Skip to main content
Kent Academic Repository

Items where division is "University-wide institutes > Institute of Cyber Security for Society"

Group by: Creator's name | Item Type | Date | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | W | X | Y | Z | Č
Number of items at this level: 146.

A

Agrawal, Shweta, Bhattacherjee, Sanjay, Phan, Duong Hieu, Stehlé, Damien, Yamada, Shota (2017) Efficient Public Trace and Revoke from Standard Assumptions. In: Proceedings of the ACM Conference on Computer and Communications Security. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. . pp. 2277-2293. Association for Computing Machinery, New York- United States ISBN 978-1-4503-4946-8. (doi:10.1145/3133956.3134041) (KAR id:83284)
Format: PDF

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science, 10292 . Springer International Publishing AG, pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_13) (KAR id:69560)
Format: PDF

Alleyne, Emma, Wood, Jane L. (2010) Gang involvement: Psychological and Behavioral Characteristics of Gang Members, Peripheral Youth, and Nongang Youth. Aggressive Behavior, 36 (6). pp. 423-436. ISSN 0096-140X. (doi:10.1002/ab.20360) (KAR id:27523)
Format: PDF Format: PDF

Alqahtani, Saeed Ibrahim, Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. . Article No. 19. ACM, New York, NY, USA ISBN 978-1-4503-5257-4. (doi:10.1145/3098954.3098984) (KAR id:69561)
Format: PDF

Alqahtani, Saeed Ibrahim, Li, Shujun, Yuan, Haiyue, Rusconi, Patrice (2020) Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? EAI Endorsed Transactions on Security and Safety, 18 (e1). ISSN 2032-9393. (doi:10.4108/eai.13-7-2018.162797) (KAR id:79945)
Format: PDF

Altuncu, Enes and Franqueira, Virginia N. L. and Li, Shujun (2022) Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review. [Preprint] (doi:10.48550/arXiv.2208.10913) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:97945)

Altuncu, Enes, Nurse, Jason R. C., Bagriacik, Meryem, Kaleba, Sophie, Yuan, Haiyue, Bonheme, Lisa, Li, Shujun (2023) aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions. In: Workshop Proceedings of the 17th International AAAI Conference on Web and Social Media. . 27:1-27:10. Association for the Advancement of Artificial Intelligence (doi:10.36190/2023.27) (KAR id:101790)
Format: PDF

Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafa, Mohamed Ali, Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69555)
Format: PDF

Aslan, Çağrı B. and Sağlam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of the 9th International Conference on Social Media and Society. ACM-ICPS International Conference Proceeding Series . ACM, New York, USA. ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919) (KAR id:66861)
Format: PDF

Aslan, Çaǧri Burak, Li, Shujun, Çelebi, Fatih V., Tian, Hao (2020) The World of Defacers: Looking through the Lens of Their Activities on Twitter. IEEE Access, 8 . pp. 204132-204143. E-ISSN 2169-3536. (doi:10.1109/ACCESS.2020.3037015) (KAR id:84855)
Format: PDF

Aydın, Kübra, Sağlam, Rahime Belen, Li, Shujun, Bülbül, Abdullah (2020) When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter. In: Proceedings of the 13th International Conference on Security of Information and Networks. . 16:1-16:8. ACM ISBN 978-1-4503-8751-4. (doi:10.1145/3433174.3433586) (KAR id:89476)
Format: PDF

B

Bada, Maria, Furnell, Steven, Nurse, Jason R. C., Dymydiuk, Jason (2023) Supporting Small and Medium-sized Enterprises in using Privacy Enhancing Technologies. In: HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust. Lecture Notes in Computer Science . Springer ISBN 978-3-031-35821-0. E-ISBN 978-3-031-35822-7. (doi:10.1007/978-3-031-35822-7_19) (KAR id:100198)
Format: PDF

Bada, Maria and Nurse, Jason R. C. (2023) Exploring Cybercriminal Activities, Behaviors, and Profiles. In: Mukherjee, Sumitava and Dutt, Varun and Srinivasan, Narayanan, eds. Applied Cognitive Science and Technology. Springer, pp. 109-120. ISBN 978-981-99-3965-7. E-ISBN 978-981-99-3966-4. (doi:10.1007/978-981-99-3966-4_7) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:102602)
Format: PDF

Bailey, Christopher J., Chadwick, David W., de Lemos, Rogerio (2011) Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models. In: Proceedings of the 9th IEEE conference on Dependable, Autonomic and Secure Computing. . pp. 182-196. IEEE (doi:10.1109/DASC.2011.31) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:30711)
Format: PDF

Bailey, Christopher, Chadwick, David W., de Lemos, Rogerio (2014) Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80 (5). pp. 935-952. ISSN 0022-0000. (doi:10.1016/j.jcss.2014.02.003) (KAR id:43003)
Format: PDF

Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio and Siu, Kristy W. S. (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Lectures Notes in Computer Science . Springer, Berlin, Germany, pp. 100-111. ISBN 978-3-642-38997-9. E-ISBN 978-3-642-38998-6. (doi:10.1007/978-3-642-38998-6_14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42993)

Bailey, Christopher, Montrieux, Lionel, de Lemos, Rogerio, Yu, Yijun, Wermelinger, Michel (2014) Run-time Generation, Transformation, and Verification of Access Control Models for Self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. (doi:10.1145/2593929.2593945) (KAR id:42968)
Format: PDF

Baker-Beall, Christopher, Mott, Gareth (2021) Understanding of the European Union's Perception of the Threat of Cyberterrorism: A Discursive Analysis. Journal of Common Market Studies, . ISSN 0021-9886. (doi:10.1111/jcms.13300) (KAR id:92503)
Format: PDF Format: XML Word Processing Document (DOCX)

