Home > Research > Security > Publications & Outputs
View graph of relations
  1. 2017
  2. Published

    Developers Need Support, Too: A Survey of Security Advice for Software Developers

    Acar, Y., Stransky, C., Wermke, D., Weir, C. A. F., Mazurek, M. & Fahl, S., 24/09/2017, Proceedings of the IEEE Secure Development Conference 2017. Jaeger, T. (ed.). IEEE, p. 22-26 5 p. 17

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    C'MON: Monitoring the compliance of cloud services to contracted properties

    Alboghdady, S., Winter, S., Taha, A., Zhang, H. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 6 36

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Towards DDoS attack resilient wide area monitoring systems

    Demir, K. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 7 p. 99

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (Editor), Tonetta, S. (Editor) & Schoitsch, E. (Editor), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Safety verification utilizing model-based development for safety critical cyber-physical systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 15/08/2017, In: Journal of Information Processing Systems. 25, p. 797-810 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

    Green, B., Le, A. T., Antrobus, R., Roedig, U., Hutchison, D. & Rashid, A., 14/08/2017. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Published

    Detecting peering infrastructure outages in the wild

    Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A. & Aben, E., 7/08/2017, SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication. New York: Association for Computing Machinery, Inc, p. 446-459 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Panning for gold: automatically analysing online social engineering attack surfaces

    Edwards, M., Larson, R., Green, B., Rashid, A. & Baron, A., 08/2017, In: Computers and Security. 69, p. 18-34 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Brief announcement: statement voting and liquid democracy

    Zhang, B. & Zhou, H.-S., 25/07/2017, PODC '17 Proceedings of the ACM Symposium on Principles of Distributed Computing. New York: ACM, p. 359-361 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In: Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In: IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In: Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    DeQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

    Zhang, H., Trapero, R., Luna, J., Suri, N., X., L. & U., B., 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (Editor) & M., L. (Editor), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    An Efficient E2E Verifiable E-voting System without Setup Assumptions

    Kiayias, A., Zacharias, T. & Zhang, B., 1/05/2017, In: IEEE Security and Privacy Magazine. 15, 3, p. 14-23 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    I'd Like to Have an Argument, Please: Using Dialectic for Effective App Security

    Weir, C., Rashid, A. & Noble, J., 29/04/2017, EuroUSEC 2017: the 2nd European Workshop on Usable Security. Reston, VA: Internet Society, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Challenges and approaches in securing safety-relevant railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S. & Suri, N., 26/04/2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 139-145 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Developer Essentials: Top Five Interventions to Support Secure Software Development

    Weir, C., Rashid, A. & Noble, J., 30/03/2017, Lancaster: Lancaster University. 9 p.

    Research output: Book/Report/ProceedingsCommissioned report

  22. Published

    Verification of Resilience Policies that Assist Attribute Based Access Control

    Gouglidis, A., Hu, V. C., Busby, J. S. & Hutchison, D., 24/03/2017, ABAC '17 Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control. New York: ACM, p. 43-52 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants

    Chan, A., Winter, S., Saissi, H., Pattabiraman, K. & Suri, N., 13/03/2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, p. 184-195 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    P2P routing table poisoning: A quorum-based sanitizing approach

    Ismail, H., Germanus, D. & Suri, N., 1/03/2017, In: Computers and Security. 65, p. 283-299 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Ceremonies for end-to-end verifiable elections

    Kiayias, A., Zacharias, T. & Zhang, B., 03/2017, PKC 2017: Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Editors (view affiliations). Springer, p. 305-334 30 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Protection against Cyber Attacks: Introducing Resilience for SCADA Networks

    Gouglidis, A. & Hutchison, D., 03/2017, 1 p. AIT Austrian Institute of Technology GmbH.

    Research output: Other contribution

  28. Published

    SeReCP: A secure and reliable communication platform for the smart grid

    Demir, K., Suri, N., M., K. (Editor), D.S., K. (Editor) & V., V. (Editor), 22/01/2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 175-184 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Robust QoS-aware communication in the smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 1/01/2017, In: Peer-to-Peer Networking and Applications. 10, 1, p. 193-207 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Unpublished

    EmerGen(e)tic: Exploring the use of genetic algorithms in emergent distributed systems

    Goldsworthy, B. & Porter, B. (Editor), 2017, (Unpublished) 47 p.

    Research output: Other contribution

  31. Published

    How to Improve the Security Skills of Mobile App Developers: An Analysis of Expert Knowledge

    Weir, C., 2017, Lancaster University. 135 p.

