Skip to main content

Items where division is "University-wide institutes > Institute of Cyber Security for Society"

Group by: Creator's name | Item Type | Date | No Grouping
Jump to: A | B | C | D | E | G | H | I | K | L | M | N | O | P | R | S | T | W | Y | Z | Č
Number of items at this level: 90.

A

Agrawal, Shweta, Bhattacherjee, Sanjay, Phan, Duong Hieu, Stehlé, Damien, Yamada, Shota (2017) Efficient Public Trace and Revoke from Standard Assumptions. In: Proceedings of the ACM Conference on Computer and Communications Security. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. . pp. 2277-2293. Association for Computing Machinery, New York- United States ISBN 978-1-4503-4946-8. (doi:10.1145/3133956.3134041) (KAR id:83284)
Format: PDF

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science, 10292 . Springer International Publishing AG, pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_13) (KAR id:69560)
Format: PDF

Alleyne, Emma, Wood, Jane L. (2010) Gang involvement: Psychological and Behavioral Characteristics of Gang Members, Peripheral Youth, and Nongang Youth. Aggressive Behavior, 36 (6). pp. 423-436. ISSN 0096-140X. (doi:10.1002/ab.20360) (KAR id:27523)
Format: PDF Format: PDF

Alqahtani, Saeed Ibrahim, Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. . Article No. 19. ACM, New York, NY, USA ISBN 978-1-4503-5257-4. (doi:10.1145/3098954.3098984) (KAR id:69561)
Format: PDF

Alqahtani, Saeed Ibrahim, Li, Shujun, Yuan, Haiyue, Rusconi, Patrice (2020) Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? EAI Endorsed Transactions on Security and Safety, 18 (e1). ISSN 2032-9393. (doi:10.4108/eai.13-7-2018.162797) (KAR id:79945)
Format: PDF

Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafa, Mohamed Ali, Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69555)
Format: PDF

Aslan, Çağrı B. and Sağlam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of the 9th International Conference on Social Media and Society. ACM-ICPS International Conference Proceeding Series . ACM, New York, USA. ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919) (KAR id:66861)
Format: PDF

Aslan, Çaǧri Burak, Li, Shujun, Çelebi, Fatih V., Tian, Hao (2020) The World of Defacers: Looking through the Lens of Their Activities on Twitter. IEEE Access, 8 . pp. 204132-204143. E-ISSN 2169-3536. (doi:10.1109/ACCESS.2020.3037015) (KAR id:84855)
Format: PDF

Aydın, Kübra, Sağlam, Rahime Belen, Li, Shujun, Bülbül, Abdullah (2020) When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter. In: Proceedings of the 13th International Conference on Security of Information and Networks. . 16:1-16:8. ACM ISBN 978-1-4503-8751-4. (doi:10.1145/3433174.3433586) (KAR id:89476)
Format: PDF

B

Bailey, Christopher J., Chadwick, David W., de Lemos, Rogerio (2011) Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models. In: Proceedings of the 9th IEEE conference on Dependable, Autonomic and Secure Computing. . pp. 182-196. IEEE (doi:10.1109/DASC.2011.31) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:30711)
Format: PDF

Bailey, Christopher, Chadwick, David W., de Lemos, Rogerio (2014) Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80 (5). pp. 935-952. ISSN 0022-0000. (doi:10.1016/j.jcss.2014.02.003) (KAR id:43003)
Format: PDF

Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio and Siu, Kristy W. S. (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Lectures Notes in Computer Science . Springer, Berlin, Germany, pp. 100-111. ISBN 978-3-642-38997-9. E-ISBN 978-3-642-38998-6. (doi:10.1007/978-3-642-38998-6_14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42993)

Bailey, Christopher, Montrieux, Lionel, de Lemos, Rogerio, Yu, Yijun, Wermelinger, Michel (2014) Run-time Generation, Transformation, and Verification of Access Control Models for Self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. (KAR id:42968)
Format: PDF

Baker-Beall, Christopher, Mott, Gareth (2021) Understanding of the European Union's Perception of the Threat of Cyberterrorism: A Discursive Analysis. Journal of Common Market Studies, . ISSN 0021-9886. (doi:10.1111/jcms.13300) (KAR id:92503)
Format: PDF Format: XML Word Processing Document (DOCX)

