Items where division is "Faculties > University wide - Teaching/Research Groups > Centre for Cyber Security Research"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Number of items at this level: 33.

2019

Li, Chengqing and Feng, Bingbing and Li, Shujun and Kurths, Jurgen and Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, . pp. 1-14. ISSN 1549-8328. (doi:https://doi.org/10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Liu, Ximing and Li, Yingjiu and Deng, Robert H. and Chang, Bing and Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:https://doi.org/10.1016/j.cose.2018.09.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

2018

Aslan, Ça?r? B. and Sa?lam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of 9th International Conference on Social Media & Society. ACM ISBN 978-1-4503-6334-1. (doi:https://doi.org/10.1145/3217804.3217919) (Full text available)
[img]
Preview

Li, Shujun and Ho, Anthony TS and Wang, Zichi and Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. MPS'18: 2nd International Workshop on Multimedia Privacy and Security Proceedings. ACM ISBN 978-1-4503-5988-7. (doi:https://doi.org/10.1145/3267357.3267365) (Full text available)
[img]
Preview

Tussyadiah, Iis and Li, Shujun and Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. Springer Nature Switzerland AG, Cham, Switzerland pp. 278-290. ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:https://doi.org/10.1007/978-3-030-05940-8_22) (Full text available)
[img]
Preview

2017

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Lecture Notes in Computer Science, 10292. Springer International Publishing AG pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:https://doi.org/10.1007/978-3-319-58460-7_13) (Full text available)
[img]
Preview

Alqahtani, Saeed Ibrahim and Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, New York, NY, USA Article No. 19. ISBN 978-1-4503-5257-4. (doi:https://doi.org/10.1145/3098954.3098984) (Full text available)
[img]
Preview

Hosu, Vlad and Hahn, Franz and Jenadeleh, Mohsen and Lin, Hanhe and Men, Hui and Szirányi, Tamás and Li, Shujun and Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience. IEEE, Germany ISBN 978-1-5386-4025-8. E-ISBN 978-1-5386-4024-1. (doi:https://doi.org/10.1109/QoMEX.2017.7965673) (Full text available)
[img]
Preview

Ong, SimYing and Li, Shujun and Wong, KokSheik and Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:https://doi.org/10.1016/j.image.2017.06.002) (Full text available)
[img]
Preview

Roberts, David L. and Hernandez-Castro, Julio (2017) Bycatch and illegal wildlife trade on the dark web. Oryx, 51 (3). pp. 393-394. ISSN 0030-6053. E-ISSN 1365-3008. (doi:https://doi.org/10.1017/S0030605317000679) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Lecture Notes in Computer Science, 10292. Springer International Publishing AG pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:https://doi.org/10.1007/978-3-319-58460-7_17) (Full text available)
[img]
Preview

2016

Boiten, Eerke Albert (2016) Big Data Refinement. Electronic Proceedings in Theoretical Computer Science, 209 . pp. 17-23. ISSN 2075-2180. E-ISSN 2075-2180. (doi:https://doi.org/10.4204/EPTCS.209.2) (Full text available)
[img]
Preview

Derrick, John and Boiten, Eerke Albert (2016) Relational Concurrent Refinement - partial and total frameworks. In: Petre, Luigia and Sekerinski, Emil, eds. From Action Systems to Distributed Systems: The Refinement Approach. Taylor and Francis, Florida, USA, pp. 143-154. ISBN 978-1-4987-0158-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

2015

?agalj, Mario and Perkovi?, Toni and Bugari?, Marin and Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:https://doi.org/10.1016/j.pmcj.2014.09.002) (Full text available)
[img]
Preview

Asghar, Hassan Jameel and Steinfeld, Ron and Li, Shujun and Kaafa, Mohamed Ali and Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Boiten, Eerke Albert (2015) Investigatory Powers bill will remove ISPs' right to protect your privacy. . The Conversation Internet only. (Full text available)
[img]

Hernandez-Castro, Julio C. and Roberts, David L. (2015) Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science, 1:e10 . pp. 1-11. ISSN 2376-5992. (doi:https://doi.org/10.7717/peerj-cs.10) (Full text available)
[img]
Preview

2014

Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio (2014) Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80 (5). pp. 935-952. ISSN 0022-0000. (doi:https://doi.org/10.1016/j.jcss.2014.02.003) (Full text available)
[img]
Preview

Bailey, Christopher and Montrieux, Lionel and de Lemos, Rogerio and Yu, Yijun and Wermelinger, Michel (2014) Run-time Generation, Transformation, and Verification of Access Control Models for Self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. (Full text available)
[img]
Preview

Boiten, Eerke Albert (2014) FoI reveals cynical logic that compromises NHS data privacy. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) Outdated laws put your health data in jeopardy. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) Time for some truth about who is feeding off our NHS data. . The Conversation Internet only. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Boiten, Eerke Albert (2014) Your NHS data is completely anonymous – until it isn’t. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert and Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only. (Full text available)
[img]

Gaspar, Jaime and Boiten, Eerke Albert (2014) Simple composition theorems of one-way functions -- proofs and presentations. Technical report. IACR EPrints (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

2013

Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio and Siu, Kristy W. S. (2013) Enabling the Autonomic Management of Federated Identity Providers. In: 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013. Lectures Notes in Computer Science. pp. 100-111. (doi:https://doi.org/10.1007/978-3-642-38998-6_14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) iPhone hack shows security isn’t at our fingertips just yet. . Scientific American Internet only. (Full text available)
[img]

2011

Bailey, Christopher J. and Chadwick, David W. and de Lemos, Rogerio (2011) Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models. In: Proceedings of the 9th IEEE conference on Dependable, Autonomic and Secure Computing. IEEE pp. 182-196. (doi:https://doi.org/10.1109/DASC.2011.31) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

This list was generated on Thu Apr 18 22:00:31 2019 BST.