This page lists selected research publications and technical reports authored by academic staff of the Group, since 2012 when the Group founded KirCCS (Kent Interdisciplinary Research Centre in Cyber Security), which evolved into the current iCSS (Institute of Cyber Security for Society) in 2021. To see a full list of publications of each member, visit their personal web pages.
For current members of the Group, all their relevant papers are considered including those they published before joining the University of Kent. For former members, only relevant papers they published with the University of Kent as an/the affiliation are considered.
The names in boldface are former and current members of the Group.
In press
- Connolly, L.; Borrion, H.; Arief, B. (2025) Ransomware Crime through the Lens of Neutralisation Theory. Accepted to European Journal of Criminology.
- Dong, X.; Li, J.; Li, S.; You, Z.; Qu, Q.; Kholodov, Y. & Shen, Y. (2025) Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks. Accepted to IEEE Transactions on Dependable and Secure Computing.
- Siqueira, B. R.; Ferrari, F. C. & de Lemos, R. (2025) An Extended Study of the Performance of Flexible Controllers Composed of Micro-controllers. Accepted to ACM Transactions on Autonomous and Adaptive Systems.
- Tang, P.; Zhu, X.; Qiu, W.; Huang, Z.; Mu, Z. & Li, S. (2025) FLAD: Byzantine-robust Federated Learning Based on Gradient Feature Anomaly Detection. Accepted to IEEE Transactions on Dependable and Secure Computing.
- Wang, Y.; Arief, B. & Hernandez-Castro, J. (2025) Secure in the Dark? An In-Depth Analysis of Dark Web Markets Security. Accepted to International Journal of Information Security.
- Wang, Y.; Qiu, W.; Zhang, W.; Tian, H. & Li, S. (2025) SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking. Accepted to IEEE Transactions on Dependable and Secure Computing.
- Sugiura, L.; Button, M.; Nurse, J. R. C.; Tapley, J.; Belen-Saglam, R.; Hawkins, C.; Frederick, B. & Blackbourn, D. (2024) The Technification of Domestic Abuse: Methods, Tools, and Criminal Justice Responses. Accepted to Criminology & Criminal Justice.
2025
- Niu, Y.; Qiu, W.; Tang, P.; Wang, L.; Chen, S.; Li, S.; Kökciyan, N. & Niu, B. (2025) Everyone’s Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors. Proceedings of the ACM on Human-Computer Interaction (PACMHCI), 9(2):CSCW069, to be presented at CSCW 2025.
- You, Z.; Dong, X.; Li, S.; Liu, X.; Ma, S. & Shen, Y. (2025) Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy. IEEE Transactions on Information Forensics and Security, 20:1519-1534.
2024
- Altuncu, E.; Franqueira, V. N. L. & Li, S. (2024) Deepfake: Definitions, Performance Metrics and Standards, Datasets, and a Meta-Review. Frontiers in Big Data, 7:1400024.
- Çetin, O.; Ekmekcioglu, E.; Arief, B. & Hernandez-Castro, J. (2024) An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection. Journal of Universal Computer Science, 30(9):1163-1183.
- Chu, K.-F.; Yuan, H.; Yuan, J.; Guo, W.; Balta-Ozkan, N. & Li, S. (2024) A Survey of AI-Related Cyber Security Risks and Countermeasures in Mobility-as-a-Service. IEEE Intelligent Transportation Systems Magazine, 16(6):37-55.
- Bhudia, A.; O’Keeffe, D. & Hurley-Smith, D. (2024) Revoke: Mitigating Ransomware Attacks Against Ethereum Validators. Computer Security – ESORICS 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16–20, 2024, Proceedings, Part IV, pp. 333–353.
- Faizan Ali, R. & Dominic, P. D. D. (2024) Investigation of information security policy violations among oil and gas employees: A security-related stress and avoidance coping perspective. Journal of Information Science, 50(1):254-272.
- Faizan Ali, R.; Dominic, P. D. D.; Hina, S. & Naseer, S. (2024) Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees. International Journal of Information Security, 23(2):1197-1213.
- Liang, Z.; Guo, J.; Qiu, W.; Huang, Z. & Li, S. (2024) When Graph Convolution Meets Double Attention: Online Privacy Disclosure Detection with Multi-Label Text Classification. Data Mining and Knowledge Discovery, 38:1171-1192, presented at ECML-PKDD 2024.
