Home > Research > Publications & Outputs
  1. Published

    Attaining comprehensive development: a comparative study of demographic, migration and socio-economics trends.

    Bora, R. S. & Virmani, S., 2011, In: The India Economy Review. VII, p. 122-129 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Attaining and sustaining organisational excellence: Process improvement as a moving target

    Dalcher, D., 1/03/2009, In: Software Process Improvement and Practice. 14, 2, p. 63-64 2 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  3. Published

    Attacks and Vulnerabilities of Trust and Reputation Models

    Such, J. M., 2013, Agreement Technologies. Ossowski, S. (ed.). Dordrecht: Springer Verlag, p. 467-477 11 p. (Law, Governance and Technology Series; vol. 8).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    Attacks and Threats of Value Added Service Charging Mechanisms in Third Generation Networks

    Katsaros, I., Martin, I. & Honary, B., 12/2004, First International Symposium on Broadband Communications. Harrogate, p. 71

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Attacks and design of image recognition CAPTCHAs

    Zhu, B. B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M. & Cai, K., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 187-200 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Attack when the World is not Watching? U.S. Media and the Israeli-Palestinian Conflict

    Durante, R. & Zhuravskaya, E., 30/06/2018, In: Journal of Political Economy. 126, 3, p. 1085-1133 49 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Attack pattern recognition through correlating cyber situational awareness in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 1/03/2014, Cyberpatterns: unifying design patterns with security and attack patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 125-134 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Attack on the drones: the creeping privatisation of our urban airspace

    Garrett, B. L. & Fish, A. R., 12/12/2016, The Guardian.

    Research output: Contribution to specialist publicationArticle

  10. Published

    Attack Models for Advanced Persistent Threats in Smart Grid Wide Area Monitoring.

    Paudel, S., Smith, P. & Zseby, T., 2017, SPSR-SG@CPSWeek. p. 61-66 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top