Items where Faculty / School / Research Centre / Research Groups is "Internet Security Research Laboratory"
- University Structure (18527)
- Faculty of Engineering & Science (7848)
- Internet Security Research Laboratory (22)
- Faculty of Engineering & Science (7848)
access control
Ma, Mingchao and Woodhead, Stephen (2006) Constraint-enabled distributed RBAC for subscription-based remote network services. In: Proceedings of The Sixth IEEE International Conference on Computer and Information Technology. IEEE Computer Society, pp. 160-165. ISBN 0-7695-2687-X (doi:10.1109/CIT.2006.63)
AEAD mode
Adekunle, A.A. and Woodhead, S.R. (2012) An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication. In: Wireless Advanced (WiAd), 2012. IEEE Conference Publications . Institution of Electrical and Electronics Engineering, Inc., Piscataway, NJ, USA, pp. 1-5. ISBN 9781457721939 (doi:10.1109/WiAd.2012.6296560)
airborne particle concentration
Murnane, S.N., Barnes, R.N., Woodhead, Steve and Amadi-Echendu, J.E. (1996) Electrostatic modelling and measurement of airborne particle concentration. IEEE Transactions on Instrumentation and Measurement, 45 (2). pp. 488-492. ISSN 0018-9456
airborne particles concentration
Murnane, S.N., Barnes, R.N., Woodhead, Steve and Amadi-Echendu, J.E. (1995) Electrostatic modelling and measurement of airborne particles concentration. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 762-765. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515418)
Analytical models
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
authentication-delegation
Woodhead, Steve and Ma, Mingchao (2006) Authentication delegation for subscription-based remote network services. Computers and Security, 25 (5). pp. 371-378. ISSN 0167-4048 (doi:10.1016/j.cose.2006.03.006)
authorisation
Woodhead, Steve and Ma, Mingchao (2006) Authentication delegation for subscription-based remote network services. Computers and Security, 25 (5). pp. 371-378. ISSN 0167-4048 (doi:10.1016/j.cose.2006.03.006)
autonomy
Smith, Darren P., Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:10.1109/ICITST.2015.7412128)
computer vision
Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824, Taylor, Matthew and Hurley-Smith, Darren (2015) Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM. In: 22nd International Conference on Systems, Signals and Image Processing. IEEE, London, UK, pp. 81-84. ISBN 9781467383523 (doi:10.1109/IWSSIP.2015.7314182)
Containment
Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)
Countermeasure
Shahzad, Khurram and Woodhead, Stephen (2015) Empirical analysis of an improved countermeasure against computer network worms. In: 6th International Conference on Computing, Communication and Networking Technologies. IEEE (Institute of Electrical and Electronics Engineers), Denton, USA.
Cyber defence
Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)
Cyber defence
Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)
Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027
Tidy, Luc, Woodhead, Steve and Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 (2013) A large-scale zero-day worm simulator for cyber-epidemiological analysis. In: International Conference On Advances In Computer Science And Electronics Engineering - CSEE 2013. Institute of Research Engineers and Doctors (IRED), Santa Barbara, CA, USA, pp. 230-234. ISBN 978-981-07-5461-7 (doi:10.3850/978-981-07-5461-7_45)
data origin authentication
Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:10.1109/NGMAST.2009.78)
data integrity
Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:10.1109/NGMAST.2009.78)
digital signature
Woodhead, Steve and Ma, Mingchao (2006) Authentication delegation for subscription-based remote network services. Computers and Security, 25 (5). pp. 371-378. ISSN 0167-4048 (doi:10.1016/j.cose.2006.03.006)
distributed
