Home > Research > Networking > Publications & Outputs
View graph of relations
  1. Conference contribution/Paper
  2. Published

    PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems.

    McLaughlin, K., Sezer, S., Smith, P., Ma, Z. & Skopik, F., 2014, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles.

    Schmittner, C., Ma, Z. & Smith, P., 2014, Computer Safety, Reliability, and Security. SAFECOMP 2014. : Lecture Notes in Computer Science. Springer, Vol. 8696. p. 282-288 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Management patterns for network resilience: design and verification of policy configurations

    Schaeffer-Filho, A., Smith, P., Mauthe, A. & Hutchison, D., 2014, Cyberpatterns: unifying design patterns with security and attack patterns. Switzerland: Springer International Publishing, Vol. 3. p. 85-95 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 2014, 23rd International Conference on Computer Communications and Networks (ICCCN 2014). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Post-processing in wireless sensor networks: Benchmarking sensor trace files

    Bor, M. C., Chatzigiannakis, I., Dulman, S. O., Kikiras, P., Theodoridis, E. & Visser, O. W., 17/10/2010, PE-WASUN'10 - Proceedings of the 7th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, Co-located with MSWiM'10. New York: ACM, p. 40-43 4 p. 1868597. (PE-WASUN'10 - Proceedings of the 7th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, Co-located with MSWiM'10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Other chapter contribution
  9. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  10. Published

    G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games

    Alshawish, A., Amine Abid, M., de Meer, H., Schauer, S., König, S., Gouglidis, A. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice . Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 129-156 28 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  11. Conference paper
  12. Published

    Computer Security for Small Modular Reactors and Microreactors

    Busquim e Silva, R., Anderson, R., Smith, P. & St. John-Green, M., 22/05/2023. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  13. Published

    World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots

    Maesschalck, S., Giotsas, V. & Race, N., 7/12/2021.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  14. Published

    Impact of Content Popularity on Content Finding in NDN: Default NDN vs. Vicinity-based Enhanced NDN: 10th International Conference on Information Science and Technology, ICIST 2020

    Suwannasa, A., Broadbent, M. & Mauthe, A., 5/06/2020, p. 163-168. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  15. Published

    Resolving the Broccoli Problem: Identifying Optimal Computational Algorithms for the Accuracy Assessment of Tree Delineations from Remotely-sensed Data

    Murray, J., Gullick, D. S., Blackburn, G. A., Whyatt, J. D. & Edwards, C. J., 19/04/2018, p. 1. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  16. Published

    Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience

    Gouglidis, A. & Hutchison, D., 10/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  17. Published

    Optimized Resource Sharing for Federated Cloud Services with Desired Performance and Limited OpEx

    Abozariba, R., Anas, A. & Patwary, M. N., 7/12/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

    Green, B., Le, A. T., Antrobus, R., Roedig, U., Hutchison, D. & Rashid, A., 14/08/2017. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  19. Published

    Testbed diversity as a fundamental principle for effective ICS security research

    Green, B., Frey, S. A. F., Rashid, A. & Hutchison, D., 6/04/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  20. Published

    A Multi-Level Approach to Resilience of Critical Infrastructures and Services

    Gouglidis, A., Shirazi, S. N. U. H., Simpson, S., Smith, P. & Hutchison, D., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  21. Published

    A perspective on defining the collective adaptive systems problem

    Suri, N. & Scott, A., 09/2014, p. 26-31. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  22. Published

    Dealing with big data outside of the cloud: GPU accelerated sort

    Vidler, J., Rayson, P., Anthony, L., Scott, A. & Mariani, J., 31/05/2014, p. 21-24. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  23. Published

    Investigating the structural condition of trees using LiDAR metrics

    Murray, J., Blackburn, A., Whyatt, D. & Edwards, C., 18/04/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  24. Published

    Multipath dissemination for collaborative mobile internet access

    Withnell, R. & Edwards, C., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  25. Published

    Design and construction of an Industrial Control System testbed

    Green, B., Paske, B., Hutchison, D. & Prince, D., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  26. Poster
  27. Published

    Citrus: Orchestrating Security Mechanisms via Adversarial Deception

    Mills, R., Broadbent, M. & Race, N., 24/04/2020. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  28. Published

    UNIMON: Lightweight Bottleneck Detection for Virtualized Network Services

    Fantom, W., 5/12/2018. 1 p.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  29. Published

    Towards Adaptive Traffic Flow Optimizations with Unikernel-based VNFs

    Jung, A. & Rotsos, C. (ed.), 11/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  30. Published

    Experience in Porting a Seismic Imaging Kernel to Multiple GPUs

    Alalmaei, S., Feki, S. & Keyes, D., 2017.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  31. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 08/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  32. Published

    OpenCL as Wireless Sensor Network programming abstraction

    Bor, M. & Roedig, U., 12/05/2014. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  33. Abstract
  34. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  35. Article
  36. Published

    Unikraft and the Coming of Age of Unikernels

    Lefeuvre, H., Gain, G., Dinca, D., Jung, A., Kuenzer, S., Bădoiu, V-A., Deaconescu, R., Mathy, L., Raiciu, C., Olivier, P. & Huici, F., 12/07/2021, ;login.