Baker-Beall, Christopher, Mott, Gareth (2021) The new EU counter-terrorism Agenda: preemptive security through the anticipation of terrorist events. Global Affairs, . ISSN 2334-0460. (doi:10.1080/23340460.2021.1995461) (KAR id:91181)
Format: PDF

Bard, Dan, Kearney, Joseph, Pérez-Delgado, Carlos A (2022) Quantum advantage on proof of work. Array, 15 . Article Number 100225. ISSN 2590-0056. (doi:10.1016/j.array.2022.100225) (KAR id:95822)
Format: PDF Format: PDF

Başkent, Can and Bhattacherjee, Sanjay and Shujun, Li (2022) Applications of Game Theory and Epistemic Logic to Fact-Checking. Technical report. University of Kent (Unpublished) (KAR id:97346)
Format: PDF

Becker, Ingolf, Posner, Rebecca, Islam, Tasmina, Ekblom, Paul, Borrion, Hervé, McGuire, Michael, Li, Shujun (2021) Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation. In: Proceedings of 54th Hawaii International Conference on System Sciences (HICSS 2021). . pp. 5347-5356. University of Hawaiʻi at Mānoa, Mānoa, Hawaiʻi, USA E-ISBN 978-0-9981331-3-3. (doi:10125/71270) (KAR id:84858)
Format: PDF

Belen Sağlam, Rahime, Nurse, Jason R. C., Hodges, Duncan (2022) An Investigation into the Sensitivity of Personal Information and Implications for Disclosure: A UK Perspective. Frontiers in Computer Science, . E-ISSN 2624-9898. (doi:10.3389/fcomp.2022.908245) (KAR id:95383)
Format: PDF

Belen-Saglam, Rahime, Altuncu, Enes, Lu, Yang, Li, Shujun (2023) A systematic literature review of the tension between the GDPR and public blockchain systems. Blockchain: Research and Applications, 4 (2). pp. 1-23. E-ISSN 2666-9536. (doi:10.1016/j.bcra.2023.100129) (KAR id:101787)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2011) An Analysis of the Naor-Naor-Lotspiech Subset Difference Algorithm (For Possibly Incomplete Binary Trees). In: The Seventh International Workshop on Coding and Cryptography 2011, April 11-15, 2011, Paris, France. (KAR id:93931)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2012) Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis. Designs, Codes and Cryptography, 66 (1). ISSN 0925-1022. E-ISSN 1573-7586. (doi:10.1007/s10623-012-9702-6) (KAR id:93930)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2014) Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme. IEEE Transactions on Computers, 63 (7). pp. 1709-1722. ISSN 0018-9340. (doi:10.1109/TC.2013.68) (KAR id:83282)
Format: PDF

Bhattacherjee, Sanjay and Sarkar, Palash (2019) Correlation and Inequality in Weighted Majority Voting Games. In: Deprivation, Inequality and Polarization. Economic Studies in Inequality, Social Exclusion and Well-Being. Springer, Singapore, pp. 161-191. ISBN 978-981-13-7943-7. E-ISBN 978-981-13-7944-4. (doi:10.1007/978-981-13-7944-4_9) (KAR id:93927)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2016) Reducing Communication Overhead of the Subset Difference Scheme. IEEE Transactions on Computers, 65 (8). pp. 2575-2587. ISSN 0018-9340. (doi:10.1109/TC.2015.2485231) (KAR id:83283)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2015) Tree Based Symmetric Key Broadcast Encryption. Journal of Discrete Algorithms, 34 . pp. 78-107. ISSN 1570-8667. (doi:10.1016/j.jda.2015.05.010) (KAR id:83842)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2023) Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies. In: Decision and Game Theory for Security. 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022, Proceedings. Lecture Notes in Computer Science . Springer E-ISBN 978-3-031-26369-9. (doi:10.1007/978-3-031-26369-9_15) (KAR id:96909)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2021) Weighted Voting Procedure having a Unique Blocker. International Journal of Game Theory, . ISSN 0020-7276. E-ISSN 1432-1270. (doi:10.1007/s00182-020-00751-z) (KAR id:83677)
Format: PDF Format: PDF

Boakes, Matthew and Guest, Richard and Deravi, Farzin (2021) Adapting to Movement Patterns for Face Recognition on Mobile Devices. In: Del Bimbo, Alberto and Cucchiara, Rita and Sclaroff, Stan and Farinella, Giovanni Maria and Mei, Tao and Bertini, Marco and Escalante, Hugo Jair and Vezzani, Roberto, eds. Pattern Recognition. ICPR International Workshops and Challenges. Lecture Notes in Computer Science, 12668 . Springer International Publishing, Cham, pp. 209-228. ISBN 978-3-030-68792-2. E-ISBN 978-3-030-68793-9. (doi:10.1007/978-3-030-68793-9_15) (KAR id:84439)
Format: PDF

Boakes, Matthew, Guest, Richard, Deravi, Farzin, Corsetti, Barbara (2019) Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships. IEEE Transactions on Biometrics, Behavior, and Identity Science, 1 (4). pp. 278-291. ISSN 2637-6407. E-ISSN 2637-6407. (doi:10.1109/TBIOM.2019.2941728) (KAR id:76574)
Format: PDF

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only. (KAR id:52756)
Format: HTML

Boiten, Eerke Albert (2016) Big Data Refinement. Electronic Proceedings in Theoretical Computer Science, 209 . pp. 17-23. ISSN 2075-2180. E-ISSN 2075-2180. (doi:10.4204/EPTCS.209.2) (KAR id:51635)
Format: PDF

