Home > Research > Networking > Publications & Outputs
View graph of relations
  1. Published

    Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Dynamic Spectrum Sharing Optimization and Post-optimization Analysis with Multiple Operators in Cellular Networks

    Asaduzzaman, M., Abozariba, R. & Patwary, M. N., 03/2018, In: IEEE Transactions on Wireless Communications. 17, 3, p. 1589-1603 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Efficient access of mobile flows to heterogeneous networks under flash crowds

    Moura, J. & Edwards, C. J., 9/10/2016, In: Computer Networks. 107, 2, p. 163-177 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Efficient mobility and multihoming support for mountain rescue

    Alsukayti, I. & Edwards, C., 5/10/2015, 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, p. 128-135 8 p. 1570179155

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks

    Hashem Eiza, M., Shi, Q., Marnerides, A., Owens, T. & Ni, Q., 01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 19-33 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Email fraud: The search for psychological predictors of susceptibility

    Jones, H., Towse, J. N., Race, N. J. P. & Harrison, T., 16/01/2019, In: PLoS ONE. 14, 1, 15 p., e0209684.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Enabling exercises, education and research with a comprehensive cyber range

    Leitner, M., Frank, M., Langner, G., Landauer, M., Skopik, F., Smith, P., Akhras, B., Hotwagner, W., Kucek, S., Pahi, T., Reuter, L. & Warum, M., 31/12/2021, In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 12, 4, p. 37-61 25 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Enabling performance evaluation beyond 10 Gbps

    Antichi, G., Rotsos, C. & Moore, A. W., 17/08/2015, Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. New York, NY, USA: ACM, p. 369-370 2 p. (SIGCOMM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods

    Althobaiti, A., Jindal, A., Marnerides, A. & Roedig, U., 30/11/2021, In: IEEE Access. 9, p. 159291-159312 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Enhancing and Protecting Intrusion Detection Systems Using P4-Enabled Data Planes

    Lewis, B., 2024, Lancaster University. 207 p.

    Research output: ThesisDoctoral Thesis

Previous 1...5 6 7 8 9 10 11 12 ...26 Next

Back to top