Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Foldwatch: using origami-inspired paper prototypes to explore the extension of output space in smartwatches

    Fuchs, A., Sturdee, M. & Schöning, J., 29/09/2018, NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction. New York: ACM, p. 47-59 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Reducible Rank Codes and Their Applications to Cryptography.

    Gabidulin, E. M., Ourivski, A. V., Honary, B. & Ammar, B., 1/01/2004, In: IEEE Transactions on Information Theory. 49, 12, p. 3289-3293 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Reducible Rank Codes and Applications to Cryptography

    Gabidulin, E. M., Ourivski, A. V., Ammar, B. & Honary, B., 2002, Information, coding and mathematics: proceedings of workshop honoring Prof. Bob McEliece on his 60th birthday. Blaum, M., Farrell, P. G. & van Tilborg, H. C. A. (eds.). Boston: Kluwer Academic Publishers, p. 121-132 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A new family of rank codes and applications to cryptography

    Gabidulin, E. M., Ourivski, A. V., Honary, B. & Ammar, B., 07/2002, Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on. Lausanne, Switzerland : IEEE, p. 268 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Information security in a random network coding network

    Gabidulin, E. M., Pilipchuk, N., Honary, B. & Rashwan, H., 04/2013, In: Problems of Information Transmission. 49, 2, p. 179-191 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    The Power of Synchronisation: Formal Analysis of Power Consumption in Networks of Pulse-Coupled Oscillators

    Gainer, P., Linker, S., Dixon, C., Hustadt, U. & Fisher, M., 11/10/2018, Formal Methods and Software Engineering: 20th International Conference on Formal Engineering Methods, ICFEM 2018, Gold Coast, QLD, Australia, November 12-16, 2018, Proceedings. Sun, J. & Sun, M. (eds.). Cham: Springer, p. 160-176 17 p. (Lecture Notes in Computer Science; vol. 11232).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Nanoscale surface roughness effects on THz vacuum electron device performance

    Gamzina, D., Himes, L., Barchfeld, R., Popovic, B., Pan, P., Letizia, R., Mineo, M., Feng, J., Paoloni, C. & Luhmann Jr., N. C., 01/2016, In: IEEE Transactions on Nanotechnology. 15, 1, p. 85-93 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Nano-CNC machining of sub-THz vacuum electron devices

    Gamzina, D., Himes, L., Barchfeld, R., Zheng, Y., Popovic, B., Paoloni, C., Choi, E. & Luhmann Jr., N. C., 10/2016, In: IEEE Transactions on Electron Devices. 63, 10, p. 4067-4073 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Backward wave oscillator for high power generation at THz frequencies

    Gamzina, D., Li, X., Tang, Y., Huang, X., Zheng, Y., Himes, L., Gonzalez, M., Li, H., Pan, P., Letizia, R., Feng, J., Luhmann Jr., N. C. & Paoloni, C., 6/08/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  10. Published

    The measurement and modeling of a P2P streaming video service

    Gao, P., Liu, T., Chen, Y., Wu, X., El-khatib, Y. & Edwards, C., 10/2008, Networks for Grid Applications : Second International Conference, GridNets 2008, Beijing, China, October 8-10, 2008, Revised Selected Papers. Vicat-Blanc Primet, P., Kudoh, T. & Mambretti, J. (eds.). Berlin: Springer, p. 24-34 11 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 2).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Study of Multiple Beam Backward Wave Oscillator Based on Corrugated Waveguide TWT

    Gao, L., Wang, Y., Hu, Y., Paoloni, C. & Li, B., 12/02/2018, International Vacuum Electronics Conference 2017. 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X. & Ni, Q., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8762016. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 1/01/2020, In: IEEE Transactions on Communications. 68, 1, p. 569-581 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Resource Allocation for Latency-aware Federated Learning in Industrial Internet-of-Things

