Home > Research > Security > Publications & Outputs
View graph of relations
  1. Chapter (peer-reviewed)
  2. Published

    Towards everlasting privacy and efficient coercion resistance in remote electronic voting

    Grontas, P., Pagourtzis, A., Zacharakis, A. & Zhang, B., 2019, FC 2018 International Workshops, VOTING 18: International Conference on Financial Cryptography and Data Security. Bracciali, A., Pintore, F., Clark, J., Eyal, I., Zohar, A., Teague, V. & Sala, M. (eds.). Cham: Springer Verlag, p. 210-231 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10958 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  3. Chapter
  4. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  12. Published

    Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Conference contribution/Paper
  14. Published

    To me, to you: Towards Secure PLC Programming through a Community-Driven Open-Source Initiative

    Derbyshire, R., Maesschalck, S., Staves, A., Green, B. & Hutchison, D., 31/07/2023, IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 358-362 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Learning to Walk: Towards Assessing the Maturity of OT Security Control Standards and Guidelines

    Staves, A., Maesschalck, S., Derbyshire, R., Green, B. & Hutchison, D., 24/07/2023, 2023 IFIP Networking Conference (IFIP Networking). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Yin, H. & Stavrou, A. (eds.). New York: ACM, p. 3415-3417 3 p. (Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Forthcoming

    Attributes and Dimensions of Trust in Secure Systems

    Bradbury, M., Prince, D., Marcinkiewicz, V. & Watson, T., 7/10/2022, (Accepted/In press) STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. Delft, Netherlands, (ACM Transactions on Internet of Things).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems

    Sailer, P., Ivkic, I., Tauber, M., Mauthe, A. & Gouglidis, A., 30/06/2021, 17th IFIP/IEEE International Symposium on Integrated Network Management (IM 2021): 2nd IEEE/IFIP International Workshop on Management for Industry 4.0 (MFI 4.0). IEEE, p. 908-913 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    A Passion for Security: Intervening to Help Software Developers

    Weir, C., Becker, I. & Blair, L., 25/05/2021, 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, p. 21-30 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 12/08/2020, USENIX Security '20 Proceedings. USENIX Association, p. 289-305 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 7/07/2020, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2020. . Springer, p. 67-88 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    λBGP: Rethinking BGP programmability

    Hart, N., Rotsos, C., Giotsas, V., Race, N. & Hutchison, D., 30/04/2020, 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search

    Zhang, J., Zhang, B. & Lin, J., 19/08/2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 211-219 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Defending Adversarial Attacks on Cloud-aided Automatic Speech Recognition Systems

    Zhang, J., Zhang, B. & Zhang, B., 2/07/2019, SCC '19 Proceedings of the Seventh International Workshop on Security in Cloud Computing. New York: ACM, p. 23-31 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Identifying infected energy systems in the wild

    Marnerides, A., Giotsas, V. & Mursch, T., 25/06/2019, e-Energy 2019 - Proceedings of the 10th ACM International Conference on Future Energy Systems. New York: ACM, p. 263-267 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Blair, L., Becker, I., Noble, J., Sasse, A. & Rashid, A., 25/05/2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice Track. Sharpe, H. & Whalen, M. (eds.). IEEE, p. 41-50 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Communication standards for distributed renewable energy sources integration in future electricity distribution networks

    Jindal, A., Marnerides, A., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 12/05/2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, p. 8390-8393 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things

    Antrobus, R., Green, B., Frey, S. A. F. & Rashid, A., 1/05/2019, Living in the Internet of Things 2019. IET, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Stable and Practical AS Relationship Inference with ProbLink

    Jin, Y., Scott, C., Dhamdhere, A., Giotsas, V., Krishnamurthy, A. & Shenker, S., 26/02/2019, 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI'19). USENIX Association, p. 581-597 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    InfoLeak: Scheduling-based information leakage

    Vateva-Gurova, T., Manzoor, S., Huang, Y. & Suri, N., 11/02/2019, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 44-53 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    On the detection of side-channel attacks

    Vateva-Gurova, T. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 185-186 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B-C., Li, S-C., Huang, Y., Suri, N. & Wang, P-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    FastFI: Accelerating software fault injections

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 193-202 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    On the sustainability of blockchain funding

    Zhang, B. & Balogun, H., 20/11/2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, p. 89-96 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs

    Nomikos, G., Kotronis, V., Sermpezis, P., Gigis, P., Manassakis, L., Dietzel, C., Konstantaras, S., Dimitropoulos, X. & Giotsas, V., 11/2018, IMC '18 Proceedings of the Internet Measurement Conference 2018. New York: Association for Computing Machinery (ACM), p. 265-278 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Light-touch Interventions to Improve Software Development Security

    Weir, C. A. F., Blair, L., Becker, I., Sasse, A. & Noble, J., 25/09/2018, Proceedings of the IEEE Cybersecurity Development Conference 2018. Yeo, D. & Chong, S. (eds.). IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Flashlight: A novel monitoring path identification schema for securing cloud services

    Zhang, H., Luna, J., Suri, N. & Trapero, R., 27/08/2018, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 10 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    CommunityWatch: The Swiss-Army Knife of BGP Anomaly Detection

    Giotsas, V., 16/07/2018, ANRW '18 Proceedings of the Applied Networking Research Workshop. New York: ACM, p. 24 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Message from the Chairs EuroSandP Workshops

    Weir, C. & Fahl, S., 6/07/2018, Proceedings of IEEE European Symposium on Security and Privacy (EuroS&P) 2018. IEEE, p. x 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Gouglidis, A., Grompanopoulos, C. & Mavridou, A., 25/06/2018, Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018). Bliudze, S. & Bensalem, S. (eds.). EPTCS, p. 52-64 13 p. (EPTCS; vol. 272).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    On the Disaster Resiliency within the Context of 5G Networks: The RECODIS Experience

    Esposito, C., Gouglidis, A., Hutchison, D., Gurtov, A., Helvik, B., Heegaard, P., Rizzo, G. & Rak, J., 18/06/2018, European Conference on Networks and Communications 2018. IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Whetstone: Reliable monitoring of cloud services

    Zhang, H., Luna, J., Trapero, R. & Suri, N., 18/06/2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, p. 115-122 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Monitoring path discovery for supporting indirect monitoring of cloud services

    Zhang, H., Manzoor, S., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 274-277 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Threat modeling and analysis for the cloud ecosystem

    Manzoor, S., Zhang, H., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 278-281 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    On the Significance of Process Comprehension for Conducting Targeted ICS Attacks

    Green, B., Krotofil, M. & Abbasi, A., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 57-67 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Inferring BGP blackholing activity in the Internet

    Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A. & Berger, A., 1/11/2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 1-14 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 Next

Back to top