Items where Subject is "Computing > Network Computing"

Up a level
Export as [feed] RSS
Group by: Creators | Item Type
Jump to: A | B | H | I | K | M | O | W
Number of items at this level: 24.

A

Almousa, Omar, Mödersheim, Sebastian, Modesti, Paolo and Viganò, Luca (2015) Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, 21-25 Sep 2015, Vienna, Austria.

B

Baglee, David, Gorostegu, Unai, Jantunen, Erikki, Campos, Jaime and Sharma, Pankaj (2017) Optimizing Condition Monitoring of Big Data Systems. In: DMIN'17 The 13th International Conference on Data Mining, 17-20 Jul 2017, Las Vegas, Nevada, USA.

Bhagat, Kiran, Wermter, Stefan and Burn, Kevin (2009) Hybrid Learning Architecture for Unobtrusive Infrared Tracking Support. In: IEEE International Joint Conference on Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE, 2703- 2709. ISBN 9781424418206

Bowerman, Chris and Karamitsos, Ioannis (2013) A Resource Reservation Protocol with Linear Traffic Prediction for OBS Networks. Advances in Optical Technologies, 2013 (425372). ISSN 1687-6393

Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2016) Security Protocol Specification and Verification with AnBx. Journal of Information Security and Applications, 30. pp. 46-63. ISSN 2214-2126

Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2015) Security Protocol Specification and Verification with AnBx. Technical Report. School of Computing Science, Newcastle University.

Bugliesi, Michele and Modesti, Paolo (2010) AnBx - Security Protocols Design and Verification. In: Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, March 27-28, 2010, Paphos, Cyprus,.

Bugliesi, Michele and Modesti, Paolo (2010) Design and Analysis of Distributed Protocols with AnBx. Technical Report. DSI, Università Ca' Foscari Venezia.

H

Hussain, S, Erwin, Harry and Dunne, Peter (2011) Threat modelling using formal methods: A new approach to develop secure web applications. In: 7th International conference on emerging technologies IEEE, 5 - 6 Sep 2011, Islamabad, Pakistan.

Hussain, Shafiq, Erwin, Harry and Dunne, Peter (2011) Threat modeling using Formal Methods: A New Approach to Develop Secure Web Applications. In: ICET 2011: 7th IEEE International Conference on Emerging Technologies, 5-6 Sep 2011, Islamabad, Pakistan.

I

Irving, Philip and Ochang, Pascal A (2016) Evolutionary Analysis of GSM, UMTS and LTE Mobile Network Architectures. World Scientific News, 54. pp. 27-39. ISSN 2392-2192

K

Kaghazchi, Hassan (2015) A Diagnostics Model for Industrial Communications Networks. Doctoral thesis, University of Sunderland.

Kok, Dirk, Knowles, Michael and Morris, Adrian (2012) Building a Driving Simulator as an Electric Vehicle Hardware Development Tool. In: Driving Simulation Conference 2012, 6-7 September 2012, Paris.

M

Modesti, Paolo (2016) AnBx: Automatic Generation and Verification of Security Protocols Implementations. In: 8th International Symposium, FPS 2015, 26-28 Oct 2015, Clermont-Ferrand, France.

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management - 10th International Workshop, STM 2014, 10-11 Sep 2014, Wroclaw, Poland.

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. Lecture Notes in Computer Science . Springer, pp. 204-208. ISBN 978-3-319-11850-5

Modesti, Paolo (2016) Security Programming with High-Level Abstractions: a Tutorial (Extended Abstract). In: HEA National Conference on Learning and Teaching in Cybersecurity, 15 Jun 2016, Maple House, Birmingham. (Unpublished)

Modesti, Paolo (2012) Verified Security Protocol Modeling and Implementation with AnBx. Doctoral thesis, Università Ca' Foscari Venezia.

Modesti, Paolo, Groß, Thomas, Mödersheim, Sebastian, Almousa, Omar and Houdeau, Deflef (2015) Security Evaluation of FutureID. Project Report. FutureID Consortium.

Mödersheim, Sebastian and Modesti, Paolo (2011) Verifying SeVeCom using set-based abstraction. In: 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, 4-8 Jul 2011, Bahcesehir University, Istanbul, Turkey.

O

Onyancha, Julius and Plekhanova, Valentina (2018) ‘Noise Reduction in Web Data: A Learning Approach Based on Dynamic User Interests'. International Journal of Information and Education Technology, 12 (1). pp. 7-14. ISSN 2010-3689

Onyancha, Julius, Plekhanova, Valentina and Nelson, David (2018) ‘Learning Noise in Web Data Prior to Elimination'. In: Transactions on Engineering Technologies: 25th World Congress on Engineering (WCE 2017). Springer. (In Press)

Onyancha, Julius, Plekhanova, Valentina and Nelson, David (2017) Noise Web Data Learning from a Web User Profile: Position Paper. In: , Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering 2017 Volume II. IAENG, pp. 608-611. ISBN 978-988-14048-3-1

W

Warrender, Robert, Tindle, John and Nelson, David (2013) Evaluating the Use of Virtual Machines in High Performance Clusters. International Journal of Advanced Computer Technology, 2 (5). pp. 25-30. ISSN 2319-7900

This list was generated on Sat Jun 23 01:03:04 2018 BST.