Home > Research > Computing and Communications > Publications & Outputs
View graph of relations

Computing and Communications

  1. Published

    Self-Generated Intent-Based System

    Bezahaf, M., Perez Hernandez, M., Bardwell, L., Davies, E., Broadbent, M., King, D. & Hutchison, D., 27/02/2020, 2019 10th International Conference on Networks of the Future (NoF). IEEE, p. 138-140 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Self-explanation in adaptive systems based on runtime goal-based models

    Welsh, K., Bencomo, N., Sawyer, P. & Whittle, J., 2014, Transactions on Computational Collective Intelligence XVI. Kowalczyk, R. & Nguyen, N. T. (eds.). Berlin: Springer, p. 122-145 24 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Self-explanation in adaptive systems

    Bencomo, N., Welsh, K., Sawyer, P. & Whittle, J., 2012, ICECCS '12 Proceedings of the 2012 IEEE 17th International Conference on Engineering of Complex Computer Systems. IEEE, p. 157-166 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Self-evolving parameter-free Rule-based Controller: SPARC

    Sadeghi-Tehran, P., Cara, A., Angelov, P., Pomares, H., Rojas, I. & Prieto, A., 2012, Fuzzy Systems (FUZZ-IEEE), 2012 IEEE International Conference on. IEEE, p. 754-761 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Self-Evolving Data Cloud-Based PID-Like Controller for Nonlinear Uncertain Systems

    Yang, Z.-X., Rong, H.-J., Wong, P. K., Angelov, P. & Wang, H., 1/05/2021, In: IEEE Transactions on Industrial Electronics. 68, 5, p. 4508-4518 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Self-disclosure decision making based on intimacy and privacy

    Such, J. M., Espinosa, A., Garcia-Fornes, A. & Sierra, C., 30/11/2012, In: Information Sciences. 211, p. 93-111 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Self-Designing Software

    Porter, B., Faulkner Rainford, P. & Rodrigues-Filho, R., 31/01/2025, In: Communications of the ACM. 68, 1, p. 50-59 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Self-defining memory cues: creative expression and emotional meaning

    Sas, C., Challioner, S., Clarke, C., Wilson, R., Coman, A., Clinch, S., Harding, M. & Davies, N., 2015, CHI EA '15 Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. New York: ACM, p. 2013-2018 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Self-Calibrated Convolutional Neural Network for SAR Image Despeckling.

    Yuan, Y., Jiang, Y., Wu, Y. & Jiang, R., 12/10/2021, 2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS. IEEE, p. 399-402 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Self-boosting first-order autonomous learning neuro-fuzzy systems

    Gu, X. & Angelov, P. P., 1/04/2019, In: Applied Soft Computing. 77, p. 118-134 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Self-awareness in Software Engineering: A systematic literature review

    Elhabbash, A., Salama, M., Bahsoon, R. & Tino, P., 31/10/2019, In: ACM Transactions on Autonomous and Adaptive Systems. 14, 2, 42 p., 5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Self-awareness for dynamic knowledge management in self-adaptive volunteer services

    Elhabbash, A., Bahsoon, R. & Tino, P., 11/09/2017, 2017 IEEE International Conference on Web Services (ICWS). IEEE, p. 180-187 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Self-adaptive volunteered services composition through stimulus-and time-awareness

    Elhabbash, A., Bahsoon, R., Tino, P. & Lewis, P. R., 2015, 2015 IEEE International Conference on Web Services. IEEE, p. 57-64 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Self-Adaptive Systems Challenges in Delivering Object-Based Media

    Porter, B., Dean, P., Race, N., Lomas, M. & Ramdhany, R., 2/12/2024, 2024 IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Self-Adaptive Power Control Mechanism in D2D Enabled Hybrid Cellular Network with mmWave Small Cells: An Optimization Approach

    Raza, S. A., Hassan, S. A., Pervaiz, H. B., Ni, Q. & Musavian, L., 4/12/2016, Globecom Workshops (GC Wkshps), 2016 IEEE. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Self-adaptive framelet-based communication for wireless sensor networks

