Items where division is "University-wide institutes > Institute of Cyber Security for Society"
- University Organisation (67788)
- University-wide institutes (166)
- Institute of Cyber Security for Society (153)
- University-wide institutes (166)
Number of items at this level: 151.
A
Adriko, Rodney, Nurse, Jason R. C. (2024) Does Cyber Insurance promote Cyber Security Best Practice? An Analysis based on Insurance Application Forms. Digital Threats: Research and Practice, . ISSN 2692-1626. (doi:10.1145/3676283) (KAR id:106506) |
Agrawal, Shweta, Bhattacherjee, Sanjay, Phan, Duong Hieu, Stehlé, Damien, Yamada, Shota (2017) Efficient Public Trace and Revoke from Standard Assumptions. In: Proceedings of the ACM Conference on Computer and Communications Security. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. . pp. 2277-2293. Association for Computing Machinery, New York- United States ISBN 978-1-4503-4946-8. (doi:10.1145/3133956.3134041) (KAR id:83284) |
Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science, 10292 . Springer International Publishing AG, pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_13) (KAR id:69560) |
Alleyne, Emma, Wood, Jane L. (2010) Gang involvement: Psychological and Behavioral Characteristics of Gang Members, Peripheral Youth, and Nongang Youth. Aggressive Behavior, 36 (6). pp. 423-436. ISSN 0096-140X. (doi:10.1002/ab.20360) (KAR id:27523) |
Alqahtani, Saeed Ibrahim, Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. . Article No. 19. ACM, New York, NY, USA ISBN 978-1-4503-5257-4. (doi:10.1145/3098954.3098984) (KAR id:69561) |
Alqahtani, Saeed Ibrahim, Li, Shujun, Yuan, Haiyue, Rusconi, Patrice (2020) Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? EAI Endorsed Transactions on Security and Safety, 18 (e1). ISSN 2032-9393. (doi:10.4108/eai.13-7-2018.162797) (KAR id:79945) |
Altuncu, Enes and Franqueira, Virginia N. L. and Li, Shujun (2022) Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review. [Preprint] (doi:10.48550/arXiv.2208.10913) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:97945) |
Altuncu, Enes, Nurse, Jason R. C., Bagriacik, Meryem, Kaleba, Sophie, Yuan, Haiyue, Bonheme, Lisa, Li, Shujun (2023) aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions. In: Workshop Proceedings of the 17th International AAAI Conference on Web and Social Media. . 27:1-27:10. Association for the Advancement of Artificial Intelligence (doi:10.36190/2023.27) (KAR id:101790) |
Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafa, Mohamed Ali, Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69555) |
Aslan, Çağrı B. and Sağlam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of the 9th International Conference on Social Media and Society. ACM-ICPS International Conference Proceeding Series . ACM, New York, USA. ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919) (KAR id:66861) |
Aslan, Çaǧri Burak, Li, Shujun, Çelebi, Fatih V., Tian, Hao (2020) The World of Defacers: Looking through the Lens of Their Activities on Twitter. IEEE Access, 8 . pp. 204132-204143. E-ISSN 2169-3536. (doi:10.1109/ACCESS.2020.3037015) (KAR id:84855) |
Aydın, Kübra, Sağlam, Rahime Belen, Li, Shujun, Bülbül, Abdullah (2020) When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter. In: Proceedings of the 13th International Conference on Security of Information and Networks. . 16:1-16:8. ACM ISBN 978-1-4503-8751-4. (doi:10.1145/3433174.3433586) (KAR id:89476) |
B
Bada, Maria, Furnell, Steven, Nurse, Jason R. C., Dymydiuk, Jason (2023) Supporting Small and Medium-sized Enterprises in using Privacy Enhancing Technologies. In: HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust. Lecture Notes in Computer Science . Springer ISBN 978-3-031-35821-0. E-ISBN 978-3-031-35822-7. (doi:10.1007/978-3-031-35822-7_19) (KAR id:100198) |
Bada, Maria and Nurse, Jason R. C. (2023) Exploring Cybercriminal Activities, Behaviors, and Profiles. In: Mukherjee, Sumitava and Dutt, Varun and Srinivasan, Narayanan, eds. Applied Cognitive Science and Technology. Springer, pp. 109-120. ISBN 978-981-99-3965-7. E-ISBN 978-981-99-3966-4. (doi:10.1007/978-981-99-3966-4_7) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:102602) |
Bailey, Christopher J., Chadwick, David W., de Lemos, Rogerio (2011) Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models. In: Proceedings of the 9th IEEE conference on Dependable, Autonomic and Secure Computing. . pp. 182-196. IEEE (doi:10.1109/DASC.2011.31) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:30711) |
Bailey, Christopher, Chadwick, David W., de Lemos, Rogerio (2014) Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80 (5). pp. 935-952. ISSN 0022-0000. (doi:10.1016/j.jcss.2014.02.003) (KAR id:43003) |
Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio and Siu, Kristy W. S. (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Lectures Notes in Computer Science . Springer, Berlin, Germany, pp. 100-111. ISBN 978-3-642-38997-9. E-ISBN 978-3-642-38998-6. (doi:10.1007/978-3-642-38998-6_14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42993) |
