Home > Research > Security > Publications & Outputs
View graph of relations
  1. 2016
  2. Published

    Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Composite vulnerabilities in Cyber Physical Systems

    Ciholas, P. & Such, J. M., 6/04/2016, p. 4-7. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    Testbed diversity as a fundamental principle for effective ICS security research

    Green, B., Frey, S. A. F., Rashid, A. & Hutchison, D., 6/04/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  5. Published

    Sibyl: A Practical Internet Route Oracle

    Cunha, I., Marchetta, P., Calder, M., Chiu, Y.-C., Machado, B. V. A., Pescapè, A., Giotsas, V., Madhyastha, H. V. & Katz-Bassett, E., 03/2016, 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, p. 325-344 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Named Data Networking: A survey

    Saxena, D., Raychoudhury, V., Suri, N., Becker, C. & Cao, J., 28/02/2016, In: Computer Science Review. 19, p. 15-55 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    SBVLC: Secure Barcode-based Visible Light Communication for Smartphones

    Zhang, B., Ren, K., Xing, G., Fu, X. & Wang, C., 1/02/2016, In: IEEE Transactions on Mobile Computing. 15, 2, p. 432-446 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    The North West cyber security industry: export potential assessment

    Prince, D. D. C. & Fitton, O. J., 27/01/2016, Lancaster: Lancaster University. 60 p.

    Research output: Book/Report/ProceedingsCommissioned report

  9. Published

    FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes

    Ali, A., Khelil, A. & Suri, N., 7/01/2016, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A Multi-commodity network flow model for cloud service environments

    Stephanakis, I. M., Shirazi, S. N. U. H., Gouglidis, A. & Hutchison, D., 2016, Engineering Applications of Neural Networks: 17th International Conference, EANN 2016, Aberdeen, UK, September 2-5, 2016, Proceedings. Jayne, C. & Iliadis, L. (eds.). Cham: Springer, p. 186-197 12 p. (Communications in Computer and Information Science; vol. 629).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    A Multi-Level Approach to Resilience of Critical Infrastructures and Services

    Gouglidis, A., Shirazi, S. N. U. H., Simpson, S., Smith, P. & Hutchison, D., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Back to top