Home > Research > i-DID > Publications & Outputs
View graph of relations
  1. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A framework for privacy aware design in future mobile applications

    Kibirige Mukisa, S., 30/07/2019, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  3. Published

    A Heuristic-Based Appliance Scheduling Scheme for Smart Homes

    Jindal, A., Bhambu, B. S., Singh, M., Kumar, N. & Naik, S., 31/05/2020, In: IEEE Transactions on Industrial Informatics. 16, 5, p. 3242-3255 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    A mobile healthcare system using IMS and the HL7 framework

    Nikolidakis, S., Giotsas, V., Vergados, D. & Douligeris, C., 2009, ANCS '09 Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems. New York: ACM Press, p. 187-188 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    A multilevel approach towards challenge detection in cloud computing

    Shirazi, S. N. U. H., Watson, M., Marnerides, A., Mauthe, A. & Hutchison, D., 07/2013, Cyberpatterns 2013 : Proceedings of the Second International Workshop on Cyberpatterns . Oxford: Oxford Brookes University, p. 103-107 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A multi-level resilience framework for unified networked environments

    Marnerides, A., Bhandari, A., Murthy, H. & Mauthe, A. U., 05/2015, Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on. IEEE, p. 1369-1372 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    A novel power-efficient middleware scheme for sensor grid applications

    Miridakis, N. I., Giotsas, V., Vergados, D. D. & Douligeris, C., 2009, Quality of Service in Heterogeneous Networks: 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and 3rd International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, AAA-IDEA 2009, Las Palmas, Gran Canaria, November 23-25, 2009 Proceedings. Bartolini, N., Nikoletseas, S., Cardellini, V. & Mahanti, A. (eds.). Berlin: Springer, p. 476-492 17 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 22).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A programmable SDN+NFV-based architecture for UAV telemetry monitoring

    White, K., Denney, E., Knudson, M. D., Marnerides, A. & Pezaros, D., 20/07/2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, p. 522-527 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A secure ubiquitous healthcare system based on IMS and the HL7 standards

    Nikolidakis, S. A., Georgakakis, E., Giotsas, V., Vergados, D. D. & Douligeris, C., 2010, PETRA '10 Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments. New York: ACM, 42

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A Situation Aware Information Infrastructure (SAI^2) Framework

    Marnerides, A., Pezaros, D., Jose, J., Mauthe, A. U. & Hutchison, D., 2017, Smart Objects and Technologies for Social Good Second International Conference, GOODTECHS 2016, Venice, Italy, November 30 – December 1, 2016, Proceedings. Gaggi, O., Manzoni, P., Palazzi, C., Bujari, A. & Marquez-Barja, J. (eds.). Cham: Springer, p. 186-194 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 195).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Achieving ICS resilience and security through granular data flow management

    Green, B., Krotofil, M. & Hutchison, D., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 93-101 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Adaptive Energy Theft Detection in Smart Grids Using Self-Learning With Dual Neural Network

    Althobaiti, A., Rotsos, C. & Marnerides, A. K., 29/02/2024, In: IEEE Transactions on Industrial Informatics. 20, 2, 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Adversarial Machine Learning in Smart Energy Systems

    Bor, M., Marnerides, A., Molineux, A., Wattam, S. & Roedig, U., 25/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 413-415 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    An ICT Architecture for Enabling Ancillary Services in Distributed Renewable Energy Sources Based on the SGAM Framework

    Stocker, A., Alshawish, A., Bor, M., Vidler, J., Gouglidis, A., Scott, A., Marnerides, A., de Meer, H. & Hutchison, D., 12/05/2022, In: Energy Informatics. 5, 1, 5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    An integrated environment for open-source network softwarization

    Han, J. H., Antichi, G., Zilberman, N., Rotsos, C. & Moore, A. W., 13/04/2015, Network Softwarization (NetSoft), 2015 1st IEEE Conference on. IEEE, p. 1-2 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In: IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    An open testing framework for next-generation openflow switches