    O'Donovan, T., Roedig, U., Benson, J. & Sreenan, C. J., 4/08/2011, In: Computer Networks. 55, 11, p. 2558-2575

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Self Organisation in Ad-Hoc Sensor Networks: An Empirical Study

    Catterall, E., Van Laerhoven, K. & Strohbach, M., 12/2002.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    Selectively linkable group signatures- stronger security and preserved verifiabiity

    Fraser, A., Grams, L. & Lehman, A., 8/12/2021, Cryptology and Network Security (CANS 2021). Conti, M., Stevens, M. & Krenn, S. (eds.). Cham: Springer, p. 200-221 22 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    SELECT: Social and Collaborative Filtering of Web Documents and News

    Nichols, D., Alton-Schiedl, R., Ekhall, J., van Geloven, O., Kovacs, L., Micsik, A., Lueg, C., Messnarz, R., Palme, J., Tholerus, T., Mason, D., Procter, R., Stupazzini, E., Vassali, M. & Wheeler, M., 1999. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  20. Published

    Select and apply: understanding how users act upon objects across devices

    Simeone, A., Chong, M. K., Sas, C. & Gellersen, H., 08/2015, In: Personal and Ubiquitous Computing. 19, 5-6, p. 881-896 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Segregating feature interfaces to support software product line maintenance

    Cafeo, B., Hunsen, C., Garcia, A., Apel, S. & Lee, J., 14/03/2016, MODULARITY 2016 Proceedings of the 15th International Conference on Modularity. New York: ACM, p. 1-12 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Segmentação e classificação de vídeo usando um sistema especialista bayesiano

    Tavares Dos Passos, Y., 2007.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  23. Published

    Segmentação de placas de veículos usando extração de características baseado em DFT e agrupamento

    Santos Maciel, R. J., Tavares Dos Passos, Y., Matos, L. N. & Freire, E. O., 2007, p. 121-126. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  24. Published

    Seeding the design process for future problems

    Newman, P., Forshaw, S., Simm, W., Ferrario, M. A., Whittle, J. & Friday, A., 09/2014, Human-centered software engineering: 5th IFIP WG 13.2 International Conference, HCSE 2014, Paderborn, Germany, September 16-18, 2014. Proceedings. Sauer, S., Bogdan, C., Forbrig, P., Bernhaupt, R. & Winckler, M. (eds.). Berlin: Springer, p. 291-298 8 p. (Lecture Notes in Computer Science; vol. 8742).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    SEED: a scalable approach for cyber-physical system simulation

    Garraghan, P., McKee, D., Ouyang, X., Webster, D. & Xu, J., 14/10/2015, In: IEEE Transactions on Services Computing. 9, 2, p. 199-212 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation

    Tang, Z., Wang, L., Kuang, K., Xue, C., Gong, X., Chen, X., Fang, D. & Wang, Z., 11/09/2017, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE, p. 261-268 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    SeDiM: A Middleware Framework for Interoperable Service Discovery in Heterogeneous Networks

    Flores Cortes, C., Grace, P. & Blair, G., 02/2011, In: ACM Transactions on Autonomous and Adaptive Systems. 6, 1, 8 p., 6.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems

    Jindal, A., Aujla, G. S., Kumar, N., Chaudhary, R., Obaidat, M. S. & You, I., 29/11/2018, In: IEEE Network. 32, 6, p. 66-73 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Security-Minded Verification of Space Systems

    Maple, C., Bradbury, M., Yuan, H., Farrell, M., Dixon, C., Fisher, M. & Atmaca, U. I., 21/08/2020, 2020 IEEE Aerospace Conference. Big Sky, Montana, USA: IEEE, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Security-Minded Verification of Cooperative Awareness Messages

    Farrell , M., Bradbury, M., Cardoso, R. C., Fisher, M., Dennis, L., Dixon, C., Sheik, A. T., Yuan, H. & Maple, C., 31/07/2024, In: IEEE Transactions on Dependable and Secure Computing. 21, 4, p. 4048-4065 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Security, Privacy, and Trust Management on Decentralized Systems and Networks

