CybSafe Research Library
Globally accessible archive of research into the human aspect of cyber security | N/A | CybSafe |
A framework for effective corporate communication after cyber security incidents | Richard Knight, Jason R.C.Nurse | Computers & Security, Volume 99 |
Emotional AI and Children: Ethics, Parents. Governance
Report | Andrew McStay, Gilad Rosner | N/A |
A framework to assess evidence quality in cyber security policy making
Policy briefing | Madeline Carr, Siraj Shaikh | RISCS |
Is your chatbot GDPR compliant?: Open issues in agent design | Rahime Belen Sağlam, Jason R. C. Nurse | CUI '20: Proceedings of the 2nd Conference on Conversational User Interfaces |
Cyber Diplomacy: A Systematic Literature Review | Amel Attatfa, Karen Renaud, Stefano DePaoli | Procedia Computer Science Volume 176 |
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes | Jason R.C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese | 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) |
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains | Petar Radanliev, David De Roure, Kevin Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La’Treall Maddox, Pete Burnap | Cybersecurity volume 3 |
No two gangs are alike: The digital divide in street gangs’ differential adaptations to social media | Andrew Whittaker, James Densley, Karin S.Moser | Computers in Human Behavior Volume 110 |
The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions | Christina Katsini, Yasmeen Abdrabou, George E. Raptis, Mohamed Khamis, Florian Alt | CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems |
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems | Xiong Li, Jieyao Peng, Mohammad S. Obaidat, Fan Wu, Muhammad Khurram Khan, Chaoyang Chen | IEEE Systems Journal Volume 14, Issue 1 |
A New Detection and Prevention System for ARP Attacks Using Static Entry | Sherin Hijazi, Mohammad S. Obaidat | IEEE Systems Journal Volume 13, Issue 3 |
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions | Muhammad Saad, Jinchun Choi, DaeHun Nyang, Joongheon Kim, Aziz Mohaisen | IEEE Systems Journal Volume 14, Issue 1 |
Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic Review | Francesca Stevens, Jason R.C. Nurse, Budi Arief | Cyberpsychology, Behavior, and Social Networking |
Cybersecurity for Smart Farming: Socio-Cultural Context Matters | Dirk van der Linden, Ola Aleksandra Michalec, Anna Zamansky | IEEE Technology and Society Magazine Volume: 39, Issue: 4 |
An Investigation of Self-Control and Self-Regulation as Mechanisms Linking Remote Communication to Employee Well-Being during the Covid-19 Pandemic | Moser, K., Rivkin, W., Diestel, S. and Alshaik, I. | Academy of Management (AoM) Annual Meeting 2020. Vancouver, CA (Virtual Meeting) 07-11 Aug 2020 |
The COVID-19 Contact Tracing App In England and ‘Experimental Proportionality’ | Marion Oswald, Jamie Grace | Forthcoming, Public Law |
Not ‘Very English’ - on the Use of the Polygraph by the Penal System in England and Wales | Kyriakos N Kotsoglou, Marion Oswald | The Journal of Criminal Law. December 2020 |
A Fuzzy Adaptive Dynamic NSGA-II With Fuzzy-Based Borda Ranking Method and its Application to Multimedia Data Analysis | Maysam Orouskhani, Daming Shi, Xiaochun Cheng | IEEE Transactions on Fuzzy Systems Volume 29, Issue 1 |
Design Thinking for Cyber Deception | Debi Ashenden, Rob Black, Iain Reid, Simon Henderson | Hawaii International Conference on System Sciences 2021 |
Interdisciplinary Lessons Learned While Researching Fake News | Char Sample, Michael J. Jensen, Keith Scott, John McAlaney, Steve Fitchpatrick, Amanda Brockinton, David Ormrod, Amy Ormrod | Frontiers in Psychology,
Research Topic on Cognition, Behavior and Cybersecurity |
Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation | Ingolf Becker, Rebecca Posner, Tasmina Islam, Paul Ekblom, Hervé Borrion, Michael Mcguire, Shujun Li | Hawaii International Conference on System Sciences 2021 |
Re-territorialising the policing of cybercrime in the post-COVID-19 era: towards a new vision of local democratic cyber policing | Shane Horgan, Ben Collier, Richard Jones, Lynsay Shepherd | Emerald Insights |
Using Public Priorities To Disentangle the Dimensions of Procedural Justice and Trustworthiness In Police–Citizen Interactions | Joseph A. Hamm, Scott E. Wolfe | The British Journal of Criminology: An International Review of Crime and Society |
A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles | Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Aparicio-Navarro, Antonios Argyriou, Helge Janicke | Array, Volume 5 |