    Research output: ThesisMaster's Thesis

  32. 2016
  33. Published

    Indistinguishable proofs of work or knowledge

    Baldimtsi, F., Kiayias, A., Zacharias, T. & Zhang, B., 4/12/2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. Cheon, J. H. & Takagi, T. (eds.). Heidelberg: Springer, p. 902-933 32 p. (Lecture Notes in Computer Science; vol. 10032).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Media Query Processing for the Internet-of-Things: Coupling of Device Energy Consumption and Cloud Infrastructure Billing

    Renna, F., Doyle, J., Giotsas, V. & Andreopoulos, Y., 1/12/2016, In: IEEE Transactions on Multimedia. 18, 12, p. 2537-2552 16 p., 7544517.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    BGPStream: A software framework for live and historical BGP data analysis

    Orsini, C., King, A., Giordano, D., Giotsas, V. & Dainotti, A., 14/11/2016, IMC '16 Proceedings of the 2016 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 429-444 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Reaching the Masses: A New Subdiscipline of App Programmer Education

    Weir, C., Rashid, A. & Noble, J., 13/11/2016, FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York: ACM, p. 936-939 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Achieving ICS resilience and security through granular data flow management

    Green, B., Krotofil, M. & Hutchison, D., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 93-101 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection

    Jardine, W., Frey, S., Green, B. & Rashid, A., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 23-34 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Malicious peers eviction for P2P overlays

    Ismail, H., Germanus, D. & Suri, N., 17/10/2016, 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, p. 216-224 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Modelling security risk in critical utilities: the system at risk as a three player game and agent society

    Busby, J. S., Gouglidis, A., Rass, S. & König, S., 9/10/2016, Proceedings of SMC 2016. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Efficient verification of program fragments: Eager POR

    Metzler, P., Saissi, H., Bokor, P., Hess, R., Suri, N., Artho, C. (Editor), Peled, D. (Editor) & Legay, A. (Editor), 22/09/2016, Automated Technology for Verification and Analysis: 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings. Springer-Verlag, Vol. 9938 LNCS. p. 375-391 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Technology-related disasters: a survey towards disaster-resilient software defined networks

    Machuca, C. M., Secci, S., Vizaretta, P., Kuipers, F., Gouglidis, A., Hutchison, D., Jouet, S., Pezaros, D., Elmokashfi, A., Heegaard, P., Ristov, S. & Gusev, M., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on . IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Threat awareness for critical infrastructures resilience

    Gouglidis, A., Green, B., Busby, J. S., Rouncefield, M. F., Hutchison, D. & Schauer, S., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on. 9781467390248: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Novel efficient techniques for real-time cloud security assessment

    Modic, J., Trapero, R., Taha, A., Luna, J., Stopar, M. & Suri, N., 1/09/2016, In: Computers and Security. 62, p. 1-18 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Practical Formal Verification for Model Based Development of Cyber-Physical Systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Reliable Memory Efficient Name Forwarding in Named Data Networking

    Saxena, D., Raychoudhury, V., Becker, C. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 48-55 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    IMPROVE: Identifying Minimal PROfile VEctors for similarity based access control

    Misra, G., Such, J. M. & Balogun, H., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/I​SPA. IEEE, p. 868-875 8 p. (2016 IEEE Trustcom/BigDataSE/I​SPA).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    SENTRY: A novel approach for mitigating application layer DDoS threats

    Zhang, H., Taha, A., Trapero, R., Luna, J. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 465-472 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    SimaticScan: towards a specialised vulnerability scanner for industrial control systems

    Antrobus, R., Frey, S., Green, B. & Rashid, A., 23/08/2016, Proceedings 4th International Symposium for ICS & SCADA Cyber Security Research. BCS

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Trust validation of cloud IaaS: A customer-centric approach

    Manzoor, S., Taha, A. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 97-104 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Non-sharing communities? an empirical study of community detection for access control decisions

    Misra, G., Such, J. M. & Balogun, H., 18/08/2016, Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience

    Shirazi, S. N. U. H., Gouglidis, A., Syeda, K. N., Simpson, S., Mauthe, A. U., Stephanakis, I. M. & Hutchison, D., 16/08/2016, Resilience Week (RWS), 2016. IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Run Time Application Repartitioning in Dynamic Mobile Cloud Environments

    Yang, L., Cao, J., Tang, S., Han, D. & Suri, N., 1/07/2016, In: IEEE Transactions on Cloud Computing. 4, 3, p. 336-348 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    Information assurance techniques: perceived cost effectiveness

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 07/2016, In: Computers and Security. 60, p. 117-133 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Published

    Anomaly detection in the cloud using data density

    Shirazi, S. N. U. H., Simpson, S., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 27/06/2016, Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on. IEEE, p. 616-623 8 p. 7820324. (Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    D-DEMOS: a distributed, end-to-end verifiable, internet voting system

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 27/06/2016, Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016) . IEEE, p. 711-720 10 p. (2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    How to Improve the Security Skills of Mobile App Developers: Comparing and Contrasting Expert Views

