Home > Research > Networking > Publications & Outputs
View graph of relations
  1. 2014
  2. Published

    Detecting and Preventing Data Exfiltration

    Rashid, A., Ramdhany, R., Edwards, M., Kibirige Mukisa, S., Ali Babar, M., Hutchison, D. & Chitchyan, R., 04/2014, Lancaster: Lancaster University. 40 p.

    Research output: Book/Report/ProceedingsOther report

  3. Published

    OpenCache: leveraging SDN to demonstrate a customisable and configurable cache

    Broadbent, M., Georgopoulos, P., Kotronis, V., Plattner, B. & Race, N., 04/2014, Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on. Piscataway, N.J.: IEEE, p. 151-152 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Performance evaluation of congestion window validation for DASH transport

    Nazir, S., Hossain, Z., Secchi, R., Broadbent, M., Petlund, A. & Fairhurst, G., 19/03/2014, NOSSDAV '14 Proceedings of Network and Operating System Support on Digital Audio and Video Workshop. New York: ACM, 6 p. 67

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    An Architectural Model for Deploying Critical Infrastructure Services in the Cloud.

    Schöller, M., Bless, R., Pallas, F., Horneber, J. & Smith, P., 6/03/2014, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 458-466 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Attack pattern recognition through correlating cyber situational awareness in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 1/03/2014, Cyberpatterns: unifying design patterns with security and attack patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 125-134 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 2014, 23rd International Conference on Computer Communications and Networks (ICCCN 2014). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Design and construction of an Industrial Control System testbed

    Green, B., Paske, B., Hutchison, D. & Prince, D., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  9. Published

    FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles.

    Schmittner, C., Ma, Z. & Smith, P., 2014, Computer Safety, Reliability, and Security. SAFECOMP 2014. : Lecture Notes in Computer Science. Springer, Vol. 8696. p. 282-288 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Management patterns for network resilience: design and verification of policy configurations

    Schaeffer-Filho, A., Smith, P., Mauthe, A. & Hutchison, D., 2014, Cyberpatterns: unifying design patterns with security and attack patterns. Switzerland: Springer International Publishing, Vol. 3. p. 85-95 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Multipath dissemination for collaborative mobile internet access

    Withnell, R. & Edwards, C., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Back to top