Bailey, Christopher, Montrieux, Lionel, de Lemos, Rogerio, Yu, Yijun, Wermelinger, Michel (2014) Run-time Generation, Transformation, and Verification of Access Control Models for Self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. (doi:10.1145/2593929.2593945) (KAR id:42968) |
Baker-Beall, Christopher, Mott, Gareth (2021) Understanding of the European Union's Perception of the Threat of Cyberterrorism: A Discursive Analysis. Journal of Common Market Studies, . ISSN 0021-9886. (doi:10.1111/jcms.13300) (KAR id:92503) |
Baker-Beall, Christopher, Mott, Gareth (2021) The new EU counter-terrorism Agenda: preemptive security through the anticipation of terrorist events. Global Affairs, . ISSN 2334-0460. (doi:10.1080/23340460.2021.1995461) (KAR id:91181) |
Bard, Dan, Kearney, Joseph, Pérez-Delgado, Carlos A (2022) Quantum advantage on proof of work. Array, 15 . Article Number 100225. ISSN 2590-0056. (doi:10.1016/j.array.2022.100225) (KAR id:95822) |
Başkent, Can and Bhattacherjee, Sanjay and Shujun, Li (2022) Applications of Game Theory and Epistemic Logic to Fact-Checking. Technical report. University of Kent (Unpublished) (KAR id:97346) |
Becker, Ingolf, Posner, Rebecca, Islam, Tasmina, Ekblom, Paul, Borrion, Hervé, McGuire, Michael, Li, Shujun (2021) Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation. In: Proceedings of 54th Hawaii International Conference on System Sciences (HICSS 2021). . pp. 5347-5356. University of Hawaiʻi at Mānoa, Mānoa, Hawaiʻi, USA E-ISBN 978-0-9981331-3-3. (doi:10125/71270) (KAR id:84858) |
Belen Sağlam, Rahime, Nurse, Jason R. C., Hodges, Duncan (2022) An Investigation into the Sensitivity of Personal Information and Implications for Disclosure: A UK Perspective. Frontiers in Computer Science, . E-ISSN 2624-9898. (doi:10.3389/fcomp.2022.908245) (KAR id:95383) |
Belen-Saglam, Rahime, Altuncu, Enes, Lu, Yang, Li, Shujun (2023) A systematic literature review of the tension between the GDPR and public blockchain systems. Blockchain: Research and Applications, 4 (2). pp. 1-23. E-ISSN 2666-9536. (doi:10.1016/j.bcra.2023.100129) (KAR id:101787) |
Bhattacherjee, Sanjay, Sarkar, Palash (2011) An Analysis of the Naor-Naor-Lotspiech Subset Difference Algorithm (For Possibly Incomplete Binary Trees). In: The Seventh International Workshop on Coding and Cryptography 2011, April 11-15, 2011, Paris, France. (KAR id:93931) |
Bhattacherjee, Sanjay, Sarkar, Palash (2012) Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis. Designs, Codes and Cryptography, 66 (1). ISSN 0925-1022. E-ISSN 1573-7586. (doi:10.1007/s10623-012-9702-6) (KAR id:93930) |
Bhattacherjee, Sanjay, Sarkar, Palash (2014) Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme. IEEE Transactions on Computers, 63 (7). pp. 1709-1722. ISSN 0018-9340. (doi:10.1109/TC.2013.68) (KAR id:83282) |
Bhattacherjee, Sanjay and Sarkar, Palash (2019) Correlation and Inequality in Weighted Majority Voting Games. In: Deprivation, Inequality and Polarization. Economic Studies in Inequality, Social Exclusion and Well-Being. Springer, Singapore, pp. 161-191. ISBN 978-981-13-7943-7. E-ISBN 978-981-13-7944-4. (doi:10.1007/978-981-13-7944-4_9) (KAR id:93927) |
Bhattacherjee, Sanjay, Sarkar, Palash (2016) Reducing Communication Overhead of the Subset Difference Scheme. IEEE Transactions on Computers, 65 (8). pp. 2575-2587. ISSN 0018-9340. (doi:10.1109/TC.2015.2485231) (KAR id:83283) |
Bhattacherjee, Sanjay, Sarkar, Palash (2015) Tree Based Symmetric Key Broadcast Encryption. Journal of Discrete Algorithms, 34 . pp. 78-107. ISSN 1570-8667. (doi:10.1016/j.jda.2015.05.010) (KAR id:83842) |
Bhattacherjee, Sanjay, Sarkar, Palash (2023) Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies. In: Decision and Game Theory for Security. 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022, Proceedings. Lecture Notes in Computer Science . Springer E-ISBN 978-3-031-26369-9. (doi:10.1007/978-3-031-26369-9_15) (KAR id:96909) |
Bhattacherjee, Sanjay, Sarkar, Palash (2021) Weighted Voting Procedure having a Unique Blocker. International Journal of Game Theory, . ISSN 0020-7276. E-ISSN 1432-1270. (doi:10.1007/s00182-020-00751-z) (KAR id:83677) |
Boakes, Matthew and Guest, Richard and Deravi, Farzin (2021) Adapting to Movement Patterns for Face Recognition on Mobile Devices. In: Del Bimbo, Alberto and Cucchiara, Rita and Sclaroff, Stan and Farinella, Giovanni Maria and Mei, Tao and Bertini, Marco and Escalante, Hugo Jair and Vezzani, Roberto, eds. Pattern Recognition. ICPR International Workshops and Challenges. Lecture Notes in Computer Science, 12668 . Springer International Publishing, Cham, pp. 209-228. ISBN 978-3-030-68792-2. E-ISBN 978-3-030-68793-9. (doi:10.1007/978-3-030-68793-9_15) (KAR id:84439) |
Boakes, Matthew, Guest, Richard, Deravi, Farzin, Corsetti, Barbara (2019) Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships. IEEE Transactions on Biometrics, Behavior, and Identity Science, 1 (4). pp. 278-291. ISSN 2637-6407. E-ISSN 2637-6407. (doi:10.1109/TBIOM.2019.2941728) (KAR id:76574) |
Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only. (KAR id:52756) |