- Lin, R.; Liu, S.; Jiang, J.; Li, S.; Li, C. & Kuo, C.-C. J. (2024) Recovering sign bits of DCT coefficients in digital images as an optimization problem. Journal of Visual Communication and Image Representation, 98:104045.
- Mott, G.; Turner, S.; Nurse, J. R. C.; Pattnaik, N.; MacColl, J.; Huesch, P. & Sullivan, J. (2024) “There was a bit of PTSD every time I walked through the office door”: Ransomware harms and the factors that influence the victim organisation’s experience. Journal of Cybersecurity, 10(1):tyae013.
- Patterson, C. M.; Nurse, J. R. & Franqueira, V. N. (2024) “I don’t think we’re there yet”: The practices and challenges of organisational learning from cyber security incidents. Computers & Security, 139:103699.
- Pattnaik, N.; Li, S. & Nurse, J. R. C. (2024) Security and privacy perspectives of people living in shared home environments. Proceedings of the ACM on Human-Computer Interaction (PACMHCI), 8(CSCW2):368, presented at CSCW 2024.
- Wang, Y.; Arief, B.; & Hernandez-Castro, J. C. (2024) Analysis of Security Mechanisms of Dark Web Markets. Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference (EICC 2024), pp. 120-127.
- Yilmaz, Y.; Cetin, O.; Ozturk, O. S.; Ekmekcioglu, E.; Arief, B. & Hernandez-Castro, J. C. (2024) Assessing the Silent Frontlines: Exploring the Impact of DDoS Hacktivism in the Russo-Ukrainian War. Proceedings of the 40th Annual Computer Security Applications Conference (ACSAC 2024).
2023
- Belen-Sağlam, R.; Altuncu, E.; Lu, Y. & Li, S. (2023) A Systematic Literature Review of the Tension between the GDPR and Public Blockchain Systems. Blockchain: Research and Applications, 4(2):100129, 2023.
- Belen Sağlam, R.; Miller, V. & Franqueira, V. N. L. (2023) A Systematic Literature Review on Cyber Security Education for Children. IEEE Transactions on Education, 66(3):274-266.
- Delgado-Santos, P.; Tolosana, R.; Guest, R.; Deravi, F. & Vera-Rodriguez, R. (2023) Exploring transformers for behavioural biometrics: A case study in gait recognition. Pattern Recognition, 143:109798.
- Hasan, M. R.; Guest, R. & Deravi, F. (2023) Presentation-level Privacy Protection Techniques for Automated Face Recognition—A Survey. ACM Computing Surveys, 55(13s):286.
- Mohd Kassim, S. R. B.; Li, S. & Arief, B. (2023) Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions. Digital Threats: Research and Practice, 4(3):45, ACM.
- Mott, G.; Turner, S.; Nurse, J. R. C.; MacColl, J.; Sullivan, J.; Cartwright, A. & Cartwright, E. (2023) Between a rock and a hard(ening) place: Cyber insurance in the ransomware era. Computers & Security, 128:103162.
- Knott, J.; Yuan, H.; Boakes, M. & Li, S. (2023) Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data. Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing (SAC 2023), pp. 1603-1606.
- Ozturk, O.S.; Ekmekcioglu, E.; Cetin, O.; Arief, B.; & Hernandez-Castro, J. C. (2023) New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference (EICC 2023), pp. 13-18.
- Parker, S.; Yuan, H. & Li, S. (2023) PassViz: A Visualisation System for Analysing Leaked Passwords. Proceedings of the 2023 20th IEEE Symposium on Visualization for Cyber Security (VizSec 2023), pp. 33-42.
- Patterson, C. M.; Nurse, J. R. C. & Franqueira, V. N. L. (2023) Learning from cyber security incidents: A systematic review and future research agenda. Computers & Security, 132:103309.
- Pattnaik, N.; Li, S. & Nurse, J. R. C. (2023) A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. ACM Computing Surveys, 55(9):180.
- Pattnaik, N.; Li, S. & Nurse, J. R. C. (2023) Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on Twitter. Computers & Security, 125:103008.
- Sunde, N. & Franqueira, V. N. L. (2023) Adding transparency to uncertainty: An argument-based method for evaluative opinions. Forensic Science International: Digital Investigation, 47:301657.