Ma, Mingchao and Woodhead, Stephen (2006) Constraint-enabled distributed RBAC for subscription-based remote network services. In: Proceedings of The Sixth IEEE International Conference on Computer and Information Technology. IEEE Computer Society, pp. 160-165. ISBN 0-7695-2687-X (doi:10.1109/CIT.2006.63)
Electrodynamic sensor
Yan, Y., Byrne, B., Woodhead, Steve and Coulthard, John M. (1995) Velocity measurement of pneumatically conveyed solids using electrodynamic sensors. Measurement Science and Technology, 6 (5). pp. 515-537. ISSN 0957-0233 (Print), 1361-6501 (Online) (doi:10.1088/0957-0233/6/5/013)
electrostatic modelling
Murnane, S.N., Barnes, R.N., Woodhead, Steve and Amadi-Echendu, J.E. (1996) Electrostatic modelling and measurement of airborne particle concentration. IEEE Transactions on Instrumentation and Measurement, 45 (2). pp. 488-492. ISSN 0018-9456
Murnane, S.N., Barnes, R.N., Woodhead, Steve and Amadi-Echendu, J.E. (1995) Electrostatic modelling and measurement of airborne particles concentration. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 762-765. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515418)
electrostatic sensors
Woodhead, Steve and Amadi-Echendu, J.E. (1995) Solid phase velocity measurements utilising electrostatic sensors and cross correlation signal processing. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 774-777. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515421)
Frequency locked loops
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
Grippers
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
image processing
Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824, Taylor, Matthew and Hurley-Smith, Darren (2015) Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM. In: 22nd International Conference on Systems, Signals and Image Processing. IEEE, London, UK, pp. 81-84. ISBN 9781467383523 (doi:10.1109/IWSSIP.2015.7314182)
integrity
Adekunle, A.A. and Woodhead, S.R. (2010) Zone based systems design framework for the realisation of efficient block cipher based message authentication code algorithms. In: ARES 2010 Fifth International Conference on Availability, Reliability, and Security15-18 February 2010 Krakow, Poland. Conference Publishing Services, IEEE Computer Society, Los Alamitos, California, pp. 216-221. ISBN 9781424458790 (doi:10.1109/ARES.2010.109)
JIT Compilation
Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 and Woodhead, Steve (2008) Investigation into a modular rule-based testing method for testing business rules in scheduling applications. In: Proceedings of the 12th Word Multi-Conference on Systemics, Cybernetics and Informatics; Jointly with the 14th International Conference on Information Systems Analysis and Synthesis; WMSCI 2008. International Institute of Informatics and Systemics, Orlando, FL, USA, pp. 204-208. ISBN 9781934272312
laser Doppler velocimetry measurements
Woodhead, Steve, Pittman, A.N. and Ashenden, Stuart J. (1995) Laser Doppler velocimetry measurements of particle velocity profiles in gas-solid two-phase flows. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 770-773. ISBN 978-0780326156
Limiting
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
Logic gates
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
Malware
Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)
Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)
Shahzad, Khurram and Woodhead, Stephen (2015) Empirical analysis of an improved countermeasure against computer network worms. In: 6th International Conference on Computing, Communication and Networking Technologies. IEEE (Institute of Electrical and Electronics Engineers), Denton, USA.
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027
Tidy, Luc and Woodhead, Steve (2015) Leveraging anonymised network traces for the assessment of the potential virulence of contemporary network worm outbreaks. In: 2015 2nd International Conference on Communications and Network Engineering (ICCNE 2015). DESTech Publications, Inc.
