Skip to main content

Items where division is "Faculties > University wide - Teaching/Research Groups > Centre for Cyber Security Research"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Jump to: A | B | D | G | H | I | L | M | O | R | S | T | W | Y | Č
Number of items at this level: 55.

A

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science, 10292 . Springer International Publishing AG, pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_13) (KAR id:69560)
[img]
Preview

Alqahtani, Saeed Ibrahim, Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. . Article No. 19. ACM, New York, NY, USA ISBN 978-1-4503-5257-4. (doi:10.1145/3098954.3098984) (KAR id:69561)
[img]
Preview

Alqahtani, Saeed Ibrahim, Li, Shujun, Yuan, Haiyue, Rusconi, Patrice (2020) Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? EAI Endorsed Transactions on Security and Safety, 18 (e1). ISSN 2032-9393. (doi:10.4108/eai.13-7-2018.162797) (KAR id:79945)
[img]
Preview

Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafa, Mohamed Ali, Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69555)
[img]

Aslan, Çağrı B. and Sağlam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of the 9th International Conference on Social Media and Society. ACM-ICPS International Conference Proceeding Series . ACM, New York, USA. ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919) (KAR id:66861)
[img]
Preview

B

Bailey, Christopher J., Chadwick, David W., de Lemos, Rogerio (2011) Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models. In: Proceedings of the 9th IEEE conference on Dependable, Autonomic and Secure Computing. . pp. 182-196. IEEE (doi:10.1109/DASC.2011.31) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:30711)
[img]

Bailey, Christopher, Chadwick, David W., de Lemos, Rogerio (2014) Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80 (5). pp. 935-952. ISSN 0022-0000. (doi:10.1016/j.jcss.2014.02.003) (KAR id:43003)
[img]
Preview

Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio and Siu, Kristy W. S. (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Lectures Notes in Computer Science . Springer, Berlin, Germany, pp. 100-111. ISBN 978-3-642-38997-9. E-ISBN 978-3-642-38998-6. (doi:10.1007/978-3-642-38998-6_14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42993)

Bailey, Christopher, Montrieux, Lionel, de Lemos, Rogerio, Yu, Yijun, Wermelinger, Michel (2014) Run-time Generation, Transformation, and Verification of Access Control Models for Self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. (KAR id:42968)
[img]
Preview

Boakes, Matthew, Guest, Richard, Deravi, Farzin, Corsetti, Barbara (2019) Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships. IEEE Transactions on Biometrics, Behavior, and Identity Science, 1 (4). pp. 278-291. ISSN 2637-6407. E-ISSN 2637-6407. (doi:10.1109/TBIOM.2019.2941728) (KAR id:76574)
[img]
Preview

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only. (KAR id:52756)
[img]

Boiten, Eerke Albert (2016) Big Data Refinement. Electronic Proceedings in Theoretical Computer Science, 209 . pp. 17-23. ISSN 2075-2180. E-ISSN 2075-2180. (doi:10.4204/EPTCS.209.2) (KAR id:51635)
[img]
Preview

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only. (KAR id:52759)
[img]

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only. (KAR id:52760)
[img]

Boiten, Eerke Albert (2014) FoI reveals cynical logic that compromises NHS data privacy. . The Conversation Internet only. (KAR id:52726)
[img]

Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only. (KAR id:52761)
[img]

Boiten, Eerke Albert (2015) Investigatory Powers bill will remove ISPs' right to protect your privacy. . The Conversation Internet only. (KAR id:51619)
[img]

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only. (KAR id:52758)
[img]

Boiten, Eerke Albert (2014) Outdated laws put your health data in jeopardy. . The Conversation Internet only. (KAR id:52729)
[img]

Boiten, Eerke Albert (2014) Time for some truth about who is feeding off our NHS data. . The Conversation Internet only. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:52727)

Boiten, Eerke Albert (2014) Your NHS data is completely anonymous – until it isn’t. . The Conversation Internet only. (KAR id:52728)
[img]

Boiten, Eerke Albert (2013) iPhone hack shows security isn’t at our fingertips just yet. . Scientific American Internet only. (KAR id:52762)
[img]

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only. (KAR id:45256)
[img]

D

Derrick, John and Boiten, Eerke Albert (2016) Relational Concurrent Refinement - partial and total frameworks. In: Petre, Luigia and Sekerinski, Emil, eds. From Action Systems to Distributed Systems: The Refinement Approach. Taylor and Francis, Florida, USA, pp. 143-154. ISBN 978-1-4987-0158-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:51618)