- Wang, Y.; Arief, B.; & Hernandez-Castro, J. (2023) Dark Ending: What Happens When A Dark Web Market Closes Down. Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP 2023), pp. 106-117. (Best Student Paper Award)
- Yilmaz, Y.; Çetin, O.; Grigore, C.; Arief, B.; & Hernandez-Castro, J. C. (2023) Personality Types and Ransomware Victimisation. Digital Threats: Research and Practice, 4(4):53, ACM.
- Yuan, X.; Guo, J.; Qiu, W.; Huang, Z. & Li, S. (2023) Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation. Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing (EMNLP 2023), pp. 4268-4280.
2022
- Belen Sağlam, R.; Nurse, J. R. C. & Hodges, D. (2022) Personal Information: Perceptions, Types and Evolution. Journal of Information Security and Applications, 66:103163.
- Delgado-Santos, P.; Stragapede, G.; Tolosana, R.; Guest, R.; Deravi, F. & Vera-Rodriguez. R. (2022) A Survey of Privacy Vulnerabilities of Mobile Device Sensors. ACM Computing Surveys, 54(11s):224.
- Erola, A.; Agrafiotis, I.; Nurse, J. R. C.; Axon, L.; Goldsmith, M. & Creese, S. (2022) A system to calculate Cyber Value-at-Risk. Computers & Security, 113:102545.
- Hurley-Smith, D.; Patsakis, C. & Hernandez-Castro, J. (2022) On the Unbearable Lightness of FIPS 140–2 Randomness Tests. IEEE Transactions on Information Forensics and Security, 17:3946-3958.
- Jones, K.; Nurse, J. R. C. & Li, S. (2022) Out of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests. Proceedings of the 2022 16th AAAI International Conference on Web and Social Media (ICWSM 2022), pp. 417-428.
- Jones, K.; Nurse, J. R. C. & Li, S. (2022) Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators. Proceedings of the 2022 16th AAAI International Conference on Web and Social Media (ICWSM 2022), pp. 429-440.
- Lu, Y. & Li, S. (2022) From Data Flows to Privacy-Benefit Trade-offs: A User-Centric Semantic Model. Security and Privacy, 5(4):e225.
- Luengo, E. A.; Cerna, M. L.; Villalba, L. J. G.; Hurley-Smith, D. & Hernandez-Castro, J. (2022) Sensitivity and uniformity in statistical randomness tests. Journal of Information Security and Applications, 70:103322.
- Raza, A.; Tran, K. P.; Koehl, L. & Li, S. (2022) Designing ECG monitoring healthcare system with federated transfer learning and explainable AI. Knowledge-Based Systems, 236:107763.
- Turner, S.; Pattnaik, N.; Nurse, J. R. C. & Li, S. (2022) “You just assume it is in there, I guess”: Understanding UK families’ application and knowledge of smart home cyber security. Proceedings of the ACM on Human-Computer Interaction (PACMHCI), 6(CSCW2):269, presented at CSCW 2022.
- Waldock, K. E.; Miller, V.; Li, S. & Franqueira, V. N. L. (2022) Pre-University Cyber Security Education: A report on developing cyber skills amongst children and young people. Technical report for GFCE (Global Forum on Cyber Expertise), 159 pages.
- Xu, Y.; Guo, J.; Qiu, W.; Huang, Z.; Altuncu, E. & Li, S. (2022) “Comments Matter and The More The Better!”: Improving Rumor Detection with User Comments. Proceedings of the 2022 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022), pp. 383-390.
2021
- Ali, S. E. A.; Lai, F. W.; Dominic, P. D. D.; Brown, N. J.; Lowry, P. B. B. & Faizan Ali, R. (2021) Stock market reactions to favorable and unfavorable information security events: A systematic literature review. Computers & Security, 110:102451.
- Becker, I.; Posner, R.; Isman, T.; Ekblom, P.; Borrion, H.; McGuire, M. & Li, S. (2021) Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation. Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS 2021), pp. 5347-5356. (Best Paper Award of Location Intelligence Invited Track)
- Bichhawat, A.; Rajani, V.; Garg, D. & Hammer, C. (2021) Permissive runtime information flow control in the presence of exceptions. Journal of Computer Security, 29(4):361-401.
- Bhattacherjee, S. & Sarkar, P. (2021) Weighted Voting Procedure having a Unique Blocker. International Journal of Game Theory, 50:279-295.
- Filiz, B.; Arief, B.; Cetin, O. & Hernandez-Castro, J. C. (2021) On the Effectiveness of Ransomware Decryption Tools. Computers & Security, 11:102469.
