frontiers in Big Data. 3, 43 p., 587139.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Published

    Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In: International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In: Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    Security analyses of click-based graphical passwords via image point memorability

    Zhu, B. B., Yan, J., Yang, M. & Wei, D., 3/11/2014, CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1217-1231 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Security and Information Representation for Niedereiter and Public Key Cryptography

    Sweeney, P. & Honary, B., 1997, Fourth International Symposium on Communications Theory and Applications. Ambleside, UK, p. 173 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    Security and middleware

    Andersen, A., Blair, G., Myrvang, P. H. & Stabell-Kulo, T., 2003, Object-Oriented Real-Time Dependable Systems, 2003.(WORDS 2003). Proceedings of the Eighth International Workshop on. IEEE, p. 186-190 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Security and privacy implications of pervasive memory augmentation

    Davies, N., Friday, A., Clinch, S., Sas, C., Langheinrich, M., Ward, G. & Schmidt, A., 4/02/2015, In: IEEE Pervasive Computing. 14, 1, p. 44-53 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published
  86. Unpublished

    Security and usability of cross-device captchas

    Algwil, A., 2018, (Unpublished) Lancaster University. 306 p.

    Research output: ThesisDoctoral Thesis

  87. Published

    Security as a service using an SLA-based approach via SPECS

    Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V. & Villano, U., 2/12/2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    Security assurance assessment methodology for hybrid clouds

    Hudic, A., Smith, P. & Weippl, E. R., 30/09/2017, In: Computers and Security. 70, p. 723-743 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    Security awareness of end-users of mobile health applications: An empirical study

    Aljedaani, B., Ahmad, A., Zahedi, M. & Ali Babar, M., 7/12/2020, Proceedings of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2020. The Association for Computing Machinery, p. 125-136 12 p. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction

    Mayrhofer, R., Gellersen, H. & Hazas, M., 09/2007, Proc. Ubicomp 2007: 9th International Conference on Ubiquitous Computing. Springer-Verlag, p. 199-216 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    Security design in human computation games

    Yu, S. Y. & Yan, J., 2014, Security Protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 142-153 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Security design in human computation games (transcript of discussion)

    Yan, J., 2014, Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 154-160 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    Security engineering with patterns

    Schumacher, M. & Roedig, U., 1/09/2001, Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    Security enhancements for A5/1 without loosing hardware efficiency in future mobile systems

    Komninos, N., Honary, B. & Darnell, M., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 324-328 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Security Evaluation in Software-Defined Networks

    Ivkic, I., Thiede, D., Race, N., Broadbent, M. & Gouglidis, A., 15/08/2024, Cloud Computing and Services Science: 12th International Conference, CLOSER 2022, Virtual Event, April 27–29, 2022, and 13th International Conference, CLOSER 2023, Prague, Czech Republic, April 26–28, 2023, Revised Selected Papers. van Steen, M., Ferguson, D. & Pahl, C. (eds.). Cham: Springer, p. 66-91 26 p. (Communications in Computer and Information Science; vol. 1845, no. 1).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Security implications of password discretization for click-based graphical passwords

    Zhu, B. B., Wei, D., Yang, M. & Yan, J., 05/2013, WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. New York: ACM, p. 1581-1591 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Security in defect detection: A new one-pixel attack for fooling DNNs

    Wang, P., Li, Q., Li, D., Meng, S., Bilal, M. & Mukherjee, A., 30/09/2023, In: Journal of King Saud University - Computer and Information Sciences. 35, 8, 101689.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    Security issues in cloud federations

    Rak, M., Ghani, H., Ficco, M., Suri, N., Luna, J., Panica, S. & Petcu, D., 2012, Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. IGI Global, p. 176-194 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  99. Published

    Security issues in online games

    Yan, J. & Choi, H.-J., 2002, In: Electronic Library. 20, 2, p. 125-133 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Security of the GPT cryptosystem and its applications to cryptography

    Rashwan, H., Gabidulin, E. M. & Honary, B., 08/2011, In: Security and Communication Networks. 4, 8, p. 937-946 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top