    Gao, W., Zhao, Z., Min, G., Ni, Q. & Jiang, Y., 31/12/2021, In: IEEE Transactions on Industrial Informatics. 17, 12, p. 8505-8513 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Edge-Computing-Based Channel Allocation for Deadline-Driven IoT Networks

    Gao, W., Zhao, Z., Yu, Z., Min, G., Yang, M. & Huang, W., 31/10/2020, In: IEEE Transactions on Industrial Informatics. 16, 10, p. 6693-6702 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (ed.), Herrera-Joancomartí, J. (ed.), Lupu, E. (ed.), Posegga, J. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2015, Springer. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  18. Published

    On the security of machine learning in malware C & C detection: a survey

    Gardiner, J. & Nagaraja, S., 18/12/2016, In: ACM Computing Surveys. 49, 3, 39 p., 59.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Wireless sensor networks: design for real-life deployment and deployment experiences

    Gaura, E., Roedig, U. & Brusey, J., 2010, In: Measurement Science and Technology. 21, 12, 1 p., 120101.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  20. Published

    5G multimedia massive MIMO communications systems

    Ge, X., Wang, H., Zi, R., Li, Q. & Ni, Q., 16/08/2016, In: Wireless Communications and Mobile Computing. 16, 11, p. 1377-1388 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. E-pub ahead of print

    AoI-minimal Power Adjustment in RF-EH-powered Industrial IoT Networks: A Soft Actor-Critic-Based Method

    Ge, Y., Xiong, K., Wang, Q., Ni, Q., Fan, P. & Letaief, K. B., 5/02/2024, (E-pub ahead of print) In: IEEE Transactions on Mobile Computing. 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Modulation of single quantum dot energy levels by a surface-acoustic-wave

    Gell, J. R., Ward, M. B., Young, R. J., Stevenson, R. M., Atkinson, P., Anderson, D., Jones, G. A. C., Ritchie, D. A. & Shields, A. J., 25/08/2008, In: Applied Physics Letters. 93, 8, p. - 3 p., 081115.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Characterizing the accelerating mode of a dielectric-lined waveguide designed for terahertz-driven manipulation of relativistic electron beams

    Georgiadis, V., Hibberd, M. T., Healy, A. L., Lake, D. S., Burt, G., Jamison, S. P. & Graham, D. M., 21/10/2019, 2019 44th International Conference on Infrared, Millimeter, and Terahertz Waves (IRMMW-THz). IEEE, 2 p. 8874140

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Dispersion in dielectric-lined waveguides designed for terahertz-driven deflection of electron beams

    Georgiadis, V., Healy, A. L., Hibberd, M. T., Burt, G., Jamison, S. & Graham, D. M., 30/04/2021, In: Applied Physics Letters. 118, 14, 144102 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Dispersion in dielectric-lined waveguides designed for terahertz-driven deflection of electron beams

    Georgiadis, V., Healy, A. L., Hibberd, M. T., Burt, G., Jamison, S. P. & Graham, D. M., 5/04/2021, In: Applied Physics Letters. 118, 14, 5 p., 144102.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Characterizing a terahertz-driven dielectric-lined waveguide for electron beam manipulation

    Georgiadis, V., Healy, A., Hibberd, M. T., Burt, G., Jamison, S. P. & Graham, D. M., 25/10/2018, 2018 43rd International Conference on Infrared Millimeter and Terahertz Waves, IRMMW-THz 2018. IEEE Computer Society Press, 8509912. (International Conference on Infrared, Millimeter, and Terahertz Waves, IRMMW-THz; vol. 2018-September).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Location Awareness in a Mountain Rescue Domain

    Georgopoulos, P., Edwards, C. & Dunmore, M., 06/2008. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  28. Published

    Developing a Portable Wireless LAN Kit

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2010, JANET.

    Research output: Working paper

  29. Published

    Theoretical and Practical Survey of Backhaul Connectivity Options

    Georgopoulos, P., Rocha Sa e Moura, J. A., Md Noor, R., McCarthy, B. & Edwards, C., 2010, JANET.