- Ioannou, A; Tussyadiah, I; Miller, G; Li, S. & Weick, M. (2021) Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis. PLoS ONE, 16(8):e0256822.
- Lallie, H. S.; Shepherd, L. A.; Nurse, J. R. C.; Erola, A.; Epiphaniou, G.; Maple, C. & Bellekens, X. (2021) Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105:102248.
- Nurse, J. R. C.; Adamos, K.; Grammatopoulos, A. & Di Franco, F. (2021) Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education. Technical report for ENISA (European Union Agency for Cybersecurity), 73 pages.
- Pina, A.; Storey, J. E.; Duggan, M. & Franqueira, V. N. L. (2021) Technology-Facilitated Intimate Partner Violence: A multidisciplinary examination of prevalence, methods used by perpetrators and the impact of COVID-19. Technical report for Home Office, 159 pages (+ appendixes of 35 pages).
- Rajani, V.; Gaboardi, M.; Garg, D. & Hoffmann, J. (2021) A Unifying Type-Theory for Higher-Order (Amortized) Cost Analysis. Proceedings of the ACM on Programming Languages, 5(POPL):27.
- Stevens, F.; Nurse, J. R. C. & Arief, B. (2020) Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review. Cyberpsychology, Behavior, and Social Networking, 24(6):367-376.
- Sugiura, L.; Blackbourn, D.; Button, M.; Hawkins, C.; Tapley, J.; Frederick, B.; Nurse, J. R. C. & Belen Sağlam, R. (2021) Computer misuse as a facilitator of Domestic Abuse. Technical report for Home Office, 127 pages.
- Uchendu, B.; Nurse, J. R. C.; Bada, M. & Furnell, S. (2021) Developing a cyber security culture: Current practices and future needs. Computers & Security, 109:102387.
- Wang, Y.; Arief, B.; & Hernandez-Castro, J. (2021) Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets. Proceedings of the 2021 APWG Symposium on Electronic Crime Research (eCrime 2021).
- Yilmaz, Y.; Cetin, O.; Arief, B. & Hernandez-Castro, J. C. (2021) Investigating the Impact of Ransomware Splash Screens. Journal of Information Security and Applications, 61:102934.
- Yuan, H.; Li, S. & Rusconi, P. (2021) CogTool+: Modeling Human Performance at Large Scale. ACM Transactions on Computer-Human Interaction, 28(2):7.
2020
- Axon, L.; Alahmadi, B.; Nurse, J. R. C.; Goldsmith, M. & Creese, S. (2020) Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice. Journal of Cybersecurity, 6(1):tyaa004.
- Belen Sağlam, R.; Aslan, Ç. B.; Li, S.; Dickson, L. & Pogrebna, G. (2020) A Data-Driven Analysis of Blockchain Systems’ Public Online Communications on GDPR. Proceedings of 2020 IEEE International Conference on Decentralized Applications and Infrastructures (IEEE DAPPS 2020), pp. 22-31.
- Bhattacherjee, S. & Sarkar, P. (2020) Weighted Voting Procedure having a Unique Blocker. International Journal of Game Theory, 50:279-295.
- Brierley, C.; Pont, J.; Arief, B.; Barnes, D.J.; & Hernandez-Castro, J. C. (2020) PaperW8: an IoT bricking ransomware proof of concept. Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020), Article 82.
- Diaz, M.; Ferrer, M. A.; Ramalingam, S. & Guest, R. (2020) Investigating the Common Authorship of Signatures by Off-Line Automatic Signature Verification Without the Use of Reference Signatures. IEEE Transactions on Information Forensics and Security, 15:487-499.
- Ellavarason, E.; Guest, R.; Deravi, F.; Sanchez-Riello, R. & Corsetti, B. (2020) Touch-dynamics based Behavioural Biometrics on Mobile Devices – A Review from a Usability and Performance Perspective. ACM Computing Surveys, 53(6):120.
- Franqueira, V. N. & Horsman, G. (2020) Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice. Forensic Science International: Digital Investigation, 32(Supplement):300923, presented at DFRWS EU 2020. (Best Paper Award)
- Hernández-Castro, C. J.; Li, S. & R-Moreno, M. D. (2020) All About Uncertainties and Traps: Statistical Oracle-based Attacks on a New CAPTCHA Protection Against Oracle Attacks. Computers & Security, 92:101758.