    Weir, C., Rashid, A. & Noble, J., 22/06/2016, Proceedings of the 2016 ACM Workshop on Security Information Workers. Biddle, R., Chu, B., Lipford, H. & Murphy-Hill, E. (eds.). New York: USENIX Association, 7 p. 1

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Cloud instance management and resource prediction for computation-as-a-service platforms

    Doyle, J., Giotsas, V., Anam, M. A. & Andreopoulos, Y., 2/06/2016, Proceedings - 2016 IEEE International Conference on Cloud Engineering, IC2E 2016: Co-located with the 1st IEEE International Conference on Internet-of-Things Design and Implementation, IoTDI 2016. Institute of Electrical and Electronics Engineers Inc., p. 89-98 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    Quantifiably Trusting the Cloud: Putting Metrics to Work

    Trapero, R., Luna, J. & Suri, N., 1/06/2016, In: IEEE Security and Privacy Magazine. 14, 3, p. 73-77 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Query processing for the internet-of-things: Coupling of device energy consumption and cloud infrastructure billing

    Renna, F., Doyle, J., Andreopoulos, Y. & Giotsas, V., 17/05/2016, Internet-of-Things Design and Implementation (IoTDI), 2016 IEEE First International Conference on. Institute of Electrical and Electronics Engineers Inc., p. 83-94 12 p. 7471353

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    On choosing server-or client-side solutions for BFT

    Platania, M., Obenshain, D., Tantillo, T., Amir, Y. & Suri, N., 1/05/2016, In: ACM Computing Surveys. 48, 4, 30 p., 61.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    Composite vulnerabilities in Cyber Physical Systems

    Ciholas, P. & Such, J. M., 6/04/2016, p. 4-7. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  65. Published

    Testbed diversity as a fundamental principle for effective ICS security research

    Green, B., Frey, S. A. F., Rashid, A. & Hutchison, D., 6/04/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  66. Published

    Sibyl: A Practical Internet Route Oracle

    Cunha, I., Marchetta, P., Calder, M., Chiu, Y.-C., Machado, B. V. A., Pescapè, A., Giotsas, V., Madhyastha, H. V. & Katz-Bassett, E., 03/2016, 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, p. 325-344 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    Named Data Networking: A survey

    Saxena, D., Raychoudhury, V., Suri, N., Becker, C. & Cao, J., 28/02/2016, In: Computer Science Review. 19, p. 15-55 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    SBVLC: Secure Barcode-based Visible Light Communication for Smartphones

    Zhang, B., Ren, K., Xing, G., Fu, X. & Wang, C., 1/02/2016, In: IEEE Transactions on Mobile Computing. 15, 2, p. 432-446 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    The North West cyber security industry: export potential assessment

    Prince, D. D. C. & Fitton, O. J., 27/01/2016, Lancaster: Lancaster University. 60 p.

    Research output: Book/Report/ProceedingsCommissioned report

  70. Published

    FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes

    Ali, A., Khelil, A. & Suri, N., 7/01/2016, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    A Multi-commodity network flow model for cloud service environments

    Stephanakis, I. M., Shirazi, S. N. U. H., Gouglidis, A. & Hutchison, D., 2016, Engineering Applications of Neural Networks: 17th International Conference, EANN 2016, Aberdeen, UK, September 2-5, 2016, Proceedings. Jayne, C. & Iliadis, L. (eds.). Cham: Springer, p. 186-197 12 p. (Communications in Computer and Information Science; vol. 629).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    A Multi-Level Approach to Resilience of Critical Infrastructures and Services

    Gouglidis, A., Shirazi, S. N. U. H., Simpson, S., Smith, P. & Hutchison, D., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  73. Published

    Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Livraga, G. (Editor), Torra, V. (Editor), Aldini, A. (Editor), Martinelli, F. (Editor) & Suri, N. (Editor), 2016, Springer.

    Research output: Book/Report/ProceedingsProceedings

  74. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  75. Published

    Foreword from the QASA 2016 program chairs

    Aldini, A., Martinelli, F., Suri, N., G., L. (Editor), A., A. (Editor), V., T. (Editor), F., M. (Editor) & N., S., 2016, Springer.

