Skip navigation

Items where Faculty / School / Research Centre / Research Groups is "Internet Security Research Laboratory"

Items where Faculty / School / Research Centre / Research Groups is "Internet Security Research Laboratory"

Group by: Date | Creators | Item Type | Uncontrolled Keywords | No Grouping
Number of items at this level: 89.

access control

Ma, Mingchao and Woodhead, Stephen (2006) Constraint-enabled distributed RBAC for subscription-based remote network services. In: Proceedings of The Sixth IEEE International Conference on Computer and Information Technology. IEEE Computer Society, pp. 160-165. ISBN 0-7695-2687-X (doi:10.1109/CIT.2006.63)

AEAD mode

Adekunle, A.A. and Woodhead, S.R. (2012) An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication. In: Wireless Advanced (WiAd), 2012. IEEE Conference Publications . Institution of Electrical and Electronics Engineering, Inc., Piscataway, NJ, USA, pp. 1-5. ISBN 9781457721939 (doi:10.1109/WiAd.2012.6296560)

airborne particle concentration

Murnane, S.N., Barnes, R.N., Woodhead, Steve and Amadi-Echendu, J.E. (1996) Electrostatic modelling and measurement of airborne particle concentration. IEEE Transactions on Instrumentation and Measurement, 45 (2). pp. 488-492. ISSN 0018-9456

airborne particles concentration

Murnane, S.N., Barnes, R.N., Woodhead, Steve and Amadi-Echendu, J.E. (1995) Electrostatic modelling and measurement of airborne particles concentration. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 762-765. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515418)

Analytical models

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

authentication-delegation

Woodhead, Steve and Ma, Mingchao (2006) Authentication delegation for subscription-based remote network services. Computers and Security, 25 (5). pp. 371-378. ISSN 0167-4048 (doi:10.1016/j.cose.2006.03.006)

authorisation

Woodhead, Steve and Ma, Mingchao (2006) Authentication delegation for subscription-based remote network services. Computers and Security, 25 (5). pp. 371-378. ISSN 0167-4048 (doi:10.1016/j.cose.2006.03.006)

autonomy

Smith, Darren P., Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:10.1109/ICITST.2015.7412128)

computer vision

Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824, Taylor, Matthew and Hurley-Smith, Darren (2015) Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM. In: 22nd International Conference on Systems, Signals and Image Processing. IEEE, London, UK, pp. 81-84. ISBN 9781467383523 (doi:10.1109/IWSSIP.2015.7314182)

Containment

Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)

Countermeasure

Shahzad, Khurram and Woodhead, Stephen (2015) Empirical analysis of an improved countermeasure against computer network worms. In: 6th International Conference on Computing, Communication and Networking Technologies. IEEE (Institute of Electrical and Electronics Engineers), Denton, USA.

Cyber defence

Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)

Cyber defence

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)

Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027

Tidy, Luc, Woodhead, Steve and Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 (2013) A large-scale zero-day worm simulator for cyber-epidemiological analysis. In: International Conference On Advances In Computer Science And Electronics Engineering - CSEE 2013. Institute of Research Engineers and Doctors (IRED), Santa Barbara, CA, USA, pp. 230-234. ISBN 978-981-07-5461-7 (doi:10.3850/978-981-07-5461-7_45)

data origin authentication

Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:10.1109/NGMAST.2009.78)

data integrity

Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:10.1109/NGMAST.2009.78)

digital signature

Woodhead, Steve and Ma, Mingchao (2006) Authentication delegation for subscription-based remote network services. Computers and Security, 25 (5). pp. 371-378. ISSN 0167-4048 (doi:10.1016/j.cose.2006.03.006)

distributed

Ma, Mingchao and Woodhead, Stephen (2006) Constraint-enabled distributed RBAC for subscription-based remote network services. In: Proceedings of The Sixth IEEE International Conference on Computer and Information Technology. IEEE Computer Society, pp. 160-165. ISBN 0-7695-2687-X (doi:10.1109/CIT.2006.63)

Electrodynamic sensor

Yan, Y., Byrne, B., Woodhead, Steve and Coulthard, John M. (1995) Velocity measurement of pneumatically conveyed solids using electrodynamic sensors. Measurement Science and Technology, 6 (5). pp. 515-537. ISSN 0957-0233 (Print), 1361-6501 (Online) (doi:10.1088/0957-0233/6/5/013)

electrostatic modelling

Murnane, S.N., Barnes, R.N., Woodhead, Steve and Amadi-Echendu, J.E. (1996) Electrostatic modelling and measurement of airborne particle concentration. IEEE Transactions on Instrumentation and Measurement, 45 (2). pp. 488-492. ISSN 0018-9456