Reflections on Digital Sovereignty | Lokke Moerel, Paul Timmers | EU Cyber Direct |
China-Linked Influence Operation on Twitter Detected Engaging with the US Presidential Election
Part 1: Detection Report
Part 2: Development Report | Cardiff University Crime and Security Research Institute | Cardiff University’s OSCAR (Open Source Communications Analytics Research) |
Nexus or Not? The relationship between terrorism and organised crime | Martin Joseph Gallagher | Policing Insight |
Benefits of implementation of mobile devices with frontline officers in Police Scotland 2019-2020 | William Graham, and Lesley Diack, Martin Joseph Gallagher | Scottish Institute for Policing Research - Breifing Series Issue 13 |
A framework for effective corporate communication after cyber security incidents | Richard Knight, Jason R. C. Nurse | Computers & Security, Volume 99, December 2020 |
Producing ‘good enough’ automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns | Joseph Da Silva | Methodological Innovations, Volume 14 Issue 1, January-April 2021 |
Efficient and Fine-grained Signature for IIoT with Resistance to Key Exposure | Yangyang Bao, Weidong Qiu, Xiaochun Cheng | IEEE Internet of Things Journal |
An efficient identity-based proxy signcryption using lattice | Hongfei Zhu, Ye Wang, Chonghua Wang, Xiaochun Cheng | Future Generation Computer Systems, Volume 117 |
Mechanisms of power inscription into IT governance: Lessons from two national digital identity systems | Rony Medaglia, Ben Eaton, Jonas Hedman, Edgar A. Whitley | Information Systems Journal (ISJ) |
Artificial Intelligence for a Better Future | Bernd Carsten Stahl | SpringerBriefs in Research and Innovation Governance |
Industrial espionage – A systematic literature review (SLR) | Tie Hou, Victoria Wang | Computers & Security, Volume 98, November 2020 |
Blockchain Technology in Current Agricultural Systems: From Techniques to Applications | Weijun Lin, Xinghong Huang, Hui Fang, Victoria Wang, Yining Hua, Jingjie Wang, Haining Yin, Dewei Yi, Laihung Yau | IEEE Access |
Exploring the extent of openness of open government data – A critique of open government datasets in the UK | Victoria Wang, David Shepherd | Government Information Quarterly, Volume 37, Issue 1, January 2020 |
Secure and Lightweight Fine-grained Searchable Data Sharing for IoT-oriented and Cloud-assisted Smart Healthcare System | Yangyang Bao, Weidong Qiu, Xiaochun Cheng | IEEE Internet of Things Journal |
Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain | Shuhui Fan, Shaojing Fu, Haoran Xu, Xiaochun Cheng | Information Processing & Management, Volume 58, Issue 4 |
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic | Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R.C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier Bellekens | Computers & Security, Volume 105, June 2021 |
Formal Modelling and Security Analysisof Bitcoin’s Payment Protocol | Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng Hao | Computers & Security, Elsevier, 2021 |
Autonomy and visibility: The rewards of mobile working | Martin Joseph Gallagher, Lesley Diack, William Graham | Policing Insight |
The Influence of Traits Associated with Autism Spectrum Disorder (ASD) on the Detection of Fake News | Jacqui Taylor-Jackson, Sophie Matthews | HCI International 2020 – Late Breaking Papers: Interaction, Knowledge and Social Media |
Regulating Online Behavioural Advertising Through Data Protection Law | Jiahong Chen | Edward Elgar Publishing |
PRECEPT-4-Justice: A bias-neutralising framework for digital forensics investigations | Karen Renaud, Ivano Bongiovanni, Sara Wilford, Alastair Irons | Science & Justice, Volume 61, Issue 5 |
he “three M’s” counter-measures to children’s risky online behaviors: mentor, mitigate and monitor | Karen Renaud, Suzanne Prior | Information and Computer Security |
Accessible authentication: dyslexia and password strategies | Karen Renaud, Graham Johnson, Jacques Ophoff | Information and Computer Security |
Ethical funding for trustworthy AI: proposals to address the responsibilities of funders to ensure that projects adhere to trustworthy AI practice | Allison Gardner, Adam Leon Smith, Adam Steventon, Ellen Coughlan, Marie Oldfield | AI Ethics (2021) |
Ethical Funding for Trustworthy AI: initial workshop outcomes | A. Gardner, A. Leon Smith, M. A. Oldfield, A. Steventon, E. Coughlan | The Society for the Study of Artificial Intelligence and Simulation of Behaviour |