Boiten, Eerke Albert (2016) Big Data Refinement. Electronic Proceedings in Theoretical Computer Science, 209 . pp. 17-23. ISSN 2075-2180. E-ISSN 2075-2180. (doi:10.4204/EPTCS.209.2) (KAR id:51635) |
Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only. (KAR id:52759) |
Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only. (KAR id:52760) |
Boiten, Eerke Albert (2014) FoI reveals cynical logic that compromises NHS data privacy. . The Conversation Internet only. (KAR id:52726) |
Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only. (KAR id:52761) |
Boiten, Eerke Albert (2015) Investigatory Powers bill will remove ISPs' right to protect your privacy. . The Conversation Internet only. (KAR id:51619) |
Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only. (KAR id:52758) |
Boiten, Eerke Albert (2014) Outdated laws put your health data in jeopardy. . The Conversation Internet only. (KAR id:52729) |
Boiten, Eerke Albert (2014) Time for some truth about who is feeding off our NHS data. . The Conversation Internet only. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:52727) |
Boiten, Eerke Albert (2014) Your NHS data is completely anonymous – until it isn’t. . The Conversation Internet only. (KAR id:52728) |
Boiten, Eerke Albert (2013) iPhone hack shows security isn’t at our fingertips just yet. . Scientific American Internet only. (KAR id:52762) |
Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only. (KAR id:45256) |
C
Cartwright, Anna, Cartwright, Edward, MacColl, Jamie, Mott, Gareth, Turner, Sarah, Sullivan, James, Nurse, Jason R. C. (2023) How Cyber-Insurance Influences the Ransomware Payment Decision: Theory and Evidence. The Geneva Papers on Risk and Insurance - Issues and Practice, 48 . pp. 300-331. E-ISSN 1468-0440. (doi:10.1057/s41288-023-00288-8) (KAR id:100212) |
Chousein, Zeynep, Tetik, Hacı Yakup, Sağlam, Rahime Belen, Bülbül, Abdullah, Li, Shujun (2020) Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions. In: Proceedings of the 13th International Conference on Security of Information and Networks. . 17:1-17:8. ACM ISBN 978-1-4503-8751-4. (doi:10.1145/3433174.3433587) (KAR id:89479) |
Connolly, Lena, Borrion, Hervé, Arief, Budi, Kaddoura, Sanaa (2023) Applying Neutralisation Theory to Better Understand Ransomware Offenders. In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). . pp. 177-182. IEEE Computer Society, Los Alamitos, CA, USA ISBN 979-8-3503-2720-5. (doi:10.1109/EuroSPW59978.2023.00025) (KAR id:102142) |
D
Derrick, John and Boiten, Eerke Albert (2016) Relational Concurrent Refinement - partial and total frameworks. In: Petre, Luigia and Sekerinski, Emil, eds. From Action Systems to Distributed Systems: The Refinement Approach. Taylor and Francis, Florida, USA, pp. 143-154. ISBN 978-1-4987-0158-7. (doi:10.1201/b20053-15) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:51618) |
E
Erola, Arnau, Agrafiotis, Ioannis, Nurse, Jason R. C., Axon, Louise, Goldsmith, Michael, Creese, Sadie (2022) A System to Calculate Cyber-Value-at-Risk. Computers & Security, 113 . Article Number 102545. ISSN 0167-4048. (doi:10.1016/j.cose.2021.102545) (KAR id:91647) |
F
Franqueira, Virginia N. L. and Annor, Jessica A. and Kafalı, Özgur (2022) Age Appropriate Design: Assessment of TikTok, Twitch, and YouTube Kids. [Preprint] (doi:10.48550/arXiv.2208.02638) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:97949) |
G
Gaspar, Jaime and Boiten, Eerke Albert (2014) Simple composition theorems of one-way functions -- proofs and presentations. Technical report. IACR EPrints (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:52889) |
Grennan, Eamonn, Toros, Harmonie (2021) 9/11 as a policy pivot point in the security community: a dialogue. Critical Studies on Terrorism, 13 . ISSN 1753-9153. (doi:10.1080/17539153.2021.1982123) (KAR id:90561) |
H
Heering, Maria Sophia, Yuan, Haiyue, Li, Shujun (2024) The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems. In: 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC). Proceedings of the 2023 IEEE 26th International Conference on Intelligent Transportation Systems. . pp. 5573-5578. IEEE ISBN 979-8-3503-9947-9. E-ISBN 979-8-3503-9946-2. (doi:10.1109/ITSC57777.2023.10422468) (KAR id:105030) |
Hernandez-Castro, Julio C., Roberts, David L. (2015) Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science, 1:e10 . pp. 1-11. ISSN 2376-5992. (doi:10.7717/peerj-cs.10) (KAR id:49885) |
Hernández-Castro, Carlos Javier, Li, Shujun, R-Moreno, María D. (2020) All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks. Computers & Security, 92 . Article Number 101758. ISSN 0167-4048. (doi:10.1016/j.cose.2020.101758) (KAR id:80266) |
Hosu, Vlad, Hahn, Franz, Jenadeleh, Mohsen, Lin, Hanhe, Men, Hui, Szirányi, Tamás, Li, Shujun, Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience. . IEEE, Germany ISBN 978-1-5386-4025-8. E-ISBN 978-1-5386-4024-1. (doi:10.1109/QoMEX.2017.7965673) (KAR id:69606) |
