Home > Research > i-DID > Publications & Outputs
View graph of relations
  1. Conference paper
  2. Published

    Testbed diversity as a fundamental principle for effective ICS security research

    Green, B., Frey, S. A. F., Rashid, A. & Hutchison, D., 6/04/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  3. Published

    Design and construction of an Industrial Control System testbed

    Green, B., Paske, B., Hutchison, D. & Prince, D., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research

    Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P. & Jones, K., 2013.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  5. Published

    Flash Crowd Detection within the realms of an Internet Service Provider (ISP)

    Marnerides, A., Pezaros, D. & Hutchison, D., 23/06/2008. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  6. Published

    Toward an efficient solution for dynamic ad hoc network interoperability

    Prince, D., Scott, A. & Shepherd, D., 17/06/2002. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  7. Poster
  8. Published

    Citrus: Orchestrating Security Mechanisms via Adversarial Deception

    Mills, R., Broadbent, M. & Race, N., 24/04/2020. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  9. Published

    Towards Adaptive Traffic Flow Optimizations with Unikernel-based VNFs

    Jung, A. & Rotsos, C. (ed.), 11/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  10. Published

    OpenCL as Wireless Sensor Network programming abstraction

    Bor, M. & Roedig, U., 12/05/2014. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  11. Abstract
  12. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  13. Other
  14. Published

    Autonomic diagnosis of anomalous network traffic.

    Marnerides, A., Pezaros, D. P. & Hutchison, D., 14/06/2010. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  15. Published

    Unsupervised two-class & multi-class support vector machines for abnormal traffic characterization.

    Marnerides, A., Pezaros, D. P., Kim, H. & Hutchison, D., 1/04/2009.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  16. Article
  17. Published

    Technology could be "aggravating" factor in sentencing

    Prince, D. & Hargreaves, C., 11/2013, Benchmark, 1, 72, p. 23-24 2 p.

    Research output: Contribution to specialist publicationArticle

  18. Web publication/site
  19. Published

    Demand Response Applications in Smart Grid Using Data Analytics - Various Facets

    Jindal, A. & Kumar, N., 04/2019

    Research output: Exhibits, objects and web-based outputsWeb publication/site

  20. Doctoral Thesis
  21. Published

    On Energy Theft Attack Detection in Smart Grids Using Machine Learning

    Althobaiti, A., 16/11/2023, Lancaster University. 154 p.

    Research output: ThesisDoctoral Thesis

  22. Published

    Enhancing Anomaly Detection Techniques for Emerging Threats

    Mills, R., 15/10/2022, Lancaster University. 176 p.

    Research output: ThesisDoctoral Thesis

  23. Published

    A framework for privacy aware design in future mobile applications

    Kibirige Mukisa, S., 30/07/2019, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  24. Unpublished

    Augmenting ICS cyber security risk assessments: assimilation of socio-technical characteristics and constructs

    Green, B., 2018, (Unpublished) Lancaster University. 314 p.

    Research output: ThesisDoctoral Thesis

  25. Published

    Improving the Accuracy of the Internet Cartography

    Giotsas, V., 2014

    Research output: ThesisDoctoral Thesis

  26. Unpublished

    On characterisation and decomposition of internet traffic dynamics

    Marnerides, A., 2011, (Unpublished) Lancaster University. 227 p.

    Research output: ThesisDoctoral Thesis

  27. Other contribution
  28. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  29. Patent
  30. Published

    RELIABLE RESPONSE EXTRACTION FOR MEMORIES BASED PUF

    Young, R. J., Roedig, U., Prince, D. D. C. & Speed, P., 12/04/2018, IPC No. G09C1/00, Patent No. GB20160016973 20161006, Priority date 6/10/2016, Priority No. GB20160016973 20161006

    Research output: Patent

  31. Published

    Malware detection in migrated virtual machines

    El-Moussa, F., Mauthe, A. U., Marnerides, A. & Watson, M., 7/12/2017, Patent No. 20170351861

    Research output: Patent

  32. Published

    Measurement of video quality

    Andreopoulos, Y., Fisher, P., Deligiannis, N. & Giotsas, V., 2016, Patent No. US20160021376A1, Priority date 17/07/2014

    Research output: Patent

  33. Journal article
  34. Published

    Adaptive Energy Theft Detection in Smart Grids Using Self-Learning With Dual Neural Network

    Althobaiti, A., Rotsos, C. & Marnerides, A. K., 29/02/2024, In: IEEE Transactions on Industrial Informatics. 20, 2, 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. E-pub ahead of print

