Home > Research > i-DID > Publications & Outputs
View graph of relations
  1. 2024
  2. Published

    These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 30/06/2024, In: IEEE Transactions on Network and Service Management. 21, 3, p. 3623-3635 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Adaptive Energy Theft Detection in Smart Grids Using Self-Learning With Dual Neural Network

    Althobaiti, A., Rotsos, C. & Marnerides, A. K., 29/02/2024, In: IEEE Transactions on Industrial Informatics. 20, 2, 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. 2023
  5. Published

    On Energy Theft Attack Detection in Smart Grids Using Machine Learning

    Althobaiti, A., 16/11/2023, Lancaster University. 154 p.

    Research output: ThesisDoctoral Thesis

  6. 2022
  7. Published

    Enhancing Anomaly Detection Techniques for Emerging Threats

    Mills, R., 15/10/2022, Lancaster University. 176 p.

    Research output: ThesisDoctoral Thesis

  8. Published

    An ICT Architecture for Enabling Ancillary Services in Distributed Renewable Energy Sources Based on the SGAM Framework

    Stocker, A., Alshawish, A., Bor, M., Vidler, J., Gouglidis, A., Scott, A., Marnerides, A., de Meer, H. & Hutchison, D., 12/05/2022, In: Energy Informatics. 5, 1, 5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Practical Intrusion Detection of Emerging Threats

    Mills, R., Marnerides, A., Broadbent, M. & Race, N., 31/03/2022, In: IEEE Transactions on Network and Service Management. 19, 1, p. 582-600 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. 2021
  12. Published

    Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems

    Miller, T., Staves, A., Maesschalck, S., Sturdee, M. & Green, B., 31/12/2021, In: International Journal of Critical Infrastructure Protection. 35, 100464.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods

    Althobaiti, A., Jindal, A., Marnerides, A. & Roedig, U., 30/11/2021, In: IEEE Access. 9, p. 159291-159312 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    PCaaD: Towards automated determination and exploitation of industrial systems

    Green, B., Derbyshire, R., Krotofil, M., Knowles, W., Prince, D. & Suri, N., 30/11/2021, In: Computers and Security. 110, 19 p., 102424.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Data-driven Energy Theft Detection in Modern Power Grids

    Althobaiti, A., Jindal, A. & Marnerides, A., 28/06/2021, e-Energy '21 : Proceedings of the Twelfth ACM International Conference on Future Energy Systems. New York: ACM, p. 39-48 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. 2020
  17. Published

    SCADA-agnostic Power Modelling for Distributed Renewable Energy Sources

    Althobaiti, A., Jindal, A. & Marnerides, A., 9/10/2020, 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 379-384 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 7/07/2020, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2020. . Springer, p. 67-88 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    A Heuristic-Based Appliance Scheduling Scheme for Smart Homes

    Jindal, A., Bhambu, B. S., Singh, M., Kumar, N. & Naik, S., 31/05/2020, In: IEEE Transactions on Industrial Informatics. 16, 5, p. 3242-3255 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Citrus: Orchestrating Security Mechanisms via Adversarial Deception

    Mills, R., Broadbent, M. & Race, N., 24/04/2020. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  21. Published

    DataPlane Broker: Open WAN control for multi-site service orchestration

    Simpson, S., Farshad, A., McCherry, P., Magzoub, A., Fantom, W., Rotsos, C., Race, N. & Hutchison, D., 19/03/2020, 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) . Dallas, USA: IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Profiling IoT-based Botnet Traffic using DNS

    Dwyer, O., Marnerides, A., Giotsas, V. & Mursch, T., 27/02/2020, 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Improved Network Traffic Classification Using Ensemble Learning

    Possebon, I., da Silva, A., Granville, L., Schaeffer-Filho, A. & Marnerides, A., 27/01/2020, IEEE Symposium on Computers and Communications (ISCC) 2019. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. 2019
  25. Published

    Deep-learning based precoding techniques for next-generation video compression

    Chadha, A., Bourtsoulatze, E., Giotsas, V., Andreopoulos, Y. & Grce, S., 13/09/2019.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  26. Published

    BEST: Blockchain-based Secure Energy Trading in SDN-enabled Intelligent Transportation System

    Chaudhary, R., Jindal, A., Aujla, G. S., Aggarwal, S., Kumar, N. & Choo, K.-K. R., 1/08/2019, In: Computers and Security. 85, p. 288-299 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    A framework for privacy aware design in future mobile applications

    Kibirige Mukisa, S., 30/07/2019, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  28. Published

    Identifying Security Challenges in Renewable Energy Systems: A Wind Turbine Case Study

