Close menu

SURE

Sunderland Repository records the research produced by the University of Sunderland including practice-based research and theses.

Up a level
Export as [feed] RSS
Group by: Creators | Item Type
Jump to: A | B | G | H | I | K | M | O | R | W
Number of items at this level: 28.

A

Algharibeh, Moath, Husari, Gaith and Jaf, Sardar (2021) A Data-Driven Password Strength Meter for Cybersecurity Assessment and Enhancement. In: The 7th IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, 20-22 Dec 2021, Haikou. (Unpublished)

Almousa, Omar, Mödersheim, Sebastian, Modesti, Paolo and Viganò, Luca (2015) Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, 21-25 Sep 2015, Vienna, Austria.

B

Baglee, David, Gorostegu, Unai, Jantunen, Erikki, Campos, Jaime and Sharma, Pankaj (2017) Optimizing Condition Monitoring of Big Data Systems. In: DMIN'17 The 13th International Conference on Data Mining, 17-20 Jul 2017, Las Vegas, Nevada, USA.

Bhagat, Kiran, Wermter, Stefan and Burn, Kevin (2009) Hybrid Learning Architecture for Unobtrusive Infrared Tracking Support. In: IEEE International Joint Conference on Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE, 2703- 2709. ISBN 9781424418206

Bowerman, Chris and Karamitsos, Ioannis (2013) A Resource Reservation Protocol with Linear Traffic Prediction for OBS Networks. Advances in Optical Technologies, 2013 (425372). ISSN 1687-6393

Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2016) Security Protocol Specification and Verification with AnBx. Journal of Information Security and Applications, 30. pp. 46-63. ISSN 2214-2126

Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2015) Security Protocol Specification and Verification with AnBx. Technical Report. School of Computing Science, Newcastle University.

Bugliesi, Michele and Modesti, Paolo (2010) AnBx - Security Protocols Design and Verification. In: Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, March 27-28, 2010, Paphos, Cyprus,.

Bugliesi, Michele and Modesti, Paolo (2010) Design and Analysis of Distributed Protocols with AnBx. Technical Report. DSI, Università Ca' Foscari Venezia.

G

Ghafir, Ibrahim, Prenosil, Vaclv, Hammoudeh, Mohammad, Baker, Thar, Jabbar, Sohail, Khalid, Shehzad and Jaf, Sardar (2018) BotDet: A System for Real Time Botnet Command and Control Traffic Detection. IEEE Access Open Access, 6 (1). pp. 38947-38958. ISSN 2169-3536

Ghafir, Ibrahim, Saleem, Jibran, Hammoudeh, Mohammad, Faour, Hanan, Prenosil, Vaclav, Jaf, Sardar, Jabbar, Sohail and Baker, Thar (2018) Security threats to critical infrastructure: the human factor. The Journal of Supercomputing, 74 (10). pp. 4986-5002. ISSN 0920-8542

H

Hussain, S, Erwin, Harry and Dunne, Peter (2011) Threat modelling using formal methods: A new approach to develop secure web applications. In: 7th International conference on emerging technologies IEEE, 5 - 6 Sep 2011, Islamabad, Pakistan.

Hussain, Shafiq, Erwin, Harry and Dunne, Peter (2011) Threat modeling using Formal Methods: A New Approach to Develop Secure Web Applications. In: ICET 2011: 7th IEEE International Conference on Emerging Technologies, 5-6 Sep 2011, Islamabad, Pakistan.

I

Irving, Philip and Ochang, Pascal A (2016) Evolutionary Analysis of GSM, UMTS and LTE Mobile Network Architectures. World Scientific News, 54. pp. 27-39. ISSN 2392-2192

K

Kaghazchi, Hassan (2015) A Diagnostics Model for Industrial Communications Networks. Doctoral thesis, University of Sunderland.

Kok, Dirk, Knowles, Michael and Morris, Adrian (2012) Building a Driving Simulator as an Electric Vehicle Hardware Development Tool. In: Driving Simulation Conference 2012, 6-7 September 2012, Paris.

M

Modesti, Paolo (2016) AnBx: Automatic Generation and Verification of Security Protocols Implementations. In: 8th International Symposium, FPS 2015, 26-28 Oct 2015, Clermont-Ferrand, France.

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management - 10th International Workshop, STM 2014, 10-11 Sep 2014, Wroclaw, Poland.

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. Lecture Notes in Computer Science . Springer, pp. 204-208. ISBN 978-3-319-11850-5

Modesti, Paolo (2016) Security Programming with High-Level Abstractions: a Tutorial (Extended Abstract). In: HEA National Conference on Learning and Teaching in Cybersecurity, 15 Jun 2016, Maple House, Birmingham. (Unpublished)

Modesti, Paolo (2012) Verified Security Protocol Modeling and Implementation with AnBx. Doctoral thesis, Università Ca' Foscari Venezia.

Modesti, Paolo, Groß, Thomas, Mödersheim, Sebastian, Almousa, Omar and Houdeau, Deflef (2015) Security Evaluation of FutureID. Project Report. FutureID Consortium.

Mödersheim, Sebastian and Modesti, Paolo (2011) Verifying SeVeCom using set-based abstraction. In: 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, 4-8 Jul 2011, Bahcesehir University, Istanbul, Turkey.

O

Onyancha, Julius and Plekhanova, Valentina (2018) ‘Noise Reduction in Web Data: A Learning Approach Based on Dynamic User Interests'. International Journal of Information and Education Technology, 12 (1). pp. 7-14. ISSN 2010-3689

Onyancha, Julius, Plekhanova, Valentina and Nelson, David (2018) Learning Noise in Web Data Prior to Elimination. In: Transactions on Engineering Technologies: 25th World Congress on Engineering (WCE 2017). Springer. ISBN 9789811307461

Onyancha, Julius, Plekhanova, Valentina and Nelson, David (2017) Noise Web Data Learning from a Web User Profile: Position Paper. In: , Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering 2017 Volume II. IAENG, pp. 608-611. ISBN 9789881404831

R

Rusyaidi, Muhammad, Jaf, Sardar and Zunaidi, Ibrahim (2021) Machine Learning Methods in Detecting Distributed Denial of Service: A Systematic Literature Review. In: 8th Brunei International Conference on Engineering and Technology, 08-10 Nov 2021, Universiti Teknologi Brunei.

W

Warrender, Robert, Tindle, John and Nelson, David (2013) Evaluating the Use of Virtual Machines in High Performance Clusters. International Journal of Advanced Computer Technology, 2 (5). pp. 25-30. ISSN 2319-7900

This list was generated on Thu Mar 28 18:17:55 2024 GMT.