- Hurley-Smith, D. & Hernandez-Castro, J. (2020) Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators. ACM Transactions on Privacy and Security, 23(3):16.
- Jones, K.; Nurse, J. R. C. & Li, S. (2020) Behind the Mask: A Computational Study of Anonymous’ Presence on Twitter. Proceedings of 14th International Conference on Web and Social Media (ICWSM 2020), pp. 327-338. (One of eight Honorable Mentions as candidates for Best Paper Award)
- Knight, R. & Nurse, J. R. C. (2020) A framework for effective corporate communication after cyber security incidents. Computers & Security, 99:102036.
- Pérez-Delgado, C. A. & Perez-Gonzalez, H. G. (2020) Towards a quantum software modeling language. Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops (ICSEW 2020), pp. 442-444.
- Pont, J.; Arief, B.; & Hernandez-Castro, J. C. (2020) Why Current Statistical Approaches to Ransomware Detection Fail. Information Security: 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings, pp. 199-216.
- Rajani, V. & Garg, D. (2020) On the expressiveness and semantics of information flow types. Journal of Computer Security, 28(1):129-156.
- Yuan, H.; Li, S. & Rusconi, P. (2020) Cognitive Modeling for Automated Human Performance Evaluation at Scale (book). Springer, ISBN 978-3-030-45704-4.
2019
- Akinrolabu, O.; Nurse, J. R. C.; Martin, A.; & New, S. (2019) Cyber risk assessment in cloud provider environments: Current models and future needs. Computers & Security, 87:101600.
- Blanco-Gonzalo, R.; Miguel-Hurtado, O.; Lunerti, C.; Guest, R. M.; Corsetti, B. & Ellavarason, E. (2019) Biometric Systems Interaction Assessment: The State of the Art. IEEE Transactions on Human-Machine Systems, 49(5):397-410.
- Boakes, M.; Guest, R.; Deravi, F. & Corsetti, B. (2019) Exploring Mobile Biometric Performance Through Identification of Core Factors and Relationships. IEEE Transactions on Biometrics, Behavior, and Identity Science, 1(4):278-291.
- Buckley, O. & Nurse, J. R. C. (2019) The language of biometrics: Analysing public perceptions. Journal of Information Security and Applications, 47:112-119.
- Hariri, A.; Giannelos, N.; & Arief, B. (2019) Selective Forwarding Attack on IoT Home Security Kits. Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers, pp. 360-373.
- Hull, G.; John, H. & Arief, B. (2019) Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses. Crime Science, 8:2.
- Hurley-Smith, D. & Hernandez-Castro, J. (2018) Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. IEEE Transactions on Information Forensics and Security, 13(4):1031-1041.
- Kafalı, Ö.; Ajmeri, N. & Singh, M. P. (2019) DESEN: Specification of Sociotechnical Systems via Patterns of Regulation and Control. ACM Transactions on Software Engineering and Methodology, 29(1):7.
- Li, C.; Feng, B.; Li, S.; Kurths, J. & Chen, G. (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers 66(6):2322-2335. (2022 IEEE Transactions on Circuits and Systems Guillemin-Cauer Best Paper Award)
- Liu, X.; Li, Y.; Deng, R. H.; Chang, B & Li, S. (2019) When Human Cognitive Modeling Meets PINs: User-Independent Inter-Keystroke Timing Attacks. Computers & Security, 80:90-107.
- Mutawa, N. A.; Bryce, J.; Franqueira, V. N.; Marrington, A. & Read, J. C. (2019) Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes. Digital Investigation, 28:70-82.
- Vassena, M.; Russo, A.; Garg, D.; Rajani, V. & Stefan, D. (2019) From Fine- to Coarse-Grained Dynamic Information Flow Control and Back. Proceedings of the ACM on Programming Languages, 3(POPL):76.
- Williams, M.; Nurse, J. R. C. & Creese, S. (2019) (Smart)Watch Out! encouraging privacy-protective behavior through interactive games. International Journal of Human-Computer Studies, 132:127-137.
- Williams, M.; Nurse, J. R. C. & Creese, S. (2019) Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. Computers in Human Behavior, 99:38-54.
- Yanushkevich, S. N.; Sundberg, K. W.; Twyman, N. W.; Guest, R. M. & Shmerko, V. P. (2019) Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening. Computers & Security, 85:372-385.
- Zhao, L.; Pérez-Delgado, C. A.; Benjamin, S. C. & Fitzsimons, J. F. (2019) Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians. Physical Review A, 100(3):032331.
