Publications
Search our publications to find articles, books, reports and papers written by experts in the field.
- Javed, A. et al. 2022. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience 52 (3), pp.788-804. (10.1002/spe.2822)
- Singh, A. et al., 2021. Scheduling real time security aware tasks in fog networks. IEEE Transactions on Services Computing 14 (6), pp.1981-1994. (10.1109/TSC.2019.2914649)
- Saxena, N. et al. 2021. Impact evaluation of malicious control commands in cyber-physical smart grids. IEEE Transactions on Sustainable Computing 6 (2), pp.208-220. (10.1109/TSUSC.2018.2879670)
- Alrayes, F. , Abdelmoty, A. and Theodorakopoulos, G. 2020. Modelling perceived risks to personal privacy from location disclosure on online social networks. International Journal of Geographical Information Science 34 (1), pp.150-176. (10.1080/13658816.2019.1654109)
- Barati, M. and Rana, O. 2020. Enhancing user privacy in IoT: Integration of GDPR and Blockchain. Presented at: BlockSys 2019: International Conference on Blockchain and Trustworthy Systems Guangzhou, China 7-8 December 2019. Published in: Zheng, Z. et al., BlockSys 2019: Blockchain and Trustworthy Systems. Communications in Computer and Information Science Springer. , pp.322-335. (10.1007/978-981-15-2777-7_26)
- Bhadoria, R. S. , Nimbalkar, A. and Saxena, N. 2020. On the role of Blockchain technology in the Internet of Things. In: Kim, S. and Deka, G. C. eds. Advanced Applications of Blockchain Technology. Springer. , pp.129-140.
- Subahi, A. and Theodorakopoulos, G. 2019. Detecting IoT user behavior and sensitive information in encrypted IoT -app traffic. Sensors 19 (21) 4777. (10.3390/s19214777)
- Anthi, E. et al. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6 (5), pp.9042-9053. (10.1109/JIOT.2019.2926365)
- Nunes, M. et al. 2019. Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis. Journal of Information Security and Applications 48 102365. (10.1016/j.jisa.2019.102365)
- Williams, M. L. et al. 2019. Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior 40 (9), pp.1119-1131. (10.1080/01639625.2018.1461786)
- Adewole, K. , Saxena, N. and Bhadauria, S. 2019. Application of cryptocurrencies using Blockchain for e-commerce online payment. In: Maleh, Y. et al., Blockchain for Cybersecurity and Privacy: Architectures, Challenges and Applications. C&C Press, Taylor & Francis Group. , pp.263-306.
- Javed, A. , Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56 (3), pp.1133-1145. (10.1016/j.ipm.2018.02.003)
- Barati, M. et al. 2019. Privacy-aware cloud ecosystems and GDPR compliance. Presented at: 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud) 26-28 August 2019 Istanbul, Turkey. 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE. , pp.117. (10.1109/FiCloud.2019.00024)
- Saxena, N. et al. 2019. BAS-VAS: A novel secure protocol for value added service delivery to mobile devices. IEEE Transactions on Information Forensics and Security 15 , pp.1470-1485. (10.1109/TIFS.2019.2940908)
- Saxena, N. and Choi, B. J. 2018. Integrated distributed authentication protocol for smart grid communications. IEEE Systems Journal 12 (3), pp.2545-2556. (10.1109/JSYST.2016.2574699)
- Anthi, E. et al. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78 , pp.477-490. (10.1016/j.cose.2018.07.016)
- Rhode, M. , Burnap, P. and Jones, K. 2018. Early-stage malware prediction using recurrent neural networks. Computers and Security 77 , pp.578-594. (10.1016/j.cose.2018.05.010)
- Chaudhary, R. et al., 2018. LSCSH: Lattice-based secure cryptosystem for smart healthcare in smart cities environment. IEEE COMMUNICATIONS MAGAZINE 56 (4), pp.24-32. (10.1109/MCOM.2018.1700787)
- Saxena, N. , Grijalva, S. and Choi, B. J. 2018. Securing restricted publisher-subscriber communications in smart grid substations. Presented at: International Conference on COMmunication Systems and NETworkS (COMSNETS) Bengaluru, India 3-7 Jan. 2018. 2018 10th International Conference on Communication Systems & Networks (COMSNETS). IEEE. , pp.364-371. (10.1109/COMSNETS.2018.8328220)