Hüsch, Pia, Mott, Gareth, MacColl, Jamie, Nurse, Jason R. C., Sullivan, James, Turner, Sarah, Pattnaik, Nandita (2024) ‘Your data is stolen and encrypted’: the ransomware victim experience. RUSI Occasional Papers, . ISSN 2397-0286. (KAR id:106978) |
I
Ioannou, Athina, Tussyadiah, Iis, Lu, Yang (2020) Privacy concerns and disclosure of biometric and behavioral data for travel. International Journal of Information Management, 54 . p. 102122. ISSN 0268-4012. (doi:10.1016/j.ijinfomgt.2020.102122) (KAR id:81190) |
Ioannou, Athina, Tussyadiah, Iis, Miller, Graham, Li, Shujun, Weick, Mario (2021) Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis. PLoS ONE, 16 (8). e0256822:1-e0256822:29. ISSN 1932-6203. (doi:10.1371/journal.pone.0256822) (KAR id:89955) |
Islam, Tasmina, Becker, Ingolf, Posner, Rebecca, Ekblom, Paul, McGuire, Michael, Borrion, Hervé, Li, Shujun (2019) A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 277-293. Springer, Singapore ISBN 978-981-15-1303-9. E-ISBN 978-981-15-1304-6. (doi:10.1007/978-981-15-1304-6_22) (KAR id:76678) |
J
Johansmeyer, Tom (2024) Natural Catastrophes: The New Cyber Threat. In: 8th ASTIN Cyber Workshop. . , London, United Kingdom (KAR id:106151) |
Jones, Keenan and Altuncu, Enes and Franqueira, Virginia N. L. and Wang, Yichao and Li, Shujun (2022) A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception. [Preprint] (doi:10.48550/arXiv.2208.05757) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:97944) |
Jones, Keenan, Zahrah, Fatima, Nurse, Jason R. C. (2024) Embedding Privacy in Computational Social Science and Artificial Intelligence Research. In: International AAAI Conference on Web and Social Media (ICWSM) Workshop Proceedings. . (In press) (KAR id:106052) |
K
Kearney, Joseph, Pérez-Delgado, Carlos A (2021) Vulnerability of blockchain technologies to quantum attacks. Array, 10 . Article Number 100065. ISSN 2590-0056. (doi:10.1016/j.array.2021.100065) (KAR id:93781) |
Khan, Neeshe, Furnell, Steven, Bada, Maria, Nurse, Jason R. C., Rand, Matthew (2024) Assessing Cyber Security Support for Small and Medium-Sized Enterprises. In: IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance. . Spinger (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:106167) |
Knott, Jamie, Yuan, Haiyue, Boakes, Matthew, Li, Shujun (2023) Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data. In: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. . 1603- 1606. ACM, New York, USA ISBN 978-1-4503-9517-5. (doi:10.1145/3555776.3577805) (KAR id:101794) |
Kocaogullar, Yekta, Cetin, Orcun, Arief, Budi, Brierley, Calvin, Pont, Jamie, Hernandez-Castro, Julio C. (2022) Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots. In: 12th International Workshop on Socio-Technical Aspects in Security (STAST 2022). . pp. 15-31. (In press) (KAR id:102122) |
L
Li, Chengqing, Feng, Bingbing, Li, Shujun, Kurths, Jurgen, Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, 66 (6). pp. 2322-2335. ISSN 1549-8328. (doi:10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:71415) |
Li, Shujun, Ho, Anthony T.S., Wang, Zichi, Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. MPS'18: 2nd International Workshop on Multimedia Privacy and Security Proceedings. CCS Computer and Communications Security . pp. 27-37. ACM, New York, USA ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267365) (KAR id:69008) |
Liang, Zhanbo, Guo, Jie, Qiu, Weidong, Huang, Zheng, Li, Shujun (2024) When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification. Data Mining and Knowledge Discovery, 38 (3). pp. 1171-1192. ISSN 1384-5810. (doi:10.1007/s10618-023-00992-y) (KAR id:104513) |
Lin, Ruiyuan, Liu, Sheng, Jiang, Jun, Li, Shujun, Li, Chengqing, Kuo, C.-C. Jay (2024) Recovering sign bits of DCT coefficients in digital images as an optimization problem. Journal of Visual Communication and Image Representation, 98 . Article Number 104045. ISSN 1047-3203. (doi:10.1016/j.jvcir.2023.104045) (KAR id:106082) |
Liu, Junjie and Aljaffan, Nouf and Li, Shujun (2018) PassInfinity: A software prototype system. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80287) |
Liu, Ximing, Li, Yingjiu, Deng, Robert H., Chang, Bing, Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:10.1016/j.cose.2018.09.003) (KAR id:69553) |
Lu, Yang, Ioannou, Athina, Tussyadiah, Iis, Li, Shujun (2019) Segmenting travelers based on responses to nudging for information disclosure. e-Review of Tourism Research, 17 (3). pp. 394-406. ISSN 1941-5842. (KAR id:79517) |
Lu, Yang, Li, Shujun (2020) From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues. In: Scholar Space. Proceedings of the 53rd Hawaii International Conference on System Sciences. . University of Hawaii at Manoa, Haiwaii, USA ISBN 978-0-9981331-3-3. (doi:10.24251/HICSS.2020.799) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:76648) |
Lu, Yang, Li, Shujun (2022) From Data Flows to Privacy-Benefit Trade-offs: A User-Centric Semantic Model. Security and Privacy, 5 (4). pp. 1-24. E-ISSN 2475-6725. (doi:10.1002/spy2.225) (KAR id:93764) |
Lu, Yang, Li, Shujun, Freitas, Alex A., Ioannou, Athina (2022) How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. EAI Endorsed Transactions on Security and Safety, 8 (30). pp. 1-20. ISSN 2032-9393. (doi:10.4108/eai.21-12-2021.172440) (KAR id:93892) |