    Research output: Working paper

  30. Published

    Towards a Secure and Seamless Host Mobility for the real world

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2011, Wireless On-Demand Network Systems and Services (WONS), 2011 Eighth International Conference on. IEEE, p. 134-141 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Location Awareness Rescue System : Support for Mountain Rescue Teams

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2010, 9th IEEE International Symposium on Network Computing and Applications (NCA), 2010 . IEEE, p. 243-246 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Providing secure and accountable privacy to roaming 802.11 mobile devices

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2012, MPM '12: Proceedings of the First Workshop on Measurement, Privacy, and Mobility. New York, NY, USA: ACM, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    A collaborative AAA architecture to enable secure real-world network mobility

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2011, NETWORKING'11: 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part I. Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A. & Scoglio, C. (eds.). Berlin: Springer-Verlag, p. 212-226 15 p. (Lecture Notes in Computer Science; vol. 6640).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Towards network-wide QoE fairness using openflow-assisted adaptive video streaming

    Georgopoulos, P., Elkhatib, Y., Broadbent, M., Mu, M. & Race, N., 08/2013, FhMN '13 : Proceedings of the 2013 ACM SIGCOMM workshop on Future human-centric multimedia networking. New York: ACM, p. 15-20 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 2014, 23rd International Conference on Computer Communications and Networks (ICCCN 2014). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 08/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  37. Published

    Using software defined networking to enhance the delivery of video-on-demand

    Georgopoulos, P., Broadbent, M., Farshad, A., Plattner, B. & Race, N., 15/09/2015, In: Computer Communications. 69, p. 79-87 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Increasing the resilience of critical SCADA systems using peer-to-peer overlays

    Germanus, D., Khelil, A. & Suri, N., 2010, Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Springer, Vol. 6150 LNCS. p. 161-178 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  39. Published

    Leveraging the next-generation power grid: Data sharing and associated partnerships

    Germanus, D., Dionysiou, I., Gjermundrød, H., Khelil, A., Suri, N., Bakken, D. E. & Hauser, C., 11/10/2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Susceptibility analysis of structured P2P systems to localized eclipse attacks

    Germanus, D., Langenberg, R., Khelil, A. & Suri, N., 8/10/2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems. IEEE, p. 11-20 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Coral: Reliable and low-latency P2P convergecast for critical sensor data collection

    Germanus, D., Khelil, A., Schwandke, J. & Suri, N., 21/10/2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 300-305 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Mitigating eclipse attacks in peer-to-peer networks

    Germanus, D., Roos, S., Strufe, T. & Suri, N., 29/10/2014, 2014 IEEE Conference on Communications and Network Security. Springer-Verlag, p. 400-408 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation

    Germanus, D., Ismail, H. & Suri, N., 28/09/2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 74-83 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    The influence of geopolitics on polar research – Options for HM Government

    Germond, B. & Suri, N., 8/06/2023

    Research output: Exhibits, objects and web-based outputsBlog

  45. Published

    Cyber maritime: A priority for Britain

    Germond, B., Burton, J., Prince, D. & Soare, S., 18/04/2024

    Research output: Exhibits, objects and web-based outputsBlog

  46. Published

    Vehicle-Driver Communication using Off-The-Shelf Transceivers

    Ghamari, M., Chung, A., Roedig, U., Honary, B. & Pickering, C. A., 09/2010, IEEE 72nd Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 . IEEE, p. 1-2 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Improving transmission reliability of low-power medium access control protocols using average diversity combining

    Ghamari, M., Heravi, B. M., Roedig, U., Honary, B. & Pickering, C. A., 1/12/2012, In: IET Wireless Sensor Systems. 2, 4, p. 377-384 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols

    Ghamari, M., Momahed Heravi, B., Roedig, U. & Honary, B., 12/2014, In: IET Networks. 3, 4, p. 284-292 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Predictive vulnerability scoring in the context of insufficient information availability