Baker-Beall, Christopher, Mott, Gareth (2021) The new EU counter-terrorism Agenda: preemptive security through the anticipation of terrorist events. Global Affairs, . ISSN 2334-0460. (doi:10.1080/23340460.2021.1995461) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:91181)
Format: PDF

Bard, Dan, Kearney, Joseph, Pérez-Delgado, Carlos A (2022) Quantum advantage on proof of work. Array, 15 . Article Number 100225. ISSN 2590-0056. (doi:10.1016/j.array.2022.100225) (KAR id:95822)
Format: PDF Format: PDF

Becker, Ingolf, Posner, Rebecca, Islam, Tasmina, Ekblom, Paul, Borrion, Hervé, McGuire, Michael, Li, Shujun (2021) Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation. In: Proceedings of 54th Hawaii International Conference on System Sciences (HICSS 2021). . pp. 5347-5356. University of Hawaiʻi at Mānoa, Mānoa, Hawaiʻi, USA E-ISBN 978-0-9981331-3-3. (doi:10125/71270) (KAR id:84858)
Format: PDF

Belen Sağlam, Rahime, Nurse, Jason R. C., Hodges, Duncan (2022) An Investigation into the Sensitivity of Personal Information and Implications for Disclosure: A UK Perspective. Frontiers in Computer Science, . E-ISSN 2624-9898. (In press) (KAR id:95383)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2011) An Analysis of the Naor-Naor-Lotspiech Subset Difference Algorithm (For Possibly Incomplete Binary Trees). In: The Seventh International Workshop on Coding and Cryptography 2011, April 11-15, 2011, Paris, France. (KAR id:93931)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2012) Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis. Designs, Codes and Cryptography, 66 (1). ISSN 0925-1022. E-ISSN 1573-7586. (doi:10.1007/s10623-012-9702-6) (KAR id:93930)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2014) Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme. IEEE Transactions on Computers, 63 (7). pp. 1709-1722. ISSN 0018-9340. (doi:10.1109/TC.2013.68) (KAR id:83282)
Format: PDF

Bhattacherjee, Sanjay and Sarkar, Palash (2019) Correlation and Inequality in Weighted Majority Voting Games. In: Deprivation, Inequality and Polarization. Economic Studies in Inequality, Social Exclusion and Well-Being. Springer, Singapore, pp. 161-191. ISBN 978-981-1379-43-7. E-ISBN 978-981-1379-44-4. (doi:10.1007/978-981-13-7944-4_9) (KAR id:93927)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2016) Reducing Communication Overhead of the Subset Difference Scheme. IEEE Transactions on Computers, 65 (8). pp. 2575-2587. ISSN 0018-9340. (doi:10.1109/TC.2015.2485231) (KAR id:83283)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2015) Tree Based Symmetric Key Broadcast Encryption. Journal of Discrete Algorithms, 34 . pp. 78-107. ISSN 1570-8667. (doi:10.1016/j.jda.2015.05.010) (KAR id:83842)
Format: PDF

Bhattacherjee, Sanjay, Sarkar, Palash (2021) Weighted Voting Procedure having a Unique Blocker. International Journal of Game Theory, . ISSN 0020-7276. E-ISSN 1432-1270. (doi:10.1007/s00182-020-00751-z) (KAR id:83677)
Format: PDF Format: PDF

Boakes, Matthew and Guest, Richard and Deravi, Farzin (2021) Adapting to Movement Patterns for Face Recognition on Mobile Devices. In: Del Bimbo, Alberto and Cucchiara, Rita and Sclaroff, Stan and Farinella, Giovanni Maria and Mei, Tao and Bertini, Marco and Escalante, Hugo Jair and Vezzani, Roberto, eds. Pattern Recognition. ICPR International Workshops and Challenges. Lecture Notes in Computer Science, 12668 . Springer International Publishing, Cham, pp. 209-228. ISBN 978-3-030-68792-2. E-ISBN 978-3-030-68793-9. (doi:10.1007/978-3-030-68793-9_15) (KAR id:84439)
Format: PDF

