Close menu


Sunderland Repository records the research produced by the University of Sunderland including practice-based research and theses.

Up a level
Export as [feed] RSS
Group by: Creators | Item Type
Jump to: A | B | C | D | G | H | I | M | R | Ö
Number of items at this level: 33.


A. Ochang, Paschal, Irving, Philip and O. Ofem, Paulinus (2016) Research on Wireless Network Security Awareness of Average Users. International Journal of Wireless and Microwave Technologies, 6 (2). pp. 21-29. ISSN 2076-1449

Algharibeh, Moath, Husari, Gaith and Jaf, Sardar (2021) A Data-Driven Password Strength Meter for Cybersecurity Assessment and Enhancement. In: The 7th IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, 20-22 Dec 2021, Haikou. (Unpublished)

Almousa, Omar, Mödersheim, Sebastian, Modesti, Paolo and Viganò, Luca (2015) Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, 21-25 Sep 2015, Vienna, Austria.


Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2016) Security Protocol Specification and Verification with AnBx. Journal of Information Security and Applications, 30. pp. 46-63. ISSN 2214-2126

Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2015) Security Protocol Specification and Verification with AnBx. Technical Report. School of Computing Science, Newcastle University.

Bugliesi, Michele and Modesti, Paolo (2010) AnBx - Security Protocols Design and Verification. In: Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, March 27-28, 2010, Paphos, Cyprus,.

Bugliesi, Michele and Modesti, Paolo (2010) Design and Analysis of Distributed Protocols with AnBx. Technical Report. DSI, Università Ca' Foscari Venezia.


Campos, Jaime, Sharma, Pankaj, Jantunen, Erikki, Baglee, David and Fumagalli, Luca (2016) The challenges of cybersecurity frameworks to protect data required for the development of advanced maintenance. Procedia CIRP, 47. pp. 222-227. ISSN 2212-8271


Davenport, James, Crick, Thomas, Irons, Alastair and Prickett, Tom (2020) A UK Case Study on Cybersecurity Education and Accreditation. IEEE Frontiers in Education Conference, 2019. p. 1. ISSN 2377-634X


Garcia, Rémi and Modesti, Paolo (2017) An IDE for the Design, Verification and Implementation of Security Protocols. In: The 28th International Symposium on Software Reliability Engineering Workshops (ISSREW), 23-26 Oct 2017, Toulouse, France.

Ghafir, Ibrahim, Prenosil, Vaclv, Hammoudeh, Mohammad, Baker, Thar, Jabbar, Sohail, Khalid, Shehzad and Jaf, Sardar (2018) BotDet: A System for Real Time Botnet Command and Control Traffic Detection. IEEE Access Open Access, 6 (1). pp. 38947-38958. ISSN 2169-3536


Horsman, Graeme (2017) Can we continue to effectively police digital crime? Science & Justice. ISSN 1355 0306

Horsman, Graeme (2017) 'Combatting those who intentionally access images depicting child sexual abuse on the Internet: A call for a new offence in England and Wales'. Computer Law & Security Review, 34 (1). pp. 111-124. ISSN 0267-3649

Horsman, Graeme (2016) Unmanned Aerial Vehicles: A Preliminary Analysis of Forensic Challenges. Digital Investigation, 16. pp. 1-11. ISSN 1742-2876

Horsman, Graeme (2016) The challenges surrounding the regulation of anonymous communication provision in the United Kingdom. Computers & Security, 56. pp. 151-162. ISSN 0167 4048

Horsman, Graeme (2017) A process-level analysis of private browsing behavior: A focus on Google Chromes Incognito mode. In: 5th International Symposium on Digital Forensics and Security (ISDFS), 26-28 Apr 2017, Tirgu Mures, Romania.

Horsman, Graeme (2017) A survey of current social network and online communication provision policies to support law enforcement identify offenders. Digital Investigation. ISSN 1742-2876

Horsman, Graeme and Conniss, Lynne R (2015) Investigating evidence of mobile phone usage by drivers in road traffic accidents. Digital Investigation, 12. S30-S37. ISSN 1742 2876


Irons, Alastair and Lallie, Harjinder Singh (2014) From Digital Forensics to Intelligent Forensics. Future Internet, 6 (3). pp. 584-596. ISSN 1999-5903

Irons, Alastair and Ophoff, Jacques (2016) Aspects of Digital Forensics in South Africa. Interdisciplinary Journal of Information, Knowledge, and Management, 11. pp. 273-283. ISSN 1555-1229

Irving, Philip (2017) Security Analysis and Development of VolP Testing Methodologies: Becoming the Hacker. In: FTC 2017 - Future Technologies Conference 2017, 29-30 Nov 2017, Vancouver, BC, Canada. (Unpublished)

Irving, Philip and Nelson, David (2006) A Survey of Risk Assessment for Corporate Networks. In: Proceedings of the 2nd European Conference on IS Management, Leadership and Governance, July 2006.


MacFarlane, Kate and Holmes, Violeta (2017) Multi-agent System for Safeguarding Children Online. In: Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016. Lecture Notes in Networks and Systems, 16 (16). Springer International Publishing AG, pp. 228-242. ISBN 978-3-319-56994-9

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management - 10th International Workshop, STM 2014, 10-11 Sep 2014, Wroclaw, Poland.

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. Lecture Notes in Computer Science . Springer, pp. 204-208. ISBN 978-3-319-11850-5

Modesti, Paolo (2016) Security Programming with High-Level Abstractions: a Tutorial (Extended Abstract). In: HEA National Conference on Learning and Teaching in Cybersecurity, 15 Jun 2016, Maple House, Birmingham. (Unpublished)

Modesti, Paolo (2012) Verified Security Protocol Modeling and Implementation with AnBx. Doctoral thesis, Università Ca' Foscari Venezia.

Modesti, Paolo, Groß, Thomas, Mödersheim, Sebastian, Almousa, Omar and Houdeau, Deflef (2015) Security Evaluation of FutureID. Project Report. FutureID Consortium.

Morrison, Ben, Coventry, L. M. and Briggs, P. (2020) Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults. Frontiers in Psychology, 11. pp. 1-13. ISSN 1664-1078

Mödersheim, Sebastian and Modesti, Paolo (2011) Verifying SeVeCom using set-based abstraction. In: 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, 4-8 Jul 2011, Bahcesehir University, Istanbul, Turkey.


Rusyaidi, Muhammad, Jaf, Sardar and Zunaidi, Ibrahim (2021) Machine Learning Methods in Detecting Distributed Denial of Service: A Systematic Literature Review. In: 8th Brunei International Conference on Engineering and Technology, 08-10 Nov 2021, Universiti Teknologi Brunei.


Özgül, Faith and Bowerman, Chris (2014) Characteristics of Tenrrorists Networks Based on Ideology and Practices. In: ENIC2014, 29-30 Sep 2014, Wroclaw.

Özgül, Faith and Bowerman, Chris (2015) Six Types of Terrorist Networks. In: BESC2014, 30 Oct - 2 Nov 2014, China.

This list was generated on Mon Jan 24 16:19:50 2022 GMT.