    Jindal, A., Marnerides, A., Scott, A. & Hutchison, D., 28/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 370-372 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Adversarial Machine Learning in Smart Energy Systems

    Bor, M., Marnerides, A., Molineux, A., Wattam, S. & Roedig, U., 25/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 413-415 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Identifying infected energy systems in the wild

    Marnerides, A., Giotsas, V. & Mursch, T., 25/06/2019, e-Energy 2019 - Proceedings of the 10th ACM International Conference on Future Energy Systems. New York: ACM, p. 263-267 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    DLRS: Deep Learning-Based Recommender System for Smart Healthcare Ecosystem

    Aujla, G. S., Jindal, A., Chaudhary, R., Kumar, N., Vashist, S., Sharma, N. & Obaidat, M. S., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8761416

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Communication standards for distributed renewable energy sources integration in future electricity distribution networks

    Jindal, A., Marnerides, A., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 12/05/2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, p. 8390-8393 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things

    Antrobus, R., Green, B., Frey, S. A. F. & Rashid, A., 1/05/2019, Living in the Internet of Things 2019. IET, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    SURVIVOR: A Blockchain based Edge-as-a-Service Framework for Secure Energy Trading in SDN-enabled Vehicle-to-Grid Environment

    Jindal, A., Aujla, G. S. & Kumar, N., 22/04/2019, In: Computer Networks. 153, p. 36-48 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In: IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Dithen: A computation-as-a-service cloud platform for large-scale multimedia processing

    Doyle, J., Giotsas, V., Anam, M. A. & Andreopoulos, Y., 1/04/2019, In: IEEE Transactions on Cloud Computing. 7, 2, p. 509-523 15 p., 7590075.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Demand Response Applications in Smart Grid Using Data Analytics - Various Facets

    Jindal, A. & Kumar, N., 04/2019

    Research output: Exhibits, objects and web-based outputsWeb publication/site

  38. Published

    Stable and Practical AS Relationship Inference with ProbLink

    Jin, Y., Scott, C., Dhamdhere, A., Giotsas, V., Krishnamurthy, A. & Shenker, S., 26/02/2019, 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI'19). USENIX Association, p. 581-597 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Clustering the Unknown - The Youtube Case

    Dvir, A., Marnerides, A., Dubin, R. & Golan, N., 18/02/2019, IEEE International Conference on Computing, Networking and Communications (IEEE ICNC 2019). IEEE, p. 402-407 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    The Security of Smart Buildings - A Systematic Literature Review

    Ciholas, P., Lennie, A., Sadigova, P. & Such, J. M., 28/01/2019, In: arXiv. 50 p.

    Research output: Contribution to Journal/MagazineJournal article

  41. Published

    Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks

    Hashem Eiza, M., Shi, Q., Marnerides, A., Owens, T. & Ni, Q., 01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 19-33 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  43. 2018
  44. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems

    Jindal, A., Aujla, G. S., Kumar, N., Chaudhary, R., Obaidat, M. S. & You, I., 29/11/2018, In: IEEE Network. 32, 6, p. 66-73 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs

    Nomikos, G., Kotronis, V., Sermpezis, P., Gigis, P., Manassakis, L., Dietzel, C., Konstantaras, S., Dimitropoulos, X. & Giotsas, V., 11/2018, IMC '18 Proceedings of the Internet Measurement Conference 2018. New York: Association for Computing Machinery (ACM), p. 265-278 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Towards Adaptive Traffic Flow Optimizations with Unikernel-based VNFs

    Jung, A. & Rotsos, C. (Editor), 11/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  49. E-pub ahead of print

    OFLOPS-SUME and the art of switch characterization

    Oudin, R., Antichi, G., Rotsos, C., Moore, A. W. & Uhlig, S., 27/09/2018, (E-pub ahead of print) In: IEEE Journal on Selected Areas in Communications. 9 p.

    Research output: Contribution to Journal/MagazineSpecial issuepeer-review

  50. Published

    ReasoNet: Inferring Network Policies Using Ontologies

    Rotsos, C., Farshad, A., King, D. & Hutchison, D., 13/09/2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft). IEEE, p. 159-167 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In: IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    CommunityWatch: The Swiss-Army Knife of BGP Anomaly Detection

    Giotsas, V., 16/07/2018, ANRW '18 Proceedings of the Applied Networking Research Workshop. New York: ACM, p. 24 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  54. Published

    Digital Authoring of Interactive Public Display Applications

    Mills, R., Broadbent, M. H. & Race, N. J. P., 26/06/2018, TVX '18 Proceedings of the 2018 ACM International Conference on Interactive Experiences for TV and Online Video. New York: ACM, p. 127-136 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    RELIABLE RESPONSE EXTRACTION FOR MEMORIES BASED PUF