Boakes, Matthew, Guest, Richard, Deravi, Farzin, Corsetti, Barbara (2019) Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships. IEEE Transactions on Biometrics, Behavior, and Identity Science, 1 (4). pp. 278-291. ISSN 2637-6407. E-ISSN 2637-6407. (doi:10.1109/TBIOM.2019.2941728) (KAR id:76574)
Format: PDF

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only. (KAR id:52756)
Format: HTML

Boiten, Eerke Albert (2016) Big Data Refinement. Electronic Proceedings in Theoretical Computer Science, 209 . pp. 17-23. ISSN 2075-2180. E-ISSN 2075-2180. (doi:10.4204/EPTCS.209.2) (KAR id:51635)
Format: PDF

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only. (KAR id:52759)
Format: HTML

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only. (KAR id:52760)
Format: HTML

Boiten, Eerke Albert (2014) FoI reveals cynical logic that compromises NHS data privacy. . The Conversation Internet only. (KAR id:52726)
Format: HTML

Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only. (KAR id:52761)
Format: HTML

Boiten, Eerke Albert (2015) Investigatory Powers bill will remove ISPs' right to protect your privacy. . The Conversation Internet only. (KAR id:51619)
Format: HTML

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only. (KAR id:52758)
Format: HTML

Boiten, Eerke Albert (2014) Outdated laws put your health data in jeopardy. . The Conversation Internet only. (KAR id:52729)
Format: HTML

Boiten, Eerke Albert (2014) Time for some truth about who is feeding off our NHS data. . The Conversation Internet only. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:52727)

Boiten, Eerke Albert (2014) Your NHS data is completely anonymous – until it isn’t. . The Conversation Internet only. (KAR id:52728)
Format: HTML

Boiten, Eerke Albert (2013) iPhone hack shows security isn’t at our fingertips just yet. . Scientific American Internet only. (KAR id:52762)
Format: HTML

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only. (KAR id:45256)
Format: HTML

C

Chousein, Zeynep, Tetik, Hacı Yakup, Sağlam, Rahime Belen, Bülbül, Abdullah, Li, Shujun (2020) Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions. In: Proceedings of the 13th International Conference on Security of Information and Networks. . 17:1-17:8. ACM ISBN 978-1-4503-8751-4. (doi:10.1145/3433174.3433587) (KAR id:89479)
Format: PDF

D

Derrick, John and Boiten, Eerke Albert (2016) Relational Concurrent Refinement - partial and total frameworks. In: Petre, Luigia and Sekerinski, Emil, eds. From Action Systems to Distributed Systems: The Refinement Approach. Taylor and Francis, Florida, USA, pp. 143-154. ISBN 978-1-4987-0158-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:51618)

E

Erola, Arnau, Agrafiotis, Ioannis, Nurse, Jason R.C., Axon, Louise, Goldsmith, Michael, Creese, Sadie (2022) A System to Calculate Cyber-Value-at-Risk. Computers & Security, 113 . Article Number 102545. ISSN 0167-4048. (doi:10.1016/j.cose.2021.102545) (KAR id:91647)
Format: PDF Format: PDF

G

Gaspar, Jaime and Boiten, Eerke Albert (2014) Simple composition theorems of one-way functions -- proofs and presentations. Technical report. IACR EPrints (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:52889)

Grennan, Eamonn, Toros, Harmonie (2021) 9/11 as a policy pivot point in the security community: a dialogue. Critical Studies on Terrorism, 13 . ISSN 1753-9153. (doi:10.1080/17539153.2021.1982123) (KAR id:90561)
Format: PDF

H

Hernandez-Castro, Julio C., Roberts, David L. (2015) Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science, 1:e10 . pp. 1-11. ISSN 2376-5992. (doi:10.7717/peerj-cs.10) (KAR id:49885)
Format: PDF

Hernández-Castro, Carlos Javier, Li, Shujun, R-Moreno, María D. (2020) All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks. Computers & Security, 92 . Article Number 101758. ISSN 0167-4048. (doi:10.1016/j.cose.2020.101758) (KAR id:80266)
Format: PDF