    Ghani, H., Luna, J., Khelil, A., Alkadri, N. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Quantitative assessment of software vulnerabilities based on economic-driven security metrics

    Ghani, H., Luna, J. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    User-centric security assessment of software configurations: A case study

    Ghani, H., Luna Garcia, J., Petkov, I. & Suri, N., 2014, Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Springer-Verlag, Vol. 8364 LNCS. p. 196-212 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Characterizing positively invariant sets: Inductive and topological methods

    Ghorbal, K. & Sogokon, A., 30/11/2022, In: Journal of Symbolic Computation. 113, p. 1-28 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    Interaction Patterns in Crisis Negotiations: Persuasive Arguments and Cultural Differences

    Giebels, E. & Taylor, P. J., 01/2009, In: Journal of Applied Psychology. 94, 1, p. 5-19 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Published

    Interaction patterns of social influence in crisis negotiation

    Giebels, E. & Taylor, P., 2010, Contemporary theory, research, and practice of crisis and hostage negotiation. Rogan, R. & Lanceley, F. (eds.). Cresskill, NJ: Hampton Press, p. 59-76 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  56. Published

    Être sur la même longueur d'onde : la communication interculturelle en contexte de négociation de crise

    Giebels, E. & Taylor, P., 2010, Psychologie de l'intervention policière en situation de crise. St-Yves, M. & Collins, P. (eds.). Editions Yvon Blais

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  57. Published

    Tuning into the right wavelength: The importance of culture for effective crisis negotiation

    Giebels, E. & Taylor, P., 2012, The psychology of crisis intervention for law enforcement officers. St-Yves, M. & Collins, P. (eds.). Toronto: Carswell, p. 277-294 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  58. Published

    Expanding the horizons of terrorism and political violence research

    Giebels, E. & Taylor, P., 08/2012, In: Negotiation and Conflict Management Research. 5, 3, p. 235-238 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    The cultural dimension of uncertainty avoidance impacts police-civilian interaction

    Giebels, E., Oostinga, M., Taylor, P. J. & Curtis, J. L., 1/02/2017, In: Law and Human Behavior. 41, 1, p. 93-102 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Transformative Effects of IoT, Blockchain and Artificial Intelligence on Cloud Computing: Evolution, Vision, Trends and Open Challenges

    Gill, S., Tuli, S., Xu, M., Singh, I., Singh, K., Lindsay, D., Tuli, S., Smirnova, D., Singh, M., Jain, U., Pervaiz, H., Sehgal, B., Kaila, S. S., Misra, S., Aslanpour, M. S., Mehta, H., Stankovski, V. & Garraghan, P., 1/12/2019, In: Internet of Things. 8, 26 p., 100118.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  61. Published

    Message from the program chairs

    Gill, C., Suri, N. & Hong, Y-S., 2005, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. IEEE, 1 p. (Proc. Int. Workshop Object Oriented Real Time Dependable Syst. WORDS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Perceptual video quality estimation by regression with myopic experts

    Giotsas, V., Deligiannis, N., Fisher, P. & Andreopoulos, Y., 2/07/2015, 2015 7th International Workshop on Quality of Multimedia Experience, QoMEX 2015. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. 7148115

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    Detecting and assessing the hybrid IPv4/IPv6 as relationships

    Giotsas, V. & Zhou, S., 2011, SIGCOMM '11 Proceedings of the ACM SIGCOMM 2011 conference. New York: ACM, p. 424-425 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    Valley-free violation in Internet routing: analysis based on BGP Community data

    Giotsas, V. & Zhou, S., 2012, 2012 IEEE International Conference on Communications, ICC 2012. IEEE, p. 1193-1197 5 p. 6363987

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    Improving the discovery of IXP peering links through passive BGP measurements

    Giotsas, V. & Zhou, S., 2013, 2013 Proceedings IEEE INFOCOM . IEEE, p. 3249-3254 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Inferring multilateral peering