    Young, R. J. (Inventor), Roedig, U. (Inventor), Prince, D. D. C. (Inventor) & Speed, P. (Inventor), 12/04/2018, IPC No. G09C1/00, Patent No. GB20160016973 20161006, Priority date 6/10/2016, Priority No. GB20160016973 20161006

    Research output: Patent

  57. Published

    Internet traffic characterisation: Third-order statistics & higher-order spectra for precise traffic modelling

    Marnerides, A., Pezaros, D. & Hutchison, D., 7/04/2018, In: Computer Networks. 134, p. 183-201 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Appliance-level Short-term Load Forecasting using Deep Neural Networks

    Ud Din, G. M., Mauthe, A. U. & Marnerides, A., 8/03/2018, 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 53-57 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In: Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Guest Editorial: Body Sensor Networks

    Koutsakis, P., Spachos, P. & Marnerides, A., 29/01/2018, In: IET Wireless Sensor Systems. 8, 1, p. 1-2 2 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  61. Unpublished

    Augmenting ICS cyber security risk assessments: assimilation of socio-technical characteristics and constructs

    Green, B., 2018, (Unpublished) Lancaster University. 314 p.

    Research output: ThesisDoctoral Thesis

  62. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  63. 2017
  64. Published

    Malware detection in migrated virtual machines

    El-Moussa, F. (Inventor), Mauthe, A. U. (Inventor), Marnerides, A. (Inventor) & Watson, M. (Inventor), 7/12/2017, Patent No. 20170351861

    Research output: Patent

  65. Published

    Modeling Server Workloads for Campus Email Traffic Using Recurrent Neural Networks

    Boukoros, S., Nugaliyadde, A., Marnerides, A., Vassilakis, C., Koutsakis, P. & Wai Wong, K., 14/11/2017, Neural Information Processing. ICONIP 2017. Liu, D., Xie, S., Li, Y., Zhou, D. & El-Alfy, E. S. (eds.). Cham: Springer, p. 57-66 10 p. (Lecture Notes in Computer Science; vol. 10638).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    On the Significance of Process Comprehension for Conducting Targeted ICS Attacks

    Green, B., Krotofil, M. & Abbasi, A., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 57-67 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    Inferring BGP blackholing activity in the Internet

    Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A. & Berger, A., 1/11/2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 1-14 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    Network service orchestration standardization: a technology survey

    Rotsos, C., King, D., Farshad, A., Bird, J., Fawcett, L., Georgalas, N., Gunkel, M., Shiomoto, K., Wang, A., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 11/2017, In: Computer Standards and Interfaces. 54, 4, p. 203-215 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study

    Kibirige Mukisa, S. & Rashid, A., 4/09/2017, 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

    Green, B., Le, A. T., Antrobus, R., Roedig, U., Hutchison, D. & Rashid, A., 14/08/2017. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  73. Published

    Detecting peering infrastructure outages in the wild

    Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A. & Aben, E., 7/08/2017, SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication. New York: Association for Computing Machinery, Inc, p. 446-459 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Panning for gold: automatically analysing online social engineering attack surfaces

    Edwards, M., Larson, R., Green, B., Rashid, A. & Baron, A., 08/2017, In: Computers and Security. 69, p. 18-34 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. Published

    Distributed, multi-level network anomaly detection for datacentre networks

    Iordache, M., Jouet, S., Marnerides, A. & Pezaros, D., 31/07/2017, IEEE International Conference on Communications (ICC) 2017. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    A programmable SDN+NFV-based architecture for UAV telemetry monitoring

    White, K., Denney, E., Knudson, M. D., Marnerides, A. & Pezaros, D., 20/07/2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, p. 522-527 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    Multi-level resilience in networked environments: concepts and principles

    Ariffin, M. A. M., Marnerides, A. & Mauthe, A. U., 20/07/2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, p. 272-275 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In: Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Published

    Transport Northbound Interface: The need for Specification and Standards coordination

    King, D., Rotsos, C., Busi, I., Zhang, F. & Georgalas, N., 26/06/2017, 2017 21st International Conference on Optical Network Design and Modeling, ONDM 2017 - Conference Proceedings. IEEE, 5 p. 1570355167

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    LoRa Transmission Parameter Selection

    Bor, M. & Roedig, U., 5/06/2017, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    Mitigating Inter-Network Interference in LoRa Networks

    Voigt, T., Bor, M., Roedig, U. & Alonso, J., 20/02/2017, EWSN ’17 Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks. New York: ACM Press, p. 323-328 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Short term power load forecasting using Deep Neural Networks