Tidy, Luc, Woodhead, Steve and Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 (2013) A large-scale zero-day worm simulator for cyber-epidemiological analysis. In: International Conference On Advances In Computer Science And Electronics Engineering - CSEE 2013. Institute of Research Engineers and Doctors (IRED), Santa Barbara, CA, USA, pp. 230-234. ISBN 978-981-07-5461-7 (doi:10.3850/978-981-07-5461-7_45)
MANET
Smith, Darren P., Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:10.1109/ICITST.2015.7412128)
mapping
Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824, Taylor, Matthew and Hurley-Smith, Darren (2015) Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM. In: 22nd International Conference on Systems, Signals and Image Processing. IEEE, London, UK, pp. 81-84. ISBN 9781467383523 (doi:10.1109/IWSSIP.2015.7314182)
message authentication code
Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:10.1109/NGMAST.2009.78)
message authentication information
Adekunle, A.A. and Woodhead, S.R. (2010) Zone based systems design framework for the realisation of efficient block cipher based message authentication code algorithms. In: ARES 2010 Fifth International Conference on Availability, Reliability, and Security15-18 February 2010 Krakow, Poland. Conference Publishing Services, IEEE Computer Society, Los Alamitos, California, pp. 216-221. ISBN 9781424458790 (doi:10.1109/ARES.2010.109)
Modeling
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
Modelling
Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027
network
Ma, Mingchao and Woodhead, Stephen (2006) Constraint-enabled distributed RBAC for subscription-based remote network services. In: Proceedings of The Sixth IEEE International Conference on Computer and Information Technology. IEEE Computer Society, pp. 160-165. ISBN 0-7695-2687-X (doi:10.1109/CIT.2006.63)
Network Security
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
Tidy, Luc and Woodhead, Steve (2015) Leveraging anonymised network traces for the assessment of the potential virulence of contemporary network worm outbreaks. In: 2015 2nd International Conference on Communications and Network Engineering (ICCNE 2015). DESTech Publications, Inc.
Network worm
Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)
Shahzad, Khurram and Woodhead, Stephen (2015) Empirical analysis of an improved countermeasure against computer network worms. In: 6th International Conference on Computing, Communication and Networking Technologies. IEEE (Institute of Electrical and Electronics Engineers), Denton, USA.
Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027
Tidy, Luc, Woodhead, Steve and Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 (2013) A large-scale zero-day worm simulator for cyber-epidemiological analysis. In: International Conference On Advances In Computer Science And Electronics Engineering - CSEE 2013. Institute of Research Engineers and Doctors (IRED), Santa Barbara, CA, USA, pp. 230-234. ISBN 978-981-07-5461-7 (doi:10.3850/978-981-07-5461-7_45)
noise signals
Amadi-Echendu, J.E. and Woodhead, Steve (1995) Characterising noise signals in 2-phase solid gas flows. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 778-781. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515422)
particle velocity profiles
Woodhead, Steve, Pittman, A.N. and Ashenden, Stuart J. (1995) Laser Doppler velocimetry measurements of particle velocity profiles in gas-solid two-phase flows. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 770-773. ISBN 978-0780326156
Pervasive computing
Adekunle, A.A. and Woodhead, S.R. (2012) An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication. In: Wireless Advanced (WiAd), 2012. IEEE Conference Publications . Institution of Electrical and Electronics Engineering, Inc., Piscataway, NJ, USA, pp. 1-5. ISBN 9781457721939 (doi:10.1109/WiAd.2012.6296560)
pneumatic conveying pipelines
Bradley, M. S. A., Burnett, A. J. and Woodhead, S. R. (1995) Measurement of pressure profiles in pneumatic conveying pipelines. Instrumentation and Measurement Technology Conference, 1995. IMTC/95. Proceedings. Integrating Intelligent Instrumentation and Control., IEEE. Institute of Electrical and Electronics Engineers, New York, pp. 766-769. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515419)