- Burnap, P. et al. 2018. Malware classification using self organising feature maps and machine activity data. Computers and Security 73 , pp.399-410. (10.1016/j.cose.2017.11.016)
- Stone, J. A. , Saxena, N. and Dogan, H. 2018. Systematic analysis: Resistance to traffic analysis attacks in Tor System for critical infrastructures. Presented at: IEEE International Conference on System, Man, and Cybernetics (SMC) Miyazaki, Japan 7-10 Oct. 2018. 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE. , pp.2832-2837. (10.1109/SMC.2018.00482)
- Saxena, N. and Chaudhari, N. S. 2018. Secure algorithms for SAKA protocol in the GSM network. Presented at: 10th IFIP Wireless and Mobile Networking Conference (WMNC) Valencia, Spain 25-27 Sep. 2017. 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE. , pp.1-8. (10.1109/WMNC.2017.8248853)
- Saxena, N. et al. 2017. CPSA: A cyber-physical security assessment tool for situational awareness in smart grid. Presented at: ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) in Conjunction with ACM CCS Dallas, USA 3 Nov. 2017. CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. ACM. , pp.69-79. (10.1145/3140241.3140246)
- Thomas, L. et al. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. CIRED - Open Access Proceedings Journal 2017 (1), pp.2619-2623. (10.1049/oap-cired.2017.0987)
- Saxena, N. et al. 2017. Network Security and Privacy Challenges in Smart Vehicle-to-Grid. IEEE Wireless Communications 24 (4), pp.88-98. (10.1109/MWC.2016.1600039WC)
- Alsaedi, N. , Burnap, P. and Rana, O. 2017. Can we predict a riot? Disruptive event detection using Twitter. ACM Transactions on Internet Technology 17 (2) 18. (10.1145/2996183)
- Burnap, P. et al. 2017. Determining and sharing risk data in distributed interdependent systems. IEEE Computer 50 (4), pp.72-79. (10.1109/MC.2017.108)
- Williams, M. L. , Burnap, P. and Sloan, L. 2017. Crime sensing with big data: the affordances and limitations of using open-source communications to estimate crime patterns. British Journal of Criminology 57 (2), pp.320-340. (10.1093/bjc/azw031)
- Levi, M. et al. 2017. Cyberfraud and the implications for effective risk-based responses: themes from UK research. Crime, Law and Social Change 67 (1), pp.77-96. (10.1007/s10611-016-9648-0)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2017. Temporal TF-IDF: a high performance approach for event summarization in Twitter. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence Omaha, Nebraska, USA 13-16 October 2016. 2016 IEEE/WIC/ACM International Conference on Web Intelligence. IEEE. , pp.515-521. (10.1109/WI.2016.0087)
- Saxena, N. , Choi, B. J. and Grijalva, S. 2017. Secure and privacy-preserving concentration of meeting data in AMI networks. Presented at: IEEE International Conference on Communications (ICC) Paris, France 21-25 May 2017. 2017 IEEE International Conference on Communications (ICC). IEEE. , pp.1-7. (10.1109/ICC.2017.7996874)
- Shokri, R. , Theodorakopoulos, G. and Troncoso, C. 2016. Privacy games along location traces: a game-theoretic framework for optimizing location privacy. ACM Transactions on Privacy and Security 19 (4) 11. (10.1145/3009908)
- Eden, P. et al., 2016. Forensic readiness for SCADA/ICS incident response. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research Queen's University Belfast, Belfast, UK 23-25 August 2016.
- Saxena, N. and Choi, B. J. 2016. Authentication scheme for flexible charging and discharging of mobile vehicles in the V2G networks. IEEE Transactions on Information Forensics and Security 11 (7), pp.1438-1452. (10.1109/TIFS.2016.2532840)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2016. Automatic summarization of real world events using Twitter. Presented at: International AAAI Conference on Web and Social Media (ICWSM) Cologne, Germany 17-20 May 2016. Proceedings of the Tenth International AAAI Confe. AAAI. , pp.511-514.