2018
- Agrafiotis, I.; Nurse, J. R. C.; Goldsmith, M.; Creese, S. & Upton, D. (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, 4(1):tyy006.
- Ali, A.; Hoque, S. & Deravi, F. (2018) Gaze stability for liveness detection. Pattern Analysis and Applications, 21:437-449.
- Bailey, C. & de Lemos, R. (2018) Evaluating Self-Adaptive Authorisation Infrastructures through Gamification. Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2018), pp. 502-513.
- Blanco-Gonzalo R.; Lunerti C.; Sanchez-Reillo R. & Guest R. (2018) Biometrics: Accessibility challenge or opportunity? PLoS ONE, 13(4):e0196372.
- Franqueira, V. N. L.; Bryce, J.; Mutawa, N. A. & Marrington, A. (2018) Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches. Digital Investigation, 24:95-10.
- Giasemidis, G.; Kaplis, N.; Agrafiotis, I. & Nurse, J. R. C. (2018) A Semi-Supervised Approach to Message Stance Classification. IEEE Transactions on Knowledge and Data Engineering, 32(1):1-11.
- McBride, J.; Arief, B.; & Hernandez-Castro, J. (2018) Security Analysis of Contiki IoT Operating System. Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks (EWSN 2018), pp. 278-283.
- Rajani, V. & Garg, D. (2018) Types for Information Flow Control: Labeling Granularity and Semantic Models. Proceedings of the 2018 IEEE 31st Computer Security Foundations Symposium (CSF 2018), pp. 233-246.
- Yang, S.; Deravi, F. & Hoque, S. (2018) Task sensitivity in EEG biometric recognition. Pattern Analysis and Applications, 21:105-117.
2017
- Agrawal, S.; Bhattacherjee, S.; Phan, D. H.; Stehlé, D. & Yamada, S (2017) Efficient Public Trace and Revoke from Standard Assumptions. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), pp. 2277-2293.
- Ali, M. A.; Arief, B.; Emms, M. & van Moorsel, A. (2017) Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Security & Privacy, 15(2):78-86.
- Bichhawat, A.; Rajani, V.; Jain, J.; Garg, D. & Hammer, C. (2017) WebPol: Fine-Grained Information Flow Policies for Web Browsers. Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I, pp. 242-259.
- Cámara, J.; de Lemos, R.; Laranjeiro, N.; Ventura, R. & Vieira, M. (2017) Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems. IEEE Transactions on Dependable and Secure Computing, 14(1):50-64.
- Hurley-Smith, D.; Wetherall, J. & Adekunle, A. (2017) SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks. IEEE Transactions on Mobile Computing, 16(10):2927-2940.
- Kafalı, Ö.; Ajmeri, N. & Singh, M. (2017) Kont: Computing Tradeoffs in Normative Multiagent Systems. Proceedings of the Conference on Artificial Intelligence, 31(1):3006-3012, presented at AAAI 2017.
- Kafalı, Ö.; Jones, J.; Petruso, M.; Williams, L. & Singh, M. (2017) How Good is a Security Policy against Real Breaches? A HIPAA Case Study Proceedings of the 39th International Conference on Software Engineering (ICSE 2017), pp. 530-540.
- Nurse, J. R. C.; Creese, S. & De Roure, D. (2017) Security risk assessment in Internet of Things systems. IEEE IT Professional, 19(5):20-26.
- Osadchy, M.; Hernandez-Castro, J.; Gibson, S.; Dunkelman, O. & Pérez-Cabo, D. (2017) No bot expects the DeepCAPTCHA! Introducing immutable adversarial examples, with applications to CAPTCHA generation. IEEE Transactions on Information Forensics and Security, 12(11):2640-2653.
- Robertson, J. J.; Guest, R. M.; Elliott, S. J. & O’Connor, K. (2017) A Framework for Biometric and Interaction Performance Assessment of Automated Border Control Processes. IEEE Transactions on Human-Machine Systems, 47(6):983-993.
- Tolosana, R.; Vera-Rodriguez, R.; Guest, R.; Fierrez, J. & Ortega-Garcia, J. (2017) Complexity-Based Biometric Signature Verification. Proceedings of the 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR 2017), pp. 195-200.
- Yuan, H.; Li, S.; Rusconi, P. & Aljaffan, N. (2017) When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, pp. 251-264. (Best Paper Award)
2016
- Bhattacherjee, S. & Sarkar, P. (2016) Reducing Communication Overhead of the Subset Difference Scheme. IEEE Transactions on Computers, 65(8):2575-2587.
