Home > Research > i-DID > Publications & Outputs
View graph of relations
  1. Published

    Composite vulnerabilities in Cyber Physical Systems

    Ciholas, P. & Such, J. M., 6/04/2016, p. 4-7. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  2. Published

    Content Relevance Opportunistic Routing for Wireless Multimedia Sensor Networks

    Spachos, P., Marnerides, A. & Hatzinakos, D., 27/04/2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, p. 263-268 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Control and understanding: Owning your home network

    Mortier, R., Rodden, T., Lodge, T., McAuley, D., Rotsos, C., Moore, A. W., Koliousis, A. & Sventek, J., 01/2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012). IEEE, p. 1-10 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Cost, performance & flexibility in OpenFlow: Pick three

    Rotsos, C., Mortier, R., Madhavapeddy, A., Singh, B. & Moore, A. W., 06/2012, 2012 IEEE International Conference on Communications (ICC). IEEE, p. 6601-6605 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published
  7. Published

    Cyber policing in the North West: regional and local co-ordination

    Prince, D. D. C., 4/09/2014, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  8. Published

    Cyber-security challenges of agent technology in intelligent transportation systems

    Kibirige Mukisa, S. & Rashid, A., 6/05/2014, ACySE '14 Proceedings of the 1st International Workshop on Agents and CyberSecurity. New York: ACM, 4 p. 9

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  10. Published

    Data-driven Energy Theft Detection in Modern Power Grids

    Althobaiti, A., Jindal, A. & Marnerides, A., 28/06/2021, e-Energy '21 : Proceedings of the Twelfth ACM International Conference on Future Energy Systems. New York: ACM, p. 39-48 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...17 Next

Back to top