    Ud Din, G. M. & Marnerides, A., 26/01/2017, 2017 International Conference on Computing, Networking and Communications (ICNC). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    A Situation Aware Information Infrastructure (SAI^2) Framework

    Marnerides, A., Pezaros, D., Jose, J., Mauthe, A. U. & Hutchison, D., 2017, Smart Objects and Technologies for Social Good Second International Conference, GOODTECHS 2016, Venice, Italy, November 30 – December 1, 2016, Proceedings. Gaggi, O., Manzoni, P., Palazzi, C., Bujari, A. & Marquez-Barja, J. (eds.). Cham: Springer, p. 186-194 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 195).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. 2016
  85. Published

    Baguette: towards end-to-end service orchestration in heterogeneous networks

    Rotsos, C., Farshad, A., Hart, N. P., Aguado, A., Bidkar, S., Sideris, K., King, D., Fawcett, L., Bird, J., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 15/12/2016, International Conference on Ubiquitous Computing and Communications (IUCC'16). IEEE, p. 196-203 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    Media Query Processing for the Internet-of-Things: Coupling of Device Energy Consumption and Cloud Infrastructure Billing

    Renna, F., Doyle, J., Giotsas, V. & Andreopoulos, Y., 1/12/2016, In: IEEE Transactions on Multimedia. 18, 12, p. 2537-2552 16 p., 7544517.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  87. Published

    BGPStream: A software framework for live and historical BGP data analysis

    Orsini, C., King, A., Giordano, D., Giotsas, V. & Dainotti, A., 14/11/2016, IMC '16 Proceedings of the 2016 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 429-444 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    Do LoRa low-power wide-area networks scale?

    Bor, M., Roedig, U., Voigt, T. & Alonso, J., 14/11/2016, MSWiM '16 Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York: ACM Press, p. 59-67 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    Achieving ICS resilience and security through granular data flow management

    Green, B., Krotofil, M. & Hutchison, D., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 93-101 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection

    Jardine, W., Frey, S., Green, B. & Rashid, A., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 23-34 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    Threat awareness for critical infrastructures resilience

    Gouglidis, A., Green, B., Busby, J. S., Rouncefield, M. F., Hutchison, D. & Schauer, S., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on. 9781467390248: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    SimaticScan: towards a specialised vulnerability scanner for industrial control systems

    Antrobus, R., Frey, S., Green, B. & Rashid, A., 23/08/2016, Proceedings 4th International Symposium for ICS & SCADA Cyber Security Research. BCS

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    Network-based telemetry to facilitate the programmable management plane for optical transport infrastructure

    King, D., Rotsos, C., Aguado, A., Velasco, L. & Georgalas, N., 10/07/2016, 2016 18th International Conference on Transparent Optical Networks (ICTON). IEEE, p. 1-1 1 p. (2016 18th International Conference on Transparent Optical Networks (ICTON)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    The software defined transport network: fundamentals, findings and futures

    King, D., Rotsos, C., Aguado, A., Georgalas, N. & Lopez, V., 10/07/2016, 2016 18th International Conference on Transparent Optical Networks (ICTON). IEEE, p. 1-4 4 p. ( Transparent Optical Networks (ICTON), 2016 18th International Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Cloud instance management and resource prediction for computation-as-a-service platforms

    Doyle, J., Giotsas, V., Anam, M. A. & Andreopoulos, Y., 2/06/2016, Proceedings - 2016 IEEE International Conference on Cloud Engineering, IC2E 2016: Co-located with the 1st IEEE International Conference on Internet-of-Things Design and Implementation, IoTDI 2016. Institute of Electrical and Electronics Engineers Inc., p. 89-98 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Hashem-Eiza, M., Shi, Q., Marnerides, A. & Owens, T., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, 6 p. 7510934

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Query processing for the internet-of-things: Coupling of device energy consumption and cloud infrastructure billing

    Renna, F., Doyle, J., Andreopoulos, Y. & Giotsas, V., 17/05/2016, Internet-of-Things Design and Implementation (IoTDI), 2016 IEEE First International Conference on. Institute of Electrical and Electronics Engineers Inc., p. 83-94 12 p. 7471353

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Composite vulnerabilities in Cyber Physical Systems

    Ciholas, P. & Such, J. M., 6/04/2016, p. 4-7. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  99. Published

    Testbed diversity as a fundamental principle for effective ICS security research

    Green, B., Frey, S. A. F., Rashid, A. & Hutchison, D., 6/04/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  100. Published

    Malware detection in cloud computing infrastructures

    Watson, M., Shirazi, S. N. U. H., Marnerides, A., Mauthe, A. U. & Hutchison, D., 03/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 192-205 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  101. Published