Scanning the Cycle: Timing-based Authentication on PLCs | Chuadhry Mujeeb Ahmed, Martin Ochoa, Jianying Zhou, Aditya Mathur | ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security |
Surveillance, trust, and policing at music festivals | Kara C. Hoover, Jeremy W. Crampton, Harrison Smith, J. Colette Berbesque | The Canadian Geographer / Le Géographe canadien |
Observing Data-Driven Approaches to Covid-19: Reflections from a Distributed, Remote, Interdisciplinary Research Project | Rachel Allsopp, Claire Bessant, Keith Ditcham, Ardi Janjeva, Guangquan Li, Marion Oswald, Mark Warner | Journal of Legal Research Methodology |
Analytical modelling and UK Government policy | Marie Oldfield, Ella Haig | AI and Ethics |
Creative Malfunction: Finding fault with Rowhammer | Matt Spencer | Computational Culture: a journal of software studies |
A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEs | Karen Renaud, Jacques Ophoff | Organizational Cybersecurity Journal: Practice, Process and People |
Developing a cyber security culture: Current practices and future needs | Betsy Uchendu, Jason R.C. Nurse, Maria Bada, Steven Furnell | Computers & Security |
When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home Devices | Sarah Turner, Jason Nurse, Shujun Li | Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings |
SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education | Alice Jaffray, Conor Finn, Jason R. C. Nurse | Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings |
Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy | Jason R. C. Nurse, Nikki Williams, Emily Collins, Niki Panteli, John Blythe, Ben Koppelman | HCI International 2021 - Posters: 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part III |
The Case for Adaptive Security Interventions | Irum Rauf, Marian Petre, Thein Tun, Tamara Lopez, Paul Lunn, Dirk Van der Linden, John Towse, Helen Sharp, Mark Levine, Awais Rashid, Bashar Nuseibeh | ACM Transactions on Software Engineering and Methodology |
The Interplay between Personal Relationships & Shoulder Surfing Mitigation | Habiba Farzand, Kinshuk Bhardwaj, Karola Marky, Mohamed Khamis | Mensch und Computer 2021 (MuC ’21), September 5–8, 2021, Ingolstadt, Germany. ACM |
Reconfiguring governance: How cyber security regulations are reconfiguring water governance | Ola Michalec, Sveta Milyaeva, Awais Rashid | Regulation & Governance |
A Quantum Leap for Financial Services | Pavle Avramovic, Sam Qayyum, Dr Rupesh Srivastava, Evert Geurtsen | Insight: Opinion and Analysis Hosted by the FCA |
A Communication Toolkit to Build Trust: Lessons from Northern Ireland’s Civil Society Peacebuilders | Charis Rice, Emily Stanton, Maureen Taylor | VOLUNTAS: International Journal of Voluntary and Nonprofit Organizations |
MailTrout: a machine learning browser extension for detecting phishing emails | Paul Boyle, Lynsay A. Shepherd | 33rd British Human Computer Interaction Conference: Post-Pandemic HCI – Living digitally |
Infiltrating security into development: exploring the world’s largest software security study | Charles Weir, Sammy Migues, Mike Ware, Laurie Williams | ESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering |
Empty Streets, Busy Internet: A Time-Series Analysis of Cybercrime and Fraud Trends During COVID-19 | Steven Kemp, David Buil-Gil, Asier Moneva, Fernando Miró-Llinares, Nacho Díaz-Castaño | Journal of Contemporary Criminal Justice |
TEL: Low-Latency Failover Traffic Engineering in Data Plane | Habib Mostafaei, Mohammad Shojafar, Mauro Conti | IEEE Transactions on Network and Service Management |
Joint QoS-aware and Cost-efficient Task Scheduling for Fog-cloud Resources in a Volunteer Computing System | Farooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Rahim Tafazolli | ACM Transactions on Internet Technology |
Link Latency Attack in Software-Defined Networks | Sanaz Soltani, Mohammad Shojafar, Habib Mostafaei, Zahra Pooranian, Rahim Tafazolli | 17th IEEE International Conference on Network and Service Management (IEEE CNSM 2021) |
A Two-layer Collaborative Vehicle-Edge Intrusion Detection System for Vehicular Communications | Parya Haji Mirzaee, Mohammad Shojafar, Hamidreza Bagher, Tsz Hin Chan, Haitham Cruickshank, Rahim Tafazolli | IEEE 94th Vehicular Technology Conference: VTC2021-Fall |
Pragmatic Online Privacy: the SftE Approach | Vitor Jesus | ~ COnSeNT 2021 ~ 1st International Workshop on Consent Management in Online Services, Networks and Things |