Lu, Yang, Li, Shujun, Ioannou, Athina, Tussyadiah, Iis (2019) From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 262-276. Springer, Singapore ISBN 978-981-15-1303-9. E-ISBN 978-981-15-1304-6. (doi:10.1007/978-981-15-1304-6_21) (KAR id:76677) |
Lu, Yang, Sinnott, Richard O. (2016) Semantic Security for E-Health: A Case Study in Enhanced Access Control. In: 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). . pp. 407-414. IEEE ISBN 978-1-4673-7212-1. E-ISBN 978-1-4673-7211-4. (doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.90) (KAR id:80963) |
Lu, Yang, Sinnott, Richard O. (2016) Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research. In: 2016 IEEE Trustcom/BigDataSE/ISPA. . pp. 519-526. IEEE ISBN 978-1-5090-3206-8. E-ISBN 978-1-5090-3205-1. (doi:10.1109/TrustCom.2016.0105) (KAR id:80962) |
Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2017) A Semantic-Based K-Anonymity Scheme for Health Record Linkage. Studies in Health Technology and Informatics, 239 . pp. 84-90. ISSN 0926-9630. (doi:10.3233/978-1-61499-783-2-84) (KAR id:80964) |
Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2018) Semantic-Based Policy Composition for Privacy-Demanding Data Linkage. In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 348-359. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00060) (KAR id:80961) |
Lu, Yang, Sinnott, Richard O., Verspoor, Karin, Parampalli, Udaya (2018) Privacy-Preserving Access Control in Electronic Health Record Linkage. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 1079-1090. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00151) (KAR id:80959) |
M
MacColl, Jamie and Hüsch, Pia and Mott, Gareth and Sullivan, James and Nurse, Jason R. C. and Turner, Sarah and Pattnaik, Nandita (2024) The Scourge of Ransomware: Victim Insights on Harms to Individuals, Organisations and Society. Technical report. The Royal United Services Institute for Defence and Security Studies (KAR id:104628) |
MacColl, Jamie and Sullivan, James and Nurse, Jason R. C. and Mott, Gareth and Turner, Sarah and Cartwright, Edward and Cartwright, Anna (2023) Cyber Insurance and the Ransomware Challenge. Technical report. The Royal United Services Institute for Defence and Security Studies (KAR id:104626) |
Mahaini, Mohamad Imad, Li, Shujun (2023) Cyber Security Researchers on Online Social Networks: From the Lens of the UK’s ACEs-CSR on Twitter. In: Lecture Notes in Computer Science. Security and Privacy in Social Networks and Big Data: 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14–16, 2023, Proceedings. Lecture Notes in Computer Science , 14097. pp. 129-148. Springer, Singapore E-ISBN 978-981-99-5177-2. (doi:10.1007/978-981-99-5177-2_8) (KAR id:102392) |
Mahaini, Mohamad Imad, Li, Shujun, Sağlam, Rahime Belen (2019) Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. In: ICPS: ACM International Conference Proceeding Series. Proceedings of the 14th International Conference on Availability, Reliability and Security. . ACM ISBN 978-1-4503-7164-3. (doi:10.1145/3339252.3339282) (KAR id:75253) |
Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2022) How National CSIRTs Leverage Public Data, OSINT and Free Tools in Operational Practices: An Empirical Study. Cyber Security: A Peer-Reviewed Journal, 5 (3). pp. 251-276. ISSN 2398-5100. (KAR id:93768) |
Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2023) Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions. Digital Threats: Research and Practice, 4 (3). pp. 1-24. ISSN 2576-5337. (doi:10.1145/3609230) (KAR id:103162) |
Mott, Gareth, Nurse, Jason R. C., Baker-Beall, Christopher (2023) Preparing for future Cyber Crises: Lessons from governance of the coronavirus pandemic. Policy Design and Practice, 6 (2). pp. 160-181. ISSN 2574-1292. (doi:10.1080/25741292.2023.2205764) (KAR id:100974) |
Mott, Gareth, Turner, Sarah, Nurse, Jason R. C., MacColl, Jamie, Sullivan, James, Cartwright, Anna, Cartwright, Edward (2023) Between a rock and a hard(ening) place: Cyber insurance in the ransomware era. Computers & Security, 128 . Article Number 103162. ISSN 0167-4048. (doi:10.1016/j.cose.2023.103162) (KAR id:100308) |
Mott, Gareth, Turner, Sarah, Nurse, Jason R. C., Pattnaik, Nandita, MacColl, Jamie, Huesch, Pia, Sullivan, James (2024) “There was a bit of PTSD every time I walked through the office door”: Ransomware harms and the factors that influence the victim organisation’s experience. Journal of Cybersecurity, 10 (1). Article Number tyae013. ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyae013) (KAR id:106485) |
Moura, Ralf Luis de, Franqueira, Virginia N. L., Pessin, Gustavo (2024) Cybersecurity in industrial networks: artificial intelligence techniques applied to intrusion detection systems. In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'23). Conference Publishing Services (CPS) . IEEE (In press) (doi:10.1109/csce60160.2023.00365) (KAR id:101558) |
