Up a level |
- Library of Congress Subject Areas (8)
- Q Science (8)
- QA Mathematics (8)
- QA75 Electronic computers. Computer science (8)
- QA76.9.A25 Computer security (8)
- QA75 Electronic computers. Computer science (8)
- QA Mathematics (8)
- Q Science (8)
Number of items at this level: 8.
Article
- Montasari, R., Hill, R., Hosseinian-Far, A. and Montaseri, F. (2018) Countermeasures for timing-based side-channel attacks against shared, modern computing hardware. International Journal of Electronic Security and Digital Forensics. 1751-911X. (Accepted)
- Yu, Y., Kaiya, H., Yoshioka, N., Hu, Z., Washizaki, H., Xiong, Y. and Hosseinian-Far, A. (2018) Goal modelling for security problem matching and pattern enforcement. International Journal of Secure Software Engineering (IJSSE). 8(3), pp. 42-57. 1947-3036.
Book Section
- Dean, A. and Opoku Agyeman, M. (2018) A study of the advances in IoT security. In: International Symposium on Computer Science and Intelligent Control. Sweden: ISCSIC. (Accepted)
- Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Chatrabgoun, O. and Montasari, R. (2018) Crime data mining, threat analysis and prediction. In: Jahankhani, H. (ed.) Cyber Criminology. Springer. (Accepted)
- Hills, M. (2017) Always on guard: how a corporate immune system can engage full-spectrum risks – a conceptual framework to re-engineer organizational capability and culture. In: Bajgoric, N. (ed.) Always-On Enterprise Information Systems for Modern Organizations. London: IGI Global. pp. 41-59.
- Mahmood, J. K. and Opoku Agyeman, M. (2018) An overview of prevention/mitigation against memory corruption attack. In: International Symposium on Computer Science and Intelligent Control. Sweden: ISCSIC. (Accepted)
- Montasari, R., Hosseinian-Far, A. and Hill, R. (2018) Policies and innovative self-adaptive techniques to counter adversarial attacks in network and cyber environments. In: Jahankhani, H. (ed.) Cyber Criminology. Springer. (Accepted)
Conference Proceedings
- Sadkhan, S., Al-Sherbaz, A. and Mohammed, R. (2015) Chaos based cryptography for voice encryption in wireless communication. In: International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE). Iraq: IEEE. pp. 191-197.