    Research output: Book/Report/ProceedingsBook

  76. Published

    Measurement of video quality

    Andreopoulos, Y. (Inventor), Fisher, P. (Inventor), Deligiannis, N. (Inventor) & Giotsas, V. (Inventor), 2016, Patent No. US20160021376A1, Priority date 17/07/2014

    Research output: Patent

  77. Published

    Periscope: Unifying looking glass querying

    Giotsas, V., Dhamdhere, A. & Claffy, K. C., 2016, PAM 2016: Passive and Active Measurement : 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings. Karagiannis, T. & Dimitropoulos, X. (eds.). Cham: Springer, p. 177-189 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9631).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. 2015
  79. Published

    Detecting and mitigating P2P eclipse attacks

    Ismail, H., Germanus, D. & Suri, N., 14/12/2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 224-231 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    Adaptive hybrid compression for wireless sensor networks

    Ali, A., Khelil, A., Suri, N. & Mahmudimanesh, M., 1/12/2015, In: ACM Transactions on Sensor Networks. 11, 4, 36 p., 53.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    Mapping peering interconnections to a facility

    Giotsas, V., Smaragdakis, G., Huffaker, B., Luckie, M. & Claffy, K. C., 1/12/2015, CoNEXT '15 Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. New York: Association for Computing Machinery, Inc, 13 p. 37

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Assessing privacy capabilities of cloud service providers

    Del Alamo, J. M., Trapero, R., Martin, Y. S., Yelmo, J. C. & Suri, N., 1/11/2015, In: IEEE Latin America Transactions. 13, 11, p. 3634-3641 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  83. Published

    The impact of hypervisor scheduling on compromising virtualized environments

    Vateva-Gurova, T., Suri, N., Mendelson, A., Atzori, L. (Editor), Jin, X. (Editor), Jarvis, S. (Editor), Liu, L. (Editor), Calvo, R. A. (Editor), Hu, J. (Editor), Min, G. (Editor), Georgalas, N. (Editor) & Wu, Y. (Editor), 26/10/2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, p. 1910-1917 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    DEMOS-2: scalable E2E verifiable elections without random oracles

    Kiayias, A., Zacharias, T. & Zhang, B., 12/10/2015, CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 352-363 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In: IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation

    Germanus, D., Ismail, H. & Suri, N., 28/09/2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 74-83 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    Foreword from the QASA 2015 chairs

    Aldini, A., Martinelli, F., Suri, N., G., N.-A. (Editor), A., A., F., M., N., S. & J., G.-A. (Editor), 21/09/2015, Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers. Springer-Verlag, Vol. 9481. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  89. Published

    On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms

    Piper, T., Winter, S., Suri, N. & Fuhrman, T. E., 7/09/2015, 2015 11th European Dependable Computing Conference (EDCC). IEEE, p. 85-96 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    Perceptual video quality estimation by regression with myopic experts

    Giotsas, V., Deligiannis, N., Fisher, P. & Andreopoulos, Y., 2/07/2015, 2015 7th International Workshop on Quality of Multimedia Experience, QoMEX 2015. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. 7148115

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    GRINDER: On Reusability of Fault Injection Tools

    Winter, S., Piper, T., Schwahn, O., Natella, R., Suri, N. & Cotroneo, D., 23/05/2015, 2015 IEEE/ACM 10th International Workshop on Automation of Software Test. IEEE, p. 75-79 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    No PAIN, No Gain? The utility of parallel fault injections

    Winter, S., Schwahn, O., Natella, R., Suri, N., Cotroneo, D., J., K. (Editor) & U., Z. (Editor), 16/05/2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, p. 494-505 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    Leveraging the Potential of Cloud Security Service-Level Agreements through Standards

    Luna, J., Suri, N., Iorga, M. & Karmel, A., 1/05/2015, In: IEEE Cloud Computing. 2, 3, p. 32-40 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    Mitigating timing error propagation in mixed-criticality automotive systems

    Piper, T., Winter, S., Schwahn, O., Bidarahalli, S. & Suri, N., 13/04/2015, 2015 IEEE 18th International Symposium on Real-Time Distributed Computing. IEEE, p. 102-109 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    End-to-end verifiable elections in the standard model

    Kiayias, A., Zacharias, T. & Zhang, B., 17/03/2015, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Oswald, E. & Fischlin, M. (eds.). Springer, Vol. II. p. 468-498 31 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    The future of maritime cyber security

    Fitton, O., Prince, D., Germond, B. & Lacy, M., 23/01/2015, Lancaster: Lancaster University. 36 p.

    Research output: Book/Report/ProceedingsOther report

  98. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  99. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (Editor), Herrera-Joancomartí, J. (Editor), Lupu, E. (Editor), Posegga, J. (Editor), Aldini, A. (Editor), Martinelli, F. (Editor) & Suri, N. (Editor), 2015, Springer. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  100. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  101. Published

    Foreword from the QASA 2014 program chairs

    Aldini, A., Martinelli, F., Suri, N., J., P. (Editor), N., S., E., L. (Editor), J., H.-J. (Editor), J., G.-A., F., M. & A., A., 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Springer-Verlag, Vol. 8872. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  102. Published

    In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

    Pellegrino, G., Balzarotti, D., Winter, S. & Suri, N., 2015. 16 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  103. Published

    IPv6 AS relationships, cliques, and congruence

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 2015, Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Mirkovic, J. & Liu, Y. (eds.). Berlin: Springer, p. 111-122 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top