    Giotsas, V., Zhou, S., Luckie, M. & Claffy, K., 2013, CoNEXT '13 Proceedings of the ninth ACM conference on Emerging networking experiments and technologies. New York: ACM, p. 247-258 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    Inferring complex AS relationships

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 5/11/2014, IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    IPv6 AS relationships, cliques, and congruence

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 2015, Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Mirkovic, J. & Liu, Y. (eds.). Berlin: Springer, p. 111-122 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    Mapping peering interconnections to a facility

    Giotsas, V., Smaragdakis, G., Huffaker, B., Luckie, M. & Claffy, K. C., 1/12/2015, CoNEXT '15 Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. New York: Association for Computing Machinery, Inc, 13 p. 37

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    Periscope: Unifying looking glass querying

    Giotsas, V., Dhamdhere, A. & Claffy, K. C., 2016, PAM 2016: Passive and Active Measurement : 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings. Karagiannis, T. & Dimitropoulos, X. (eds.). Cham: Springer, p. 177-189 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9631).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Inferring BGP blackholing activity in the Internet

    Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A. & Berger, A., 1/11/2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 1-14 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Detecting peering infrastructure outages in the wild

    Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A. & Aben, E., 7/08/2017, SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication. New York: Association for Computing Machinery, Inc, p. 446-459 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Unpublished

    Inferring Internet AS Relationships Based on BGP Routing Policies

    Giotsas, V. & Zhou, S., 2011, (Unpublished).

    Research output: Working paperOther

  74. Published

    Improving the Accuracy of the Internet Cartography

    Giotsas, V., 2014

    Research output: ThesisDoctoral Thesis

  75. Published

    IEEE Transactions on Dependable an Secure Computing: Editorial

    Gligor, V. D., Meadows, C. & Suri, N., 8/02/2008, In: IEEE Transactions on Dependable and Secure Computing. 5, 1, p. 4-5 2 p.

    Research output: Contribution to Journal/MagazineEditorial

  76. Published

    An evolving approach to unsupervised and Real-Time fault detection in industrial processes

    Gomes Bezerra, C., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 30/11/2016, In: Expert Systems with Applications. 63, p. 134-144 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Monitoring and evaluation of semantic rooms

    Gönczy, L., Csertán, G., Urbanics, G., Ghani, H., Khelil, A. & Suri, N., 2012, Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware. Springer Berlin / Heidelberg, p. 99-116 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  78. Published

    Status of 3.9 GHz defelecting mode (crab) cavity R&D.

    Goudket, P., Bellantoni, L., Edwards, H., Foley, M., Khabiboulline, T., Mitchell, D., Rowe, N., Solyak, N., Burt, G., Dexter, A., Koeth, T. & Adolphsen, C., 2006, Proceedings of the LINAC 2006 conference..

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  79. Published

    Status of the crab cavity system development for the ILC: 36th ICFA Advanced Beam Dynamics Workshop on Nano Scale Beams, NANOBEAM 2005

    Goudket, P., Ma, L., Kalinin, A., Beard, C., Burt, G., Dexter, A., Y., H. (ed.), T., T. (ed.), J., U. (ed.), Y., I. (ed.) & A., N. (ed.), 21/10/2020, p. 191-193. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  80. Published

    Security policy verification for multi-domains in cloud systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 1/04/2014, In: International Journal of Information Security. 13, 2, p. 97-111 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    DomRBAC: an access control model for modern collaborative systems

    Gouglidis, A. & Mavridis, I., 06/2012, In: Computers and Security. 31, 4, p. 540-556 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  82. Published

    On the definition of access control requirements for grid and cloud computing systems

    Gouglidis, A. & Mavridis, I., 1/12/2010, Networks for Grid Applications: Third International ICST Conference, GridNets 2009, Athens, Greece, September 8-9, 2009, Revised Selected Papers. Doulamis, A., Mambretti, J., Tomkos, I. & Varvarigou, T. (eds.). Berlin: Springer Verlag, p. 19-26 8 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 25).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    Grid access control models and architectures