Moura, Ralf Luis de, Franqueira, Virginia N. L., Pessin, Gustavo (2022) Non-IP Industrial Networks: An Agnostic Anomaly Detection System. In: Anais do Xxiv Congresso Brasileiro de Automática – CBA 2022. . Brazilian Society of Automatic (SBA), Brazil (KAR id:97938) |
N
Nadeem, Muhammad Shahroz, Kurugollu, Fatih, Saravi, Sara, Atlam, Hany F., Franqueira, Virginia N. L. (2023) Deep labeller: automatic bounding box generation for synthetic violence detection datasets. Multimedia Tools and Applications, 83 (4). pp. 10717-10734. ISSN 1573-7721. (doi:10.1007/s11042-023-15621-5) (KAR id:101823) |
Nurse, Jason R. C., Adamos, Konstantinos, Grammatopoulos, Athanasios, Di Franco, Fabio (2021) Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education. Report number: 10.2824/033355. European Union Agency for Cybersecurity (ENISA) (doi:10.2824/033355) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:91977) |
Nurse, Jason R. C., Vargas, Francielle, Hassan, Naeemul, Wang, Dakuo, Andriotis, Panagiotis, Ghenai, Amira, Jaidka, Kokil, Mustafaraj, Eni, Joseph, Kenneth, Foucault Welles, Brooke and others. (2021) Towards A Diverse, Inclusive, Accessible and Equitable AAAI International Conference on Web and Social Media (ICWSM). In: Proceedings of the ICWSM Workshops. . Association for the Advancement of Artificial Intelligence (doi:10.36190/2021.00) (KAR id:98160) |
O
Ong, SimYing, Li, Shujun, Wong, KokSheik, Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:10.1016/j.image.2017.06.002) (KAR id:69562) |
Ozturk, Omer Said, Ekmekcioglu, Emre, Cetin, Orcun, Arief, Budi, Hernandez-Castro, Julio C. (2023) New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? In: EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference. . pp. 13-18. ACM ISBN 978-1-4503-9829-9. (doi:10.1145/3590777.3590780) (KAR id:102124) |
P
Panteli, Niki, Nurse, Jason R. C., Collins, Emily, Williams, Nikki (2021) Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges. In: 42nd International Conference on Information Systems (ICIS) TREOs. (KAR id:92838) |
Panteli, Niki, Nurse, Jason R. C., Collins, Emily, Williams, Nikki (2022) Trust disruption and preservation in the Covid-19 work from home context. Journal of Workplace Learning, . ISSN 1366-5626. (doi:10.1108/JWL-02-2022-0017) (KAR id:96206) |
Parker, Sam, Yuan, Haiyue, Li, Shujun (2024) PassViz: A Visualisation System for Analysing Leaked Passwords. In: Proceedings of the 2023 20th IEEE Symposium on Visualization for Cyber Security. . pp. 33-42. IEEE ISBN 979-8-3503-1794-7. E-ISBN 979-8-3503-1793-0. (doi:10.1109/VizSec60606.2023.00011) (KAR id:102913) |
Patterson, Clare M., Nurse, Jason R. C., Franqueira, Virginia N. L. (2023) Learning from cyber security incidents: A systematic review and future research agenda. Computers & Security, 132 . Article Number 103309. ISSN 0167-4048. (doi:10.1016/j.cose.2023.103309) (KAR id:101556) |
Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2022) Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter. Computers and Security, 125 . Article Number 103008. ISSN 0167-4048. (doi:10.1016/j.cose.2022.103008) (KAR id:96259) |
Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2023) A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. ACM Computing Surveys, 55 (9). 180:1-180:38. ISSN 0360-0300. E-ISSN 1557-7341. (doi:10.1145/3558095) (KAR id:98166) |
Pattnaik, Nandita, Nurse, Jason R. C., Turner, Sarah, Mott, Gareth, MacColl, Jamie, Huesch, Pia, Sullivan, James (2023) It's more than just money: The real-world harms from ransomware attacks. In: 17th International Symposium on Human Aspects of Information Security & Assurance, 4-6 July 2023, Canterbury, UK. (doi:10.1007/978-3-031-38530-8_21) (KAR id:101600) |
Pérez-Delgado, Carlos A (2022) A Quantum Software Modeling Language. In: Quantum Software Engineering. First Edition. Springer International Publishing Cham, Switzerland, pp. 103-119. ISBN 978-3-031-05323-8. E-ISBN 978-3-031-05324-5. (doi:10.1007/978-3-031-05324-5_6) (KAR id:97519) |
R
Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2023) AnoFed: Adaptive anomaly detection for digital health usingtransformer-based federated learning and support vector data description. Engineering Applications of Artificial Intelligence, 121 . Article Number 106051. ISSN 0952-1976. (doi:10.1016/j.engappai.2023.106051) (KAR id:100363) |
Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2022) Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI. Knowledge-Based Systems, 236 . Article Number 107763. ISSN 0950-7051. (doi:10.1016/j.knosys.2021.107763) (KAR id:92005) |
Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2023) Proof of Swarm Based Ensemble Learning for Federated Learning Applications. In: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. . 152- 155. ACM, New York, USA ISBN 978-1-4503-9517-5. (doi:10.1145/3555776.3578601) (KAR id:101795) |
Roberts, David L., Hernandez-Castro, Julio (2017) Bycatch and illegal wildlife trade on the dark web. Oryx, 51 (3). pp. 393-394. ISSN 0030-6053. E-ISSN 1365-3008. (doi:10.1017/S0030605317000679) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:62140) |
S