    Sibyl: A Practical Internet Route Oracle

    Cunha, I., Marchetta, P., Calder, M., Chiu, Y.-C., Machado, B. V. A., Pescapè, A., Giotsas, V., Madhyastha, H. V. & Katz-Bassett, E., 03/2016, 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, p. 325-344 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  102. Published

    Analysis and characterisation of botnet scan traffic

    Marnerides, A. & Mauthe, A. U., 15/02/2016, 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  103. Published

    LoRa for the Internet of Things

    Bor, M., Vidler, J. E. & Roedig, U., 15/02/2016, EWSN '16 Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. Canada: Junction Publishing, p. 361-366 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  104. Published

    The North West cyber security industry: export potential assessment

    Prince, D. D. C. & Fitton, O. J., 27/01/2016, Lancaster: Lancaster University. 60 p.

    Research output: Book/Report/ProceedingsCommissioned report

  105. Published

    Measurement of video quality

    Andreopoulos, Y. (Inventor), Fisher, P. (Inventor), Deligiannis, N. (Inventor) & Giotsas, V. (Inventor), 2016, Patent No. US20160021376A1, Priority date 17/07/2014

    Research output: Patent

  106. Published

    Periscope: Unifying looking glass querying

    Giotsas, V., Dhamdhere, A. & Claffy, K. C., 2016, PAM 2016: Passive and Active Measurement : 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings. Karagiannis, T. & Dimitropoulos, X. (eds.). Cham: Springer, p. 177-189 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9631).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  107. 2015
  108. Published

    Mapping peering interconnections to a facility

    Giotsas, V., Smaragdakis, G., Huffaker, B., Luckie, M. & Claffy, K. C., 1/12/2015, CoNEXT '15 Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. New York: Association for Computing Machinery, Inc, 13 p. 37

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  109. Published

    SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications

    Granby, B., Askwith, R. & Marnerides, A., 10/11/2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP). IEEE, p. 463-466 4 p. (2015 IEEE 23rd International Conference on Network Protocols (ICNP)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  110. Published

    Enabling performance evaluation beyond 10 Gbps

    Antichi, G., Rotsos, C. & Moore, A. W., 17/08/2015, Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. New York, NY, USA: ACM, p. 369-370 2 p. (SIGCOMM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  111. Published

    Challenge: resolving data center power bill disputes: the energy-performance trade-offs of consolidation

    Chatzipapas, A., Pediaditakis, D., Rotsos, C., Mancuso, V., Crowcroft, J. & Moore, A., 14/07/2015, e-Energy '15 Proceedings of the 2015 ACM Sixth International Conference on Future Energy Systems. New York, NY, USA: ACM, p. 89-94 6 p. (e-Energy '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  112. Published

    Tool support for the evaluation of anomaly traffic classification for network resilience

    da Silva, A., Wickboldt, J., Schaeffer-Filho, A., Marnerides, A. & Mauthe, A. U., 6/07/2015, Proceedings of 20th IEEE Symposium on Computers and Communications, ISCC2015. IEEE, p. 514-519 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  113. Published

    Perceptual video quality estimation by regression with myopic experts

    Giotsas, V., Deligiannis, N., Fisher, P. & Andreopoulos, Y., 2/07/2015, 2015 7th International Workshop on Quality of Multimedia Experience, QoMEX 2015. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. 7148115

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  114. Published

    Reconfigurable network systems and software-defined networking

    Zilberman, N., Watts, P. M., Rotsos, C. & Moore, A. W., 1/07/2015, In: Proceedings of the IEEE . 103, 7, p. 1102-1124 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  115. Published

    OFLOPS-Turbo: Testing the next-generation OpenFlow switch

    Rotsos, C., Antichi, G., Bruyere, M. & Owezarski, P., 8/06/2015, 2015 IEEE International Conference on Communications (ICC). London: IEEE, p. 1550-3607 57 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  116. Published

    Lifetime bounds of Wi-Fi enabled sensor nodes

    Bor, M., King, A. & Roedig, U., 4/06/2015, In: Procedia Computer Science. 52, p. 1108-1113 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  117. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  118. Published

    Fault diagnosis in DSL networks using support vector machines

    Marnerides, A., Malinowski, S., Morla, R. & Kim, H. S., 15/05/2015, In: Computer Communications. 62, p. 72-84 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  119. Published

    Blueswitch: enabling provably consistent configuration of network switches

    Han, J. H., Mundkur, P., Rotsos, C., Antichi, G., Dave, N., Moore, A. W. & Neumann, P. G., 7/05/2015, Architectures for Networking and Communications Systems (ANCS), 2015 ACM/IEEE Symposium on. IEEE, p. 17-27 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  120. Published