    Meng, W., Katsikas, S., Chen, J. & Chen, C., 31/12/2024, In: International Journal of Network Management. 34, 6, e2311.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  32. Published

    Security techniques in multi-user systems

    Honary, B. & Darnell, M., 1986, Carnahan Conference on Security Technology, May 14-16, 1986 : proceedings. Jackson, J. S. & DeVore, R. W. (eds.). Lexington, Kentucky: University of Kentucky, p. 73-79 7 p. (UKY Bulletin; no. 140).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Security Requirements Engineering in Safety-Critical Railway Signalling Networks.

    Heinrich, M., Vateva-Gurova, T., Arul, T., Katzenbeisser, S., Suri, N., Birkholz, H., Fuchs, A., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Tverdyshev, S. & Schlehuber, C., 14/07/2019, In: Security and Communication Networks. 2019, 14 p., 8348925.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Security policy verification for multi-domains in cloud systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 1/04/2014, In: International Journal of Information Security. 13, 2, p. 97-111 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Security of the GPT cryptosystem and its applications to cryptography

    Rashwan, H., Gabidulin, E. M. & Honary, B., 08/2011, In: Security and Communication Networks. 4, 8, p. 937-946 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Security issues in online games

    Yan, J. & Choi, H.-J., 2002, In: Electronic Library. 20, 2, p. 125-133 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Security issues in cloud federations

    Rak, M., Ghani, H., Ficco, M., Suri, N., Luna, J., Panica, S. & Petcu, D., 2012, Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. IGI Global, p. 176-194 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  38. Published

    Security in defect detection: A new one-pixel attack for fooling DNNs

    Wang, P., Li, Q., Li, D., Meng, S., Bilal, M. & Mukherjee, A., 30/09/2023, In: Journal of King Saud University - Computer and Information Sciences. 35, 8, 101689.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    Security implications of password discretization for click-based graphical passwords

    Zhu, B. B., Wei, D., Yang, M. & Yan, J., 05/2013, WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. New York: ACM, p. 1581-1591 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Security Evaluation in Software-Defined Networks

    Ivkic, I., Thiede, D., Race, N., Broadbent, M. & Gouglidis, A., 15/08/2024, Cloud Computing and Services Science: 12th International Conference, CLOSER 2022, Virtual Event, April 27–29, 2022, and 13th International Conference, CLOSER 2023, Prague, Czech Republic, April 26–28, 2023, Revised Selected Papers. van Steen, M., Ferguson, D. & Pahl, C. (eds.). Cham: Springer, p. 66-91 26 p. (Communications in Computer and Information Science; vol. 1845, no. 1).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Security enhancements for A5/1 without loosing hardware efficiency in future mobile systems

    Komninos, N., Honary, B. & Darnell, M., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 324-328 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Security engineering with patterns

    Schumacher, M. & Roedig, U., 1/09/2001, Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Security design in human computation games (transcript of discussion)

    Yan, J., 2014, Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 154-160 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Security design in human computation games

    Yu, S. Y. & Yan, J., 2014, Security Protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 142-153 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction

    Mayrhofer, R., Gellersen, H. & Hazas, M., 09/2007, Proc. Ubicomp 2007: 9th International Conference on Ubiquitous Computing. Springer-Verlag, p. 199-216 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Security awareness of end-users of mobile health applications: An empirical study

    Aljedaani, B., Ahmad, A., Zahedi, M. & Ali Babar, M., 7/12/2020, Proceedings of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2020. The Association for Computing Machinery, p. 125-136 12 p. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Security assurance assessment methodology for hybrid clouds

    Hudic, A., Smith, P. & Weippl, E. R., 30/09/2017, In: Computers and Security. 70, p. 723-743 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Security as a service using an SLA-based approach via SPECS

    Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V. & Villano, U., 2/12/2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Unpublished

    Security and usability of cross-device captchas

    Algwil, A., 2018, (Unpublished) Lancaster University. 306 p.

