Home > Research > i-DID > Publications & Outputs
View graph of relations
  1. Unpublished

    Inferring Internet AS Relationships Based on BGP Routing Policies

    Giotsas, V. & Zhou, S., 2011, (Unpublished).

    Research output: Working paperOther

  2. Published

    Improving the Accuracy of the Internet Cartography

    Giotsas, V., 2014

    Research output: ThesisDoctoral Thesis

  3. Published

    CommunityWatch: The Swiss-Army Knife of BGP Anomaly Detection

    Giotsas, V., 16/07/2018, ANRW '18 Proceedings of the Applied Networking Research Workshop. New York: ACM, p. 24 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Threat awareness for critical infrastructures resilience

    Gouglidis, A., Green, B., Busby, J. S., Rouncefield, M. F., Hutchison, D. & Schauer, S., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on. 9781467390248: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  6. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications

    Granby, B., Askwith, R. & Marnerides, A., 10/11/2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP). IEEE, p. 463-466 4 p. (2015 IEEE 23rd International Conference on Network Protocols (ICNP)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Design and construction of an Industrial Control System testbed

    Green, B., Paske, B., Hutchison, D. & Prince, D., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  9. Published

    Socio-technical security analysis of Industrial Control Systems (ICS)

    Green, B., Prince, D., Roedig, U., Busby, J. & Hutchison, D., 11/09/2014, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. Janicke, H. (ed.). Swindon: BCS Learning and Development Limited, p. 10-14 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  11. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Testbed diversity as a fundamental principle for effective ICS security research

    Green, B., Frey, S. A. F., Rashid, A. & Hutchison, D., 6/04/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  13. Published

    Achieving ICS resilience and security through granular data flow management

    Green, B., Krotofil, M. & Hutchison, D., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 93-101 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    On the Significance of Process Comprehension for Conducting Targeted ICS Attacks

    Green, B., Krotofil, M. & Abbasi, A., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 57-67 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

    Green, B., Le, A. T., Antrobus, R., Roedig, U., Hutchison, D. & Rashid, A., 14/08/2017. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  17. Unpublished

    Augmenting ICS cyber security risk assessments: assimilation of socio-technical characteristics and constructs

    Green, B., 2018, (Unpublished) Lancaster University. 314 p.

    Research output: ThesisDoctoral Thesis

  18. Published

    PCaaD: Towards automated determination and exploitation of industrial systems

    Green, B., Derbyshire, R., Krotofil, M., Knowles, W., Prince, D. & Suri, N., 30/11/2021, In: Computers and Security. 110, 19 p., 102424.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    An integrated environment for open-source network softwarization

    Han, J. H., Antichi, G., Zilberman, N., Rotsos, C. & Moore, A. W., 13/04/2015, Network Softwarization (NetSoft), 2015 1st IEEE Conference on. IEEE, p. 1-2 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Blueswitch: enabling provably consistent configuration of network switches

    Han, J. H., Mundkur, P., Rotsos, C., Antichi, G., Dave, N., Moore, A. W. & Neumann, P. G., 7/05/2015, Architectures for Networking and Communications Systems (ANCS), 2015 ACM/IEEE Symposium on. IEEE, p. 17-27 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Understanding cyber criminals and measuring their future activity

    Hargreaves, C. & Prince, D., 1/07/2013, Lancaster: Lancaster University. (Future of ...)

    Research output: Book/Report/ProceedingsOther report

  22. Published

    Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks

    Hashem Eiza, M., Shi, Q., Marnerides, A., Owens, T. & Ni, Q., 01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 19-33 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Hashem-Eiza, M., Shi, Q., Marnerides, A. & Owens, T., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, 6 p. 7510934

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Distributed, multi-level network anomaly detection for datacentre networks

    Iordache, M., Jouet, S., Marnerides, A. & Pezaros, D., 31/07/2017, IEEE International Conference on Communications (ICC) 2017. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection

    Jardine, W., Frey, S., Green, B. & Rashid, A., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 23-34 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Stable and Practical AS Relationship Inference with ProbLink

    Jin, Y., Scott, C., Dhamdhere, A., Giotsas, V., Krishnamurthy, A. & Shenker, S., 26/02/2019, 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI'19). USENIX Association, p. 581-597 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems

    Jindal, A., Aujla, G. S., Kumar, N., Chaudhary, R., Obaidat, M. S. & You, I., 29/11/2018, In: IEEE Network. 32, 6, p. 66-73 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Communication standards for distributed renewable energy sources integration in future electricity distribution networks

    Jindal, A., Marnerides, A., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 12/05/2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, p. 8390-8393 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    SURVIVOR: A Blockchain based Edge-as-a-Service Framework for Secure Energy Trading in SDN-enabled Vehicle-to-Grid Environment

    Jindal, A., Aujla, G. S. & Kumar, N., 22/04/2019, In: Computer Networks. 153, p. 36-48 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    A Heuristic-Based Appliance Scheduling Scheme for Smart Homes

    Jindal, A., Bhambu, B. S., Singh, M., Kumar, N. & Naik, S., 31/05/2020, In: IEEE Transactions on Industrial Informatics. 16, 5, p. 3242-3255 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Demand Response Applications in Smart Grid Using Data Analytics - Various Facets

    Jindal, A. & Kumar, N., 04/2019

    Research output: Exhibits, objects and web-based outputsWeb publication/site

  32. Published

    Identifying Security Challenges in Renewable Energy Systems: A Wind Turbine Case Study

    Jindal, A., Marnerides, A., Scott, A. & Hutchison, D., 28/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 370-372 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Towards Adaptive Traffic Flow Optimizations with Unikernel-based VNFs

    Jung, A. & Rotsos, C. (ed.), 11/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  34. Published

    Cyber-security challenges of agent technology in intelligent transportation systems

    Kibirige Mukisa, S. & Rashid, A., 6/05/2014, ACySE '14 Proceedings of the 1st International Workshop on Agents and CyberSecurity. New York: ACM, 4 p. 9

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study

    Kibirige Mukisa, S. & Rashid, A., 4/09/2017, 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    A framework for privacy aware design in future mobile applications

    Kibirige Mukisa, S., 30/07/2019, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  37. Published

    Network-based telemetry to facilitate the programmable management plane for optical transport infrastructure

    King, D., Rotsos, C., Aguado, A., Velasco, L. & Georgalas, N., 10/07/2016, 2016 18th International Conference on Transparent Optical Networks (ICTON). IEEE, p. 1-1 1 p. (2016 18th International Conference on Transparent Optical Networks (ICTON)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    The software defined transport network: fundamentals, findings and futures

    King, D., Rotsos, C., Aguado, A., Georgalas, N. & Lopez, V., 10/07/2016, 2016 18th International Conference on Transparent Optical Networks (ICTON). IEEE, p. 1-4 4 p. ( Transparent Optical Networks (ICTON), 2016 18th International Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Transport Northbound Interface: The need for Specification and Standards coordination

    King, D., Rotsos, C., Busi, I., Zhang, F. & Georgalas, N., 26/06/2017, 2017 21st International Conference on Optical Network Design and Modeling, ONDM 2017 - Conference Proceedings. IEEE, 5 p. 1570355167

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Perceptual Influences on Risk Assessments and the Challenges for Information Security and Network Management

    Knowles, W., Prince, D. & Hutchison, D., 2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2012). Liverpool: Liverpool John Moores University

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research

    Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P. & Jones, K., 2013.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  42. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  45. Published

    Guest Editorial: Body Sensor Networks

    Koutsakis, P., Spachos, P. & Marnerides, A., 29/01/2018, In: IET Wireless Sensor Systems. 8, 1, p. 1-2 2 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  46. Published

    The future of digital disrupters: rethinking the digital divide

    Lacy, M. & Prince, D., 12/06/2013, Lancaster: Lancaster University. 46 p. (Future of...)

    Research output: Book/Report/ProceedingsOther report

  47. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In: Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    AS relationships, customer cones, and validation

    Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V. & Claffy, K., 2013, IMC '13 Proceedings of the 2013 conference on Internet measurement conference. New York: ACM, p. 243-256 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. E-pub ahead of print

    These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 5/02/2024, (E-pub ahead of print) In: IEEE Transactions on Network and Service Management.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top