Hosu, Vlad, Hahn, Franz, Jenadeleh, Mohsen, Lin, Hanhe, Men, Hui, Szirányi, Tamás, Li, Shujun, Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience. . IEEE, Germany ISBN 978-1-5386-4025-8. E-ISBN 978-1-5386-4024-1. (doi:10.1109/QoMEX.2017.7965673) (KAR id:69606)
Format: PDF

I

Ioannou, Athina, Tussyadiah, Iis, Lu, Yang (2020) Privacy concerns and disclosure of biometric and behavioral data for travel. International Journal of Information Management, 54 . p. 102122. ISSN 0268-4012. (doi:10.1016/j.ijinfomgt.2020.102122) (KAR id:81190)
Format: PDF Format: PDF

Ioannou, Athina, Tussyadiah, Iis, Miller, Graham, Li, Shujun, Weick, Mario (2021) Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis. PLoS ONE, 16 (8). e0256822:1-e0256822:29. ISSN 1932-6203. (doi:10.1371/journal.pone.0256822) (KAR id:89955)
Format: PDF

Islam, Tasmina, Becker, Ingolf, Posner, Rebecca, Ekblom, Paul, McGuire, Michael, Borrion, Hervé, Li, Shujun (2019) A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 277-293. Springer, Singapore ISBN 978-981-1513-03-9. E-ISBN 978-981-1513-04-6. (doi:10.1007/978-981-15-1304-6_22) (KAR id:76678)
Format: PDF Format: PDF

K

Kearney, Joseph, Pérez-Delgado, Carlos A (2021) Vulnerability of blockchain technologies to quantum attacks. Array, 10 . Article Number 100065. ISSN 2590-0056. (doi:10.1016/j.array.2021.100065) (KAR id:93781)
Format: PDF

L

Li, Chengqing, Feng, Bingbing, Li, Shujun, Kurths, Jurgen, Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, 66 (6). pp. 2322-2335. ISSN 1549-8328. (doi:10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:71415)
Format: PDF

Li, Shujun, Ho, Anthony T.S., Wang, Zichi, Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. MPS'18: 2nd International Workshop on Multimedia Privacy and Security Proceedings. CCS Computer and Communications Security . pp. 27-37. ACM, New York, USA ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267365) (KAR id:69008)
Format: PDF

Liu, Junjie and Aljaffan, Nouf and Li, Shujun (2018) PassInfinity: A software prototype system. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80287)
Format: Archive (ZIP)

Liu, Ximing, Li, Yingjiu, Deng, Robert H., Chang, Bing, Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:10.1016/j.cose.2018.09.003) (KAR id:69553)
Format: PDF

Lu, Yang, Ioannou, Athina, Tussyadiah, Iis, Li, Shujun (2019) Segmenting travelers based on responses to nudging for information disclosure. e-Review of Tourism Research, 17 (3). pp. 394-406. ISSN 1941-5842. (KAR id:79517)
Format: PDF

Lu, Yang, Li, Shujun (2020) From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues. In: Scholar Space. Proceedings of the 53rd Hawaii International Conference on System Sciences. . University of Hawaii at Manoa, Haiwaii, USA ISBN 978-0-9981331-3-3. (doi:10.24251/HICSS.2020.799) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:76648)
Format: PDF Format: Image (PNG)

Lu, Yang, Li, Shujun (2022) From Data Flows to Privacy-Benefit Trade-offs: A User-Centric Semantic Model. Security and Privacy, 5 (4). pp. 1-24. E-ISSN 2475-6725. (doi:10.1002/spy2.225) (KAR id:93764)
Format: PDF

Lu, Yang, Li, Shujun, Freitas, Alex A., Ioannou, Athina (2022) How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. EAI Endorsed Transactions on Security and Safety, 8 (30). pp. 1-20. ISSN 2032-9393. (doi:10.4108/eai.21-12-2021.172440) (KAR id:93892)
Format: PDF

Lu, Yang, Li, Shujun, Ioannou, Athina, Tussyadiah, Iis (2019) From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 262-276. Springer, Singapore ISBN 978-981-1513-03-9. E-ISBN 978-981-1513-04-6. (doi:10.1007/978-981-15-1304-6_21) (KAR id:76677)
Format: PDF Format: PDF

