Home > Research > i-DID > Publications & Outputs
View graph of relations
  1. 2014
  2. Published

    Cyber policing in the North West: regional and local co-ordination

    Prince, D. D. C., 4/09/2014, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  3. Published

    An open testing framework for next-generation openflow switches

    Rotsos, C., Antichi, G., Bruyere, M., Owezarski, P. & Moore, A. W., 1/09/2014, 2014 Third European Workshop on Software Defined Networks (EWSDN). IEEE, p. 127-128 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published
  5. Published

    OpenCL as Wireless Sensor Network programming abstraction

    Bor, M. & Roedig, U., 12/05/2014. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  6. Published

    Cyber-security challenges of agent technology in intelligent transportation systems

    Kibirige Mukisa, S. & Rashid, A., 6/05/2014, ACySE '14 Proceedings of the 1st International Workshop on Agents and CyberSecurity. New York: ACM, 4 p. 9

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Content Relevance Opportunistic Routing for Wireless Multimedia Sensor Networks

    Spachos, P., Marnerides, A. & Hatzinakos, D., 27/04/2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, p. 263-268 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Detecting and Preventing Data Exfiltration

    Rashid, A., Ramdhany, R., Edwards, M., Kibirige Mukisa, S., Ali Babar, M., Hutchison, D. & Chitchyan, R., 04/2014, Lancaster: Lancaster University. 40 p.

    Research output: Book/Report/ProceedingsOther report

  9. Published

    Design and construction of an Industrial Control System testbed

    Green, B., Paske, B., Hutchison, D. & Prince, D., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  10. Published

    Improving the Accuracy of the Internet Cartography

    Giotsas, V., 2014

    Research output: ThesisDoctoral Thesis

  11. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. 2013
  13. Published

    Malware analysis in cloud computing: network and system characteristics

    Marnerides, A., Watson, M., Shirazi, S. N. U. H., Mauthe, A. & Hutchison, D., 12/2013, Globecom Workshops (GC Wkshps), 2013 IEEE. Piscataway, N.J.: IEEE, p. 482-487 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Technology could be "aggravating" factor in sentencing

    Prince, D. & Hargreaves, C., 11/2013, Benchmark, 1, 72, p. 23-24 2 p.

    Research output: Contribution to specialist publicationArticle

  15. Published

    On the comprehension of DSL SyncTrap events in IPTV networks

    Marnerides, A., Malinowski, S., Morla, R., Rodrigues, M. R. D. & Kim, H. S., 7/07/2013, 2013 IEEE Symposium on Computers and Communications (ISCC) . IEEE, p. 670-675 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Understanding cyber criminals and measuring their future activity

    Hargreaves, C. & Prince, D., 1/07/2013, Lancaster: Lancaster University. (Future of ...)

    Research output: Book/Report/ProceedingsOther report

  17. Published

    A multilevel approach towards challenge detection in cloud computing

    Shirazi, S. N. U. H., Watson, M., Marnerides, A., Mauthe, A. & Hutchison, D., 07/2013, Cyberpatterns 2013 : Proceedings of the Second International Workshop on Cyberpatterns . Oxford: Oxford Brookes University, p. 103-107 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    The future of digital disrupters: rethinking the digital divide

    Lacy, M. & Prince, D., 12/06/2013, Lancaster: Lancaster University. 46 p. (Future of...)

    Research output: Book/Report/ProceedingsOther report

  19. Published

    Internet traffic classification using energy time-frequency distributions

    Marnerides, A., Pezaros, D., Kim, H. & Hutchison, D., 9/06/2013, 2013 IEEE International Conference on Communications (ICC). IEEE, p. 2513-2518 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Small business cyber security workshop 2013: towards digitally secure business growth

    Prince, D. & King, N., 29/04/2013, Lancaster: Lancaster University. 22 p.

    Research output: Book/Report/ProceedingsOther report

  21. Published

    AS relationships, customer cones, and validation

    Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V. & Claffy, K., 2013, IMC '13 Proceedings of the 2013 conference on Internet measurement conference. New York: ACM, p. 243-256 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Improving the discovery of IXP peering links through passive BGP measurements

    Giotsas, V. & Zhou, S., 2013, 2013 Proceedings IEEE INFOCOM . IEEE, p. 3249-3254 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Inferring multilateral peering

    Giotsas, V., Zhou, S., Luckie, M. & Claffy, K., 2013, CoNEXT '13 Proceedings of the ninth ACM conference on Emerging networking experiments and technologies. New York: ACM, p. 247-258 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research

    Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P. & Jones, K., 2013.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  25. 2012
  26. Published

    Towards the improvement of diagnostic metrics Fault diagnosis for DSL-Based IPTV networks using the Rényi entropy

    Marnerides, A., Malinowski, S., Morla, R., Rodrigues, M. R. D. & Kim, H. S., 3/12/2012, 2012 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 2779-2784 6 p. (2012 IEEE Global Communications Conference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Measuring the diffusion of marketing messages across a social network

    Rogers, M., Chapman, C. & Giotsas, V., 11/2012, In: Journal of Direct, Data and Digital Marketing Practice. 14, 2, p. 97-130 34 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Small Business Cyber Security Survey 2012

    Prince, D. & King, N., 10/2012, Lancaster: Lancaster University. 38 p.

    Research output: Book/Report/ProceedingsOther report

Back to top