Sağlam, Rahime Belen, Aslan, Çağrı B., Li, Shujun, Dickson, Lisa, Pogrebna, Ganna (2020) A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR. In: Proceedings of 2020 2nd IEEE International Conference on Decentralized Applications and Infrastructures. . pp. 22-31. IEEE ISBN 978-1-7281-7022-0. (doi:10.1109/DAPPS49028.2020.00003) (KAR id:81277) |
Sağlam, Rahime Belen, Miller, Vincent, Franqueira, Virginia N. L. (2023) A Systematic Literature Review on Cyber Security Education for Children. IEEE Transactions on Education, 66 (3). pp. 274-266. ISSN 0018-9359. (doi:10.1109/TE.2022.3231019) (KAR id:99071) |
Schmitz, Roland and Li, Shujun and Grecos, Christos and Zhang, Xinpeng (2018) Commutative Watermarking-Encryption of Multimedia Data Based on Histograms. In: Bhattacharyya, Siddhartha, ed. Intelligent Innovations in Multimedia Data Engineering and Management. First edition. IGI Global, USA, pp. 141-163. ISBN 978-1-5225-8783-5. E-ISBN 978-1-5225-7108-7. (doi:10.4018/978-1-5225-7107-0.ch006) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:74214) |
Shere, Anjuli R.K., Nurse, Jason R. C., Martin, Andrew (2023) Threats to Journalists from the Consumer Internet of Things. In: Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media. Cyber Science 2022; 20–21 June; Wales. Springer Proceedings in Complexity . Springer ISBN 978-981-19-6413-8. (doi:10.1007/978-981-19-6414-5_17) (KAR id:94898) |
Shi, Na, Tan, Liang, Yang, Ciaxia, He, Chen, Xu, Junli, Lu, Yang, Xu, Hao (2020) BacS: A blockchain-based access control scheme in distributed internet of things. Peer-to-Peer Networking and Applications, . ISSN 1936-6442. E-ISSN 1936-6450. (doi:10.1007/s12083-020-00930-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:81701) |
Sugiura, Lisa, Blackbourn, Dean, Button, Mark, Hawkins, Chloe, Tapley, Jacki, Frederick, Brian, Nurse, Jason R. C., Belen Sağlam, Rahime (2021) Computer misuse as a facilitator of Domestic Abuse. University of Portsmouth, 127 pp. (KAR id:98203) |
Sugiura, Lisa, Button, Mark, Nurse, Jason R. C., Tapley, Jacki, Belen-Saglam, Rahime, Hawkins, Chloe, Frederick, Brian, Blackbourn, Dean (2024) The Technification of Domestic Abuse: Methods, Tools, and Criminal Justice Responses. Criminology & Criminal Justice, . ISSN 1748-8958. E-ISSN 1748-8966. (doi:10.1177/17488958241266760) (KAR id:106245) |
Sunde, Nina, Franqueira, Virginia N. L. (2023) Adding transparency to uncertainty: An argument-based method for evaluative opinions. Forensic Science International: Digital Investigation, 47 . Article Number 301657. ISSN 1742-2876. (doi:10.1016/j.fsidi.2023.301657) (KAR id:103353) |
T
Toros, Harmonie (2022) Better researchers, better people? The dangers of empathetic research on the extreme right. Critical Studies on Terrorism, 15 (1). pp. 225-231. ISSN 1753-9153. (doi:10.1080/17539153.2022.2031127) (KAR id:92845) |
Toros, Harmonie (2022) UK Counter Terrorism Narratives: An Analysis of the Action Counters Terrorism Campaign 2017-2020. Project report. iCSS, Kent, UK (Unpublished) (KAR id:99013) |
Toros, Harmonie and Martucci, Laura Sabrina (2021) Women’s role in de-radicalization and rehabilitation in the MENA region. Project report. NATO Southern Hub, Naples, Italy (KAR id:99015) |
Turner, Sarah, Nurse, Jason R. C., Li, Shujun (2022) "It was hard to find the words": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices. In: ACM Conference on Human Factors in Computing Systems (CHI). 2022 ACM CHI Conference on Human Factors in Computing Systems. . ACM ISBN 978-1-4503-9156-6. (doi:10.1145/3491101.3503577) (KAR id:92356) |
Turner, Sarah, Nurse, Jason R. C., Li, Shujun (2021) When Googling it doesn’t work: The challenge of finding security advice for smart home devices. In: Human Aspects of Information Security and Assurance. HAISA 2021. IFIP Advances in Information and Communication Technology. 613. Springer ISBN 978-3-030-81110-5. E-ISBN 978-3-030-81111-2. (doi:10.1007/978-3-030-81111-2_10) (KAR id:88357) |
Turner, Sarah, Pattnaik, Nandita, Nurse, Jason R. C., Li, Shujun (2022) "You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security. Proceedings of the ACM on Human-Computer Interaction, 6 (CSCW2). Article Number 269. E-ISSN 2573-0142. (doi:10.1145/3555159) (KAR id:95346) |
Tussyadiah, Iis, Li, Shujun, Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. . pp. 278-290. Springer Nature Switzerland AG, Cham, Switzerland ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:10.1007/978-3-030-05940-8_22) (KAR id:71418) |
W
Waldock, Krysia Emily, Miller, Vincent, Li, Shujun, Franqueira, Virginia N. L. (2022) Pre-University Cyber Security Education: A report on developing cyber skills amongst children and young people. Global Forum on Cyber Expertise, 159 pp. (KAR id:96040) |
Wang, Hui and Ho, Anthony T.S. and Li, Shujun (2021) OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. In: Computer Security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 243-260. ISBN 978-3-030-66503-6. E-ISBN 978-3-030-66504-3. (doi:10.1007/978-3-030-66504-3_15) (KAR id:84857) |