- Camara, J.; Correia, P.; de Lemos, R.; Garlan, D.; Gomes, P.; Schmerl, B. & Ventura, R. (2016) Incorporating Architecture-Based Self-Adaptation into an Adaptive Industrial Software System. Journal of Systems and Software, 122:507-523.
- Hu, Y.; Sirlantzis, K. & Howells, G. (2016) Signal-Level Information Fusion for Less Constrained Iris Recognition Using Sparse-Error Low Rank Matrix Factorization. IEEE Transactions on Information Forensics and Security, 11(7):1549-1564.
- Kafalı, Ö.; Ajmeri, N. & Singh, M. P. (2016) Revani: Revising and Verifying Normative Specifications for Privacy. IEEE Intelligent Systems, 31(5):8-15.
- Kafalı, Ö.; Singh, M. P. & Williams, L. (2016) Nane: Identifying misuse cases using temporal norm enactments. Proceedings of the 2016 IEEE 24th International Requirements Engineering Conference (RE 2016), pp. 136-145.
- Miguel-Hurtado, O.; Guest, R.; Stevenage, S. V.; Neil, G. J. & Black, S. (2016) Comparing Machine Learning Classifiers and Linear/Logistic Regression to Explore the Relationship between Hand Dimensions and Demographic Characteristics. PLoS ONE, 11(11): e0165521.
- Mutawa, N. A.; Bryce, J.; Franqueira, V. N. & Marrington, A. (2016) Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis. Digital Investigation, 16(Supplement):S96-S103.
- Rajani, V.; Garg, D. & Rezk, T. (2016) On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks. Proceedings of the 2016 IEEE 29th Computer Security Foundations Symposium (CSF 2016), pp. 150-163.
- Rashid, T.; Agrafiotis, I. & Nurse, J. R. C. (2016) A new take on detecting insider threats: exploring the use of hidden markov models. Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, pp. 47-56.
- Zhao, L.; Pérez-Delgado, C. A. & Fitzsimons, J. F. (2016) Fast graph operations in quantum computation. Physical Review A, 93(3):032314.
2015
- Alawadhi, I.; Read, J. C.; Marrington, A. & Franqueira, V. N. L. (2015) Factors Influencing Digital Forensic Investigations: Empirical Evaluation of 12 Years of Dubai Police Cases. Journal of Digital Forensics, Security and Law, 10:1.
- Arief, B. & Bin Adzmi, M. A. (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 1—Attackers. IEEE Security & Privacy, 13(1):71-76.
- Arief, B. & Bin Adzmi, M. A. (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2—Defenders and Victims. IEEE Security & Privacy, 13(2):84-88.
- Asghar, H. J.; Steinfeld, R.; Li, S.; Kaafar, M. A. & Pieprzyk, J. (2015) On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices. IEEE Transactions on Information Forensics and Security, 10(8):1643-1655.
- Bhattacherjee, S. & Sarkar, P. (2015) Tree Based Symmetric Key Broadcast Encryption. Journal of Discrete Algorithms, 34:78-107.
- Cámara, J.; de Lemos, R.; Laranjeiro, N.; Ventura, R. & Vieira, M. (2015) Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems. IEEE Transactions on Dependable and Secure Computing, 14(1):50-64.
- Pawar, P.; Sajjad, A.; Chadwick, D. W. & Dimitrakos, T. (2015) Security-as-a-Service in Multi-cloud and Federated Cloud Environments. Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, pp. 251-261.
- Pérez-Delgado, C. A. & Fitzsimons, J. F. (2015) Iterated gate teleportation and blind quantum computation. Physical Review Letters, 114(22):220502.
- Rajani, V.; Bichhawat, A.; Garg, D. & Hammer, C. (2015) Information Flow Control for Event Handling and the DOM in Web Browsers. Proceedings of the 2015 IEEE 28th Computer Security Foundations Symposium (CSF 2015), pp. 366-379.
- Wu, T. & Nurse, Jason R. C. (2015) Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems. Journal of Digital Forensics, Security and Law, 10(4):79-96.
- Yu, Y.; Franqueira, V. N. L.; Tun, T. T.; Wieringa, R. J. & Nuseibeh, B. (2015) Automated Analysis of Security Requirements through Risk-based Argumentation. Journal of Systems and Software, 106:102-116.