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only. (KAR id:52759)
Format: HTML

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only. (KAR id:52760)
Format: HTML

Boiten, Eerke Albert (2014) FoI reveals cynical logic that compromises NHS data privacy. . The Conversation Internet only. (KAR id:52726)
Format: HTML

Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only. (KAR id:52761)
Format: HTML

Boiten, Eerke Albert (2015) Investigatory Powers bill will remove ISPs' right to protect your privacy. . The Conversation Internet only. (KAR id:51619)
Format: HTML

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only. (KAR id:52758)
Format: HTML

Boiten, Eerke Albert (2014) Outdated laws put your health data in jeopardy. . The Conversation Internet only. (KAR id:52729)
Format: HTML

Boiten, Eerke Albert (2014) Time for some truth about who is feeding off our NHS data. . The Conversation Internet only. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:52727)

Boiten, Eerke Albert (2014) Your NHS data is completely anonymous – until it isn’t. . The Conversation Internet only. (KAR id:52728)
Format: HTML

Boiten, Eerke Albert (2013) iPhone hack shows security isn’t at our fingertips just yet. . Scientific American Internet only. (KAR id:52762)
Format: HTML

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only. (KAR id:45256)
Format: HTML

C

Cartwright, Anna, Cartwright, Edward, MacColl, Jamie, Mott, Gareth, Turner, Sarah, Sullivan, James, Nurse, Jason R. C. (2023) How Cyber-Insurance Influences the Ransomware Payment Decision: Theory and Evidence. The Geneva Papers on Risk and Insurance - Issues and Practice, 48 . pp. 300-331. E-ISSN 1468-0440. (doi:10.1057/s41288-023-00288-8) (KAR id:100212)
Format: PDF

Chousein, Zeynep, Tetik, Hacı Yakup, Sağlam, Rahime Belen, Bülbül, Abdullah, Li, Shujun (2020) Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions. In: Proceedings of the 13th International Conference on Security of Information and Networks. . 17:1-17:8. ACM ISBN 978-1-4503-8751-4. (doi:10.1145/3433174.3433587) (KAR id:89479)
Format: PDF

Connolly, Lena, Borrion, Hervé, Arief, Budi, Kaddoura, Sanaa (2023) Applying Neutralisation Theory to Better Understand Ransomware Offenders. In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). . pp. 177-182. IEEE Computer Society, Los Alamitos, CA, USA ISBN 979-8-3503-2720-5. (doi:10.1109/EuroSPW59978.2023.00025) (KAR id:102142)
Format: PDF

D

Derrick, John and Boiten, Eerke Albert (2016) Relational Concurrent Refinement - partial and total frameworks. In: Petre, Luigia and Sekerinski, Emil, eds. From Action Systems to Distributed Systems: The Refinement Approach. Taylor and Francis, Florida, USA, pp. 143-154. ISBN 978-1-4987-0158-7. (doi:10.1201/b20053-15) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:51618)

E

Erola, Arnau, Agrafiotis, Ioannis, Nurse, Jason R. C., Axon, Louise, Goldsmith, Michael, Creese, Sadie (2022) A System to Calculate Cyber-Value-at-Risk. Computers & Security, 113 . Article Number 102545. ISSN 0167-4048. (doi:10.1016/j.cose.2021.102545) (KAR id:91647)
Format: PDF Format: PDF

F

Franqueira, Virginia N. L. and Annor, Jessica A. and Kafalı, Özgur (2022) Age Appropriate Design: Assessment of TikTok, Twitch, and YouTube Kids. [Preprint] (doi:10.48550/arXiv.2208.02638) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:97949)

G

Gaspar, Jaime and Boiten, Eerke Albert (2014) Simple composition theorems of one-way functions -- proofs and presentations. Technical report. IACR EPrints (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:52889)

Grennan, Eamonn, Toros, Harmonie (2021) 9/11 as a policy pivot point in the security community: a dialogue. Critical Studies on Terrorism, 13 . ISSN 1753-9153. (doi:10.1080/17539153.2021.1982123) (KAR id:90561)
Format: PDF

H

Heering, Maria Sophia, Yuan, Haiyue, Li, Shujun (2024) The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems. In: 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC). Proceedings of the 2023 IEEE 26th International Conference on Intelligent Transportation Systems. . pp. 5573-5578. IEEE ISBN 979-8-3503-9947-9. E-ISBN 979-8-3503-9946-2. (doi:10.1109/ITSC57777.2023.10422468) (KAR id:105030)
Format: PDF

Hernandez-Castro, Julio C., Roberts, David L. (2015) Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science, 1:e10 . pp. 1-11. ISSN 2376-5992. (doi:10.7717/peerj-cs.10) (KAR id:49885)
Format: PDF

Hernández-Castro, Carlos Javier, Li, Shujun, R-Moreno, María D. (2020) All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks. Computers & Security, 92 . Article Number 101758. ISSN 0167-4048. (doi:10.1016/j.cose.2020.101758) (KAR id:80266)
Format: PDF

Hosu, Vlad, Hahn, Franz, Jenadeleh, Mohsen, Lin, Hanhe, Men, Hui, Szirányi, Tamás, Li, Shujun, Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience. . IEEE, Germany ISBN 978-1-5386-4025-8. E-ISBN 978-1-5386-4024-1. (doi:10.1109/QoMEX.2017.7965673) (KAR id:69606)
Format: PDF