    Rotsos, C., Antichi, G., Bruyere, M., Owezarski, P. & Moore, A. W., 1/09/2014, 2014 Third European Workshop on Software Defined Networks (EWSDN). IEEE, p. 127-128 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Analysis and characterisation of botnet scan traffic

    Marnerides, A. & Mauthe, A. U., 15/02/2016, 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In: Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  23. Published

    Appliance-level Short-term Load Forecasting using Deep Neural Networks

    Ud Din, G. M., Mauthe, A. U. & Marnerides, A., 8/03/2018, 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 53-57 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    AS relationships, customer cones, and validation

    Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V. & Claffy, K., 2013, IMC '13 Proceedings of the 2013 conference on Internet measurement conference. New York: ACM, p. 243-256 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Assessing the impact of intra-cloud live migration on anomaly detection

    Shirazi, S. N. U. H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A. & Hutchison, D., 10/2014, Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE, p. 52-57 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  27. Unpublished

    Augmenting ICS cyber security risk assessments: assimilation of socio-technical characteristics and constructs

    Green, B., 2018, (Unpublished) Lancaster University. 314 p.

    Research output: ThesisDoctoral Thesis

  28. Published

    Autonomic diagnosis of anomalous network traffic.

    Marnerides, A., Pezaros, D. P. & Hutchison, D., 14/06/2010. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  29. Published

    Baguette: towards end-to-end service orchestration in heterogeneous networks

    Rotsos, C., Farshad, A., Hart, N. P., Aguado, A., Bidkar, S., Sideris, K., King, D., Fawcett, L., Bird, J., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 15/12/2016, International Conference on Ubiquitous Computing and Communications (IUCC'16). IEEE, p. 196-203 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In: IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    BEST: Blockchain-based Secure Energy Trading in SDN-enabled Intelligent Transportation System

    Chaudhary, R., Jindal, A., Aujla, G. S., Aggarwal, S., Kumar, N. & Choo, K-K. R., 1/08/2019, In: Computers and Security. 85, p. 288-299 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    BGPStream: A software framework for live and historical BGP data analysis

    Orsini, C., King, A., Giordano, D., Giotsas, V. & Dainotti, A., 14/11/2016, IMC '16 Proceedings of the 2016 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 429-444 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Blueswitch: enabling provably consistent configuration of network switches

    Han, J. H., Mundkur, P., Rotsos, C., Antichi, G., Dave, N., Moore, A. W. & Neumann, P. G., 7/05/2015, Architectures for Networking and Communications Systems (ANCS), 2015 ACM/IEEE Symposium on. IEEE, p. 17-27 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Challenge: resolving data center power bill disputes: the energy-performance trade-offs of consolidation

    Chatzipapas, A., Pediaditakis, D., Rotsos, C., Mancuso, V., Crowcroft, J. & Moore, A., 14/07/2015, e-Energy '15 Proceedings of the 2015 ACM Sixth International Conference on Future Energy Systems. New York, NY, USA: ACM, p. 89-94 6 p. (e-Energy '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study

    Kibirige Mukisa, S. & Rashid, A., 4/09/2017, 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Citrus: Orchestrating Security Mechanisms via Adversarial Deception

    Mills, R., Broadbent, M. & Race, N., 24/04/2020. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  37. Published

    Cloud instance management and resource prediction for computation-as-a-service platforms

    Doyle, J., Giotsas, V., Anam, M. A. & Andreopoulos, Y., 2/06/2016, Proceedings - 2016 IEEE International Conference on Cloud Engineering, IC2E 2016: Co-located with the 1st IEEE International Conference on Internet-of-Things Design and Implementation, IoTDI 2016. Institute of Electrical and Electronics Engineers Inc., p. 89-98 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Clustering the Unknown - The Youtube Case

    Dvir, A., Marnerides, A., Dubin, R. & Golan, N., 18/02/2019, IEEE International Conference on Computing, Networking and Communications (IEEE ICNC 2019). IEEE, p. 402-407 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Communication standards for distributed renewable energy sources integration in future electricity distribution networks

    Jindal, A., Marnerides, A., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 12/05/2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, p. 8390-8393 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    CommunityWatch: The Swiss-Army Knife of BGP Anomaly Detection