    Research output: ThesisDoctoral Thesis

  50. Published
  51. Published

    Security and privacy implications of pervasive memory augmentation

    Davies, N., Friday, A., Clinch, S., Sas, C., Langheinrich, M., Ward, G. & Schmidt, A., 4/02/2015, In: IEEE Pervasive Computing. 14, 1, p. 44-53 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Security and middleware

    Andersen, A., Blair, G., Myrvang, P. H. & Stabell-Kulo, T., 2003, Object-Oriented Real-Time Dependable Systems, 2003.(WORDS 2003). Proceedings of the Eighth International Workshop on. IEEE, p. 186-190 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Security and Information Representation for Niedereiter and Public Key Cryptography

    Sweeney, P. & Honary, B., 1997, Fourth International Symposium on Communications Theory and Applications. Ambleside, UK, p. 173 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    Security analyses of click-based graphical passwords via image point memorability

    Zhu, B. B., Yan, J., Yang, M. & Wei, D., 3/11/2014, CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1217-1231 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In: Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In: International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    Securing Machine Learning (ML) in the Cloud: A Systematic Review of Cloud ML Security

    Qayyum, A., Aneeqa, I., Usama, M., Iqbal, W., Qadir, J., Elkhatib, Y. & Al-Fuqaha, A., 12/11/2020, In: Frontiers in Big Data. 3, 43 p., 587139.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Securing Internet Coordinate Systems

    Kaafar, D., Mathy, L., Salamatian, K., Barakat, C., Turletti, T. & Dabbous, W., 2007, Sustainable Internet Third Asian Internet Engineering Conference, AINTEC 2007, Phuket, Thailand, November 27-29, 2007. Proceedings. Fdida, S. & Sugiura, K. (eds.). Berlin: Springer Verlag, p. 167-168 2 p. (Lecture Notes in Computer Science; vol. 4866).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    Securing internet coordinate embedding systems

    Kaafar, M. A., Mathy, L., Barakat, C., Salamatian, K., Turletti, T. & Dabbous, W., 2007, In: Computer Communication Review. 37, 4, p. 61-72 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Securing GSM voice through scrambling

    Naeem, I. A., Rauf, U., Ahmad, S. F. & Shirazi, S. N., 2010, Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE, p. 156-158 3 p. 5555330

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Securing cyber-physical social interactions on wrist-worn devices

    Shen, Y., Du, B., Xu, W., Luo, C., Wei, B., Cui, L. & Wen, H., 31/05/2020, In: ACM Transactions on Sensor Networks (TOSN). 16, 2, p. 1-22 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    Securing Communication in 6LoWPAN with Compressed IPsec

    Raza, S., Duquennoy, S., Chung, A., Yazar, D., Voigt, T. & Roedig, U., 1/06/2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    Securing Aspect Composition

    Camilleri, A., Blair, L. & Coulson, G., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing. New York: ACM, p. 278-279 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    Securely Storing and Sharing Memory Cues in Memory Augmentation Systems: A Practical Approach

    Bexheti, A., Langheinrich, M., Elhart, I. & Davies, N. A. J., 11/03/2019, 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    SecureComm: A Secure Data Transfer Framework for Neural Network Inference on CPU-FPGA Heterogeneous Edge Devices

    Chen, T., Tan, Y.-A., Li, C., Zhang, Z., Meng, W. & Li, Y., 31/12/2024, In: IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 14, 4, p. 811-812 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping

    Su, B., Yu, W., Liu, H., Chorti, A. & Poor, H. V., 31/05/2022, In: IEEE Wireless Communications Letters. 11, 5, p. 878-882 5 p.

    Research output: Contribution to Journal/MagazineLetterpeer-review

  67. Published

    Secure Source-Relay Link Based Threshold DF Relaying Scheme

    Yao, J., Ye, J., Wang, D., Lei, H. & Pan, G., 02/2018, In: AEÜ - International Journal of Electronics and Communications. 85, p. 144-149 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    Secure Smart Grids or Say ‘Goodnight Vienna!'.