I

Ioannou, Athina, Tussyadiah, Iis, Lu, Yang (2020) Privacy concerns and disclosure of biometric and behavioral data for travel. International Journal of Information Management, 54 . p. 102122. ISSN 0268-4012. (doi:10.1016/j.ijinfomgt.2020.102122) (KAR id:81190)
Format: PDF Format: PDF

Ioannou, Athina, Tussyadiah, Iis, Miller, Graham, Li, Shujun, Weick, Mario (2021) Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis. PLoS ONE, 16 (8). e0256822:1-e0256822:29. ISSN 1932-6203. (doi:10.1371/journal.pone.0256822) (KAR id:89955)
Format: PDF

Islam, Tasmina, Becker, Ingolf, Posner, Rebecca, Ekblom, Paul, McGuire, Michael, Borrion, Hervé, Li, Shujun (2019) A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 277-293. Springer, Singapore ISBN 978-981-15-1303-9. E-ISBN 978-981-15-1304-6. (doi:10.1007/978-981-15-1304-6_22) (KAR id:76678)
Format: PDF Format: PDF

J

Johansmeyer, Tom (2024) Natural Catastrophes: The New Cyber Threat. In: 8th ASTIN Cyber Workshop. . , London, United Kingdom (KAR id:106151)
Format: Microsoft PowerPoint

Jones, Keenan and Altuncu, Enes and Franqueira, Virginia N. L. and Wang, Yichao and Li, Shujun (2022) A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception. [Preprint] (doi:10.48550/arXiv.2208.05757) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:97944)

Jones, Keenan, Zahrah, Fatima, Nurse, Jason R. C. (2024) Embedding Privacy in Computational Social Science and Artificial Intelligence Research. In: International AAAI Conference on Web and Social Media (ICWSM) Workshop Proceedings. . (In press) (KAR id:106052)
Format: PDF

K

Kearney, Joseph, Pérez-Delgado, Carlos A (2021) Vulnerability of blockchain technologies to quantum attacks. Array, 10 . Article Number 100065. ISSN 2590-0056. (doi:10.1016/j.array.2021.100065) (KAR id:93781)
Format: PDF

Khan, Neeshe, Furnell, Steven, Bada, Maria, Nurse, Jason R. C., Rand, Matthew (2024) Assessing Cyber Security Support for Small and Medium-Sized Enterprises. In: IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance. . Spinger (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:106167)
Format: PDF

Knott, Jamie, Yuan, Haiyue, Boakes, Matthew, Li, Shujun (2023) Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data. In: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. . 1603- 1606. ACM, New York, USA ISBN 978-1-4503-9517-5. (doi:10.1145/3555776.3577805) (KAR id:101794)
Format: PDF

Kocaogullar, Yekta, Cetin, Orcun, Arief, Budi, Brierley, Calvin, Pont, Jamie, Hernandez-Castro, Julio C. (2022) Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots. In: 12th International Workshop on Socio-Technical Aspects in Security (STAST 2022). . pp. 15-31. (In press) (KAR id:102122)
Format: PDF

L

Li, Chengqing, Feng, Bingbing, Li, Shujun, Kurths, Jurgen, Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, 66 (6). pp. 2322-2335. ISSN 1549-8328. (doi:10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:71415)
Format: PDF

Li, Shujun, Ho, Anthony T.S., Wang, Zichi, Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. MPS'18: 2nd International Workshop on Multimedia Privacy and Security Proceedings. CCS Computer and Communications Security . pp. 27-37. ACM, New York, USA ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267365) (KAR id:69008)
Format: PDF

Liang, Zhanbo, Guo, Jie, Qiu, Weidong, Huang, Zheng, Li, Shujun (2024) When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification. Data Mining and Knowledge Discovery, 38 (3). pp. 1171-1192. ISSN 1384-5810. (doi:10.1007/s10618-023-00992-y) (KAR id:104513)
Format: PDF

Lin, Ruiyuan, Liu, Sheng, Jiang, Jun, Li, Shujun, Li, Chengqing, Kuo, C.-C. Jay (2024) Recovering sign bits of DCT coefficients in digital images as an optimization problem. Journal of Visual Communication and Image Representation, 98 . Article Number 104045. ISSN 1047-3203. (doi:10.1016/j.jvcir.2023.104045) (KAR id:106082)
Format: PDF

Liu, Junjie and Aljaffan, Nouf and Li, Shujun (2018) PassInfinity: A software prototype system. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80287)
Format: Archive (ZIP)

Liu, Ximing, Li, Yingjiu, Deng, Robert H., Chang, Bing, Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:10.1016/j.cose.2018.09.003) (KAR id:69553)
Format: PDF

Lu, Yang, Ioannou, Athina, Tussyadiah, Iis, Li, Shujun (2019) Segmenting travelers based on responses to nudging for information disclosure. e-Review of Tourism Research, 17 (3). pp. 394-406. ISSN 1941-5842. (KAR id:79517)
Format: PDF

Lu, Yang, Li, Shujun (2020) From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues. In: Scholar Space. Proceedings of the 53rd Hawaii International Conference on System Sciences. . University of Hawaii at Manoa, Haiwaii, USA ISBN 978-0-9981331-3-3. (doi:10.24251/HICSS.2020.799) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:76648)
Format: PDF Format: Image (PNG)

Lu, Yang, Li, Shujun (2022) From Data Flows to Privacy-Benefit Trade-offs: A User-Centric Semantic Model. Security and Privacy, 5 (4). pp. 1-24. E-ISSN 2475-6725. (doi:10.1002/spy2.225) (KAR id:93764)
Format: PDF

