Home > Research > Networking > Publications & Outputs
View graph of relations
  1. Conference contribution/Paper
  2. Published

    Performance evaluation of congestion window validation for DASH transport

    Nazir, S., Hossain, Z., Secchi, R., Broadbent, M., Petlund, A. & Fairhurst, G., 19/03/2014, NOSSDAV '14 Proceedings of Network and Operating System Support on Digital Audio and Video Workshop. New York: ACM, 6 p. 67

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    An Architectural Model for Deploying Critical Infrastructure Services in the Cloud.

    Schöller, M., Bless, R., Pallas, F., Horneber, J. & Smith, P., 6/03/2014, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 458-466 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems.

    McLaughlin, K., Sezer, S., Smith, P., Ma, Z. & Skopik, F., 2014, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles.

    Schmittner, C., Ma, Z. & Smith, P., 2014, Computer Safety, Reliability, and Security. SAFECOMP 2014. : Lecture Notes in Computer Science. Springer, Vol. 8696. p. 282-288 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Management patterns for network resilience: design and verification of policy configurations

    Schaeffer-Filho, A., Smith, P., Mauthe, A. & Hutchison, D., 2014, Cyberpatterns: unifying design patterns with security and attack patterns. Switzerland: Springer International Publishing, Vol. 3. p. 85-95 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 2014, 23rd International Conference on Computer Communications and Networks (ICCCN 2014). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Post-processing in wireless sensor networks: Benchmarking sensor trace files

    Bor, M. C., Chatzigiannakis, I., Dulman, S. O., Kikiras, P., Theodoridis, E. & Visser, O. W., 17/10/2010, PE-WASUN'10 - Proceedings of the 7th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, Co-located with MSWiM'10. New York: ACM, p. 40-43 4 p. 1868597. (PE-WASUN'10 - Proceedings of the 7th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, Co-located with MSWiM'10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Other chapter contribution
  11. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  12. Published

    G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games

    Alshawish, A., Amine Abid, M., de Meer, H., Schauer, S., König, S., Gouglidis, A. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice . Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 129-156 28 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  13. Conference paper
  14. Published

    Computer Security for Small Modular Reactors and Microreactors

    Busquim e Silva, R., Anderson, R., Smith, P. & St. John-Green, M., 22/05/2023. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  15. Published

    World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots

    Maesschalck, S., Giotsas, V. & Race, N., 7/12/2021.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  16. Published

    Impact of Content Popularity on Content Finding in NDN: Default NDN vs. Vicinity-based Enhanced NDN: 10th International Conference on Information Science and Technology, ICIST 2020

    Suwannasa, A., Broadbent, M. & Mauthe, A., 5/06/2020, p. 163-168. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  17. Published

    Resolving the Broccoli Problem: Identifying Optimal Computational Algorithms for the Accuracy Assessment of Tree Delineations from Remotely-sensed Data

    Murray, J., Gullick, D. S., Blackburn, G. A., Whyatt, J. D. & Edwards, C. J., 19/04/2018, p. 1. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience

    Gouglidis, A. & Hutchison, D., 10/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  19. Published

    Optimized Resource Sharing for Federated Cloud Services with Desired Performance and Limited OpEx

    Abozariba, R., Anas, A. & Patwary, M. N., 7/12/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  20. Published

    Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

    Green, B., Le, A. T., Antrobus, R., Roedig, U., Hutchison, D. & Rashid, A., 14/08/2017. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  21. Published

    Testbed diversity as a fundamental principle for effective ICS security research

    Green, B., Frey, S. A. F., Rashid, A. & Hutchison, D., 6/04/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  22. Published

    A Multi-Level Approach to Resilience of Critical Infrastructures and Services

    Gouglidis, A., Shirazi, S. N. U. H., Simpson, S., Smith, P. & Hutchison, D., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  23. Published

    A perspective on defining the collective adaptive systems problem

    Suri, N. & Scott, A., 09/2014, p. 26-31. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  24. Published

    Dealing with big data outside of the cloud: GPU accelerated sort

    Vidler, J., Rayson, P., Anthony, L., Scott, A. & Mariani, J., 31/05/2014, p. 21-24. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  25. Published

    Investigating the structural condition of trees using LiDAR metrics

    Murray, J., Blackburn, A., Whyatt, D. & Edwards, C., 18/04/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  26. Published

    Design and construction of an Industrial Control System testbed

    Green, B., Paske, B., Hutchison, D. & Prince, D., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  27. Published

    Multipath dissemination for collaborative mobile internet access

    Withnell, R. & Edwards, C., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  28. Poster
  29. Published

