Items where division is "Faculties > University wide - Teaching/Research Groups > Centre for Cyber Security Research"
Number of items at this level: 59. A
Asghar, Hassan Jameel,
Steinfeld, Ron,
Li, Shujun,
Kaafa, Mohamed Ali,
Pieprzyk, Josef
(2015)
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Transactions on Information Forensics and Security,
10
(8).
pp. 1643-1655.
ISSN 1556-6013.
E-ISSN 1556-6021.
(doi:10.1109/TIFS.2015.2421875)
(Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
(KAR id:69555)
|
|
B
Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio and Siu, Kristy W. S.
(2013)
Enabling the Autonomic Management of Federated Identity Providers.
In:
Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security.
Lectures Notes in Computer Science
.
Springer, Berlin, Germany, pp. 100-111.
ISBN 978-3-642-38997-9.
E-ISBN 978-3-642-38998-6.
(doi:10.1007/978-3-642-38998-6_14)
(The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)
(KAR id:42993)
|
|
Bailey, Christopher,
Montrieux, Lionel,
de Lemos, Rogerio,
Yu, Yijun,
Wermelinger, Michel
(2014)
Run-time Generation, Transformation, and Verification of Access Control Models for Self-protection.
In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems.
(KAR id:42968)
|
![[img]](/42968/1.hassmallThumbnailVersion/84_seams14_camera_ready.pdf)  Preview |
|
Becker, Ingolf,
Posner, Rebecca,
Islam, Tasmina,
Ekblom, Paul,
Borrion, Hervé,
McGuire, Michael,
Li, Shujun
(2021)
Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation.
In:
Proceedings of 54th Hawaii International Conference on System Sciences (HICSS 2021).
.
pp. 5347-5356.
University of Hawaiʻi at Mānoa, Mānoa, Hawaiʻi, USA
E-ISBN 978-0-9981331-3-3.
(doi:10125/71270)
(KAR id:84858)
|
![[img]](/84858/1.hassmallThumbnailVersion/HICSS2021.pdf)  Preview |
|
Boakes, Matthew,
Guest, Richard,
Deravi, Farzin,
Corsetti, Barbara
(2019)
Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships.
IEEE Transactions on Biometrics, Behavior, and Identity Science,
1
(4).
pp. 278-291.
ISSN 2637-6407.
E-ISSN 2637-6407.
(doi:10.1109/TBIOM.2019.2941728)
(KAR id:76574)
|
![[img]](/76574/1.hassmallThumbnailVersion/TBIOM2941728.pdf)  Preview |
|
D
Derrick, John and Boiten, Eerke Albert
(2016)
Relational Concurrent Refinement - partial and total frameworks.
In: Petre, Luigia and Sekerinski, Emil, eds.
From Action Systems to Distributed Systems: The Refinement Approach.
Taylor and Francis, Florida, USA, pp. 143-154.
ISBN 978-1-4987-0158-7.
(The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)
(KAR id:51618)
|
|
G
H
Hosu, Vlad,
Hahn, Franz,
Jenadeleh, Mohsen,
Lin, Hanhe,
Men, Hui,
Szirányi, Tamás,
Li, Shujun,
Saupe, Dietmar
(2017)
The Konstanz Natural Video Database (KoNViD-1k).
In:
2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX).
Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience.
.
IEEE, Germany
ISBN 978-1-5386-4025-8.
E-ISBN 978-1-5386-4024-1.
(doi:10.1109/QoMEX.2017.7965673)
(KAR id:69606)
|
![[img]](/69606/1.hassmallThumbnailVersion/konstanz-natural-video.pdf)  Preview |
|
I
Islam, Tasmina,
Becker, Ingolf,
Posner, Rebecca,
Ekblom, Paul,
McGuire, Michael,
Borrion, Hervé,
Li, Shujun
(2019)
A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems.
In:
Communications in Computer and Information Science.
Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings.
1123.
pp. 277-293.
Springer, Singapore
ISBN 978-981-1513-03-9.
E-ISBN 978-981-1513-04-6.
(doi:10.1007/978-981-15-1304-6_22)
(KAR id:76678)
|
|
L
Li, Chengqing,
Feng, Bingbing,
Li, Shujun,
Kurths, Jurgen,
Chen, Guanrong
(2019)
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks.
IEEE Transactions on Circuits and Systems I: Regular Papers,
66
(6).
pp. 2322-2335.
ISSN 1549-8328.