- Williams, M. L. and Burnap, P. 2016. Cyberhate on social media in the aftermath of Woolwich: a case study in computational criminology and big data. British Journal of Criminology 56 (2), pp.211-238. (10.1093/bjc/azv059)
- Awan, M. S. K. , Burnap, P. and Rana, O. F. 2016. Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Computers and Security 57 , pp.31-46. (10.1016/j.cose.2015.11.003)
- Cherdantseva, Y. et al. 2016. A review of cyber security risk assessment methods for SCADA systems. Computers and Security 56 , pp.1-27. (10.1016/j.cose.2015.09.009)
- Williams, M. L. 2016. Guardians upon high: an application of routine activities theory to online identity theft in Europe at the country and individual level. British Journal of Criminology 56 (1), pp.21-48. (10.1093/bjc/azv011)
- Burnap, P. and Williams, M. L. 2016. Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science 5 11. (10.1140/epjds/s13688-016-0072-6)
- Galini, T. et al., 2016. On the inference of user paths from anonymized mobility data. Presented at: 1st IEEE European Symposium on Security and Privacy Saarbrücken, Germany 21-24 March 2016.
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2015. Identifying disruptive events from social media to enhance situational awareness. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) Paris, France 24-27 August 2015. ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM. , pp.934-941. (10.1145/2808797.2808879)
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7 (2), pp.223-242. (10.1002/poi3.85)
- Burnap, P. et al. 2015. Detecting tension in online communities with computational Twitter analysis. Technological Forecasting & Social Change 95 , pp.96-108. (10.1016/j.techfore.2013.04.013)
- Al Said, T. , Rana, O. F. and Burnap, P. 2015. VMInformant: an instrumented virtual machine to support trustworthy cloud computing. International Journal of High Performance Computing and Networking 8 (3), pp.222-234. IJHPCN080303. (10.1504/IJHPCN.2015.071257)
- Awan, M. S. K. et al. 2015. A classification framework for distinct cyber-attacks based on occurrence patterns. Presented at: The 9th International Conference on Security of Information and Networks Soch, Russia 8-10 September 2015. Proceedings of the 8th International Conference on Security of Information and Networks. ACM. , pp.165-168. (10.1145/2799979.2800037)
- Awan, M. S. K. et al. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC New York City, NY, USA 24-26 August 2015. High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE. , pp.1442-1447. (10.1109/HPCC-CSS-ICESS.2015.224)
- Awan, M. S. , Burnap, P. and Rana, O. F. 2015. Estimating risk boundaries for persistent and stealthy cyber-attacks. Presented at: 22nd ACM Conference on Computer and Communications Security Denver Colorado, USA 12-16 October 2015. SafeConfig '15 Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense. ACM. , pp.15-20. (10.1145/2809826.2809830)
- Awan, M. , Burnap, P. and Rana, O. F. 2015. An empirical risk management framework for monitoring network security. Presented at: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), Liverpool, UK 26-28 October 2015. Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on. IEEE. , pp.1764-1771. (10.1109/CIT/IUCC/DASC/PICOM.2015.266)
- Eden, P. et al., 2015. A cyber forensic taxonomy for SCADA systems in critical infrastructure. Presented at: The 10th International Conference on Critical Information Infrastructures Security 2015 (CRITIS 2015) Berlin, Germany 5-7 October 2015.
- Eden, P. et al., 2015. A forensic taxonomy of SCADA systems and approach to incident response. Presented at: The 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015) Ingolstadt, Germany 17 - 18 September 2015. (10.14236/ewic/ICS2015.5)
- Rahulamathavan, Y. et al., 2015. Assessing data breach risk in cloud systems. Presented at: 7th International Conference on Cloud Computing Technology and Science (CloudCom) Vancouver, BC, Canada 30 Nov-3 Dec 2015. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE. , pp.363-370. (10.1109/CloudCom.2015.58)
- Theodorakopoulos, G. 2015. The same-origin attack against location privacy. Presented at: 22nd ACM Conference on Computer and Communications Security Denver, Colorado, USA 12-126 October 2015. Published in: Ray, I. , Hopper, N. and Jansen, R. eds. WPES '15 Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society. ACM. , pp.49-53. (10.1145/2808138.2808150)
- Williams, M. L. and Levi, M. 2015. Perceptions of the eCrime controllers: modelling the influence of cooperation and data source factors. Security Journal 28 (3), pp.252-271. (10.1057/sj.2012.47)
- Burnap, P. et al. 2014. Towards real-time probabilistic risk assessment by sensing disruptive events from streamed news feeds. Presented at: 8th IEEE International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014) Birmingham City University, Birmingham, UK. 2-4 July 2014. , pp.-.
