Close menu

SURE

Sunderland Repository records the research produced by the University of Sunderland including practice-based research and theses.

Up a level
Export as [feed] RSS
Group by: Creators | Item Type
Number of items at this level: 47.

Article

A. Ochang, Paschal, Irving, Philip and O. Ofem, Paulinus (2016) Research on Wireless Network Security Awareness of Average Users. International Journal of Wireless and Microwave Technologies, 6 (2). pp. 21-29. ISSN 2076-1449

Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2016) Security Protocol Specification and Verification with AnBx. Journal of Information Security and Applications, 30. pp. 46-63. ISSN 2214-2126

Campos, Jaime, Sharma, Pankaj, Jantunen, Erikki, Baglee, David and Fumagalli, Luca (2016) The challenges of cybersecurity frameworks to protect data required for the development of advanced maintenance. Procedia CIRP, 47. pp. 222-227. ISSN 2212-8271

Cheng, Yongqiang, Ding, Xintao, Luo, Yonglong, Li, Qingde and Gope, Prosanta (2022) Consensus Adversarial Defense Method Based on Augmented Examples. Transactions on Industrial Informatics. pp. 984-994. ISSN 1941-0050

Davenport, James, Crick, Thomas, Irons, Alastair and Prickett, Tom (2020) A UK Case Study on Cybersecurity Education and Accreditation. IEEE Frontiers in Education Conference, 2019. p. 1. ISSN 2377-634X

Eliot, Neil, Kendall, David and Brockway, Michael (2018) A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World Cybersecurity Skills. IEEE Access, 6. pp. 211-34895. ISSN 2169-3536

Ghafir, Ibrahim, Prenosil, Vaclv, Hammoudeh, Mohammad, Baker, Thar, Jabbar, Sohail, Khalid, Shehzad and Jaf, Sardar (2018) BotDet: A System for Real Time Botnet Command and Control Traffic Detection. IEEE Access Open Access, 6 (1). pp. 38947-38958. ISSN 2169-3536

Horsman, Graeme (2017) Can we continue to effectively police digital crime? Science & Justice. ISSN 1355 0306

Horsman, Graeme (2017) 'Combatting those who intentionally access images depicting child sexual abuse on the Internet: A call for a new offence in England and Wales'. Computer Law & Security Review, 34 (1). pp. 111-124. ISSN 0267-3649

Horsman, Graeme (2016) Unmanned Aerial Vehicles: A Preliminary Analysis of Forensic Challenges. Digital Investigation, 16. pp. 1-11. ISSN 1742-2876

Horsman, Graeme (2016) The challenges surrounding the regulation of anonymous communication provision in the United Kingdom. Computers & Security, 56. pp. 151-162. ISSN 0167 4048

Horsman, Graeme (2017) A survey of current social network and online communication provision policies to support law enforcement identify offenders. Digital Investigation. ISSN 1742-2876

Horsman, Graeme and Conniss, Lynne R (2015) Investigating evidence of mobile phone usage by drivers in road traffic accidents. Digital Investigation, 12. S30-S37. ISSN 1742 2876

Irons, Alastair and Lallie, Harjinder Singh (2014) From Digital Forensics to Intelligent Forensics. Future Internet, 6 (3). pp. 584-596. ISSN 1999-5903

Irons, Alastair and Ophoff, Jacques (2016) Aspects of Digital Forensics in South Africa. Interdisciplinary Journal of Information, Knowledge, and Management, 11. pp. 273-283. ISSN 1555-1229

Morrison, Ben, Coventry, L. M. and Briggs, P. (2020) Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults. Frontiers in Psychology, 11. pp. 1-13. ISSN 1664-1078

Rehman, Mujeeb Ur, Shafique, Arslan, Azhar, Qurat-Ul-Ain, Jamal, Sajjad Shaukat, Gheraibia, Youcef and Usman, Aminu Bello (2024) Voice disorder detection using machine learning algorithms: An application in speech and language pathology. Engineering Applications of Artificial Intelligence, 133 (108047). ISSN 1873-6769

Rehman, Mujeeb Ur, Shafique, Arslan and Usman, Aminu Bello (2023) Securing Medical Information Transmission Between IoT Devices: An Innovative Hybrid Encryption Scheme Based on Quantum Walk, DNA Encoding, and Chaos. Internet of Things, 24 (100891). ISSN 2542-6605

Rusyaidi, Muhammad, Jaf, Sardar and Ibrahim, Zunaidi (2022) Detecting Distributed Denial of Service in Network Traffic with Deep Learning. International Journal of Advanced Computer Science and Applications, 13 (1). pp. 34-41. ISSN 2156-5570

Rusyaidi, Muhammad, Jaf, Sardar and Zunaidi, Ibrahim (2022) Detecting DDoS in Network Traffic with Deep Learning. The International Journal of Advanced Computer Science and Applications (IJACSA), 13 (1). (In Press)

Rusyaidi, Muhammad, Jaf, Sardar and Zunaidi, Ibrahim (2021) Machine Learning Methods in Detecting Distributed Denial of Service: A Systematic Literature Review.