    Citrus: Orchestrating Security Mechanisms via Adversarial Deception

    Mills, R., Broadbent, M. & Race, N., 24/04/2020. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  30. Published

    UNIMON: Lightweight Bottleneck Detection for Virtualized Network Services

    Fantom, W., 5/12/2018. 1 p.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  31. Published

    Towards Adaptive Traffic Flow Optimizations with Unikernel-based VNFs

    Jung, A. & Rotsos, C. (Editor), 11/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  32. Published

    Experience in Porting a Seismic Imaging Kernel to Multiple GPUs

    Alalmaei, S., Feki, S. & Keyes, D., 2017.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  33. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 08/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  34. Published

    OpenCL as Wireless Sensor Network programming abstraction

    Bor, M. & Roedig, U., 12/05/2014. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  35. Abstract
  36. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  37. Article
  38. Published

    Unikraft and the Coming of Age of Unikernels

    Lefeuvre, H., Gain, G., Dinca, D., Jung, A., Kuenzer, S., Bădoiu, V.-A., Deaconescu, R., Mathy, L., Raiciu, C., Olivier, P. & Huici, F., 12/07/2021, ;login.

    Research output: Contribution to specialist publicationArticle

  39. Doctoral Thesis
  40. Published

    Improving Network and Middlebox Resilience with Virtualisation

    Hill, L., 2025, Lancaster University. 172 p.

    Research output: ThesisDoctoral Thesis

  41. Published
  42. Published

    Enhancing and Protecting Intrusion Detection Systems Using P4-Enabled Data Planes

    Lewis, B., 2024, Lancaster University. 207 p.

    Research output: ThesisDoctoral Thesis

  43. Published

    On Energy Theft Attack Detection in Smart Grids Using Machine Learning

    Althobaiti, A., 16/11/2023, Lancaster University. 154 p.

    Research output: ThesisDoctoral Thesis

  44. Published

    Enhancing Anomaly Detection Techniques for Emerging Threats

    Mills, R., 15/10/2022, Lancaster University. 176 p.

    Research output: ThesisDoctoral Thesis

  45. Published

    Improved Content Finding in Named Data Networking

    Suwannasa, A., 2021, Lancaster University. 202 p.

    Research output: ThesisDoctoral Thesis

  46. Published

    Scalable and responsive SDN monitoring and remediation for the Cloud-to-Fog continuum

    Fawcett, L., 26/09/2019, Lancaster University. 220 p.

    Research output: ThesisDoctoral Thesis

  47. Published

    OpenCache: a content delivery platform for the modern internet

    Broadbent, M. H., 2016, Lancaster University. 191 p.

    Research output: ThesisDoctoral Thesis

  48. Other contribution
  49. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  50. Published

    Protection against Cyber Attacks: Introducing Resilience for SCADA Networks

    Gouglidis, A. & Hutchison, D., 03/2017, 1 p. AIT Austrian Institute of Technology GmbH.

    Research output: Other contribution

  51. Published
  52. Patent
  53. Published

    Malware detection in migrated virtual machines

    El-Moussa, F. (Inventor), Mauthe, A. U. (Inventor), Marnerides, A. (Inventor) & Watson, M. (Inventor), 7/12/2017, Patent No. 20170351861

    Research output: Patent

  54. Journal article
  55. Published

    REMEDIATE: Improving Network and Middlebox Resilience with Virtualisation

    Hill, L., Rotsos, C., Edwards, C. & Hutchison, D., 31/01/2025, In: International Journal of Network Management. 35, 1, e2317.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 30/06/2024, In: IEEE Transactions on Network and Service Management. 21, 3, p. 3623-3635 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology

    Staves, A., Gouglidis, A., Maesschalck, S. & Hutchison, D., 30/06/2024, In: Safety Science. 174, 106481.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Adaptive Energy Theft Detection in Smart Grids Using Self-Learning With Dual Neural Network

    Althobaiti, A., Rotsos, C. & Marnerides, A. K., 29/02/2024, In: IEEE Transactions on Industrial Informatics. 20, 2, 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Goosewolf: An Embedded Intrusion Detection System for Advanced Programmable Logic Controllers

    Allison, D., McLaughlin, K. & Smith, P., 31/12/2023, In: Digital Threats: Research and Practice. 4, 4, p. 1-19 19 p., 59.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    4MIDable: Flexible Network Offloading For Security VNFs

    Lewis, B., Broadbent, M., Rotsos, C. & Race, N., 31/07/2023, In: Journal of Network and Systems Management. 31, 3, 52.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top