Home > Research > Networking > Publications & Outputs
View graph of relations
  1. 2018
  2. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  3. Published

    Stealthy Attacks on Smart Grid PMU State Estimation.

    Paudel, S., Smith, P. & Zseby, T., 2018, ARES. Association for Computing Machinery (ACM), p. 16:1-16:10 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. 2017
  5. Published

    Evidential Network Modeling for Cyber-Physical System State Inference.

    Friedberg, I., Hong, X., McLaughlin, K., Smith, P. & Miller, P. C., 31/12/2017, In: IEEE Access. 5, p. 17149-17164 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Malware detection in migrated virtual machines

    El-Moussa, F., Mauthe, A. U., Marnerides, A. & Watson, M., 7/12/2017, Patent No. 20170351861

    Research output: Patent

  7. Published

    Optimized Resource Sharing for Federated Cloud Services with Desired Performance and Limited OpEx

    Abozariba, R., Anas, A. & Patwary, M. N., 7/12/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Published

    Modeling Server Workloads for Campus Email Traffic Using Recurrent Neural Networks

    Boukoros, S., Nugaliyadde, A., Marnerides, A., Vassilakis, C., Koutsakis, P. & Wai Wong, K., 14/11/2017, Neural Information Processing. ICONIP 2017. Liu, D., Xie, S., Li, Y., Zhou, D. & El-Alfy, E. S. (eds.). Cham: Springer, p. 57-66 10 p. (Lecture Notes in Computer Science; vol. 10638).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Adaptive bitrate selection: a survey

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 11/2017, In: Communications Surveys and Tutorials, IEEE Communications Society. 19, 4, p. 2985-3014 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Network service orchestration standardization: a technology survey

    Rotsos, C., King, D., Farshad, A., Bird, J., Fawcett, L., Georgalas, N., Gunkel, M., Shiomoto, K., Wang, A., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 11/2017, In: Computer Standards and Interfaces. 54, 4, p. 203-215 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective

    Shirazi, S. N. U. H., Gouglidis, A., Farshad, A. & Hutchison, D., 11/2017, In: IEEE Journal on Selected Areas in Communications. 35, 11, p. 2586-2595 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1...6 7 8 9 10 11 12 13 ...26 Next

Back to top