Lu, Yang, Li, Shujun, Freitas, Alex A., Ioannou, Athina (2022) How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. EAI Endorsed Transactions on Security and Safety, 8 (30). pp. 1-20. ISSN 2032-9393. (doi:10.4108/eai.21-12-2021.172440) (KAR id:93892)
Format: PDF

Lu, Yang, Li, Shujun, Ioannou, Athina, Tussyadiah, Iis (2019) From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 262-276. Springer, Singapore ISBN 978-981-15-1303-9. E-ISBN 978-981-15-1304-6. (doi:10.1007/978-981-15-1304-6_21) (KAR id:76677)
Format: PDF Format: PDF

Lu, Yang, Sinnott, Richard O. (2016) Semantic Security for E-Health: A Case Study in Enhanced Access Control. In: 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). . pp. 407-414. IEEE ISBN 978-1-4673-7212-1. E-ISBN 978-1-4673-7211-4. (doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.90) (KAR id:80963)
Format: PDF

Lu, Yang, Sinnott, Richard O. (2016) Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research. In: 2016 IEEE Trustcom/BigDataSE/ISPA. . pp. 519-526. IEEE ISBN 978-1-5090-3206-8. E-ISBN 978-1-5090-3205-1. (doi:10.1109/TrustCom.2016.0105) (KAR id:80962)
Format: PDF

Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2017) A Semantic-Based K-Anonymity Scheme for Health Record Linkage. Studies in Health Technology and Informatics, 239 . pp. 84-90. ISSN 0926-9630. (doi:10.3233/978-1-61499-783-2-84) (KAR id:80964)
Format: PDF

Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2018) Semantic-Based Policy Composition for Privacy-Demanding Data Linkage. In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 348-359. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00060) (KAR id:80961)
Format: PDF

Lu, Yang, Sinnott, Richard O., Verspoor, Karin, Parampalli, Udaya (2018) Privacy-Preserving Access Control in Electronic Health Record Linkage. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 1079-1090. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00151) (KAR id:80959)
Format: PDF

M

MacColl, Jamie and Hüsch, Pia and Mott, Gareth and Sullivan, James and Nurse, Jason R. C. and Turner, Sarah and Pattnaik, Nandita (2024) Ransomware: Victim Insights on Harms to Individuals, Organisations and Society. Technical report. The Royal United Services Institute for Defence and Security Studies (KAR id:104628)
Format: PDF Format: PDF

MacColl, Jamie and Sullivan, James and Nurse, Jason R. C. and Mott, Gareth and Turner, Sarah and Cartwright, Edward and Cartwright, Anna (2023) Cyber Insurance and the Ransomware Challenge. Technical report. The Royal United Services Institute for Defence and Security Studies (KAR id:104626)
Format: PDF Format: PDF

Mahaini, Mohamad Imad, Li, Shujun (2023) Cyber Security Researchers on Online Social Networks: From the Lens of the UK’s ACEs-CSR on Twitter. In: Lecture Notes in Computer Science. Security and Privacy in Social Networks and Big Data: 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14–16, 2023, Proceedings. Lecture Notes in Computer Science , 14097. pp. 129-148. Springer, Singapore E-ISBN 978-981-99-5177-2. (doi:10.1007/978-981-99-5177-2_8) (KAR id:102392)
Format: PDF

Mahaini, Mohamad Imad, Li, Shujun, Sağlam, Rahime Belen (2019) Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. In: ICPS: ACM International Conference Proceeding Series. Proceedings of the 14th International Conference on Availability, Reliability and Security. . ACM ISBN 978-1-4503-7164-3. (doi:10.1145/3339252.3339282) (KAR id:75253)
Format: PDF

Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2022) How National CSIRTs Leverage Public Data, OSINT and Free Tools in Operational Practices: An Empirical Study. Cyber Security: A Peer-Reviewed Journal, 5 (3). pp. 251-276. ISSN 2398-5100. (KAR id:93768)
Format: PDF

Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2023) Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions. Digital Threats: Research and Practice, 4 (3). pp. 1-24. ISSN 2576-5337. (doi:10.1145/3609230) (KAR id:103162)
Format: PDF

Mott, Gareth, Nurse, Jason R. C., Baker-Beall, Christopher (2023) Preparing for future Cyber Crises: Lessons from governance of the coronavirus pandemic. Policy Design and Practice, 6 (2). pp. 160-181. ISSN 2574-1292. (doi:10.1080/25741292.2023.2205764) (KAR id:100974)
Format: PDF Format: PDF

Mott, Gareth, Turner, Sarah, Nurse, Jason R. C., MacColl, Jamie, Sullivan, James, Cartwright, Anna, Cartwright, Edward (2023) Between a rock and a hard(ening) place: Cyber insurance in the ransomware era. Computers & Security, 128 . Article Number 103162. ISSN 0167-4048. (doi:10.1016/j.cose.2023.103162) (KAR id:100308)
Format: PDF Format: PDF

Moura, Ralf Luis de, Franqueira, Virginia N. L., Pessin, Gustavo (2024) Cybersecurity in Industrial Networks: Artificial Intelligence Techniques Applied to Intrusion Detection Systems. In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'23). Conference Publishing Services (CPS) . IEEE (In press) (doi:10.1109/csce60160.2023.00365) (KAR id:101558)
Format: PDF

Moura, Ralf Luis de, Franqueira, Virginia N. L., Pessin, Gustavo (2022) Non-IP Industrial Networks: An Agnostic Anomaly Detection System. In: Anais do Xxiv Congresso Brasileiro de Automática – CBA 2022. . Brazilian Society of Automatic (SBA), Brazil (KAR id:97938)
Format: PDF