Pneumatically conveyed solids
Yan, Y., Byrne, B., Woodhead, Steve and Coulthard, John M. (1995) Velocity measurement of pneumatically conveyed solids using electrodynamic sensors. Measurement Science and Technology, 6 (5). pp. 515-537. ISSN 0957-0233 (Print), 1361-6501 (Online) (doi:10.1088/0957-0233/6/5/013)
real-time wireless communication
Adekunle, A.A. and Woodhead, S.R. (2012) An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication. In: Wireless Advanced (WiAd), 2012. IEEE Conference Publications . Institution of Electrical and Electronics Engineering, Inc., Piscataway, NJ, USA, pp. 1-5. ISBN 9781457721939 (doi:10.1109/WiAd.2012.6296560)
rule-testing
Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 and Woodhead, Steve (2008) Investigation into a modular rule-based testing method for testing business rules in scheduling applications. In: Proceedings of the 12th Word Multi-Conference on Systemics, Cybernetics and Informatics; Jointly with the 14th International Conference on Information Systems Analysis and Synthesis; WMSCI 2008. International Institute of Informatics and Systemics, Orlando, FL, USA, pp. 204-208. ISBN 9781934272312
scheduling
Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 and Woodhead, Steve (2008) Investigation into a modular rule-based testing method for testing business rules in scheduling applications. In: Proceedings of the 12th Word Multi-Conference on Systemics, Cybernetics and Informatics; Jointly with the 14th International Conference on Information Systems Analysis and Synthesis; WMSCI 2008. International Institute of Informatics and Systemics, Orlando, FL, USA, pp. 204-208. ISBN 9781934272312
secure channel
Adekunle, A.A. and Woodhead, S.R. (2012) An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication. In: Wireless Advanced (WiAd), 2012. IEEE Conference Publications . Institution of Electrical and Electronics Engineering, Inc., Piscataway, NJ, USA, pp. 1-5. ISBN 9781457721939 (doi:10.1109/WiAd.2012.6296560)
security
Smith, Darren P., Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:10.1109/ICITST.2015.7412128)
security block ciphers
Adekunle, A.A. and Woodhead, S.R. (2010) Zone based systems design framework for the realisation of efficient block cipher based message authentication code algorithms. In: ARES 2010 Fifth International Conference on Availability, Reliability, and Security15-18 February 2010 Krakow, Poland. Conference Publishing Services, IEEE Computer Society, Los Alamitos, California, pp. 216-221. ISBN 9781424458790 (doi:10.1109/ARES.2010.109)
signal processing
Woodhead, Steve and Amadi-Echendu, J.E. (1995) Solid phase velocity measurements utilising electrostatic sensors and cross correlation signal processing. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 774-777. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515421)
Simulation
Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027
Tidy, Luc, Woodhead, Steve and Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 (2013) A large-scale zero-day worm simulator for cyber-epidemiological analysis. In: International Conference On Advances In Computer Science And Electronics Engineering - CSEE 2013. Institute of Research Engineers and Doctors (IRED), Santa Barbara, CA, USA, pp. 230-234. ISBN 978-981-07-5461-7 (doi:10.3850/978-981-07-5461-7_45)
skipjack
Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:10.1109/NGMAST.2009.78)
SLAM
Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824, Taylor, Matthew and Hurley-Smith, Darren (2015) Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM. In: 22nd International Conference on Systems, Signals and Image Processing. IEEE, London, UK, pp. 81-84. ISBN 9781467383523 (doi:10.1109/IWSSIP.2015.7314182)
Slammer
Shahzad, Khurram and Woodhead, Stephen (2015) Empirical analysis of an improved countermeasure against computer network worms. In: 6th International Conference on Computing, Communication and Networking Technologies. IEEE (Institute of Electrical and Electronics Engineers), Denton, USA.