- Zhai, X.; Appiah, K.; Ehsan, S.; Howells, G.; Hu, H.; Gu, D. (2015) A Method for Detecting Abnormal Program Behavior on Embedded Devices. IEEE Transactions on Information Forensics and Security, 10(8):1692-1704.
2014
- Bailey, C.; Chadwick, D. W. & de Lemos, R. (2014) Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80(5):935-952.
- Bhattacherjee, S. & Sarkar, P. (2014) Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme. IEEE Transactions on Computers, 63(7):1709-1722.
- Chadwick, D. W.; Siu, K.; Lee, C.; Fouillat, Y. & Germonville, D. (2014) Adding Federated Identity Management to OpenStack. Journal of Grid Computing, 12(1):3-27.
- Emms, M.; Arief, B.; Freitas, L.; Hannon, J. & van Moorsel, A. (2014) Harvesting high value foreign currency transactions from EMV contactless credit cards without the PIN. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS 2014), pp. 716-726.
- Nurse, J. R. C.; Buckley, O.; Legg, P. A.; Goldsmith, M.; Creese, S.; Wright, G. R. T. & Whitty, M. (2014) Understanding insider threat: A framework for characterising attacks. Proceedings of the 2014 IEEE Security and Privacy Workshops, pp. 214-228.
- Yu, L.; Pérez-Delgado, C. A. & Fitzsimons, J. F. (2014) Limitations on information-theoretically-secure quantum homomorphic encryption. Physical Review A, 90(5):050303.
2013
- Asghar, H. J.; Li, S.; Pieprzyk, J. & Wang, X. (2013) Cryptanalysis of the Convex Hull Click Human Identification Protocol. International Journal of Information Security, 12(2):83-96.
- Asghar, H. J.; Li, S.; Steinfeld, R. & Pieprzyk, J. (2013) Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. Proceedings of 20th Annual Network & Distributed System Security Symposium (NDSS 2013).
- Emms, M.; Arief, B.; Little, N. & van Moorsel, A. (2013) Risks of Offline Verify PIN on Contactless Cards. Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers, pp. 313–321.
- Mantri, A.; Pérez-Delgado, C. A. and Fitzsimons, J. F. (2013) Optimal blind quantum computation. Physical Review Letters, 111(23):230502.
2012
- Ahmad, J. J.; Li, S.; Sadeghi, A.-R. & Schneider, T. (2012) CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, February 27-March 2, 2012, Revised Selected Papers, pp. 299-313.
- Bhattacherjee, S. & Sarkar, P. (2012) Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis. Designs, Codes and Cryptography, 66:335-362.
- Cornelsen, S.; Karrenbauer, A. & Li, S. (2012) Leveling the Grid. Proceedings of the Meeting on Algorithm Engineering & Experiments, Kyoto, Japan, January 16, 2012 (ALENEX 2012), pp. 45-54, SIAM.
- Franqueira, V. N. & Wieringa, R. (2012) Role-Based Access Control in Retrospect. Computer, 45(6):81-88, IEEE.
- Li, S.; Sadeghi, A.-R.; Heisrath, S.; Schmitz, R. & Ahmad, J. J. (2012) hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers. Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 – March 4, 2011, Revised Selected Papers, pp. 235-249.
- Liang, Y.; Fairhurst, M. C. & Guest, R. M. (2012) A synthesised word approach to word retrieval in handwritten documents. Pattern Recognition, 45(12):4225-4236.
- Pérez-Delgado, C. A.; Pearce, M. E. & Kok, P. (2012) Fundamental Limits of Classical and Quantum Imaging. Physical Review Letters, 109(12):123601.
- Sheng, W.; Howells, G.; Fairhurst, M.; Deravi, F. & Chen, S. (2012) Reliable and secure encryption key generation from fingerprints. Information Management & Computer Security, 20(3):207-221.
- Wahab, A. W. A.; Ho, A. T. S. & Li, S. (2012) Inter-Camera Model Image Source Identification with Conditional Probability Features. Proceedings of the IIEEJ Image Electronics and Visual Computing Workshop 2012 (IEVC 2012), Paper ID 2P-2. (One of three Best Paper Awards)
- Zwierz, M.; Pérez-Delgado, C. A. & Kok, P. (2012) Ultimate limits to quantum metrology and the meaning of the Heisenberg limit. Physical Review A, 85(4):042112.