    A multi-level resilience framework for unified networked environments

    Marnerides, A., Bhandari, A., Murthy, H. & Mauthe, A. U., 05/2015, Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on. IEEE, p. 1369-1372 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  121. Published

    An integrated environment for open-source network softwarization

    Han, J. H., Antichi, G., Zilberman, N., Rotsos, C. & Moore, A. W., 13/04/2015, Network Softwarization (NetSoft), 2015 1st IEEE Conference on. IEEE, p. 1-2 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  122. Published

    Malware detection in the cloud under ensemble empirical mode decomposition

    Marnerides, A., Spachos, P., Chatzimisios, P. & Mauthe, A. U., 02/2015, Proceedings of 6th International Conference on Computing, Networking and Communications, IEEE ICNC 2015. IEEE, p. 82-88 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  123. Published

    The future of maritime cyber security

    Fitton, O., Prince, D., Germond, B. & Lacy, M., 23/01/2015, Lancaster: Lancaster University. 36 p.

    Research output: Book/Report/ProceedingsOther report

  124. Published

    Power consumption profiling using energy time-frequency distributions in smart grids

    Marnerides, A., Schaeffer-Filho, A., Smith, P. & Mauthe, A., 01/2015, In: IEEE Communications Letters. 19, 1, p. 46-49 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  125. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  126. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  127. Published

    IPv6 AS relationships, cliques, and congruence

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 2015, Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Mirkovic, J. & Liu, Y. (eds.). Berlin: Springer, p. 111-122 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  128. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  129. Published

    Video Clarity: High Speed Data Mining for Video

    Fisher, P., Alhabib, A., Giotsas, V. & Andreopoulos, I., 2015, IBC 2015. London: Institution of Engineering and Technology, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  130. 2014
  131. Published

    The future of mobile devices: security and mobility

    Fitton, O. & Prince, D., 17/11/2014, Lancaster: Lancaster University. 34 p.

    Research output: Book/Report/ProceedingsOther report

  132. Published

    Traffic anomaly diagnosis in Internet backbone networks: a survey

    Marnerides, A., Schaeffer-Filho, A. & Mauthe, A., 14/11/2014, In: Computer Networks. 73, p. 224-243 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  133. Published

    Inferring complex AS relationships

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 5/11/2014, IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  134. Published

    Faithful reproduction of network experiments

    Pediaditakis, D., Rotsos, C. & Moore, A. W., 20/10/2014, Proceedings of the Tenth ACM/IEEE Symposium on Architectures for networking and communications systems. New York: ACM, p. 41-52 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  135. Published

    Assessing the impact of intra-cloud live migration on anomaly detection

    Shirazi, S. N. U. H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A. & Hutchison, D., 10/2014, Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE, p. 52-57 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  136. Published

    Socio-technical security analysis of Industrial Control Systems (ICS)

    Green, B., Prince, D., Roedig, U., Busby, J. & Hutchison, D., 11/09/2014, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. Janicke, H. (ed.). Swindon: BCS Learning and Development Limited, p. 10-14 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  137. Published

    Cyber policing in the North West: regional and local co-ordination

    Prince, D. D. C., 4/09/2014, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  138. Published

    An open testing framework for next-generation openflow switches

    Rotsos, C., Antichi, G., Bruyere, M., Owezarski, P. & Moore, A. W., 1/09/2014, 2014 Third European Workshop on Software Defined Networks (EWSDN). IEEE, p. 127-128 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  139. Published
  140. Published

    OpenCL as Wireless Sensor Network programming abstraction

    Bor, M. & Roedig, U., 12/05/2014. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  141. Published

    Cyber-security challenges of agent technology in intelligent transportation systems

    Kibirige Mukisa, S. & Rashid, A., 6/05/2014, ACySE '14 Proceedings of the 1st International Workshop on Agents and CyberSecurity. New York: ACM, 4 p. 9

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  142. Published

    Content Relevance Opportunistic Routing for Wireless Multimedia Sensor Networks

    Spachos, P., Marnerides, A. & Hatzinakos, D., 27/04/2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, p. 263-268 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  143. Published

    Detecting and Preventing Data Exfiltration

    Rashid, A., Ramdhany, R., Edwards, M., Kibirige Mukisa, S., Ali Babar, M., Hutchison, D. & Chitchyan, R., 04/2014, Lancaster: Lancaster University. 40 p.

