This list is to be updated to reflect more recent publications selected by members of the Group. To see a full list of publications of the Group, visit its members’ personal web pages.
2021
- Becker, I.; Posner, R.; Isman, T.; Ekblom, P.; Borrion, H.; McGuire, M.; Li, S. (2021) “Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation”, in Proceedings of 54th Hawaii International Conference on System Sciences (HICSS 2021), pp. 5347-5356. (Best Paper Award of Location Intelligence Invited Track).
2020
- Bhattacherjee, S. & Sarkar, P. (2020), “Weighted Voting Procedure having a Unique Blocker“. International Journal of Game Theory.
- Knight, R. & Nurse, J. R. C. (2020), “A framework for effective corporate communication after cyber security incidents.” Computers & Security 99.
- Pérez-Delgado, C. A. & Perez-Gonzalez, H. G. (2020), “Towards a quantum software modeling language”. In IEEE/ACM 42nd International Conference on Software Engineering Workshops (ICSEW’20), pp. 442-444.
- Yuan, H.; Li, S. & Rusconi, P. (2020) “Cognitive Modeling for Automated Human Performance Evaluation at Scale“, Springer, ISBN 978-3-030-45704-4.
2019
- Hull, G.; John, H.; Arief, B. (2019), Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses, Crime Science 8(2).
- Kafalı, Ö.; Ajmeri, N. & Singh, M. (2019), “Desen: Specification of Sociotechnical Systems via Patterns of Regulation and Control”. ACM Transactions on Software Engineering and Methodology, 29 (Article 7).
- Li, C.; Feng, B.; Li, S.; Kurths, J. & Chen, G. (2019), “Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks,” IEEE Transactions on Circuits and Systems I: Regular Papers 66(6), pp. 2322-2335.
- Liu, X.; Li, Y.; Deng, R. H.; Chang, B & Li, S. (2019), “When Human Cognitive Modeling Meets PINs: User-Independent Inter-Keystroke Timing Attacks,” Computers & Security 80, pp. 90-107.
- Williams, M.; Nurse, J. R. C. & Creese, S. (2019), “Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study.” Computers in Human Behavior 99, pp. 38-54.
- Zhao, L.; Pérez-Delgado, C. A.; Benjamin, S. C. & Fitzsimons, J. F. (2019), “Measurement-driven analog of adiabatic quantum computation for frustration-free hamiltonians”. Physical Review A 100(3).
2017
- Agrawal, S.; Bhattacherjee, S.; Phan, D. H.; Stehlé, D.; Yamada, S (2017), “Efficient Public Trace and Revoke from Standard Assumptions”. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2277-2293.
- Ali, M. A.; Arief, B.; Emms, M.; van Moorsel, A. (2017), “Does The Online Card Payment Landscape Unwittingly Facilitate Fraud?”. IEEE Security & Privacy 15(2), pp. 78-86.
- Kafalı, Ö.; Ajmeri, N. & Singh, M. (2017), “Kont: Computing tradeoffs in normative multiagent systems“. 31st Conference on Artificial Intelligence (AAAI), pp. 3006-3012.
- Kafalı, Ö.; Jones, J.; Petruso, M.; Williams, L. & Singh, M. (2017), “How Good is a Security Policy against Real Breaches? A HIPAA Case Study”. 39th International Conference on Software Engineering (ICSE), IEEE, pp. 530-540.
- Osadchy, M.; Hernandez-Castro, J.; Gibson, S.; Dunkelman, O. & Pérez-Cabo, D. (2017). “No bot expects the DeepCAPTCHA! Introducing immutable adversarial examples, with applications to CAPTCHA generation”. IEEE Transactions on Information Forensics and Security, 12(11), pp.2640-2653.
- Wazan, A. S.; Laborde, R.; Chadwick, D. W.; Barrere, F.; Benzekri, A.; Habbal, A. M. M.; Kaiiali, M. (2017), “Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker”. Security and Communication Networks”, (690714). pp. 1-23.
2016
- Bhattacherjee, S. & Sarkar, P. (2016), “Reducing Communication Overhead of the Subset Difference Scheme”. IEEE Transactions on Computers, 65(8), pp. 2575-2587.
- Rashid, T.; Agrafiotis, I. & Nurse, J. R. C. (2016), “A new take on detecting insider threats: exploring the use of hidden markov models.” In Proceedings of the 8th ACM CCS international workshop on managing insider security threats, pp. 47-56.
- Zhao, L.; Pérez-Delgado, C. A. & Fitzsimons, J. F. (2016), “Fast graph operations in quantum computation”. Physical Review A 93(3). Article Number 32314.
2015
- Asghar, H. J.; Steinfeld, R.; Li, S.; Kaafar, M. A. & Pieprzyk, J. (2015). “On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices,”. In IEEE Transactions on Information Forensics and Security 10(8), pp. 1643-1655.
- Bhattacherjee S.; Sarkar P. (2015), “Tree Based Symmetric Key Broadcast Encryption“, Journal of Discrete Algorithms 34, pp.78-107.
- Cámara, J.; de Lemos, R.; Laranjeiro, N.; Ventura, R.; Vieira, M. (2015), “Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems”. IEEE Transactions on Dependable and Secure Computing 14(1).
- Pawar, P.; Sajjad, A.; Chadwick, D. W. & Dimitrakos, T. (2015), “Security-as-a-Service in Multi-cloud and Federated Cloud Environments”. In: Trust Management IX. IFIP Advances in Information and Communication Technology, pp. 251-261.
- Pérez-Delgado, C. A. & Fitzsimons, J. F. (2015), “Iterated gate teleportation and blind quantum computation”. Physical Review Letters: Moving Physics Forward 114 (22), p. 220502.
- Yu, Y.; Franqueira, V. N. L.; Tun, T. T.; Wieringa, R. J.; Nuseibeh, B. (2015), “Automated Analysis of Security Requirements through Risk-based Argumentation”. Journal of Systems and Software 106, pp. 102-116.
2014
- Bailey, C.; Chadwick, D. W.; de Lemos, R. (2014), “Self-adaptive federated authorization infrastructures”. Journal of Computer and System Sciences, 80(5), pp. 935-952.
- Bhattacherjee, S. & Sarkar, P. (2014), “Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme”. IEEE Transactions on Computers 63(7), pp. 1709-1722.
- Chadwick, D. W.; Siu, K.; Lee, C.; Fouillat, Y.; Germonville, D. (2014), “Adding Federated Identity Management to OpenStack”. Journal of Grid Computing 12(1), pp. 3-27.
- Emms, M.; Arief, B.; Freitas, L.; Hannon, J.; van Moorsel, A. (2014), “Harvesting high value foreign currency transactions from EMV contactless credit cards without the PIN”. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS’14), pp. 716-726.
- Nurse, J. R. C.; Buckley, O.; Legg, P. A.; Goldsmith, M.; Creese, S.; Wright, G. R. T. & Whitty, M. (2014), “Understanding insider threat: A framework for characterising attacks.” In 2014 IEEE Security and Privacy Workshops, pp. 214-228.
- Yu, L.; Pérez-Delgado, C. A. & Fitzsimons, J. F. (2014), “Limitations on information-theoretically-secure quantum homomorphic encryption”. Physical Review A, 90 (5). Article Number 50303.