Lu, Yang, Sinnott, Richard O. (2016) Semantic Security for E-Health: A Case Study in Enhanced Access Control. In: 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). . pp. 407-414. IEEE ISBN 978-1-4673-7212-1. E-ISBN 978-1-4673-7211-4. (doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.90) (KAR id:80963)
Format: PDF

Lu, Yang, Sinnott, Richard O. (2016) Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research. In: 2016 IEEE Trustcom/BigDataSE/ISPA. . pp. 519-526. IEEE ISBN 978-1-5090-3206-8. E-ISBN 978-1-5090-3205-1. (doi:10.1109/TrustCom.2016.0105) (KAR id:80962)
Format: PDF

Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2017) A Semantic-Based K-Anonymity Scheme for Health Record Linkage. Studies in Health Technology and Informatics, 239 . pp. 84-90. ISSN 0926-9630. (doi:10.3233/978-1-61499-783-2-84) (KAR id:80964)
Format: PDF

Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2018) Semantic-Based Policy Composition for Privacy-Demanding Data Linkage. In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 348-359. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00060) (KAR id:80961)
Format: PDF

Lu, Yang, Sinnott, Richard O., Verspoor, Karin, Parampalli, Udaya (2018) Privacy-Preserving Access Control in Electronic Health Record Linkage. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 1079-1090. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00151) (KAR id:80959)
Format: PDF

M

Mahaini, Mohamad Imad, Li, Shujun, Sağlam, Rahime Belen (2019) Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. In: ICPS: ACM International Conference Proceeding Series. Proceedings of the 14th International Conference on Availability, Reliability and Security. . ACM ISBN 978-1-4503-7164-3. (doi:10.1145/3339252.3339282) (KAR id:75253)
Format: PDF

Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2022) How National CSIRTs Leverage Public Data, OSINT and Free Tools in Operational Practices: An Empirical Study. Cyber Security: A Peer-Reviewed Journal, 5 (3). pp. 251-276. ISSN 2398-5100. (KAR id:93768)
Format: PDF

N

Nurse, Jason R. C. and Adamos, Konstantinos and Grammatopoulos, Athanasios and Di Franco, Fabio (2021) Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education. European Union Agency for Cybersecurity (ENISA). (doi:10.2824/033355) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:91977)
Format: PDF

O

Ong, SimYing, Li, Shujun, Wong, KokSheik, Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:10.1016/j.image.2017.06.002) (KAR id:69562)
Format: PDF

P

Panteli, Niki, Nurse, Jason R. C., Collins, Emily, Williams, Nikki (2021) Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges. In: 42nd International Conference on Information Systems (ICIS) TREOs. (KAR id:92838)
Format: PDF

R

Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2022) Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI. Knowledge-Based Systems, 236 . Article Number 107763. ISSN 0950-7051. (doi:10.1016/j.knosys.2021.107763) (KAR id:92005)
Format: PDF

Roberts, David L., Hernandez-Castro, Julio (2017) Bycatch and illegal wildlife trade on the dark web. Oryx, 51 (3). pp. 393-394. ISSN 0030-6053. E-ISSN 1365-3008. (doi:10.1017/S0030605317000679) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:62140)
Format: PDF

S

Sağlam, Rahime Belen, Aslan, Çağrı B., Li, Shujun, Dickson, Lisa, Pogrebna, Ganna (2020) A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR. In: Proceedings of 2020 2nd IEEE International Conference on Decentralized Applications and Infrastructures. . pp. 22-31. IEEE ISBN 978-1-72817-022-0. (doi:10.1109/DAPPS49028.2020.00003) (KAR id:81277)
Format: PDF

Schmitz, Roland and Li, Shujun and Grecos, Christos and Zhang, Xinpeng (2018) Commutative Watermarking-Encryption of Multimedia Data Based on Histograms. In: Bhattacharyya, Siddhartha, ed. Intelligent Innovations in Multimedia Data Engineering and Management. IGI Global, USA, pp. 141-163. ISBN 978-1-5225-8783-5. E-ISBN 978-1-5225-7108-7. (doi:10.4018/978-1-5225-7107-0.ch006) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:74214)
Format: PDF