    Gouglidis, A. & Mavridis, I., 1/12/2011, Computational and data grids: principles, applications and design. IGI Global, p. 217-234 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  84. Published

    A foundation for defining security requirements in grid computing

    Gouglidis, A. & Mavridis, I., 4/12/2009, PCI 2009 - 13th Panhellenic Conference on Informatics. IEEE, p. 180-184 5 p. 5298349

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Verification of secure inter-operation properties in multi-domain RBAC systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 06/2013, Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on . IEEE, p. 35-44 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    A methodology for the development and verification of access control systems in cloud computing

    Gouglidis, A. & Mavridis, I., 2013, Collaborative, Trusted and Privacy-Aware e/m-Services. Douligeris, C., Polemi, N., Karantjias, A. & Lamersdorf, W. (eds.). Berlin: Springer Verlag, p. 88-99 12 p. (IFIP Advances in Information and Communication Technology ; vol. 399).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  87. Published

    Role-based secure inter-operation and resource usage management in mobile grid systems

    Gouglidis, A. & Mavridis, I., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. Ardagna, C. A. & Zhou, J. (eds.). Berlin: Springer Verlag, p. 38-53 16 p. (Lecture Notes in Computer Science; vol. 6633).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    A Multi-Level Approach to Resilience of Critical Infrastructures and Services

    Gouglidis, A., Shirazi, S. N. U. H., Simpson, S., Smith, P. & Hutchison, D., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  89. Published

    Threat awareness for critical infrastructures resilience

    Gouglidis, A., Green, B., Busby, J. S., Rouncefield, M. F., Hutchison, D. & Schauer, S., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on. 9781467390248: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    Verification of Resilience Policies that Assist Attribute Based Access Control

    Gouglidis, A., Hu, V. C., Busby, J. S. & Hutchison, D., 24/03/2017, ABAC '17 Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control. New York: ACM, p. 43-52 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    Protection against Cyber Attacks: Introducing Resilience for SCADA Networks

    Gouglidis, A. & Hutchison, D., 03/2017, 1 p. AIT Austrian Institute of Technology GmbH.

    Research output: Other contribution

  92. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  93. Published

    Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience

    Gouglidis, A. & Hutchison, D., 10/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  94. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Gouglidis, A., Grompanopoulos, C. & Mavridou, A., 25/06/2018, Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018). Bliudze, S. & Bensalem, S. (eds.). EPTCS, p. 52-64 13 p. (EPTCS; vol. 272).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Combined coding and cryptography based on LDPC codes

    Govinda, S., Honary, B., Catherine, C. & Soyjaudah, K. S., 07/2003, Proceedings of the Seventh International Symposium on Communications Theory and Applications held on 13-18 July 2003 at St. Martin's College, Ambleside, UK.. Lancaster: HW Communications Limited, p. 221-226 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications

    Granby, B., Askwith, R. & Marnerides, A., 10/11/2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP). IEEE, p. 463-466 4 p. (2015 IEEE 23rd International Conference on Network Protocols (ICNP)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Performance analysis of IEEE 802.11n under different STBC rates using 64-QAM

    Gravalos, A., Hadjinicolaou, M. & Ni, Q., 02/2007, Wireless Pervasive Computing, 2007. ISWPC '07. 2nd International Symposium on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    Microtopography of the eye surface of the crab Carcinus maenas: an atomic force microscope study suggesting a possible antifouling potential

    Greco, G., Lanero, T. S., Torrassa, S., Young, R., Vassalli, M., Cavaliere, A., Rolandi, R., Pelucchi, E., Faimali, M. & Davenport, J., 1/05/2013, In: Interface. 10, 84, 7 p., 20130122.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Design and construction of an Industrial Control System testbed

    Green, B., Paske, B., Hutchison, D. & Prince, D., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Previous 1...5 6 7 8 9 10 11 12 ...26 Next

Back to top