Usman, Aminu Bello, Hazzazi, Mohammad Mazyad, Rehman, Mujeeb Ur, Shafque, Arslan, Amer, Aljaedi and Zaid, Bassfar (2024) Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT difusion: a robust data encryption approach. Scientific Reports, 14 (12277). ISSN 2045-2322

Wang, Wei, Gope, Prosanta and Cheng, Yongqiang (2022) An AI-Driven Secure and Intelligent Robotic Delivery System. Transactions on Engineering Management. pp. 1-16. ISSN 1558-0040

Book Section

MacFarlane, Kate and Holmes, Violeta (2017) Multi-agent System for Safeguarding Children Online. In: Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016. Lecture Notes in Networks and Systems, 16 (16). Springer International Publishing AG, pp. 228-242. ISBN 978-3-319-56994-9

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. Lecture Notes in Computer Science . Springer, pp. 204-208. ISBN 978-3-319-11850-5

Yang, Longzhi, Elisa, Noe and Eliot, Neil (2019) Privacy and security aspects of E-government in smart cities. In: Smart cities cybersecurity and privacy. Elsevier, pp. 211-102. ISBN 978-0-12-815032-0

Reports, briefing/ working papers

Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2015) Security Protocol Specification and Verification with AnBx. Technical Report. School of Computing Science, Newcastle University.

Bugliesi, Michele and Modesti, Paolo (2010) Design and Analysis of Distributed Protocols with AnBx. Technical Report. DSI, Università Ca' Foscari Venezia.

Modesti, Paolo, Groß, Thomas, Mödersheim, Sebastian, Almousa, Omar and Houdeau, Deflef (2015) Security Evaluation of FutureID. Project Report. FutureID Consortium.

Conference or Workshop Item

Algharibeh, Moath, Husari, Gaith and Jaf, Sardar (2021) A Data-Driven Password Strength Meter for Cybersecurity Assessment and Enhancement. In: The 7th IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, 20-22 Dec 2021, Haikou. (Unpublished)

Almousa, Omar, Mödersheim, Sebastian, Modesti, Paolo and Viganò, Luca (2015) Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, 21-25 Sep 2015, Vienna, Austria.

Bugliesi, Michele and Modesti, Paolo (2010) AnBx - Security Protocols Design and Verification. In: Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, March 27-28, 2010, Paphos, Cyprus,.

Garcia, Rémi and Modesti, Paolo (2017) An IDE for the Design, Verification and Implementation of Security Protocols. In: The 28th International Symposium on Software Reliability Engineering Workshops (ISSREW), 23-26 Oct 2017, Toulouse, France.

Horsman, Graeme (2017) A process-level analysis of private browsing behavior: A focus on Google Chromes Incognito mode. In: 5th International Symposium on Digital Forensics and Security (ISDFS), 26-28 Apr 2017, Tirgu Mures, Romania.

Irving, Philip (2017) Security Analysis and Development of VolP Testing Methodologies: Becoming the Hacker. In: FTC 2017 - Future Technologies Conference 2017, 29-30 Nov 2017, Vancouver, BC, Canada. (Unpublished)

Irving, Philip and Nelson, David (2006) A Survey of Risk Assessment for Corporate Networks. In: Proceedings of the 2nd European Conference on IS Management, Leadership and Governance, July 2006.

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management - 10th International Workshop, STM 2014, 10-11 Sep 2014, Wroclaw, Poland.

Modesti, Paolo (2016) Security Programming with High-Level Abstractions: a Tutorial (Extended Abstract). In: HEA National Conference on Learning and Teaching in Cybersecurity, 15 Jun 2016, Maple House, Birmingham. (Unpublished)

Mödersheim, Sebastian and Modesti, Paolo (2011) Verifying SeVeCom using set-based abstraction. In: 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, 4-8 Jul 2011, Bahcesehir University, Istanbul, Turkey.

Peacock, Donna and Irons, Alastair (2015) Gender and Computer Security. In: Dynamo North East 15th Annual Conference, 18th June 2015, University of Sunderland. (Unpublished)

Peacock, Donna and Irons, Alastair (2015) Gender and Cybersecurity: Encouragement, Opportunities, Progression. In: 11th Annual Teaching Computer Forensics Conference, 19th November 2015, University of Sunderland. (Unpublished)

Peacock, Donna and Irons, Alastair (2017) Mind The Gap! : Explaining Gender Inequality in Cybersecurity. In: CASS Public Lecture, 1st March 2017, University of Sunderland. (Unpublished)

Peacock, Donna and Irons, Alastair (2016) Women in Cybersecurity: Closed Doors, Sticky Floors and Glass Ceilings. In: North East Crime Research Network (NECRN) Conference 2016, 16th April 2016, Northumbria University. (Unpublished)

Usman, Aminu Bello (2024) The Future of IoT Security: Integrating Network Protection and Privacy-Enhanced Biometric Systems at Edge. In: Yorkshire Innovation in Science and Engineering Conference, 21 Jun 2024, University of Hull. (Unpublished)

Özgül, Faith and Bowerman, Chris (2014) Characteristics of Tenrrorists Networks Based on Ideology and Practices. In: ENIC2014, 29-30 Sep 2014, Wroclaw.

Özgül, Faith and Bowerman, Chris (2015) Six Types of Terrorist Networks. In: BESC2014, 30 Oct - 2 Nov 2014, China.

Thesis

Modesti, Paolo (2012) Verified Security Protocol Modeling and Implementation with AnBx. Doctoral thesis, Università Ca' Foscari Venezia.

This list was generated on Sat Oct 5 20:39:40 2024 BST.