    Skopik, F., Smith, P. & Bleier, T., 16/01/2013, In: ERCIM News. 2013, 92, 92.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    Secure Perception-Driven Control of Mobile Robots Using Chaotic Encryption

    Zhang, X., Yuan, Z., Xu, S., Lu, Y. & Zhu, M., 28/07/2021, 2021 American Control Conference (ACC). IEEE, p. 2575-2580 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    Secure perception-driven control of mobile robots using chaotic encryption

    Zhang, X., Yuan, Z., Xu, S., Lu, Y. & Zhu, M., 30/04/2024, In: IEEE Transactions on Automatic Control. 69, 4, p. 2429-2436 8 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    Secure multicast communications with private jammers

    Cumanan, K., Ding, Z., Xu, M. & Poor, H. V., 3/07/2016, 2016 IEEE 17th International Workshop on Processing Advances in Wireless Communications (SPAWC). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Secure MISO-NOMA Transmission With Artificial Noise

    Lv, L., Ding, Z., Ni, Q. & Chen, J., 07/2018, In: IEEE Transactions on Vehicular Technology. 67, 7, p. 6700-6705 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Published

    Secure messaging and real time media streaming using enterprise PKI and ECC based certificates

    Ashraf, S., Shirazi, S. N., Nadeem, M. A. & Ikram, N., 2010, Computational Technologies in Electrical and Electronics Engineering (SIBIRCON), 2010 IEEE Region 8 International Conference on. IEEE, p. 159-161 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Secure File Transmission over Multi-User Networking Environments

    Samarakoon, M. I., Honary, B. & Sweeney, P., 1997, Proceedings of the Fourth International Symposium on Communications Theory and Applications. Lancaster: HW Communications Limited, p. 121-127 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    Secure facial recognition in the encrypted domain using a local ternary pattern approach

    Khan, F. A., Bouridane, A., Boussakta, S., Jiang, R. & Almaadeed, S., 30/06/2021, In: Journal of Information Security and Applications. 59

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  76. Published

    Secure Distribution of Protected Content in Information-Centric Networking

    Bilal, M. & Pack, S., 06/2020, In: IEEE Systems Journal. 14, 2, p. 1921-1932 12 p., 8798748.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Secure crowd-sensing protocol for fog-based vehicular cloud

    Nkenyereye, L., Islam, S. M. R., Bilal, M., Abdullah-Al-Wadud, M., Alamri, A. & Nayyar, A., 07/2021, In: Future Generation Computer Systems. 120, p. 61-75 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  78. Published

    Secure Communication Protocol for Mobile Multimedia Applications

    Komninos, N., Honary, B. & Darnell, M., 11/2000, 3rd International Symposium on Wireless Personal Multimedia Communications (WPMC 2000) . Bangkok, p. 1011–1014 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  79. Published

    Secure communication in cooperative network with wireless information and power transfer

    Hu, S. & Ding, Z., 12/2015, In: Signal Processing. 9, 9, p. 663-669 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In: Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    Secure Cloud Computing Algorithms for Discrete Constrained Potential Games

    Lu, Y. & Zhu, M., 11/09/2015, IFAC Workshop on Distributed Estimation and Control in Networked Systems. 22 ed. Elsevier, Vol. 48. p. 180-185 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Secure and robust multi-constrained QoS aware routing algorithm for VANETs

    Hashem Eiza, M., Owens, T. & Ni, Q., 01/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 1, p. 32-45 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  83. Published

    Secure and Privacy-preserving Data Sharing in the Cloud based on Lossless Image Coding

    Khelifi, F., Brahimi, T., Han, J. & Li, X., 07/2018, In: Signal Processing. 148, p. 91-101 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  84. Published

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Hashem-Eiza, M., Shi, Q., Marnerides, A. & Owens, T., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, 6 p. 7510934

