Home > Research > Networking > Publications & Outputs
View graph of relations
  1. Journal article
  2. Published

    Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Enabling exercises, education and research with a comprehensive cyber range

    Leitner, M., Frank, M., Langner, G., Landauer, M., Skopik, F., Smith, P., Akhras, B., Hotwagner, W., Kucek, S., Pahi, T., Reuter, L. & Warum, M., 31/12/2021, In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 12, 4, p. 37-61 25 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods

    Althobaiti, A., Jindal, A., Marnerides, A. & Roedig, U., 30/11/2021, In: IEEE Access. 9, p. 159291-159312 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Self-Organization and Resilience for Networked Systems: Design Principles and Open Research Issues

    Dobson, S., Hutchison, D., Mauthe, A. U., Schaeffer-Filho, A. E., Smith, P. & Sterbenz, J. PG., 1/04/2019, In: Proceedings of the IEEE . 107, 4, p. 819-834 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends

    Moura, J. A. & Hutchison, D., 1/03/2019, In: Communications Surveys and Tutorials, IEEE Communications Society. 21, 1, p. 260-288 29 p., 8424815.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Email fraud: The search for psychological predictors of susceptibility

    Jones, H., Towse, J. N., Race, N. J. P. & Harrison, T., 16/01/2019, In: PLoS ONE. 14, 1, 15 p., e0209684.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks

    Hashem Eiza, M., Shi, Q., Marnerides, A., Owens, T. & Ni, Q., 01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 19-33 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    TENNISON: A Distributed SDN Framework for Scalable Network Security

    Fawcett, L., Scott-Hayward, S., Broadbent, M. H., Wright, A. & Race, N. J. P., 12/2018, In: IEEE Journal on Selected Areas in Communications. 36, 12, p. 2805 - 2818 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Using fractal analysis of crown images to measure the structural condition of trees

    Murray, J., Blackburn, G. A., Whyatt, J. D. & Edwards, C. J., 10/2018, In: Forestry. 91, 4, p. 480-491 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...26 Next

Back to top