- Shokri, R. et al., 2014. Hiding in the mobile crowd: location privacy through collaboration. IEEE Transactions on Dependable and Secure Computing 11 (3), pp.266-279. (10.1109/TDSC.2013.57)
- Burnap, P. et al. 2014. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4 206. (10.1007/s13278-014-0206-4)
- Rahulamathavan, Y. et al., 2014. Analysing security requirements in cloud-based service level agreements. Presented at: SIN '14 The 7th International Conference on Security of Information and Networks Glasgow 9 - 11 September 2014. Proceedings of the 7th International Conference on Security of Information and Networks. New York, NY: ACM. , pp.73-77. (10.1145/2659651.2659735)
- Levi, M. and Williams, M. L. 2013. Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space. Information Management & Computer Security 21 (5), pp.420-443. (10.1108/IMCS-04-2013-0027)
- Theodorakopoulos, G. , Le Boudec, J. Y. and Baras, J. S. 2013. Selfish response to epidemic propagation. IEEE Transactions on Automatic Control 58 (2), pp.363-376. (10.1109/TAC.2012.2209949)
- Williams, M. L. et al. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing and Society 23 (4), pp.461-481. (10.1080/10439463.2013.780225)
- Burnap, P. et al. 2012. Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information. Presented at: 2012 International Conference on Collaboration Technologies and Systems (CTS) Denver, CO, USA 21-25 May 2012. Published in: Smari, W. W. and Charles, F. eds. 2012 International Conference on Collaboration Technologies and Systems (CTS). Vol. 14.Los Alamitos, CA: IEEE. , pp.490-497. (10.1109/CTS.2012.6261095)
- Shokri, R. et al., 2012. Protecting location privacy: Optimal strategy against localization attacks. Presented at: 19th ACM Conference on Computer and Communications Security (CCS 2012) Raleigh, NC, USA 16-18 October 2012. Published in: Yu, T. , Danezis, G. and Gligor, V. D. eds. Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. ACM 2012. New York, NY: ACM. , pp.617-627. (10.1145/2382196.2382261)
- Shokri, R. et al., 2011. Quantifying location privacy. Presented at: 2011 IEEE Symposium on Security and Privacy (SP) Berkeley, CA, USA 22-25 May 2011. Published in: O’Conner, L. ed. Proceedings of the 2011 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA: IEEE. , pp.247-262. (10.1109/SP.2011.18)
- Burnap, P. and Hilton, J. C. 2009. Self protecting data for de-perimeterised information sharing. Presented at: Third International Conference on Digital Society ICDS '09 Cancun, Mexico 1-7 February 2009. Digital Society, 2009. ICDS '09. Third International Conference on. IEEE. , pp.65-70. (10.1109/ICDS.2009.41)
- Theodorakopoulos, G. and Baras, J. 2008. Game theoretic modeling of malicious users in collaborative networks. IEEE Journal on Selected Areas in Communications 26 (7), pp.1317-1327. (10.1109/JSAC.2008.080928)
- Theodorakopoulos, G. 2007. Robust network trust establishment for collaborative applications and protocols. PhD Thesis , University of Maryland, College Park.
- Theodorakopoulos, G. and Baras, J. S. 2006. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24 (2), pp.318-328. (10.1109/JSAC.2005.861390)
- Theodorakopoulos, G. and Baras, J. S. 2004. Trust evaluation in ad-hoc networks. Presented at: WiSe '04:3rd ACM workshop on Wireless security 1 October 2004Published in: Jakobsson, M. and Perrig, A. eds. WiSe '04 Proceedings of the 3rd ACM workshop on Wireless security. New York, NY: ACM. , pp.1-10. (10.1145/1023646.1023648)