    Giotsas, V., 16/07/2018, ANRW '18 Proceedings of the Applied Networking Research Workshop. New York: ACM, p. 24 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Composite vulnerabilities in Cyber Physical Systems

    Ciholas, P. & Such, J. M., 6/04/2016, p. 4-7. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  42. Published

    Content Relevance Opportunistic Routing for Wireless Multimedia Sensor Networks

    Spachos, P., Marnerides, A. & Hatzinakos, D., 27/04/2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, p. 263-268 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Control and understanding: Owning your home network

    Mortier, R., Rodden, T., Lodge, T., McAuley, D., Rotsos, C., Moore, A. W., Koliousis, A. & Sventek, J., 01/2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012). IEEE, p. 1-10 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Cost, performance & flexibility in OpenFlow: Pick three

    Rotsos, C., Mortier, R., Madhavapeddy, A., Singh, B. & Moore, A. W., 06/2012, 2012 IEEE International Conference on Communications (ICC). IEEE, p. 6601-6605 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published
  47. Published

    Cyber policing in the North West: regional and local co-ordination

    Prince, D. D. C., 4/09/2014, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  48. Published

    Cyber-security challenges of agent technology in intelligent transportation systems

    Kibirige Mukisa, S. & Rashid, A., 6/05/2014, ACySE '14 Proceedings of the 1st International Workshop on Agents and CyberSecurity. New York: ACM, 4 p. 9

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  50. Published

    Data-driven Energy Theft Detection in Modern Power Grids

    Althobaiti, A., Jindal, A. & Marnerides, A., 28/06/2021, e-Energy '21 : Proceedings of the Twelfth ACM International Conference on Future Energy Systems. New York: ACM, p. 39-48 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    DataPlane Broker: Open WAN control for multi-site service orchestration

    Simpson, S., Farshad, A., McCherry, P., Magzoub, A., Fantom, W., Rotsos, C., Race, N. & Hutchison, D., 19/03/2020, 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) . Dallas, USA: IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    Deep-learning based precoding techniques for next-generation video compression

    Chadha, A., Bourtsoulatze, E., Giotsas, V., Andreopoulos, Y. & Grce, S., 13/09/2019.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  53. Published

    Demand Response Applications in Smart Grid Using Data Analytics - Various Facets

    Jindal, A. & Kumar, N., 04/2019

    Research output: Exhibits, objects and web-based outputsWeb publication/site

  54. Published

    Design and construction of an Industrial Control System testbed

    Green, B., Paske, B., Hutchison, D. & Prince, D., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  55. Published

    Detecting and assessing the hybrid IPv4/IPv6 as relationships

    Giotsas, V. & Zhou, S., 2011, SIGCOMM '11 Proceedings of the ACM SIGCOMM 2011 conference. New York: ACM, p. 424-425 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Detecting and Preventing Data Exfiltration

    Rashid, A., Ramdhany, R., Edwards, M., Kibirige Mukisa, S., Ali Babar, M., Hutchison, D. & Chitchyan, R., 04/2014, Lancaster: Lancaster University. 40 p.

    Research output: Book/Report/ProceedingsOther report

  57. Published

    Detecting peering infrastructure outages in the wild

    Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A. & Aben, E., 7/08/2017, SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication. New York: Association for Computing Machinery, Inc, p. 446-459 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Detection and mitigation of abnormal traffic behaviour in autonomic networked environments.

    Marnerides, A., Pezaros, D. P. & Hutchison, D., 9/12/2008, CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference. New York: ACM, 51

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    Digital Authoring of Interactive Public Display Applications

    Mills, R., Broadbent, M. H. & Race, N. J. P., 26/06/2018, TVX '18 Proceedings of the 2018 ACM International Conference on Interactive Experiences for TV and Online Video. New York: ACM, p. 127-136 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    Distributed, multi-level network anomaly detection for datacentre networks

    Iordache, M., Jouet, S., Marnerides, A. & Pezaros, D., 31/07/2017, IEEE International Conference on Communications (ICC) 2017. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Dithen: A computation-as-a-service cloud platform for large-scale multimedia processing

    Doyle, J., Giotsas, V., Anam, M. A. & Andreopoulos, Y., 1/04/2019, In: IEEE Transactions on Cloud Computing. 7, 2, p. 509-523 15 p., 7590075.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    DLRS: Deep Learning-Based Recommender System for Smart Healthcare Ecosystem

    Aujla, G. S., Jindal, A., Chaudhary, R., Kumar, N., Vashist, S., Sharma, N. & Obaidat, M. S., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8761416

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    Do LoRa low-power wide-area networks scale?