Wang, Yichao, Arief, Budi, Franqueira, Virginia N. L., Coates, Anna Grace, Ó Ciardha, Caoilte (2023) Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned. In: EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference. . pp. 59-64. ACM ISBN 978-1-4503-9829-9. (doi:10.1145/3590777.3590812) (KAR id:102125) |
Wang, Yichao, Arief, Budi, Hernandez-Castro, Julio C. (2024) Analysis of Security Mechanisms of Dark Web Markets. In: EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference. . ACM ISBN 979-8-4007-1651-5. (doi:10.1145/3655693.3655700) (KAR id:105237) |
Wang, Yichao, Arief, Budi, Hernandez-Castro, Julio C. (2023) Dark ending: what happens when a dark web market closes down. In: Proceedings of the 9th International Conference on Information Systems Security and Privacy. . ScitePress ISBN 978-989-758-624-8. (doi:10.5220/0011681600003405) (KAR id:100540) |
Wang, Yichao, Arief, Budi, Hernandez-Castro, Julio C. (2021) Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets. In: 2021 APWG Symposium on Electronic Crime Research (eCrime). . pp. 1-13. IEEE ISBN 978-1-6654-8029-1. (doi:10.1109/eCrime54498.2021.9738745) (KAR id:99679) |
Wang, Yichao, Roscoe, Sophia, Arief, Budi, Connolly, Lena, Borrion, Hervé, Kaddoura, Sanaa (2023) The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities. In: 9th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2023). Lecture Notes in Computer Science (LNCS) . pp. 149-163. Springer Singapore ISBN 978-981-99-5176-5. E-ISBN 978-981-99-5177-2. (doi:10.1007/978-981-99-5177-2_9) (KAR id:102144) |
Wang, Zichi, Li, Shujun, Zhang, Xinpeng (2019) Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access, 7 . pp. 168914-168921. ISSN 2169-3536. (doi:10.1109/ACCESS.2019.2955113) (KAR id:79178) |
Wei, Yun-gang, Lu, Yang, Hu, Xiaoyan, Sun, Bo (2013) Research and Application of Access Control Technique in 3D Virtual Reality System OpenSim. In: 2013 Sixth International Symposium on Computational Intelligence and Design. . pp. 65-68. IEEE E-ISBN 978-0-7695-5079-4. (doi:10.1109/ISCID.2013.130) (KAR id:80976) |
Wiiliams, Nick, Li, Shujun (2017) Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model. In: Proceedings of 2017 3rd IEEE International Conference on Cybernetics. . pp. 471-478. IEEE, USA ISBN 978-1-5386-2201-8. E-ISBN 978-1-5386-2200-1. (doi:10.1109/CYBConf.2017.7985810) (KAR id:74278) |
X
Xu, Yang, Guo, Jie, Qiu, Weidong, Huang, Zheng, Altuncu, Enes, Li, Shujun (2023) “Comments Matter and The More The Better!”: Improving Rumor Detection with User Comments. In: Proceedings of the 2022 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022). . pp. 383-390. IEEE ISBN 978-1-6654-9425-0. (doi:10.1109/TrustCom56396.2022.00060) (KAR id:97593) |
Y
Yilmaz, Yagiz, Cetin, Orcun, Grigore, Claudia, Arief, Budi, Hernandez-Castro, Julio (2023) Personality Types and Ransomware Victimisation. Digital Threats: Research and Practice, 4 (4). pp. 1-25. ISSN 2692-1626. E-ISSN 2576-5337. (doi:10.1145/3568994) (KAR id:102123) |
Yuan, Haiyue, Boakes, Matthew, Ma, Xiao, Cao, Dongmei, Li, Shujun (2023) Visualising Personal Data Flows: Insights from a Case Study of Booking.com. In: Lecture Notes in Business Information Processing. Intelligent Information Systems: CAiSE Forum 2023, Zaragoza, Spain, June 12–16, 2023, Proceedings. 477. pp. 52-60. Springer Cham, Cham, Germany E-ISBN 978-3-031-34674-3. (doi:10.1007/978-3-031-34674-3_7) (KAR id:101789) |
Yuan, Haiyue and Li, Shujun (2020) MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80296) |
Yuan, Haiyue, Li, Shujun, Rusconi, Patrice (2021) CogTool+: Modeling human performance at large scale. ACM Transactions on Computer-Human Interaction, 28 (2). Article Number 7. ISSN 1073-0516. E-ISSN 1557-7325. (doi:10.1145/3447534) (KAR id:87545) |
Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_17) (KAR id:69559) |
Yuan, Xin, Guo, Jie, Qiu, Weidong, Huang, Zheng, Li, Shujun (2023) Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation. In: Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing. . pp. 4268-4280. Association for Computational Linguistics (doi:2023.emnlp-main.259) (KAR id:104246) |
Z
Zahrah, Fatima and Nurse, Jason R. C. (2022) Terrorism and online extremism. In: Ceron, Andrea, ed. Elgar Encyclopedia of Technology and Politics. Elgar Encyclopedias in the Social Sciences series . Edward Elgar Publishing, pp. 62-67. ISBN 978-1-80037-425-6. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:98159) |
Zahrah, Fatima, Nurse, Jason R. C., Goldsmith, Michael (2022) A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election. In: 2022 ACM/SIGAPP Symposium On Applied Computing. . pp. 1788-1791. ACM (doi:10.1145/3477314.3507226) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:92440) |
Zahrah, Fatima, Nurse, Jason R. C., Goldsmith, Michael (2024) Unmasking Hate in the Pandemic: A Cross-Platform Study of the COVID-19 Infodemic. Big Data Research, 37 . Article Number 100481. ISSN 2214-5796. (doi:10.1016/j.bdr.2024.100481) (KAR id:106263) |
Č
Čagalja, Mario, Perković, Toni, Bugarić, Marin, Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:10.1016/j.pmcj.2014.09.002) (KAR id:69556) |