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Secure and privacy-aware cloud-assisted video reporting service in 5G enabled vehicular networks

    Hashem Eiza, M., Ni, Q. & Shi, Q., 10/2016, In: IEEE Transactions on Vehicular Technology. 65, 10, p. 7868-7881 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    Secrecy Wireless-Powered Sensor Networks for Internet of Things

    Li, J., Zhao, H., Chen, X., Chu, Z., Zhen, L., Jiang, J. & Pervaiz, H., 22/09/2020, In: Wireless Communications and Mobile Computing. 2020, 12 p., 8859264.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  87. Published

    Secrecy sum rate maximization in non-orthogonal multiple access

    Zhang, Y., Wang, H.-M., Yang, Q. & Ding, Z., 9/05/2016, In: IEEE Communications Letters. 20, 5, p. 930-933 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    Secrecy Spectrum and Energy Efficiency Analysis in Massive MIMO-enabled Multi-Tier Hybrid HetNets

    Umer, A., Hassan, S. A., Pervaiz, H., Musavian, L., Ni, Q. & Imran, M. A., 1/03/2020, In: IEEE Transactions on Green Communications and Networking. 4, 1, p. 246-262 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer

    Chu, Z., Cumanan, K., Ding, Z., Johnston, M. & Le Goff, S. Y., 1/05/2015, In: IEEE Transactions on Vehicular Technology. 64, 5, p. 1833-1847 15 p., 6848758.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. Published

    Secrecy Outage Probability for RSMA-based ISATNs with Imperfect Hardware

    Guo, K., Li, X., Bilal, M., Nauman, A., Wu, M. & Zhou, F., 20/08/2024, ICC 2024 - IEEE International Conference on Communications. Valenti, M., Reed, D. & Torres, M. (eds.). IEEE, p. 5147-5152 6 p. (IEEE International Conference on Communications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    Secrecy outage analysis for massive MIMO-Enabled multi-tier 5G hybrid hetnets

    Umer, A., Hassan, S. A., Pervaiz, H., Ni, Q., Musavian, L. & Ahmed, S. H., 3/07/2018, 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018 - Proceedings).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Second International Workshop on Physicality (workshop abstract)

    Ramduny-Ellis, D., Dix, A. & Gill, S., 09/2007.

    Research output: Contribution to conference - Without ISBN/ISSN Other

  93. Published

    Second International Workshop on Physicality

    Ramduny-Ellis, D., Dix, A., Hare, J. & Gill, S., 09/2007, p. 217-218. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  94. Published

    Second International Workshop on Models@run.time

    Bencomo, N., France, R. & Blair, G. S., 2008, Models in Software Engineering Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papers. Giese, H. (ed.). Berlin: Springer-Verlag, p. 206-211 6 p. (Lecture Notes in Computer Science; vol. 5002).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Second International Workshop on Location and the Web (LocWeb 2009)

    Wilde, E., Boll, S., Cheverst, K., Fröhlich, P., Purves, R. & Schöning, J., 2009, LOCWEB '09: Proceedings of the 2nd International Workshop on Location and the Web. New York: ACM, p. 1-2 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  97. Published

    SECCRIT: Secure Cloud Computing for High Assurance Services

    Bless, R., Hutchison, D., Schöller, M., Smith, P. & Tauber, M. G., 13/10/2013, In: ERCIM News. 2013, 95, 95.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Unpublished

    Seasonal Adjustment - Interactive Installation

    Kember, S., Lock, S., Phillips, P., Sheridan, J. & Lindsay, A., 01/2003, (Unpublished)

    Research output: Other contribution

  99. Unpublished

    Searching in public versus re-finding in private: are they the same

    Kamaruddin, A. & Dix, A., 10/2005, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  100. Published

    Search+: A resource efficient Peer-to-Peer service discovery mechanism

    Skjegstad, M., Roedig, U. & Johnsen, F. T., 10/2009, IEEE Military Communications Conference, 2009. MILCOM 2009. . IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top