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
solid gas flows
Amadi-Echendu, J.E. and Woodhead, Steve (1995) Characterising noise signals in 2-phase solid gas flows. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 778-781. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515422)
solid phase velocity measurements
Woodhead, Steve and Amadi-Echendu, J.E. (1995) Solid phase velocity measurements utilising electrostatic sensors and cross correlation signal processing. 1995 IEEE Instrumentation and Measurement Technology. Institute of Electrical and Electronics Engineers, New York, pp. 774-777. ISBN 978-0780326156 (doi:10.1109/IMTC.1995.515421)
Susceptible-Infected (SI)
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
temporal business rules
Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 and Woodhead, Steve (2008) Investigation into a modular rule-based testing method for testing business rules in scheduling applications. In: Proceedings of the 12th Word Multi-Conference on Systemics, Cybernetics and Informatics; Jointly with the 14th International Conference on Information Systems Analysis and Synthesis; WMSCI 2008. International Institute of Informatics and Systemics, Orlando, FL, USA, pp. 204-208. ISBN 9781934272312
third-party authentication
Woodhead, Steve and Ma, Mingchao (2006) Authentication delegation for subscription-based remote network services. Computers and Security, 25 (5). pp. 371-378. ISSN 0167-4048 (doi:10.1016/j.cose.2006.03.006)
TinyAEAD
Adekunle, A.A. and Woodhead, S.R. (2012) An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication. In: Wireless Advanced (WiAd), 2012. IEEE Conference Publications . Institution of Electrical and Electronics Engineering, Inc., Piscataway, NJ, USA, pp. 1-5. ISBN 9781457721939 (doi:10.1109/WiAd.2012.6296560)
ubiquitous networks
Adekunle, A.A. and Woodhead, S.R. (2010) Zone based systems design framework for the realisation of efficient block cipher based message authentication code algorithms. In: ARES 2010 Fifth International Conference on Availability, Reliability, and Security15-18 February 2010 Krakow, Poland. Conference Publishing Services, IEEE Computer Society, Los Alamitos, California, pp. 216-221. ISBN 9781424458790 (doi:10.1109/ARES.2010.109)
Velocity measurement
Yan, Y., Byrne, B., Woodhead, Steve and Coulthard, John M. (1995) Velocity measurement of pneumatically conveyed solids using electrodynamic sensors. Measurement Science and Technology, 6 (5). pp. 515-537. ISSN 0957-0233 (Print), 1361-6501 (Online) (doi:10.1088/0957-0233/6/5/013)
virtual closed network
Smith, Darren P., Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:10.1109/ICITST.2015.7412128)
virtual private network
Smith, Darren P., Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:10.1109/ICITST.2015.7412128)
wireless sensor networks
Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:10.1109/NGMAST.2009.78)
Witty
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
Worm containment
Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)
Worm detection
Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)
Worms
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
XML
Woodhead, Steve and Ma, Mingchao (2006) Authentication delegation for subscription-based remote network services. Computers and Security, 25 (5). pp. 371-378. ISSN 0167-4048 (doi:10.1016/j.cose.2006.03.006)
XML and .NET Framework
Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 and Woodhead, Steve (2008) Investigation into a modular rule-based testing method for testing business rules in scheduling applications. In: Proceedings of the 12th Word Multi-Conference on Systemics, Cybernetics and Informatics; Jointly with the 14th International Conference on Information Systems Analysis and Synthesis; WMSCI 2008. International Institute of Informatics and Systemics, Orlando, FL, USA, pp. 204-208. ISBN 9781934272312
Yttrium
Shahzad, Khurram and Woodhead, Steve (2016) Epidemiological modeling of network worm infections and countermeasures. In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp. 628-633. ISBN 978-1-5090-1949-6 ISSN 978-1-5090-1950-2 (Online) (doi:10.1109/IntelCIS.2015.7397288)
Zero-Day Worm
Tidy, Luc, Shahzad, Khurram, Ahmad, Muhammad Aminu and Woodhead, Steve (2014) An assessment of the contemporary threat posed by network worm malware. In: ICSNC 2014: The Ninth International Conference on Systems and Networks Communications. IARIA, Nice, France, pp. 92-98. ISBN 9781612083681 ISSN 2163-9027
Tidy, Luc, Woodhead, Steve and Wetherall, Jodie ORCID: https://orcid.org/0000-0002-4786-5824 (2013) A large-scale zero-day worm simulator for cyber-epidemiological analysis. In: International Conference On Advances In Computer Science And Electronics Engineering - CSEE 2013. Institute of Research Engineers and Doctors (IRED), Santa Barbara, CA, USA, pp. 230-234. ISBN 978-981-07-5461-7 (doi:10.3850/978-981-07-5461-7_45)