Murnane, S.N., Barnes, R.N., Woodhead, Steve and Amadi-Echendu, J.E. (1995) Electrostatic modelling and measurement of airborne particles concentration. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 762-765. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515418)

electrostatic sensors

Woodhead, Steve and Amadi-Echendu, J.E. (1995) Solid phase velocity measurements utilising electrostatic sensors and cross correlation signal processing. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 774-777. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515421)

Frequency locked loops

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

Grippers

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

image processing

Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824, Taylor, Matthew and Hurley-Smith, Darren (2015) Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM. In: 22nd International Conference on Systems, Signals and Image Processing. IEEE, London, UK, pp. 81-84. ISBN 9781467383523 (doi:10.1109/IWSSIP.2015.7314182)

integrity

Adekunle, A.A. and Woodhead, S.R. (2010) Zone based systems design framework for the realisation of efficient block cipher based message authentication code algorithms. In: ARES 2010 Fifth International Conference on Availability, Reliability, and Security15-18 February 2010 Krakow, Poland. Conference Publishing Services, IEEE Computer Society, Los Alamitos, California, pp. 216-221. ISBN 9781424458790 (doi:10.1109/ARES.2010.109)

JIT Compilation

Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 and Woodhead, Steve (2008) Investigation into a modular rule-based testing method for testing business rules in scheduling applications. In: Proceedings of the 12th Word Multi-Conference on Systemics, Cybernetics and Informatics; Jointly with the 14th International Conference on Information Systems Analysis and Synthesis; WMSCI 2008. International Institute of Informatics and Systemics, Orlando, FL, USA, pp. 204-208. ISBN 9781934272312

laser Doppler velocimetry measurements

Woodhead, Steve, Pittman, A.N. and Ashenden, Stuart J. (1995) Laser Doppler velocimetry measurements of particle velocity profiles in gas-solid two-phase flows. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 770-773. ISBN 978-0780326156

Limiting

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

Logic gates

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

Malware

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)

Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)

Shahzad, Khurram and Woodhead, Stephen (2015) Empirical analysis of an improved countermeasure against computer network worms. In: 6th International Conference on Computing, Communication and Networking Technologies. IEEE (Institute of Electrical and Electronics Engineers), Denton, USA.

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027

Tidy, Luc and Woodhead, Steve (2015) Leveraging anonymised network traces for the assessment of the potential virulence of contemporary network worm outbreaks. In: 2015 2nd International Conference on Communications and Network Engineering (ICCNE 2015). DESTech Publications, Inc.

Tidy, Luc, Woodhead, Steve and Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 (2013) A large-scale zero-day worm simulator for cyber-epidemiological analysis. In: International Conference On Advances In Computer Science And Electronics Engineering - CSEE 2013. Institute of Research Engineers and Doctors (IRED), Santa Barbara, CA, USA, pp. 230-234. ISBN 978-981-07-5461-7 (doi:10.3850/978-981-07-5461-7_45)

MANET

Smith, Darren P., Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:10.1109/ICITST.2015.7412128)

mapping

Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824, Taylor, Matthew and Hurley-Smith, Darren (2015) Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM. In: 22nd International Conference on Systems, Signals and Image Processing. IEEE, London, UK, pp. 81-84. ISBN 9781467383523 (doi:10.1109/IWSSIP.2015.7314182)

message authentication code

Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:10.1109/NGMAST.2009.78)

message authentication information

Adekunle, A.A. and Woodhead, S.R. (2010) Zone based systems design framework for the realisation of efficient block cipher based message authentication code algorithms. In: ARES 2010 Fifth International Conference on Availability, Reliability, and Security15-18 February 2010 Krakow, Poland. Conference Publishing Services, IEEE Computer Society, Los Alamitos, California, pp. 216-221. ISBN 9781424458790 (doi:10.1109/ARES.2010.109)

Modeling

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

Modelling

Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027

network

Ma, Mingchao and Woodhead, Stephen (2006) Constraint-enabled distributed RBAC for subscription-based remote network services. In: Proceedings of The Sixth IEEE International Conference on Computer and Information Technology. IEEE Computer Society, pp. 160-165. ISBN 0-7695-2687-X (doi:10.1109/CIT.2006.63)

Network Security

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

Tidy, Luc and Woodhead, Steve (2015) Leveraging anonymised network traces for the assessment of the potential virulence of contemporary network worm outbreaks. In: 2015 2nd International Conference on Communications and Network Engineering (ICCNE 2015). DESTech Publications, Inc.

Network worm

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)

Shahzad, Khurram and Woodhead, Stephen (2015) Empirical analysis of an improved countermeasure against computer network worms. In: 6th International Conference on Computing, Communication and Networking Technologies. IEEE (Institute of Electrical and Electronics Engineers), Denton, USA.

Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027

Tidy, Luc, Woodhead, Steve and Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 (2013) A large-scale zero-day worm simulator for cyber-epidemiological analysis. In: International Conference On Advances In Computer Science And Electronics Engineering - CSEE 2013. Institute of Research Engineers and Doctors (IRED), Santa Barbara, CA, USA, pp. 230-234. ISBN 978-981-07-5461-7 (doi:10.3850/978-981-07-5461-7_45)

noise signals

Amadi-Echendu, J.E. and Woodhead, Steve (1995) Characterising noise signals in 2-phase solid gas flows. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 778-781. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515422)

particle velocity profiles

Woodhead, Steve, Pittman, A.N. and Ashenden, Stuart J. (1995) Laser Doppler velocimetry measurements of particle velocity profiles in gas-solid two-phase flows. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 770-773. ISBN 978-0780326156

Pervasive computing

Adekunle, A.A. and Woodhead, S.R. (2012) An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication. In: Wireless Advanced (WiAd), 2012. IEEE Conference Publications . Institution of Electrical and Electronics Engineering, Inc., Piscataway, NJ, USA, pp. 1-5. ISBN 9781457721939 (doi:10.1109/WiAd.2012.6296560)

pneumatic conveying pipelines

Bradley, M. S. A., Burnett, A. J. and Woodhead, S. R. (1995) Measurement of pressure profiles in pneumatic conveying pipelines. Instrumentation and Measurement Technology Conference, 1995. IMTC/95. Proceedings. Integrating Intelligent Instrumentation and Control., IEEE. Institute of Electrical and Electronics Engineers, New York, pp. 766-769. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515419)

Pneumatically conveyed solids

Yan, Y., Byrne, B., Woodhead, Steve and Coulthard, John M. (1995) Velocity measurement of pneumatically conveyed solids using electrodynamic sensors. Measurement Science and Technology, 6 (5). pp. 515-537. ISSN 0957-0233 (Print), 1361-6501 (Online) (doi:10.1088/0957-0233/6/5/013)

real-time wireless communication

Adekunle, A.A. and Woodhead, S.R. (2012) An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication. In: Wireless Advanced (WiAd), 2012. IEEE Conference Publications . Institution of Electrical and Electronics Engineering, Inc., Piscataway, NJ, USA, pp. 1-5. ISBN 9781457721939 (doi:10.1109/WiAd.2012.6296560)

rule-testing

Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 and Woodhead, Steve (2008) Investigation into a modular rule-based testing method for testing business rules in scheduling applications. In: Proceedings of the 12th Word Multi-Conference on Systemics, Cybernetics and Informatics; Jointly with the 14th International Conference on Information Systems Analysis and Synthesis; WMSCI 2008. International Institute of Informatics and Systemics, Orlando, FL, USA, pp. 204-208. ISBN 9781934272312

scheduling

Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 and Woodhead, Steve (2008) Investigation into a modular rule-based testing method for testing business rules in scheduling applications. In: Proceedings of the 12th Word Multi-Conference on Systemics, Cybernetics and Informatics; Jointly with the 14th International Conference on Information Systems Analysis and Synthesis; WMSCI 2008. International Institute of Informatics and Systemics, Orlando, FL, USA, pp. 204-208. ISBN 9781934272312

secure channel

Adekunle, A.A. and Woodhead, S.R. (2012) An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication. In: Wireless Advanced (WiAd), 2012. IEEE Conference Publications . Institution of Electrical and Electronics Engineering, Inc., Piscataway, NJ, USA, pp. 1-5. ISBN 9781457721939 (doi:10.1109/WiAd.2012.6296560)

security

Smith, Darren P., Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:10.1109/ICITST.2015.7412128)

security block ciphers

Adekunle, A.A. and Woodhead, S.R. (2010) Zone based systems design framework for the realisation of efficient block cipher based message authentication code algorithms. In: ARES 2010 Fifth International Conference on Availability, Reliability, and Security15-18 February 2010 Krakow, Poland. Conference Publishing Services, IEEE Computer Society, Los Alamitos, California, pp. 216-221. ISBN 9781424458790 (doi:10.1109/ARES.2010.109)

signal processing

Woodhead, Steve and Amadi-Echendu, J.E. (1995) Solid phase velocity measurements utilising electrostatic sensors and cross correlation signal processing. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 774-777. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515421)

Simulation

Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027

Tidy, Luc, Woodhead, Steve and Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 (2013) A large-scale zero-day worm simulator for cyber-epidemiological analysis. In: International Conference On Advances In Computer Science And Electronics Engineering - CSEE 2013. Institute of Research Engineers and Doctors (IRED), Santa Barbara, CA, USA, pp. 230-234. ISBN 978-981-07-5461-7 (doi:10.3850/978-981-07-5461-7_45)

skipjack

Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:10.1109/NGMAST.2009.78)