G

Gaspar, Jaime and Boiten, Eerke Albert (2014) Simple composition theorems of one-way functions -- proofs and presentations. Technical report. IACR EPrints (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:52889)

H

Hernandez-Castro, Julio C., Roberts, David L. (2015) Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science, 1:e10 . pp. 1-11. ISSN 2376-5992. (doi:10.7717/peerj-cs.10) (KAR id:49885)
[img]
Preview

Hernández-Castro, Carlos Javier, Li, Shujun, R-Moreno, María D. (2020) All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks. Computers & Security, 92 . Article Number 101758. ISSN 0167-4048. (doi:10.1016/j.cose.2020.101758) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80266)
[img]

Hosu, Vlad, Hahn, Franz, Jenadeleh, Mohsen, Lin, Hanhe, Men, Hui, Szirányi, Tamás, Li, Shujun, Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience. . IEEE, Germany ISBN 978-1-5386-4025-8. E-ISBN 978-1-5386-4024-1. (doi:10.1109/QoMEX.2017.7965673) (KAR id:69606)
[img]
Preview

I

Ioannou, Athina, Tussyadiah, Iis, Lu, Yang (2020) Privacy concerns and disclosure of biometric and behavioral data for travel. International Journal of Information Management, 54 . p. 102122. ISSN 0268-4012. (doi:10.1016/j.ijinfomgt.2020.102122) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:81190)
[img] [img]

Islam, Tasmina, Becker, Ingolf, Posner, Rebecca, Ekblom, Paul, McGuire, Michael, Borrion, Hervé, Li, Shujun (2019) A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 277-293. Springer, Singapore ISBN 978-981-1513-03-9. E-ISBN 978-981-1513-04-6. (doi:10.1007/978-981-15-1304-6_22) (KAR id:76678)
[img]
Preview
[img]

L

Li, Chengqing, Feng, Bingbing, Li, Shujun, Kurths, Jurgen, Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, 66 (6). pp. 2322-2335. ISSN 1549-8328. (doi:10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:71415)
[img]

Li, Shujun and Ho, Anthony T.S. and Wang, Zichi and Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. Proceedings of the 2nd International Workshop on Multimedia Privacy and Security. CCS Computer and Communications Security . ACM, New York, USA, pp. 27-37. ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267365) (KAR id:69008)
[img]
Preview

Liu, Junjie and Aljaffan, Nouf and Li, Shujun (2018) PassInfinity: A software prototype system. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80287)
[img]

Liu, Ximing, Li, Yingjiu, Deng, Robert H., Chang, Bing, Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:10.1016/j.cose.2018.09.003) (KAR id:69553)
[img]
Preview

Lu, Yang, Ioannou, Athina, Tussyadiah, Iis, Li, Shujun (2019) Segmenting travelers based on responses to nudging for information disclosure. e-Review of Tourism Research, 17 (3). pp. 394-406. ISSN 1941-5842. (KAR id:79517)
[img]
Preview

Lu, Yang, Li, Shujun (2020) From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues. In: Scholar Space. Proceedings of the 53rd Hawaii International Conference on System Sciences. . University of Hawaii at Manoa, Haiwaii, USA ISBN 978-0-9981331-3-3. (doi:10.24251/HICSS.2020.799) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:76648)
[img] [img]

Lu, Yang, Li, Shujun, Ioannou, Athina, Tussyadiah, Iis (2019) From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 262-276. Springer, Singapore ISBN 978-981-1513-03-9. E-ISBN 978-981-1513-04-6. (doi:10.1007/978-981-15-1304-6_21) (KAR id:76677)
[img]
Preview
[img]

Lu, Yang, Sinnott, Richard O. (2016) Semantic Security for E-Health: A Case Study in Enhanced Access Control. In: 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). . pp. 407-414. IEEE ISBN 978-1-4673-7212-1. E-ISBN 978-1-4673-7211-4. (doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.90) (KAR id:80963)
[img]
Preview

Lu, Yang, Sinnott, Richard O. (2016) Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research. In: 2016 IEEE Trustcom/BigDataSE/ISPA. . pp. 519-526. IEEE ISBN 978-1-5090-3206-8. E-ISBN 978-1-5090-3205-1. (doi:10.1109/TrustCom.2016.0105) (KAR id:80962)
[img]
Preview

Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2017) A Semantic-Based K-Anonymity Scheme for Health Record Linkage. Studies in Health Technology and Informatics, 239 . pp. 84-90. ISSN 0926-9630. (doi:10.3233/978-1-61499-783-2-84) (KAR id:80964)
[img]
Preview

Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2018) Semantic-Based Policy Composition for Privacy-Demanding Data Linkage. In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 348-359. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00060) (KAR id:80961)
[img]
Preview

Lu, Yang, Sinnott, Richard O., Verspoor, Karin, Parampalli, Udaya (2018) Privacy-Preserving Access Control in Electronic Health Record Linkage. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 1079-1090. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00151) (KAR id:80959)
[img]
Preview

M

Mahaini, Mohamad Imad, Li, Shujun, Sağlam, Rahime Belen (2019) Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. In: ICPS: ACM International Conference Proceeding Series. Proceedings of the 14th International Conference on Availability, Reliability and Security. . ACM ISBN 978-1-4503-7164-3. (doi:10.1145/3339252.3339282) (KAR id:75253)
[img]
Preview

O

Ong, SimYing, Li, Shujun, Wong, KokSheik, Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:10.1016/j.image.2017.06.002) (KAR id:69562)
[img]
Preview

R

Roberts, David L., Hernandez-Castro, Julio (2017) Bycatch and illegal wildlife trade on the dark web. Oryx, 51 (3). pp. 393-394. ISSN 0030-6053. E-ISSN 1365-3008. (doi:10.1017/S0030605317000679) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:62140)
[img]

S

Sağlam, Rahime Belen, Aslan, Çağrı B., Li, Shujun, Dickson, Lisa, Pogrebna, Ganna (2020) A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR. In: Proceedings of 2020 2nd IEEE International Conference on Decentralized Applications and Infrastructures. . pp. 22-31. IEEE ISBN 978-1-72817-022-0. (doi:10.1109/DAPPS49028.2020.00003) (KAR id:81277)
[img]
Preview

Schmitz, Roland and Li, Shujun and Grecos, Christos and Zhang, Xinpeng (2018) Commutative Watermarking-Encryption of Multimedia Data Based on Histograms. In: Bhattacharyya, Siddhartha, ed. Intelligent Innovations in Multimedia Data Engineering and Management. IGI Global, USA, pp. 141-163. ISBN 978-1-5225-8783-5. E-ISBN 978-1-5225-7108-7. (doi:10.4018/978-1-5225-7107-0.ch006) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:74214)
[img]

Shi, Na, Tan, Liang, Yang, Ciaxia, He, Chen, Xu, Junli, Lu, Yang, Xu, Hao (2020) BacS: A blockchain-based access control scheme in distributed internet of things. Peer-to-Peer Networking and Applications, . ISSN 1936-6442. E-ISSN 1936-6450. (doi:10.1007/s12083-020-00930-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:81701)
[img]

T

Tussyadiah, Iis, Li, Shujun, Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. . pp. 278-290. Springer Nature Switzerland AG, Cham, Switzerland ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:10.1007/978-3-030-05940-8_22) (KAR id:71418)
[img]
Preview

W

Wang, Zichi, Li, Shujun, Zhang, Xinpeng (2019) Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access, 7 . pp. 168914-168921. ISSN 2169-3536. (doi:10.1109/ACCESS.2019.2955113) (KAR id:79178)
[img]
Preview

Wei, Yun-gang, Lu, Yang, Hu, Xiaoyan, Sun, Bo (2013) Research and Application of Access Control Technique in 3D Virtual Reality System OpenSim. In: 2013 Sixth International Symposium on Computational Intelligence and Design. . pp. 65-68. IEEE E-ISBN 978-0-7695-5079-4. (doi:10.1109/ISCID.2013.130) (KAR id:80976)
[img]
Preview

Wiiliams, Nick, Li, Shujun (2017) Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model. In: Proceedings of 2017 3rd IEEE International Conference on Cybernetics. . pp. 471-478. IEEE, USA ISBN 978-1-5386-2201-8. E-ISBN 978-1-5386-2200-1. (doi:10.1109/CYBConf.2017.7985810) (KAR id:74278)
[img]
Preview

Y

Yuan, Haiyue and Li, Shujun (2020) MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80296)
[img] [img]

Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_17) (KAR id:69559)
[img]
Preview

Č

Čagalja, Mario, Perković, Toni, Bugarić, Marin, Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:10.1016/j.pmcj.2014.09.002) (KAR id:69556)
[img]
Preview

This list was generated on Fri Oct 30 21:55:02 2020 GMT.