    Research output: Book/Report/ProceedingsOther report

  144. Published

    Design and construction of an Industrial Control System testbed

    Green, B., Paske, B., Hutchison, D. & Prince, D., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  145. Published

    Improving the Accuracy of the Internet Cartography

    Giotsas, V., 2014

    Research output: ThesisDoctoral Thesis

  146. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  147. 2013
  148. Published

    Malware analysis in cloud computing: network and system characteristics

    Marnerides, A., Watson, M., Shirazi, S. N. U. H., Mauthe, A. & Hutchison, D., 12/2013, Globecom Workshops (GC Wkshps), 2013 IEEE. Piscataway, N.J.: IEEE, p. 482-487 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  149. Published

    Technology could be "aggravating" factor in sentencing

    Prince, D. & Hargreaves, C., 11/2013, Benchmark, 1, 72, p. 23-24 2 p.

    Research output: Contribution to specialist publicationArticle

  150. Published

    On the comprehension of DSL SyncTrap events in IPTV networks

    Marnerides, A., Malinowski, S., Morla, R., Rodrigues, M. R. D. & Kim, H. S., 7/07/2013, 2013 IEEE Symposium on Computers and Communications (ISCC) . IEEE, p. 670-675 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  151. Published

    Understanding cyber criminals and measuring their future activity

    Hargreaves, C. & Prince, D., 1/07/2013, Lancaster: Lancaster University. (Future of ...)

    Research output: Book/Report/ProceedingsOther report

  152. Published

    A multilevel approach towards challenge detection in cloud computing

    Shirazi, S. N. U. H., Watson, M., Marnerides, A., Mauthe, A. & Hutchison, D., 07/2013, Cyberpatterns 2013 : Proceedings of the Second International Workshop on Cyberpatterns . Oxford: Oxford Brookes University, p. 103-107 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  153. Published

    The future of digital disrupters: rethinking the digital divide

    Lacy, M. & Prince, D., 12/06/2013, Lancaster: Lancaster University. 46 p. (Future of...)

    Research output: Book/Report/ProceedingsOther report

  154. Published

    Internet traffic classification using energy time-frequency distributions

    Marnerides, A., Pezaros, D., Kim, H.-C. & Hutchison, D., 9/06/2013, 2013 IEEE International Conference on Communications (ICC). IEEE, p. 2513-2518 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  155. Published

    Small business cyber security workshop 2013: towards digitally secure business growth

    Prince, D. & King, N., 29/04/2013, Lancaster: Lancaster University. 22 p.

    Research output: Book/Report/ProceedingsOther report

  156. Published

    AS relationships, customer cones, and validation

    Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V. & Claffy, K., 2013, IMC '13 Proceedings of the 2013 conference on Internet measurement conference. New York: ACM, p. 243-256 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  157. Published

    Improving the discovery of IXP peering links through passive BGP measurements

    Giotsas, V. & Zhou, S., 2013, 2013 Proceedings IEEE INFOCOM . IEEE, p. 3249-3254 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  158. Published

    Inferring multilateral peering

    Giotsas, V., Zhou, S., Luckie, M. & Claffy, K., 2013, CoNEXT '13 Proceedings of the ninth ACM conference on Emerging networking experiments and technologies. New York: ACM, p. 247-258 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  159. Published

    Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research

    Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P. & Jones, K., 2013.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  160. 2012
  161. Published

    Towards the improvement of diagnostic metrics Fault diagnosis for DSL-Based IPTV networks using the Rényi entropy

    Marnerides, A., Malinowski, S., Morla, R., Rodrigues, M. R. D. & Kim, H. S., 3/12/2012, 2012 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 2779-2784 6 p. (2012 IEEE Global Communications Conference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  162. Published

    Measuring the diffusion of marketing messages across a social network

    Rogers, M., Chapman, C. & Giotsas, V., 11/2012, In: Journal of Direct, Data and Digital Marketing Practice. 14, 2, p. 97-130 34 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  163. Published

    Small Business Cyber Security Survey 2012

    Prince, D. & King, N., 10/2012, Lancaster: Lancaster University. 38 p.

    Research output: Book/Report/ProceedingsOther report

  164. Published

    Cost, performance & flexibility in OpenFlow: Pick three

    Rotsos, C., Mortier, R., Madhavapeddy, A., Singh, B. & Moore, A. W., 06/2012, 2012 IEEE International Conference on Communications (ICC). IEEE, p. 6601-6605 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  165. Published

    Control and understanding: Owning your home network

    Mortier, R., Rodden, T., Lodge, T., McAuley, D., Rotsos, C., Moore, A. W., Koliousis, A. & Sventek, J., 01/2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012). IEEE, p. 1-10 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  166. Published

    Perceptual Influences on Risk Assessments and the Challenges for Information Security and Network Management

    Knowles, W., Prince, D. & Hutchison, D., 2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2012). Liverpool: Liverpool John Moores University