    Bor, M., Roedig, U., Voigt, T. & Alonso, J., 14/11/2016, MSWiM '16 Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York: ACM Press, p. 59-67 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks

    Hashem Eiza, M., Shi, Q., Marnerides, A., Owens, T. & Ni, Q., 01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 19-33 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    Enabling performance evaluation beyond 10 Gbps

    Antichi, G., Rotsos, C. & Moore, A. W., 17/08/2015, Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. New York, NY, USA: ACM, p. 369-370 2 p. (SIGCOMM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods

    Althobaiti, A., Jindal, A., Marnerides, A. & Roedig, U., 30/11/2021, In: IEEE Access. 9, p. 159291-159312 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    Enhancing Anomaly Detection Techniques for Emerging Threats

    Mills, R., 15/10/2022, Lancaster University. 176 p.

    Research output: ThesisDoctoral Thesis

  69. Published

    Faithful reproduction of network experiments

    Pediaditakis, D., Rotsos, C. & Moore, A. W., 20/10/2014, Proceedings of the Tenth ACM/IEEE Symposium on Architectures for networking and communications systems. New York: ACM, p. 41-52 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 7/07/2020, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2020. . Springer, p. 67-88 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Fault diagnosis in DSL networks using support vector machines

    Marnerides, A., Malinowski, S., Morla, R. & Kim, H. S., 15/05/2015, In: Computer Communications. 62, p. 72-84 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    Flash Crowd Detection within the realms of an Internet Service Provider (ISP)

    Marnerides, A., Pezaros, D. & Hutchison, D., 23/06/2008. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  73. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  74. Published

    Guest Editorial: Body Sensor Networks

    Koutsakis, P., Spachos, P. & Marnerides, A., 29/01/2018, In: IET Wireless Sensor Systems. 8, 1, p. 1-2 2 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  75. Published

    Identifying infected energy systems in the wild

    Marnerides, A., Giotsas, V. & Mursch, T., 25/06/2019, e-Energy 2019 - Proceedings of the 10th ACM International Conference on Future Energy Systems. New York: ACM, p. 263-267 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Identifying Security Challenges in Renewable Energy Systems: A Wind Turbine Case Study

    Jindal, A., Marnerides, A., Scott, A. & Hutchison, D., 28/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 370-372 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    Improved Network Traffic Classification Using Ensemble Learning

    Possebon, I., da Silva, A., Granville, L., Schaeffer-Filho, A. & Marnerides, A., 27/01/2020, IEEE Symposium on Computers and Communications (ISCC) 2019. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Improving the Accuracy of the Internet Cartography

    Giotsas, V., 2014

    Research output: ThesisDoctoral Thesis

  79. Published

    Improving the discovery of IXP peering links through passive BGP measurements

    Giotsas, V. & Zhou, S., 2013, 2013 Proceedings IEEE INFOCOM . IEEE, p. 3249-3254 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    Inferring BGP blackholing activity in the Internet

    Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A. & Berger, A., 1/11/2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 1-14 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    Inferring complex AS relationships

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 5/11/2014, IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Unpublished

    Inferring Internet AS Relationships Based on BGP Routing Policies

    Giotsas, V. & Zhou, S., 2011, (Unpublished).