N

Nadeem, Muhammad Shahroz, Kurugollu, Fatih, Saravi, Sara, Atlam, Hany F., Franqueira, Virginia N. L. (2023) Deep labeller: automatic bounding box generation for synthetic violence detection datasets. Multimedia Tools and Applications, 83 (4). pp. 10717-10734. ISSN 1573-7721. (doi:10.1007/s11042-023-15621-5) (KAR id:101823)
Format: PDF

Nurse, Jason R. C., Adamos, Konstantinos, Grammatopoulos, Athanasios, Di Franco, Fabio (2021) Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education. Report number: 10.2824/033355. European Union Agency for Cybersecurity (ENISA) (doi:10.2824/033355) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:91977)
Format: PDF

Nurse, Jason R. C., Vargas, Francielle, Hassan, Naeemul, Wang, Dakuo, Andriotis, Panagiotis, Ghenai, Amira, Jaidka, Kokil, Mustafaraj, Eni, Joseph, Kenneth, Foucault Welles, Brooke and others. (2021) Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM). In: Proceedings of the ICWSM Workshops. . Association for the Advancement of Artificial Intelligence (doi:10.36190/2021.00) (KAR id:98160)
Format: PDF

O

Ong, SimYing, Li, Shujun, Wong, KokSheik, Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:10.1016/j.image.2017.06.002) (KAR id:69562)
Format: PDF

Ozturk, Omer Said, Ekmekcioglu, Emre, Cetin, Orcun, Arief, Budi, Hernandez-Castro, Julio C. (2023) New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? In: EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference. . pp. 13-18. ACM ISBN 978-1-4503-9829-9. (doi:10.1145/3590777.3590780) (KAR id:102124)
Format: PDF Format: PDF

P

Panteli, Niki, Nurse, Jason R. C., Collins, Emily, Williams, Nikki (2021) Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges. In: 42nd International Conference on Information Systems (ICIS) TREOs. (KAR id:92838)
Format: PDF

Panteli, Niki, Nurse, Jason R. C., Collins, Emily, Williams, Nikki (2022) Trust disruption and preservation in the Covid-19 work from home context. Journal of Workplace Learning, . ISSN 1366-5626. (doi:10.1108/JWL-02-2022-0017) (KAR id:96206)
Format: PDF

Parker, Sam, Yuan, Haiyue, Li, Shujun (2024) PassViz: A Visualisation System for Analysing Leaked Passwords. In: Proceedings of the 2023 20th IEEE Symposium on Visualization for Cyber Security. . pp. 33-42. IEEE ISBN 979-8-3503-1794-7. E-ISBN 979-8-3503-1793-0. (doi:10.1109/VizSec60606.2023.00011) (KAR id:102913)
Format: PDF

Patterson, Clare M., Nurse, Jason R. C., Franqueira, Virginia N. L. (2023) Learning from cyber security incidents: A systematic review and future research agenda. Computers & Security, 132 . Article Number 103309. ISSN 0167-4048. (doi:10.1016/j.cose.2023.103309) (KAR id:101556)
Format: PDF Format: PDF

Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2022) Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter. Computers and Security, 125 . Article Number 103008. ISSN 0167-4048. (doi:10.1016/j.cose.2022.103008) (KAR id:96259)
Format: PDF

Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2023) A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. ACM Computing Surveys, 55 (9). 180:1-180:38. ISSN 0360-0300. E-ISSN 1557-7341. (doi:10.1145/3558095) (KAR id:98166)
Format: PDF

Pattnaik, Nandita, Nurse, Jason R. C., Turner, Sarah, Mott, Gareth, MacColl, Jamie, Huesch, Pia, Sullivan, James (2023) It's more than just money: The real-world harms from ransomware attacks. In: 17th International Symposium on Human Aspects of Information Security & Assurance, 4-6 July 2023, Canterbury, UK. (doi:10.1007/978-3-031-38530-8_21) (KAR id:101600)
Format: PDF

Pérez-Delgado, Carlos A (2022) A Quantum Software Modeling Language. In: Quantum Software Engineering. Springer International Publishing Cham, Switzerland, pp. 103-119. ISBN 978-3-031-05323-8. E-ISBN 978-3-031-05324-5. (doi:10.1007/978-3-031-05324-5_6) (KAR id:97519)
Format: PDF

R

Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2023) AnoFed: Adaptive anomaly detection for digital health usingtransformer-based federated learning and support vector data description. Engineering Applications of Artificial Intelligence, 121 . Article Number 106051. ISSN 0952-1976. (doi:10.1016/j.engappai.2023.106051) (KAR id:100363)
Format: PDF

Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2022) Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI. Knowledge-Based Systems, 236 . Article Number 107763. ISSN 0950-7051. (doi:10.1016/j.knosys.2021.107763) (KAR id:92005)
Format: PDF

Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2023) Proof of Swarm Based Ensemble Learning for Federated Learning Applications. In: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. . 152- 155. ACM, New York, USA ISBN 978-1-4503-9517-5. (doi:10.1145/3555776.3578601) (KAR id:101795)
Format: PDF

Roberts, David L., Hernandez-Castro, Julio (2017) Bycatch and illegal wildlife trade on the dark web. Oryx, 51 (3). pp. 393-394. ISSN 0030-6053. E-ISSN 1365-3008. (doi:10.1017/S0030605317000679) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:62140)
Format: PDF

S

Sağlam, Rahime Belen, Aslan, Çağrı B., Li, Shujun, Dickson, Lisa, Pogrebna, Ganna (2020) A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR. In: Proceedings of 2020 2nd IEEE International Conference on Decentralized Applications and Infrastructures. . pp. 22-31. IEEE ISBN 978-1-7281-7022-0. (doi:10.1109/DAPPS49028.2020.00003) (KAR id:81277)
Format: PDF