IADE: An Improved Differential Evolution Algorithm to Preserve Sustainability in a 6G Network | Zhou Zhou, Mohammad Shojafar, Jemal Abawajy, Ali Kashif Bashir | IEEE Transactions on Green Communications and Networking |
AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center | Zhou Zhou, Mohammad Shojafar, Mamoun Alazab, Jemal Abawajy, Fangmin Li | IEEE Transactions on Green Communications and Networking |
HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs | Peng Wang, Chien-Ming Chen, Saru Kumari, Mohammad Shojafar, Rahim Tafazolli, Yi-Ning Liu | IEEE Transactions on Intelligent Transportation Systems |
FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network | Parya Haji Mirzaee, Mohammad Shojafar, Zahra Pooranian,
Pedram Asef, Haitham Cruickshank, Rahim Tafazolli | The 17th International Conference on Mobility, Sensing and Networking (MSN 2021) |
When Is Software a Medical Device? Understanding and Determining the “Intention” and Requirements for Software as a Medical Device in European Union Law | Kaspar LUDVIGSEN, Shishir NAGARAJA, Angela DALY | European Journal of Risk Regulation |
Making assembly line in supply chain robust and secure using UHF RFID | Abubakar Sharif, Rajesh Kumar, Jun Ouyang, Hasan T. Abbas, Akram Alomainy, Kamran Arshad, Khaled Assaleh, Ayman Althuwayb, Muhammad Ali Imran, Qammer H. Abbasi | Scientific Reports |
Always on, anytime, anywhere: The impact of the ‘new norm’ and digital training revolution on employees | Nadine Michaelides | BPS Cyberpsychology Section |
The fight against disinformation and the right to freedom of expression | Dr. Judit BAYER, Dr. Irini KATSIREA, Dr. Olga BATURA, Prof. Dr. Bernd HOLZNAGEL, Dr. Sarah HARTMANN, Katarzyna LUBIANIEC | European Parliament Think Tank |
Adaptive Voronoi Masking: A Method to Protect Confidential Discrete Spatial Data | Fiona Polzin, Ourania Kounadi | 11th International Conference on Geographic Information Science (GIScience 2021) - Part II |
Shadow Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing | Zhongyuan Hau, Soteris DemetriouLuis, Muñoz-González, Emil C. Lupu | ESORICS 2021: Computer Security – ESORICS 2021 |
Oh, behave! The Annual Cybersecurity Atittudes and Behaviours Report 2021 | Dr. Inka Karppinen, Ruya Ince | CybSafe |
Democracy@Risk 2021 | ARIADNA TSENINA, RACHEL GIBSON, EMMA BARRETT | Digital Futures Manchester |
Editorial: Security of cloud service for the manufacturing industry | Xiaochun Cheng, Zheli Liu, Yongsheng Ning | Transactions on Emerging Telecommunication Technologies |
Efficient, Revocable and Privacy-preserving Fine-grained Data Sharing with Keyword Search for the Cloud-assisted Medical IoT System | Yangyang Bao, Weidong Qiu, Peng Tang, Xiaochun Cheng | IEEE Journal of Biomedical and Health Informatics |
PPVF: Privacy-Preserving Protocol for Vehicle Feedback in Cloud-Assisted VANET | Hongyuan Cheng, Mohammad Shojafar, Mamoun Alazab, Rahim Tafazolli, Yining Liu | IEEE Transactions on Intelligent Transportation Systems |
Final Report | Data-Driven Responses to COVID-19: Lessons Learned | Hugh Oberlander, Luke Chambers | The Observatory for Monitoring Data-Driven Approaches to COVID-19 (OMDDAC) |
'Balancing Cybersecurity And Privacy In The Remote Workforce'. | Jason R.C Nurse | CREST Research. |
'Can lessons be learnt from the governance of the coronavirus pandemic to help preparations for future cyber crises?'. | Jason R.C Nurse, Gareth Mott | The Hague Program on International Cyber Security. |
'De-platforming disinformation: conspiracy theories and their control'. | Helen Innes, Martin Innes | Taylor & Francis Online. |
'Shame in Cyber Security: Efective Behavior Modification Tool
or Counterproductive Foil?'. | Karen Renaud, Rosalind Searle, Marc Dupuis | N/A |
'Fingerprint Technology in the Age of COVID'. | Alan Hodgson | ID and Secure Document News. |
'Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing'. | Xindi Ma, Jianfeng Ma, Saru Kumari, Fushan Wei, Mohammad Shojafar, Mamoun Alazab | ACM Transactions on Internet Technology, Volume 22, Issue 2. |
'An unstable environment
The economic case for getting asylum decisions right
the first time. | Marie Oldfield, Jade Siu, Sadia Sheikh | Pro Bono Economics. |
"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country. | Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini. | USENIX. |
'Usage Patterns of Privacy-Enhancing Technologies'. | Kovila P.L Coopamootoo | CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. |
'How Can and Would People Protect From
Online Tracking?