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  167. Published

    Towards utilizing Tcpcrypt in mobile healthcare applications

    Nikolidakis, S. A., Giotsas, V., Georgakakis, E., Vergados, D. D. & Douligeris, C., 2012, Wireless Mobile Communication and Healthcare: Second International ICST Conference, MobiHealth 2011, Kos Island, Greece, October 5-7, 2011. Revised Selected Papers. Berlin: Springer, p. 374-379 6 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 83 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  168. Published

    Valley-free violation in Internet routing: analysis based on BGP Community data

    Giotsas, V. & Zhou, S., 2012, 2012 IEEE International Conference on Communications, ICC 2012. IEEE, p. 1193-1197 5 p. 6363987

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  169. 2011
  170. Published

    Detecting and assessing the hybrid IPv4/IPv6 as relationships

    Giotsas, V. & Zhou, S., 2011, SIGCOMM '11 Proceedings of the ACM SIGCOMM 2011 conference. New York: ACM, p. 424-425 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  171. Unpublished

    Inferring Internet AS Relationships Based on BGP Routing Policies

    Giotsas, V. & Zhou, S., 2011, (Unpublished).

    Research output: Working paperOther

  172. Unpublished

    On characterisation and decomposition of internet traffic dynamics

    Marnerides, A., 2011, (Unpublished) Lancaster University. 227 p.

    Research output: ThesisDoctoral Thesis

  173. 2010
  174. Published

    Post-processing in wireless sensor networks: Benchmarking sensor trace files

    Bor, M. C., Chatzigiannakis, I., Dulman, S. O., Kikiras, P., Theodoridis, E. & Visser, O. W., 17/10/2010, PE-WASUN'10 - Proceedings of the 7th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, Co-located with MSWiM'10. New York: ACM, p. 40-43 4 p. 1868597. (PE-WASUN'10 - Proceedings of the 7th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, Co-located with MSWiM'10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  175. Published

    Autonomic diagnosis of anomalous network traffic.

    Marnerides, A., Pezaros, D. P. & Hutchison, D., 14/06/2010. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  176. Published

    A secure ubiquitous healthcare system based on IMS and the HL7 standards

    Nikolidakis, S. A., Georgakakis, E., Giotsas, V., Vergados, D. D. & Douligeris, C., 2010, PETRA '10 Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments. New York: ACM, 42

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  177. Published

    Probabilistic graphical models for semi-supervised traffic classification

    Rotsos, C., Gael, J. V., Moore, A. W. & Ghahramani, Z., 2010, Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ - IWCMC '10: IWCMC '10. ACM, p. 752-757 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  178. 2009
  179. Published

    Unsupervised two-class & multi-class support vector machines for abnormal traffic characterization.

    Marnerides, A., Pezaros, D. P., Kim, H.-C. & Hutchison, D., 1/04/2009.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  180. Published

    A mobile healthcare system using IMS and the HL7 framework

    Nikolidakis, S., Giotsas, V., Vergados, D. & Douligeris, C., 2009, ANCS '09 Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems. New York: ACM Press, p. 187-188 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  181. Published

    A novel power-efficient middleware scheme for sensor grid applications

    Miridakis, N. I., Giotsas, V., Vergados, D. D. & Douligeris, C., 2009, Quality of Service in Heterogeneous Networks: 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and 3rd International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, AAA-IDEA 2009, Las Palmas, Gran Canaria, November 23-25, 2009 Proceedings. Bartolini, N., Nikoletseas, S., Cardellini, V. & Mahanti, A. (eds.). Berlin: Springer, p. 476-492 17 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 22).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  182. 2008
  183. Published

    Detection and mitigation of abnormal traffic behaviour in autonomic networked environments.

    Marnerides, A., Pezaros, D. P. & Hutchison, D., 9/12/2008, CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference. New York: ACM, 51

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  184. Published

    Flash Crowd Detection within the realms of an Internet Service Provider (ISP)

    Marnerides, A., Pezaros, D. & Hutchison, D., 23/06/2008. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  185. 2003
  186. Published

    On Demand Network Level Service Deployment in Ad-Hoc Networks

    Prince, D., Scott, A. & Shepherd, W., 09/2003, Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC 2003, Venice, Italy, September 23-25, 2003. Proceedings. Conti, M., Giordano, S., Gregori, E. & Olariu, S. (eds.). Berlin: Springer, p. 817-822 6 p. (Lecture Notes in Computer Science; vol. 2775).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  187. 2002
  188. Published

    Toward an efficient solution for dynamic ad hoc network interoperability

    Prince, D., Scott, A. & Shepherd, D., 17/06/2002. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Back to top