    Research output: Working paperOther

  83. Published

    Inferring multilateral peering

    Giotsas, V., Zhou, S., Luckie, M. & Claffy, K., 2013, CoNEXT '13 Proceedings of the ninth ACM conference on Emerging networking experiments and technologies. New York: ACM, p. 247-258 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Internet traffic characterisation: Third-order statistics & higher-order spectra for precise traffic modelling

    Marnerides, A., Pezaros, D. & Hutchison, D., 7/04/2018, In: Computer Networks. 134, p. 183-201 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published

    Internet traffic classification using energy time-frequency distributions

    Marnerides, A., Pezaros, D., Kim, H. & Hutchison, D., 9/06/2013, 2013 IEEE International Conference on Communications (ICC). IEEE, p. 2513-2518 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    IPv6 AS relationships, cliques, and congruence

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 2015, Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Mirkovic, J. & Liu, Y. (eds.). Berlin: Springer, p. 111-122 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    Lifetime bounds of Wi-Fi enabled sensor nodes

    Bor, M., King, A. & Roedig, U., 4/06/2015, In: Procedia Computer Science. 52, p. 1108-1113 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems

    Miller, T., Staves, A., Maesschalck, S., Sturdee, M. & Green, B., 31/12/2021, In: International Journal of Critical Infrastructure Protection. 35, 100464.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    LoRa for the Internet of Things

    Bor, M., Vidler, J. E. & Roedig, U., 15/02/2016, EWSN '16 Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. Canada: Junction Publishing, p. 361-366 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    LoRa Transmission Parameter Selection

    Bor, M. & Roedig, U., 5/06/2017, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    Malware analysis in cloud computing: network and system characteristics

    Marnerides, A., Watson, M., Shirazi, S. N. U. H., Mauthe, A. & Hutchison, D., 12/2013, Globecom Workshops (GC Wkshps), 2013 IEEE. Piscataway, N.J.: IEEE, p. 482-487 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Malware detection in cloud computing infrastructures

    Watson, M., Shirazi, S. N. U. H., Marnerides, A., Mauthe, A. U. & Hutchison, D., 03/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 192-205 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    Malware detection in migrated virtual machines

    El-Moussa, F., Mauthe, A. U., Marnerides, A. & Watson, M., 7/12/2017, Patent No. 20170351861

    Research output: Patent

  94. Published

    Malware detection in the cloud under ensemble empirical mode decomposition

    Marnerides, A., Spachos, P., Chatzimisios, P. & Mauthe, A. U., 02/2015, Proceedings of 6th International Conference on Computing, Networking and Communications, IEEE ICNC 2015. IEEE, p. 82-88 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Mapping peering interconnections to a facility

    Giotsas, V., Smaragdakis, G., Huffaker, B., Luckie, M. & Claffy, K. C., 1/12/2015, CoNEXT '15 Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. New York: Association for Computing Machinery, Inc, 13 p. 37

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Measurement of video quality

    Andreopoulos, Y., Fisher, P., Deligiannis, N. & Giotsas, V., 2016, Patent No. US20160021376A1, Priority date 17/07/2014

    Research output: Patent

  97. Published

    Measuring the diffusion of marketing messages across a social network

    Rogers, M., Chapman, C. & Giotsas, V., 11/2012, In: Journal of Direct, Data and Digital Marketing Practice. 14, 2, p. 97-130 34 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    Media Query Processing for the Internet-of-Things: Coupling of Device Energy Consumption and Cloud Infrastructure Billing

    Renna, F., Doyle, J., Giotsas, V. & Andreopoulos, Y., 1/12/2016, In: IEEE Transactions on Multimedia. 18, 12, p. 2537-2552 16 p., 7544517.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Mitigating Inter-Network Interference in LoRa Networks

    Voigt, T., Bor, M., Roedig, U. & Alonso, J., 20/02/2017, EWSN ’17 Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks. New York: ACM Press, p. 323-328 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  100. Published

    Modeling Server Workloads for Campus Email Traffic Using Recurrent Neural Networks

    Boukoros, S., Nugaliyadde, A., Marnerides, A., Vassilakis, C., Koutsakis, P. & Wai Wong, K., 14/11/2017, Neural Information Processing. ICONIP 2017. Liu, D., Xie, S., Li, Y., Zhou, D. & El-Alfy, E. S. (eds.). Cham: Springer, p. 57-66 10 p. (Lecture Notes in Computer Science; vol. 10638).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 Next

Back to top