SLAM

Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824, Taylor, Matthew and Hurley-Smith, Darren (2015) Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM. In: 22nd International Conference on Systems, Signals and Image Processing. IEEE, London, UK, pp. 81-84. ISBN 9781467383523 (doi:10.1109/IWSSIP.2015.7314182)

Slammer

Shahzad, Khurram and Woodhead, Stephen (2015) Empirical analysis of an improved countermeasure against computer network worms. In: 6th International Conference on Computing, Communication and Networking Technologies. IEEE (Institute of Electrical and Electronics Engineers), Denton, USA.

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

solid gas flows

Amadi-Echendu, J.E. and Woodhead, Steve (1995) Characterising noise signals in 2-phase solid gas flows. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 778-781. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515422)

solid phase velocity measurements

Woodhead, Steve and Amadi-Echendu, J.E. (1995) Solid phase velocity measurements utilising electrostatic sensors and cross correlation signal processing. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 774-777. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515421)

Susceptible-Infected (SI)

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

temporal business rules

Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 and Woodhead, Steve (2008) Investigation into a modular rule-based testing method for testing business rules in scheduling applications. In: Proceedings of the 12th Word Multi-Conference on Systemics, Cybernetics and Informatics; Jointly with the 14th International Conference on Information Systems Analysis and Synthesis; WMSCI 2008. International Institute of Informatics and Systemics, Orlando, FL, USA, pp. 204-208. ISBN 9781934272312

third-party authentication

Woodhead, Steve and Ma, Mingchao (2006) Authentication delegation for subscription-based remote network services. Computers and Security, 25 (5). pp. 371-378. ISSN 0167-4048 (doi:10.1016/j.cose.2006.03.006)

TinyAEAD

Adekunle, A.A. and Woodhead, S.R. (2012) An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication. In: Wireless Advanced (WiAd), 2012. IEEE Conference Publications . Institution of Electrical and Electronics Engineering, Inc., Piscataway, NJ, USA, pp. 1-5. ISBN 9781457721939 (doi:10.1109/WiAd.2012.6296560)

ubiquitous networks

Adekunle, A.A. and Woodhead, S.R. (2010) Zone based systems design framework for the realisation of efficient block cipher based message authentication code algorithms. In: ARES 2010 Fifth International Conference on Availability, Reliability, and Security15-18 February 2010 Krakow, Poland. Conference Publishing Services, IEEE Computer Society, Los Alamitos, California, pp. 216-221. ISBN 9781424458790 (doi:10.1109/ARES.2010.109)

Velocity measurement

Yan, Y., Byrne, B., Woodhead, Steve and Coulthard, John M. (1995) Velocity measurement of pneumatically conveyed solids using electrodynamic sensors. Measurement Science and Technology, 6 (5). pp. 515-537. ISSN 0957-0233 (Print), 1361-6501 (Online) (doi:10.1088/0957-0233/6/5/013)

virtual closed network

Smith, Darren P., Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:10.1109/ICITST.2015.7412128)

virtual private network

Smith, Darren P., Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:10.1109/ICITST.2015.7412128)

wireless sensor networks

Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:10.1109/NGMAST.2009.78)

Witty

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

Worm containment

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)

Worm detection

Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)

Worms

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

XML

Woodhead, Steve and Ma, Mingchao (2006) Authentication delegation for subscription-based remote network services. Computers and Security, 25 (5). pp. 371-378. ISSN 0167-4048 (doi:10.1016/j.cose.2006.03.006)

XML and .NET Framework

Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 and Woodhead, Steve (2008) Investigation into a modular rule-based testing method for testing business rules in scheduling applications. In: Proceedings of the 12th Word Multi-Conference on Systemics, Cybernetics and Informatics; Jointly with the 14th International Conference on Information Systems Analysis and Synthesis; WMSCI 2008. International Institute of Informatics and Systemics, Orlando, FL, USA, pp. 204-208. ISBN 9781934272312

Yttrium

Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)

Zero-Day Worm

Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027

Tidy, Luc, Woodhead, Steve and Wetherall, Jodie ORCID logoORCID: https://orcid.org/0000-0002-4786-5824 (2013) A large-scale zero-day worm simulator for cyber-epidemiological analysis. In: International Conference On Advances In Computer Science And Electronics Engineering - CSEE 2013. Institute of Research Engineers and Doctors (IRED), Santa Barbara, CA, USA, pp. 230-234. ISBN 978-981-07-5461-7 (doi:10.3850/978-981-07-5461-7_45)

This list was generated on Sat Dec 21 02:02:46 2024 UTC.