Home > Research > Security > Publications & Outputs
View graph of relations
  1. Published

    SeReCP: A secure and reliable communication platform for the smart grid

    Demir, K., Suri, N., M., K. (Editor), D.S., K. (Editor) & V., V. (Editor), 22/01/2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 175-184 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Towards DDoS attack resilient wide area monitoring systems

    Demir, K. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 7 p. 99

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Assessing privacy capabilities of cloud service providers

    Del Alamo, J. M., Trapero, R., Martin, Y. S., Yelmo, J. C. & Suri, N., 1/11/2015, In: IEEE Latin America Transactions. 13, 11, p. 3634-3641 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Sibyl: A Practical Internet Route Oracle

    Cunha, I., Marchetta, P., Calder, M., Chiu, Y.-C., Machado, B. V. A., Pescapè, A., Giotsas, V., Madhyastha, H. V. & Katz-Bassett, E., 03/2016, 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, p. 325-344 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    TrEKer: Tracing error propagation in operating system kernels

    Coppik, N., Schwahn, O., Winter, S., Suri, N., T.N., N. (Editor), G., R. & M., D. P., 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 377-387 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Composite vulnerabilities in Cyber Physical Systems

    Ciholas, P. & Such, J. M., 6/04/2016, p. 4-7. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Published

    The Security of Smart Buildings - A Systematic Literature Review

    Ciholas, P., Lennie, A., Sadigova, P. & Such, J. M., 28/01/2019, In: arXiv. 50 p.

    Research output: Contribution to Journal/MagazineJournal article

  9. Published

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 7/07/2020, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2020. . Springer, p. 67-88 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    D-DEMOS: a distributed, end-to-end verifiable, internet voting system

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 27/06/2016, Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016) . IEEE, p. 711-720 10 p. (2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Distributed, end-to-end verifiable, and privacy-preserving internet voting systems

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 1/06/2019, In: Computers and Security. 83, p. 268-299 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants

    Chan, A., Winter, S., Saissi, H., Pattabiraman, K. & Suri, N., 13/03/2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, p. 184-195 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Modelling security risk in critical utilities: the system at risk as a three player game and agent society

    Busby, J. S., Gouglidis, A., Rass, S. & König, S., 9/10/2016, Proceedings of SMC 2016. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In: Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Forthcoming

    Attributes and Dimensions of Trust in Secure Systems

    Bradbury, M., Prince, D., Marcinkiewicz, V. & Watson, T., 7/10/2022, (Accepted/In press) STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. Delft, Netherlands, (ACM Transactions on Internet of Things).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Transformers: Intrusion Detection Data In Disguise

    Boorman, J., Prince, D. & Green, B., 18/09/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  17. Published

    A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems

    Birkholz, H., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Arul, T., Heinrich, M., Katzenbeisser, S., Suri, N., Vateva-Gurova, T. & Schlehuber, C., 25/06/2018. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    Indistinguishable proofs of work or knowledge

    Baldimtsi, F., Kiayias, A., Zacharias, T. & Zhang, B., 4/12/2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. Cheon, J. H. & Takagi, T. (eds.). Heidelberg: Springer, p. 902-933 32 p. (Lecture Notes in Computer Science; vol. 10032).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    SimaticScan: towards a specialised vulnerability scanner for industrial control systems

    Antrobus, R., Frey, S., Green, B. & Rashid, A., 23/08/2016, Proceedings 4th International Symposium for ICS & SCADA Cyber Security Research. BCS

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things

    Antrobus, R., Green, B., Frey, S. A. F. & Rashid, A., 1/05/2019, Living in the Internet of Things 2019. IET, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Measurement of video quality

    Andreopoulos, Y. (Inventor), Fisher, P. (Inventor), Deligiannis, N. (Inventor) & Giotsas, V. (Inventor), 2016, Patent No. US20160021376A1, Priority date 17/07/2014

    Research output: Patent

  22. Published

    G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games

    Alshawish, A., Amine Abid, M., de Meer, H., Schauer, S., König, S., Gouglidis, A. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice . Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 129-156 28 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  23. Published

    Adaptive hybrid compression for wireless sensor networks

    Ali, A., Khelil, A., Suri, N. & Mahmudimanesh, M., 1/12/2015, In: ACM Transactions on Sensor Networks. 11, 4, 36 p., 53.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes

    Ali, A., Khelil, A. & Suri, N., 7/01/2016, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Foreword from the QASA 2016 program chairs

    Aldini, A., Martinelli, F., Suri, N., G., L. (Editor), A., A. (Editor), V., T. (Editor), F., M. (Editor) & N., S., 2016, Springer.

    Research output: Book/Report/ProceedingsBook

  26. Published

    Foreword from the QASA 2014 program chairs

    Aldini, A., Martinelli, F., Suri, N., J., P. (Editor), N., S., E., L. (Editor), J., H.-J. (Editor), J., G.-A., F., M. & A., A., 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Springer-Verlag, Vol. 8872. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  27. Published

    Foreword from the QASA 2015 chairs

    Aldini, A., Martinelli, F., Suri, N., G., N.-A. (Editor), A., A., F., M., N., S. & J., G.-A. (Editor), 21/09/2015, Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers. Springer-Verlag, Vol. 9481. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  28. Published

    C'MON: Monitoring the compliance of cloud services to contracted properties

    Alboghdady, S., Winter, S., Taha, A., Zhang, H. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 6 36

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Developers Need Support, Too: A Survey of Security Advice for Software Developers

    Acar, Y., Stransky, C., Wermke, D., Weir, C. A. F., Mazurek, M. & Fahl, S., 24/09/2017, Proceedings of the IEEE Secure Development Conference 2017. Jaeger, T. (ed.). IEEE, p. 22-26 5 p. 17

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 Next

Back to top