    These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 5/02/2024, (E-pub ahead of print) In: IEEE Transactions on Network and Service Management.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    An ICT Architecture for Enabling Ancillary Services in Distributed Renewable Energy Sources Based on the SGAM Framework

    Stocker, A., Alshawish, A., Bor, M., Vidler, J., Gouglidis, A., Scott, A., Marnerides, A., de Meer, H. & Hutchison, D., 12/05/2022, In: Energy Informatics. 5, 1, 5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Practical Intrusion Detection of Emerging Threats

    Mills, R., Marnerides, A., Broadbent, M. & Race, N., 31/03/2022, In: IEEE Transactions on Network and Service Management. 19, 1, p. 582-600 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems

    Miller, T., Staves, A., Maesschalck, S., Sturdee, M. & Green, B., 31/12/2021, In: International Journal of Critical Infrastructure Protection. 35, 100464.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    PCaaD: Towards automated determination and exploitation of industrial systems

    Green, B., Derbyshire, R., Krotofil, M., Knowles, W., Prince, D. & Suri, N., 30/11/2021, In: Computers and Security. 110, 19 p., 102424.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods

    Althobaiti, A., Jindal, A., Marnerides, A. & Roedig, U., 30/11/2021, In: IEEE Access. 9, p. 159291-159312 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    A Heuristic-Based Appliance Scheduling Scheme for Smart Homes

    Jindal, A., Bhambu, B. S., Singh, M., Kumar, N. & Naik, S., 31/05/2020, In: IEEE Transactions on Industrial Informatics. 16, 5, p. 3242-3255 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    BEST: Blockchain-based Secure Energy Trading in SDN-enabled Intelligent Transportation System

    Chaudhary, R., Jindal, A., Aujla, G. S., Aggarwal, S., Kumar, N. & Choo, K-K. R., 1/08/2019, In: Computers and Security. 85, p. 288-299 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    SURVIVOR: A Blockchain based Edge-as-a-Service Framework for Secure Energy Trading in SDN-enabled Vehicle-to-Grid Environment

    Jindal, A., Aujla, G. S. & Kumar, N., 22/04/2019, In: Computer Networks. 153, p. 36-48 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In: IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Dithen: A computation-as-a-service cloud platform for large-scale multimedia processing

    Doyle, J., Giotsas, V., Anam, M. A. & Andreopoulos, Y., 1/04/2019, In: IEEE Transactions on Cloud Computing. 7, 2, p. 509-523 15 p., 7590075.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    The Security of Smart Buildings - A Systematic Literature Review

    Ciholas, P., Lennie, A., Sadigova, P. & Such, J. M., 28/01/2019, In: arXiv. 50 p.

    Research output: Contribution to Journal/MagazineJournal article

  48. Published

    Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks

    Hashem Eiza, M., Shi, Q., Marnerides, A., Owens, T. & Ni, Q., 01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 19-33 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems

    Jindal, A., Aujla, G. S., Kumar, N., Chaudhary, R., Obaidat, M. S. & You, I., 29/11/2018, In: IEEE Network. 32, 6, p. 66-73 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In: IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Published

    Internet traffic characterisation: Third-order statistics & higher-order spectra for precise traffic modelling

    Marnerides, A., Pezaros, D. & Hutchison, D., 7/04/2018, In: Computer Networks. 134, p. 183-201 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In: Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Published

    Network service orchestration standardization: a technology survey

    Rotsos, C., King, D., Farshad, A., Bird, J., Fawcett, L., Georgalas, N., Gunkel, M., Shiomoto, K., Wang, A., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 11/2017, In: Computer Standards and Interfaces. 54, 4, p. 203-215 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    Panning for gold: automatically analysing online social engineering attack surfaces

    Edwards, M., Larson, R., Green, B., Rashid, A. & Baron, A., 08/2017, In: Computers and Security. 69, p. 18-34 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In: Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Media Query Processing for the Internet-of-Things: Coupling of Device Energy Consumption and Cloud Infrastructure Billing

    Renna, F., Doyle, J., Giotsas, V. & Andreopoulos, Y., 1/12/2016, In: IEEE Transactions on Multimedia. 18, 12, p. 2537-2552 16 p., 7544517.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Malware detection in cloud computing infrastructures

    Watson, M., Shirazi, S. N. U. H., Marnerides, A., Mauthe, A. U. & Hutchison, D., 03/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 192-205 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Reconfigurable network systems and software-defined networking

    Zilberman, N., Watts, P. M., Rotsos, C. & Moore, A. W., 1/07/2015, In: Proceedings of the IEEE . 103, 7, p. 1102-1124 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top