'. | Maryam Mehrnezhad, Kovila Coopamootoo, Ehsan Toreini
| Sciendo: Proceedings on Privacy Enhancing Technologies. |
'What we do with data: a performative critique of data "collection"'. | Garfield Benjamin | Internet Policy Review. |
'Shame in Cyber Security: Efective Behavior Modification Tool
or Counterproductive Foil?'. | Karen Renaud, Rosaline Searle, Marc Dupuis | NSPW. |
'Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks'. | Neeshe Khan, Robert J. Houghton, Sarah Sharples | Cognition, Technology & Work. |
'Editorial: Security of cloud service for the manufacturing industry'. | Xiaochun Cheng, Zheli Liu, Yongsheng Ning | Transactions on Emerging Telecommunications Technologies. |
'‘I am not a number’: Conceptualising identity in digital surveillance'. | Victoria Wang, John V.Tucker | Technology in Society. |
'Higher Education in Europe: Understanding the Cybersecurity Skills Gap in the EU'. | Jason Nurse | Enisa. |
'What’s Next for Cyber Insurance?'. | Jason Nurse | N/A |
'Recruiting Participants With Programming Skills: A Comparison
of Four Crowdsourcing Platforms and a CS Student Mailing List'. | Mohammad Tahaei, Kami Vaniea | CHI. |
'Understanding Privacy-Related Advice on Stack Overflow'. | Mohammad Tahaei, Tianshi Li, Kami Vaniea | Privacy Enhancing Technologies Symposium. |
'Forward Privacy Preservation in IoT-Enabled Healthcare Systems'. | Ke Wang, Chien-Ming Chen, Zhuoyu Tie, Mohammad Shojafar, Sachin Kumar | IEEE Transactions on Industrial Informatics. |
'Fear might motivate secure password choices in the short term, but at what cost?'. | Marc Dupuis, Karen Renaud, Anna Jennings | HICSS. |
‘The Enabling Role of Internal Organizational Communication in Insider Threat Activity – Evidence From a High Security Organization’. | Charis Rice, Rosalind Searle | Management Communication Quarterly. |
'Adoption and continued use of mobile contact tracing technology: multilevel explanations from a three-wave panel survey and linked data '. | Laszlo Horvath, Susan Banducci, Joshua Blamire, Cathrine Degnen, Oliver James, Andrew Jones, Daniel Stevens, Katharine Tyler | BMJ Open . |
'Versioning biological cells for trustworthy cell engineering'. | Jonathan Tellechea-Luzardo, Leanne Hobbs, Elena Velázquez, Lenka Pelechova, Simon Woods, Víctor de Lorenzo, Natalio Krasnogor | Nature Communications. |
'Using Machine Learning Methods to Study Technology-Facilitated Abuse: Evidence from the Analysis of UK Crimestoppers’ Text Data'. | elix Soldner, Leonie Maria Tanczer, Daniel Hammocks, Isabel Lopez-Neira, Shane D. Johnson | The Palgrave Handbook of Gendered Violence and Technology. |
'Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach'. | Sadoon Azizi, Mohammad Shojafar, Jemal Abawajy, Rajkumar Buyya | The Journal of Network and Computer Applications. |
'Intelligent-Reflecting-Surface-Empowered Wireless-Powered Caching Networks'. | Zheng Chu, Pei Xiao, Mohammad Shojafar, De Mi, Wanming Hao | IEEE Internet of Things Journal. |
'Remodeled chaotic compressive sensing scheme for secure and energy-efficient data forwarding in body-to-body network'. | R Nidhya, Manish Kumar, Achyut Shankar, Shuchi Mala, Sanjeev Thakur, Xiaochun Cheng | Computers and Electrical Engineering. |
'SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles'. | Guangquan Xu, Hongpeng Bai, Jun Xing. Tao Luo, Neal N. Xiong, Xiaochun Cheng, Shaoying Liu, X iZheng | Journal of Parallel and Distributed Computing. |