(doi:10.1109/TCSI.2018.2888688)
(Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
(KAR id:71415)
|
|
Li, Shujun and Ho, Anthony T.S. and Wang, Zichi and Zhang, Xinpeng
(2018)
Lost in the Digital Wild: Hiding Information in Digital Activities.
In: Hallman, Roger and Li, Shujun and Chang, Victor, eds.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security.
CCS Computer and Communications Security
.
ACM, New York, USA, pp. 27-37.
ISBN 978-1-4503-5988-7.
(doi:10.1145/3267357.3267365)
(KAR id:69008)
|
![[img]](/69008/1.hassmallThumbnailVersion/lost-digital-wild.pdf)  Preview |
|
Liu, Junjie and Aljaffan, Nouf and Li, Shujun
(2018)
PassInfinity: A software prototype system.
NA
Electronic files.
(Unpublished)
(Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
(KAR id:80287)
|
|
Liu, Ximing,
Li, Yingjiu,
Deng, Robert H.,
Chang, Bing,
Li, Shujun
(2019)
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
Computers and Security,
80
.
pp. 90-107.
ISSN 0167-4048.
(doi:10.1016/j.cose.2018.09.003)
(KAR id:69553)
|
![[img]](/69553/1.hassmallThumbnailVersion/TimeDictionaryAttack.pdf)  Preview |
|
Lu, Yang,
Li, Shujun,
Ioannou, Athina,
Tussyadiah, Iis
(2019)
From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework.
In:
Communications in Computer and Information Science.
Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings.
1123.
pp. 262-276.
Springer, Singapore
ISBN 978-981-1513-03-9.
E-ISBN 978-981-1513-04-6.
(doi:10.1007/978-981-15-1304-6_21)
(KAR id:76677)
|
|
Lu, Yang,
Sinnott, Richard O.,
Verspoor, Karin
(2018)
Semantic-Based Policy Composition for Privacy-Demanding Data Linkage.
In:
17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications.
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
.
pp. 348-359.
IEEE
ISBN 978-1-5386-4389-1.
E-ISBN 978-1-5386-4388-4.
(doi:10.1109/TrustCom/BigDataSE.2018.00060)
(KAR id:80961)
|
![[img]](/80961/2.hassmallThumbnailVersion/6.%20Semantic-based%20Policy%20Composition%20for%20Privacy-demanding%20Data%20Linkage.pdf)  Preview |
|
M
O
R
S
Shi, Na,
Tan, Liang,
Yang, Ciaxia,
He, Chen,
Xu, Junli,
Lu, Yang,
Xu, Hao
(2020)
BacS: A blockchain-based access control scheme in distributed internet of things.
Peer-to-Peer Networking and Applications,
.
ISSN 1936-6442.
E-ISSN 1936-6450.
(doi:10.1007/s12083-020-00930-5)
(Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
(KAR id:81701)
|
|
T
Tussyadiah, Iis,
Li, Shujun,
Miller, Graham
(2018)
Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For.
In: Pesonen, Juho and Neidhardt, Julia, eds.
Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019.
.
pp. 278-290.
Springer Nature Switzerland AG, Cham, Switzerland
ISBN 978-3-030-05939-2.
E-ISBN 978-3-030-05940-8.
(doi:10.1007/978-3-030-05940-8_22)
(KAR id:71418)
|
![[img]](/71418/1.hassmallThumbnailVersion/final.pdf)  Preview |
|
W
Wang, Hui and Ho, Anthony T.S. and Li, Shujun
(2021)
OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework.
In:
Computer Security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers.
Lecture Notes in Computer Science
.
Springer, Cham, Switzerland, pp. 243-260.
ISBN 978-3-030-66503-6.
E-ISBN 978-3-030-66504-3.
(doi:10.1007/978-3-030-66504-3_15)
(Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
(KAR id:84857)
|
|
Y
Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf
(2017)
When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems.
In: Tryfonas, Theo, ed.
Human Aspects of Information Security, Privacy and Trust 5th International Conference.
Lecture Notes in Computer Science
.
Springer, Cham, Switzerland, pp. 251-264.
ISBN 978-3-319-58459-1.
E-ISBN 978-3-319-58460-7.
(doi:10.1007/978-3-319-58460-7_17)
(KAR id:69559)
|
![[img]](/69559/1.hassmallThumbnailVersion/eye-tracking-meets.pdf)  Preview |
|
Č
This list was generated on Wed Jan 27 22:07:32 2021 GMT.
|