Skip to main content
Kent Academic Repository

Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 12.

2015

Zhai, Xiaojun and Appiah, Kofi and Ehsan, Shoaib and Howells, Gareth and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. (2015) A Method for Detecting Abnormal Program Behavior on Embedded Devices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1692-1704. ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2015.2422674) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Zhai, Xiaojun and Appiah, Kofi and Ehsan, Shoaib and Howells, Gareth and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus (2015) Exploring ICMetrics to detect abnormal program behaviour on embedded devices. Journal of Systems Architecture, 61 (10). pp. 567-575. ISSN 1383-7621. (doi:https://doi.org/10.1016/j.sysarc.2015.07.007) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

2014

Zhai, Xiaojun and Appiah, Kofi and Ehsan, Shoaib and Cheung, Wah M. and Howells, Gareth and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. (2014) Detecting Compromised Programs for Embedded System Applications: 27th International Conference, Lübeck, Germany, February 25-28, 2014. Proceedings. In: Architecture of Computing Systems - ARCS 2014. Lecture Notes in Computer Science, 8350. Springerlink pp. 221-232. ISBN 978-3-319-04890-1. E-ISBN 978-3-319-04891-8. (doi:https://doi.org/10.1007/978-3-319-04891-8_19) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

2013

Zhai, Xiaojun and Appiah, Kofi and Ehsan, Shoaib and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. and Cheung, Wah M. and Howells, Gareth (2013) Application of ICmetrics for Embedded System Security. In: Emerging Security Technologies (EST), 2013 Fourth International Conference on. IEEE pp. 89-92. (doi:https://doi.org/10.1109/EST.2013.21) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Appiah, Kofi and Zhai, Xiaojun and Ehsan, Shoaib and Cheung, Wah M. and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. and Howells, Gareth (2013) Program Counter as an Integrated Circuit Metrics for Secured Program Identification. In: Emerging Security Technologies (EST), 2013 Fourth International Conference on. IEEE pp. 98-101. (doi:https://doi.org/10.1109/EST.2013.23) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Zhai, Xiaojun and Appiah, Kofi and Ehsan, Shoaib and Cheung, Wah M. and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. and Howells, Gareth (2013) A Self-Organising Map Based Algorithm for Analysis of ICmetrics Features. In: Emerging Security Technologies (EST), 2013 Fourth International Conference on. IEEE pp. 93-97. (doi:https://doi.org/10.1109/EST.2013.22) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Tahir, Ruhma and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. and Howells, Gareth (2013) Resilience against Brute Force and Rainbow Table Attacks using Strong ICMetrics Session Key Pairs. In: 2013 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA). IEEE (doi:https://doi.org/10.1109/ICCSPA.2013.6487307) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Tahir, Ruhma and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. and Howells, Gareth (2013) A Scheme for the Generation of Strong ICMetrics based Session Key Pairs for Secure Embedded System Applications. In: The First International Conference on Communications, Signal Processing and their applications, 25-28 Mar 2013, Barcelona, Spain. (doi:https://doi.org/10.1109/WAINA.2013.143) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

2012

Tahir, Ruhma and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. and Howells, Gareth (2012) A Scheme for the Generation of Strong Cryptographic Key Pairs based on ICMetrics. In: The Seventh International Conference for Internet Technology and Secured Transactions (ICITST), 10-12 Dec 2012, London, UK. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kovalchuk, Yevgeniya and Howells, Gareth and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. (2012) A practical proposal for ensuring the provenance of hardware devices and their safe operation. In: The 7th International IET System Safety Conference, incorporating the Cyber Security Conference, 15-18 Oct 2012, Edinburgh, UK. (doi:https://doi.org/10.1049/cp.2012.1500) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kovalchuk, Yevgeniya and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. and Howells, Gareth (2012) ICmetrics for Low Resource Embedded Systems. In: 2012 Third International Conference on Emerging Security Technologies (EST 2012). IEEE pp. 121-126. ISBN 978-1-4673-2448-9. (doi:https://doi.org/10.1109/EST.2012.23) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kovalchuk, Yevgeniya and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. and Newman, Daniel and Kelly, Stephen W. and Howells, Gareth (2012) Investigation of Properties of ICmetrics Features. In: 2012 Third International Conference on Emerging Security Technologies (EST 2012). IEEE pp. 115-120. ISBN 978-1-4673-2448-9. (doi:https://doi.org/10.1109/EST.2012.22) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

This list was generated on Wed May 1 00:56:42 2019 BST.