Items where Subject is "Computing > Cybersecurity"

Up a level
Export as [feed] RSS
Group by: Creators | Item Type
Jump to: A | B | G | H | I | M
Number of items at this level: 23.

A

A. Ochang, Paschal, Irving, Philip and O. Ofem, Paulinus (2016) Research on Wireless Network Security Awareness of Average Users. International Journal of Wireless and Microwave Technologies, 6 (2). pp. 21-29. ISSN 2076-1449

Almousa, Omar, Mödersheim, Sebastian, Modesti, Paolo and Viganò, Luca (2015) Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, 21-25 Sep 2015, Vienna, Austria.

B

Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2016) Security Protocol Specification and Verification with AnBx. Journal of Information Security and Applications, 30. pp. 46-63. ISSN 2214-2126

Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2015) Security Protocol Specification and Verification with AnBx. Technical Report. School of Computing Science, Newcastle University.

Bugliesi, Michele and Modesti, Paolo (2010) AnBx - Security Protocols Design and Verification. In: Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, March 27-28, 2010, Paphos, Cyprus,.

Bugliesi, Michele and Modesti, Paolo (2010) Design and Analysis of Distributed Protocols with AnBx. Technical Report. DSI, Università Ca' Foscari Venezia.

G

Garcia, Rémi and Modesti, Paolo (2017) An Integrated Development Environment for the Design, Verification and Implementation of Security Protocols. In: The 28th International Symposium on Software Reliability Engineering (ISSRE), 23-26 Oct 2017, Toulouse, France. (In Press)

H

Horsman, Graeme (2017) Can we continue to effectively police digital crime? Science & Justice. ISSN 1355 0306

Horsman, Graeme (2017) 'Combatting those who intentionally access images depicting child sexual abuse on the Internet: A call for a new offence in England and Wales'. Computer Law & Security Review. ISSN 0267-3649 (In Press)

Horsman, Graeme (2016) Unmanned Aerial Vehicles: A Preliminary Analysis of Forensic Challenges. Digital Investigation, 16. pp. 1-11. ISSN 1742-2876

Horsman, Graeme (2016) The challenges surrounding the regulation of anonymous communication provision in the United Kingdom. Computers & Security, 56. pp. 151-162. ISSN 0167 4048

Horsman, Graeme (2017) A process-level analysis of private browsing behavior: A focus on Google Chromes Incognito mode. In: 5th International Symposium on Digital Forensics and Security (ISDFS), 26-28 Apr 2017, Tirgu Mures, Romania.

Horsman, Graeme (2017) A survey of current social network and online communication provision policies to support law enforcement identify offenders. Digital Investigation. ISSN 1742-2876

Horsman, Graeme and Conniss, Lynne R (2015) Investigating evidence of mobile phone usage by drivers in road traffic accidents. Digital Investigation, 12. S30-S37. ISSN 1742 2876

I

Irons, Alastair and Ophoff, Jacques (2016) Aspects of Digital Forensics in South Africa. Interdisciplinary Journal of Information, Knowledge, and Management, 11. pp. 273-283. ISSN 1555-1229

Irving, Philip (2017) Security Analysis and Development of VolP Testing Methodologies: Becoming the Hacker. In: FTC 2017 - Future Technologies Conference 2017, 29-30 Nov 2017, Vancouver, BC, Canada. (Unpublished)

Irving, Philip and Nelson, David (2006) A Survey of Risk Assessment for Corporate Networks. In: Proceedings of the 2nd European Conference on IS Management, Leadership and Governance, July 2006.

M

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management - 10th International Workshop, STM 2014, 10-11 Sep 2014, Wroclaw, Poland.

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. Lecture Notes in Computer Science . Springer, pp. 204-208. ISBN 978-3-319-11850-5

Modesti, Paolo (2016) Security Programming with High-Level Abstractions: a Tutorial (Extended Abstract). In: HEA National Conference on Learning and Teaching in Cybersecurity, 15 Jun 2016, Maple House, Birmingham. (Unpublished)

Modesti, Paolo (2012) Verified Security Protocol Modeling and Implementation with AnBx. Doctoral thesis, Università Ca' Foscari Venezia.

Modesti, Paolo, Groß, Thomas, Mödersheim, Sebastian, Almousa, Omar and Houdeau, Deflef (2015) Security Evaluation of FutureID. Project Report. FutureID Consortium.

Mödersheim, Sebastian and Modesti, Paolo (2011) Verifying SeVeCom using set-based abstraction. In: 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, 4-8 Jul 2011, Bahcesehir University, Istanbul, Turkey.

This list was generated on Thu Nov 23 17:07:02 2017 GMT.