Sağlam, Rahime Belen, Miller, Vincent, Franqueira, Virginia N. L. (2023) A Systematic Literature Review on Cyber Security Education for Children. IEEE Transactions on Education, 66 (3). pp. 274-266. ISSN 0018-9359. (doi:10.1109/TE.2022.3231019) (KAR id:99071)
Format: PDF

Schmitz, Roland and Li, Shujun and Grecos, Christos and Zhang, Xinpeng (2018) Commutative Watermarking-Encryption of Multimedia Data Based on Histograms. In: Bhattacharyya, Siddhartha, ed. Intelligent Innovations in Multimedia Data Engineering and Management. IGI Global, USA, pp. 141-163. ISBN 978-1-5225-8783-5. E-ISBN 978-1-5225-7108-7. (doi:10.4018/978-1-5225-7107-0.ch006) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:74214)
Format: PDF

Shere, Anjuli R.K., Nurse, Jason R. C., Martin, Andrew (2023) Threats to Journalists from the Consumer Internet of Things. In: Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media. Cyber Science 2022; 20–21 June; Wales. Springer Proceedings in Complexity . Springer ISBN 978-981-19-6413-8. (doi:10.1007/978-981-19-6414-5_17) (KAR id:94898)
Format: PDF

Shi, Na, Tan, Liang, Yang, Ciaxia, He, Chen, Xu, Junli, Lu, Yang, Xu, Hao (2020) BacS: A blockchain-based access control scheme in distributed internet of things. Peer-to-Peer Networking and Applications, . ISSN 1936-6442. E-ISSN 1936-6450. (doi:10.1007/s12083-020-00930-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:81701)
Format: PDF

Sugiura, Lisa, Blackbourn, Dean, Button, Mark, Hawkins, Chloe, Tapley, Jacki, Frederick, Brian, Nurse, Jason R. C., Belen Sağlam, Rahime (2021) Computer misuse as a facilitator of Domestic Abuse. University of Portsmouth, 127 pp. (KAR id:98203)
Format: PDF

Sunde, Nina, Franqueira, Virginia N. L. (2023) Adding transparency to uncertainty: An argument-based method for evaluative opinions. Forensic Science International: Digital Investigation, 47 . Article Number 301657. ISSN 1742-2876. (doi:10.1016/j.fsidi.2023.301657) (KAR id:103353)
Format: PDF

T

Toros, Harmonie (2022) Better researchers, better people? The dangers of empathetic research on the extreme right. Critical Studies on Terrorism, 15 (1). pp. 225-231. ISSN 1753-9153. (doi:10.1080/17539153.2022.2031127) (KAR id:92845)
Format: PDF

Toros, Harmonie (2022) UK Counter Terrorism Narratives: An Analysis of the Action Counters Terrorism Campaign 2017-2020. Project report. iCSS, Kent, UK (Unpublished) (KAR id:99013)
Format: PDF

Toros, Harmonie and Martucci, Laura Sabrina (2021) Women’s role in de-radicalization and rehabilitation in the MENA region. Project report. NATO Southern Hub, Naples, Italy (KAR id:99015)
Format: PDF

Turner, Sarah, Nurse, Jason R. C., Li, Shujun (2022) "It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. In: ACM Conference on Human Factors in Computing Systems (CHI). 2022 ACM CHI Conference on Human Factors in Computing Systems. . ACM ISBN 978-1-4503-9156-6. (doi:10.1145/3491101.3503577) (KAR id:92356)
Format: PDF

Turner, Sarah, Nurse, Jason R. C., Li, Shujun (2021) When Googling it doesn’t work: The challenge of finding security advice for smart home devices. In: Human Aspects of Information Security and Assurance. HAISA 2021. IFIP Advances in Information and Communication Technology. 613. Springer ISBN 978-3-030-81110-5. E-ISBN 978-3-030-81111-2. (doi:10.1007/978-3-030-81111-2_10) (KAR id:88357)
Format: PDF

Turner, Sarah, Pattnaik, Nandita, Nurse, Jason R. C., Li, Shujun (2022) "You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security. Proceedings of the ACM on Human-Computer Interaction, 6 (CSCW2). Article Number 269. E-ISSN 2573-0142. (doi:10.1145/3555159) (KAR id:95346)
Format: PDF

Tussyadiah, Iis, Li, Shujun, Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. . pp. 278-290. Springer Nature Switzerland AG, Cham, Switzerland ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:10.1007/978-3-030-05940-8_22) (KAR id:71418)
Format: PDF

W

Waldock, Krysia Emily, Miller, Vincent, Li, Shujun, Franqueira, Virginia N. L. (2022) Pre-University Cyber Security Education: A report on developing cyber skills amongst children and young people. Global Forum on Cyber Expertise, 159 pp. (KAR id:96040)
Format: PDF

Wang, Hui and Ho, Anthony T.S. and Li, Shujun (2021) OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. In: Computer Security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 243-260. ISBN 978-3-030-66503-6. E-ISBN 978-3-030-66504-3. (doi:10.1007/978-3-030-66504-3_15) (KAR id:84857)
Format: PDF

Wang, Yichao, Arief, Budi, Franqueira, Virginia N. L., Coates, Anna Grace, Ó Ciardha, Caoilte (2023) Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned. In: EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference. . pp. 59-64. ACM ISBN 978-1-4503-9829-9. (doi:10.1145/3590777.3590812) (KAR id:102125)
Format: PDF Format: PDF