'A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living'
. | Xingmiao Wang, Kai Fan, Kan Yang, Xiaochun Cheng, Qingkuan Dong, Hui Li, Yintang Yang | Computer Communications. |
'Analytical modelling and UK Government policy'. | Marie Oldfield, Ella Haig | AI & Ethics. |
'Behavioral Consistency in the Digital Age'. | Heather Shaw, Paul J. Taylor, David A. Ellis | Psychological Science. |
'Consent Receipts for a Usable and Auditable Web of Personal Data'. | Vitor Jesus, Harshvardhan J. Pandit | IEEE Access. |
'We’re all radioactive – so let’s stop being afraid of it'. | Bill Lee | The Conversation. |
'Cyber security and the Leviathan'. | Joseph Da Silva | Computers & Security. |
'How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis'. | Yang Lu, Shujun Li, Alex Freitas, Athina Ioannou | European Union Digital Library. |
'From data flows to privacy-benefit trade-offs: A user-centric
semantic model'. | Yang Lu, Shujun Li | Wiley Online Library. |
'Slight: A lightweight authentication scheme for smart healthcare services'. | Haleh Amintoosi, Mahdi Nikooghadam, Mohammad Shojafar, Saru Kumari, Mamoun Alazab | Computers and Electrical Engineering. |
'An authentication and key agreement scheme for smart grid'. | Masoumeh Safkhani, Saru Kumari, Mohammad Shojafar & Sachin Kumar | Peer-to-Peer Networking and Applications. |
'DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS'. | Xindi Ma; Qi Jiang; Mohammad Shojafar; Mamoun Alazab; Sachin Kumar; Saru Kumari | IEEE Transactions on Intelligent Transportation Systems. |
'Experiences from the Dark Side of Participant Recruitment'. | Charles Weir | Hipster - Secure Development. |
SIEMS: A Secure Intelligent Energy Management System for Industrial IoT applications | Pedram Asef; Rahim Taheri; Mohammad Shojafar; Iosif Mporas; Rahim Tafazolli | IEEE. |
Personal information: Perceptions, types and evolution | Rahime Belen Saglam; Jason R.C. Nurse; Duncan Hodges | Journal of Information Security and Applications. |
'The impact of financial deprivation on children’s cybersecurity knowledge & abilities'. | Suzanne Prior; Karen Renaud |
Education and Information Technologies: The Official Journal of the IFIP Technical Committee on Education. |
MIGRANT: Modeling Smartphone Password Manager Adoption using Migration Theory | Nora Alkaldi; Karen Renaud
| ACM SIGMIS Database: the DATABASE for Advances in Information Systems |
Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge | Karen Renaud; Lizzie Coles‑Kemp | SN Computer Science: A Springer Nature Journal |
Network intrusion detection using ACO-DNN model with DVFS based energy optimization in cloud framework | Jitendra Kumar Samriya; Rajeev Tiwari; Xiaochun Cheng; Rahul Kumar Singh; Achyut Shankar; Manoj Kumar | Sustainable Computing: Informatics and Systems |
On Shielding Android’s Pending Intent from Malware Apps Using a Novel Ownership-Based Authentication | S. Pradeepkumar Duraisamy; S. Geetha; Xiaochun Cheng; Seifedine Kadry | Journal of Circuits, Systems and Computers |
Securing AI-based Security Systems | Sandra Scott-Hayward | Geneva Centre for Security Policy |
Supporting and Enabling Effective Privacy Decision Making for SMEs | Maria Bada; Steven Furnell; Jason Nurse | National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online (REPHRAIN) |
Theorising ‘Digital Vulnerability’ in the Criminal Justice Process | Lindsey Rice; Layla Skinns | British Society of Criminology |