Home > Research > Networking > Publications & Outputs
View graph of relations
  1. Published

    SDN Heading North: Towards a Declarative Intent-based Northbound Interface

    Alalmaei, S., Elkhatib, Y., Bezahaf, M., Broadbent, M. & Race, N., 30/11/2020, 2020 16th International Conference on Network and Service Management (CNSM). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications

    Granby, B., Askwith, R. & Marnerides, A., 10/11/2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP). IEEE, p. 463-466 4 p. (2015 IEEE 23rd International Conference on Network Protocols (ICNP)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    SDQ: Enabling rapid QoE experimentation using Software Defined Networking

    Fawcett, L., Mu, M., Broadbent, M. H., Hart, N. P. & Race, N. J. P., 24/07/2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon, Portugal: IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Hashem-Eiza, M., Shi, Q., Marnerides, A. & Owens, T., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, 6 p. 7510934

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Security assurance assessment methodology for hybrid clouds

    Hudic, A., Smith, P. & Weippl, E. R., 30/09/2017, In: Computers and Security. 70, p. 723-743 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Self-Organization and Resilience for Networked Systems: Design Principles and Open Research Issues

    Dobson, S., Hutchison, D., Mauthe, A. U., Schaeffer-Filho, A. E., Smith, P. & Sterbenz, J. P., 1/04/2019, In: Proceedings of the IEEE . 107, 4, p. 819-834 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Short term power load forecasting using Deep Neural Networks

    Ud Din, G. M. & Marnerides, A., 26/01/2017, 2017 International Conference on Computing, Networking and Communications (ICNC). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Siren: A platform for deploying virtual network services in the cloud to Fog continuum

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 31/05/2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, p. 202-207 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Siren: a platform for deployment of VNFs in distributed infrastructures

    Fawcett, L. & Race, N. J. P., 3/04/2017, SOSR '17 Proceedings of the Symposium on SDN Research. New York: ACM, p. 201-202 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Social telemedia: the relationship between social information and networked media

    Niamut, O., Mu, M., Denazis, S. & Race, N., 1/05/2016, In: Computer. 49, 5, p. 92-97 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Socio-technical security analysis of Industrial Control Systems (ICS)

    Green, B., Prince, D., Roedig, U., Busby, J. & Hutchison, D., 11/09/2014, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. Janicke, H. (ed.). Swindon: BCS Learning and Development Limited, p. 10-14 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Spectrum sharing optimization in cellular networks under target performance and budget restriction

    Asaduzzaman, M., Abozariba, R. & Patwary, M. N., 7/06/2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring). IEEE, 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Stealthy Attacks on Smart Grid PMU State Estimation.

    Paudel, S., Smith, P. & Zseby, T., 2018, ARES. Association for Computing Machinery (ACM), p. 16:1-16:10 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    STPA-SafeSec: Safety and security analysis for cyber-physical systems

    Friedberg, I., McLaughlin, K., Smith, P., Laverty, D. M. & Sezer, S., 30/06/2017, In: Journal of Information Security and Applications. 34, 2, p. 183-196 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Subverting Network Intrusion Detection: Crafting Adversarial Examples Accounting for Domain-Specific Constraints.

    Teuffenbach, M., Piatkowska, E. & Smith, P., 2020, Machine Learning and Knowledge Extraction - 4th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2020, Proceedings. Holzinger, A., Kieseberg, P., Tjoa, A. M. & Weippl, E. (eds.). Springer, p. 301-320 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12279 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Susceptibility to email fraud: a review of psychological perspectives, data-collection methods, and ethical considerations

    Jones, H., Towse, J. & Race, N., 2015, In: International Journal of Cyber Behavior, Psychology and Learning. 5, 3, p. 13-29 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Tackling Energy Theft in Smart Grids through Data-driven Analysis

    Jindal, A., Schaeffer-Filho, A., Marnerides, A., Smith, P., Mauthe, A. & Granville, L., 30/03/2020, 2020 International Conference on Computing, Networking and Communications, ICNC 2020. IEEE, p. 410-414 5 p. 9049793. (2020 International Conference on Computing, Networking and Communications, ICNC 2020).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Technology-related disasters: a survey towards disaster-resilient software defined networks

    Machuca, C. M., Secci, S., Vizaretta, P., Kuipers, F., Gouglidis, A., Hutchison, D., Jouet, S., Pezaros, D., Elmokashfi, A., Heegaard, P., Ristov, S. & Gusev, M., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on . IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    TENNISON: A Distributed SDN Framework for Scalable Network Security

    Fawcett, L., Scott-Hayward, S., Broadbent, M. H., Wright, A. & Race, N. J. P., 12/2018, In: IEEE Journal on Selected Areas in Communications. 36, 12, p. 2805 - 2818 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Testbed diversity as a fundamental principle for effective ICS security research

    Green, B., Frey, S. A. F., Rashid, A. & Hutchison, D., 6/04/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  22. Published

    The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective

    Shirazi, S. N. U. H., Gouglidis, A., Farshad, A. & Hutchison, D., 11/2017, In: IEEE Journal on Selected Areas in Communications. 35, 11, p. 2586-2595 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    The software defined transport network: fundamentals, findings and futures

    King, D., Rotsos, C., Aguado, A., Georgalas, N. & Lopez, V., 10/07/2016, 2016 18th International Conference on Transparent Optical Networks (ICTON). IEEE, p. 1-4 4 p. ( Transparent Optical Networks (ICTON), 2016 18th International Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 30/06/2024, In: IEEE Transactions on Network and Service Management. 21, 3, p. 3623-3635 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top