Shere, Anjuli R.K., Nurse, Jason R.C., Martin, Andrew (2022) Threats to Journalists from the Consumer Internet of Things. In: 2022 International Conference on Cybersecurity, Situational Awareness and Social Media. Proceedings in Complexity . Springer (In press) (KAR id:94898)
Format: PDF

Shi, Na, Tan, Liang, Yang, Ciaxia, He, Chen, Xu, Junli, Lu, Yang, Xu, Hao (2020) BacS: A blockchain-based access control scheme in distributed internet of things. Peer-to-Peer Networking and Applications, . ISSN 1936-6442. E-ISSN 1936-6450. (doi:10.1007/s12083-020-00930-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:81701)
Format: PDF

T

Toros, Harmonie (2022) Better researchers, better people? The dangers of empathetic research on the extreme right. Critical Studies on Terrorism, 15 (1). pp. 225-231. ISSN 1753-9153. (doi:10.1080/17539153.2022.2031127) (KAR id:92845)
Format: PDF

Turner, Sarah, Nurse, Jason R. C., Li, Shujun (2021) "It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. In: 2022 ACM CHI Conference on Human Factors in Computing Systems. . ACM ISBN 978-1-4503-9156-6. (In press) (doi:10.1145/3491101.3503577) (KAR id:92356)
Format: PDF

Tussyadiah, Iis, Li, Shujun, Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. . pp. 278-290. Springer Nature Switzerland AG, Cham, Switzerland ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:10.1007/978-3-030-05940-8_22) (KAR id:71418)
Format: PDF

W

Waldock, Krysia Emily, Miller, Vincent, Li, Shujun, Franqueira, Virginia N. L. (2022) Pre-University Cyber Security Education: A report on developing cyber skills amongst children and young people. Global Forum on Cyber Expertise, 159 pp. (KAR id:96040)
Format: PDF

Wang, Hui and Ho, Anthony T.S. and Li, Shujun (2021) OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. In: Computer Security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 243-260. ISBN 978-3-030-66503-6. E-ISBN 978-3-030-66504-3. (doi:10.1007/978-3-030-66504-3_15) (KAR id:84857)
Format: PDF

Wang, Zichi, Li, Shujun, Zhang, Xinpeng (2019) Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access, 7 . pp. 168914-168921. ISSN 2169-3536. (doi:10.1109/ACCESS.2019.2955113) (KAR id:79178)
Format: PDF

Wei, Yun-gang, Lu, Yang, Hu, Xiaoyan, Sun, Bo (2013) Research and Application of Access Control Technique in 3D Virtual Reality System OpenSim. In: 2013 Sixth International Symposium on Computational Intelligence and Design. . pp. 65-68. IEEE E-ISBN 978-0-7695-5079-4. (doi:10.1109/ISCID.2013.130) (KAR id:80976)
Format: PDF

Wiiliams, Nick, Li, Shujun (2017) Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model. In: Proceedings of 2017 3rd IEEE International Conference on Cybernetics. . pp. 471-478. IEEE, USA ISBN 978-1-5386-2201-8. E-ISBN 978-1-5386-2200-1. (doi:10.1109/CYBConf.2017.7985810) (KAR id:74278)
Format: PDF

Y

Yuan, Haiyue and Li, Shujun (2020) MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80296)
Format: Archive (ZIP) Format: PDF

Yuan, Haiyue, Li, Shujun, Rusconi, Patrice (2021) CogTool+: Modeling human performance at large scale. ACM Transactions on Computer-Human Interaction, 28 (2). Article Number 7. ISSN 1073-0516. E-ISSN 1557-7325. (doi:10.1145/3447534) (KAR id:87545)
Format: PDF

Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_17) (KAR id:69559)
Format: PDF

Z

Zahrah, Fatima, Nurse, Jason R. C., Goldsmith, Michael (2022) A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election. In: 2022 ACM/SIGAPP Symposium On Applied Computing. . pp. 1788-1791. ACM (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:92440)
Format: PDF

Č

Čagalja, Mario, Perković, Toni, Bugarić, Marin, Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:10.1016/j.pmcj.2014.09.002) (KAR id:69556)
Format: PDF

This list was generated on Mon Aug 8 21:55:50 2022 BST.