Wang, Yichao, Arief, Budi, Hernandez-Castro, Julio C. (2024) Analysis of Security Mechanisms of Dark Web Markets. In: European Interdisciplinary Cybersecurity Conference (EICC 2024), 5-6 June 2024, Xanthi, Greece. (In press) (KAR id:105237)
Format: PDF

Wang, Yichao, Arief, Budi, Hernandez-Castro, Julio C. (2023) Dark ending: what happens when a dark web market closes down. In: In Proceedings of the 9th International Conference on Information Systems Security and Privacy. . ISBN 978-989-758-624-8. (doi:10.5220/0011681600003405) (KAR id:100540)
Format: PDF

Wang, Yichao, Arief, Budi, Hernandez-Castro, Julio C. (2021) Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets. In: 2021 APWG Symposium on Electronic Crime Research (eCrime). . pp. 1-13. IEEE ISBN 978-1-6654-8029-1. (doi:10.1109/eCrime54498.2021.9738745) (KAR id:99679)
Format: PDF

Wang, Yichao, Roscoe, Sophia, Arief, Budi, Connolly, Lena, Borrion, Hervé, Kaddoura, Sanaa (2023) The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities. In: 9th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2023). Lecture Notes in Computer Science (LNCS) . pp. 149-163. Springer Singapore ISBN 978-981-99-5176-5. E-ISBN 978-981-99-5177-2. (doi:10.1007/978-981-99-5177-2_9) (KAR id:102144)
Format: PDF

Wang, Zichi, Li, Shujun, Zhang, Xinpeng (2019) Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access, 7 . pp. 168914-168921. ISSN 2169-3536. (doi:10.1109/ACCESS.2019.2955113) (KAR id:79178)
Format: PDF

Wei, Yun-gang, Lu, Yang, Hu, Xiaoyan, Sun, Bo (2013) Research and Application of Access Control Technique in 3D Virtual Reality System OpenSim. In: 2013 Sixth International Symposium on Computational Intelligence and Design. . pp. 65-68. IEEE E-ISBN 978-0-7695-5079-4. (doi:10.1109/ISCID.2013.130) (KAR id:80976)
Format: PDF

Wiiliams, Nick, Li, Shujun (2017) Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model. In: Proceedings of 2017 3rd IEEE International Conference on Cybernetics. . pp. 471-478. IEEE, USA ISBN 978-1-5386-2201-8. E-ISBN 978-1-5386-2200-1. (doi:10.1109/CYBConf.2017.7985810) (KAR id:74278)
Format: PDF

X

Xu, Yang, Guo, Jie, Qiu, Weidong, Huang, Zheng, Altuncu, Enes, Li, Shujun (2023) “Comments Matter and The More The Better!”: Improving Rumor Detection with User Comments. In: Proceedings of the 2022 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022). . pp. 383-390. IEEE ISBN 978-1-6654-9425-0. (doi:10.1109/TrustCom56396.2022.00060) (KAR id:97593)
Format: PDF

Y

Yilmaz, Yagiz, Cetin, Orcun, Grigore, Claudia, Arief, Budi, Hernandez-Castro, Julio (2023) Personality Types and Ransomware Victimisation. Digital Threats: Research and Practice, 4 (4). pp. 1-25. ISSN 2692-1626. E-ISSN 2576-5337. (doi:10.1145/3568994) (KAR id:102123)
Format: PDF Format: PDF

Yuan, Haiyue, Boakes, Matthew, Ma, Xiao, Cao, Dongmei, Li, Shujun (2023) Visualising Personal Data Flows: Insights from a Case Study of Booking.com. In: Lecture Notes in Business Information Processing. Intelligent Information Systems: CAiSE Forum 2023, Zaragoza, Spain, June 12–16, 2023, Proceedings. 477. pp. 52-60. Springer Cham, Cham, Germany E-ISBN 978-3-031-34674-3. (doi:10.1007/978-3-031-34674-3_7) (KAR id:101789)
Format: PDF

Yuan, Haiyue and Li, Shujun (2020) MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80296)
Format: Archive (ZIP) Format: PDF

Yuan, Haiyue, Li, Shujun, Rusconi, Patrice (2021) CogTool+: Modeling human performance at large scale. ACM Transactions on Computer-Human Interaction, 28 (2). Article Number 7. ISSN 1073-0516. E-ISSN 1557-7325. (doi:10.1145/3447534) (KAR id:87545)
Format: PDF

Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_17) (KAR id:69559)
Format: PDF

Yuan, Xin, Guo, Jie, Qiu, Weidong, Huang, Zheng, Li, Shujun (2023) Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation. In: Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing. . pp. 4268-4280. Association for Computational Linguistics (doi:2023.emnlp-main.259) (KAR id:104246)
Format: PDF

Z

Zahrah, Fatima and Nurse, Jason R. C. (2022) Terrorism and online extremism. In: Ceron, Andrea, ed. Elgar Encyclopedia of Technology and Politics. Elgar Encyclopedias in the Social Sciences series . Edward Elgar Publishing, pp. 62-67. ISBN 978-1-80037-425-6. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:98159)
Format: PDF

Zahrah, Fatima, Nurse, Jason R. C., Goldsmith, Michael (2022) A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election. In: 2022 ACM/SIGAPP Symposium On Applied Computing. . pp. 1788-1791. ACM (doi:10.1145/3477314.3507226) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:92440)
Format: PDF

Č

Čagalja, Mario, Perković, Toni, Bugarić, Marin, Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:10.1016/j.pmcj.2014.09.002) (KAR id:69556)
Format: PDF

This list was generated on Tue Jun 11 21:40:10 2024 BST.