Home > Research > Cyber Threat Lab > Publications & Outputs
View graph of relations

Cyber Threat Lab

  1. Journal article
  2. E-pub ahead of print

    These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 5/02/2024, (E-pub ahead of print) In: IEEE Transactions on Network and Service Management.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Practical Intrusion Detection of Emerging Threats

    Mills, R., Marnerides, A., Broadbent, M. & Race, N., 31/03/2022, In: IEEE Transactions on Network and Service Management. 19, 1, p. 582-600 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Dithen: A computation-as-a-service cloud platform for large-scale multimedia processing

    Doyle, J., Giotsas, V., Anam, M. A. & Andreopoulos, Y., 1/04/2019, In: IEEE Transactions on Cloud Computing. 7, 2, p. 509-523 15 p., 7590075.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks

    Hashem Eiza, M., Shi, Q., Marnerides, A., Owens, T. & Ni, Q., 01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 19-33 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Other contribution
  7. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  8. Doctoral Thesis
  9. Published

    Enhancing Anomaly Detection Techniques for Emerging Threats

    Mills, R., 15/10/2022, Lancaster University. 176 p.

    Research output: ThesisDoctoral Thesis

  10. Poster
  11. Published

    Citrus: Orchestrating Security Mechanisms via Adversarial Deception

    Mills, R., Broadbent, M. & Race, N., 24/04/2020. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  12. Conference paper
  13. Published

    World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots

    Maesschalck, S., Giotsas, V. & Race, N., 7/12/2021.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  14. Published

    Deep-learning based precoding techniques for next-generation video compression

    Chadha, A., Bourtsoulatze, E., Giotsas, V., Andreopoulos, Y. & Grce, S., 13/09/2019.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  15. Conference contribution/Paper
  16. Published

    Profiling IoT-based Botnet Traffic using DNS

    Dwyer, O., Marnerides, A., Giotsas, V. & Mursch, T., 27/02/2020, 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 Next

Back to top