    Research output: Contribution to specialist publicationArticle

  37. Doctoral Thesis
  38. Published
  39. Published

    Enhancing and Protecting Intrusion Detection Systems Using P4-Enabled Data Planes

    Lewis, B., 2024, Lancaster University. 207 p.

    Research output: ThesisDoctoral Thesis

  40. Published

    On Energy Theft Attack Detection in Smart Grids Using Machine Learning

    Althobaiti, A., 16/11/2023, Lancaster University. 154 p.

    Research output: ThesisDoctoral Thesis

  41. Published

    Enhancing Anomaly Detection Techniques for Emerging Threats

    Mills, R., 15/10/2022, Lancaster University. 176 p.

    Research output: ThesisDoctoral Thesis

  42. Published

    Improved Content Finding in Named Data Networking

    Suwannasa, A., 2021, Lancaster University. 202 p.

    Research output: ThesisDoctoral Thesis

  43. Published

    Scalable and responsive SDN monitoring and remediation for the Cloud-to-Fog continuum

    Fawcett, L., 26/09/2019, Lancaster University. 220 p.

    Research output: ThesisDoctoral Thesis

  44. Published

    OpenCache: a content delivery platform for the modern internet

    Broadbent, M. H., 2016, Lancaster University. 191 p.

    Research output: ThesisDoctoral Thesis

  45. Other contribution
  46. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  47. Published

    Protection against Cyber Attacks: Introducing Resilience for SCADA Networks

    Gouglidis, A. & Hutchison, D., 03/2017, 1 p. AIT Austrian Institute of Technology GmbH.

    Research output: Other contribution

  48. Published
  49. Patent
  50. Published

    Malware detection in migrated virtual machines

    El-Moussa, F., Mauthe, A. U., Marnerides, A. & Watson, M., 7/12/2017, Patent No. 20170351861

    Research output: Patent

  51. Journal article
  52. Published

    Adaptive Energy Theft Detection in Smart Grids Using Self-Learning With Dual Neural Network

    Althobaiti, A., Rotsos, C. & Marnerides, A. K., 29/02/2024, In: IEEE Transactions on Industrial Informatics. 20, 2, 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. E-pub ahead of print

    Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology

    Staves, A., Gouglidis, A., Maesschalck, S. & Hutchison, D., 30/06/2024, In: Safety Science. 174, 106481.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. E-pub ahead of print

    These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 5/02/2024, (E-pub ahead of print) In: IEEE Transactions on Network and Service Management.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Published

    Goosewolf: An Embedded Intrusion Detection System for Advanced Programmable Logic Controllers

    Allison, D., McLaughlin, K. & Smith, P., 31/12/2023, In: Digital Threats: Research and Practice. 4, 4, p. 1-19 19 p., 59.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    4MIDable: Flexible Network Offloading For Security VNFs

    Lewis, B., Broadbent, M., Rotsos, C. & Race, N., 31/07/2023, In: Journal of Network and Systems Management. 31, 3, 52.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    An ICT Architecture for Enabling Ancillary Services in Distributed Renewable Energy Sources Based on the SGAM Framework

    Stocker, A., Alshawish, A., Bor, M., Vidler, J., Gouglidis, A., Scott, A., Marnerides, A., de Meer, H. & Hutchison, D., 12/05/2022, In: Energy Informatics. 5, 1, 5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Practical Intrusion Detection of Emerging Threats

    Mills, R., Marnerides, A., Broadbent, M. & Race, N., 31/03/2022, In: IEEE Transactions on Network and Service Management. 19, 1, p. 582-600 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Enabling exercises, education and research with a comprehensive cyber range

    Leitner, M., Frank, M., Langner, G., Landauer, M., Skopik, F., Smith, P., Akhras, B., Hotwagner, W., Kucek, S., Pahi, T., Reuter, L. & Warum, M., 31/12/2021, In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 12, 4, p. 37-61 25 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top