Items where Division is "Faculty of Computing, Engineering and the Built Environment > School of Computing and Digital Technology > Cyber Security" and Year is 2013

Up a level
Export as [feed] RSS
Group by: Creators | Item Type | No Grouping
Jump to: A | C | H | K
Number of items: 5.

A

Alcaide, Almudena and Palomar, Esther and Montero-Castillo, José and Ribagorda, Arturo (2013) Anonymous authentication for privacy-preserving IoT target-driven applications. Computers & Security, 37. pp. 111-123. ISSN 01674048

C

Cui, Z and Herwono, I and Kearney, Paul (2013) Multi-Stage Attack Modelling: your new weapon against sophisticated cyber attacks. In: CyberPatterns, 8-9 July, Abingdon.

H

Huang, Xiaowei and Meyden, Ron (2013) Symbolic Synthesis of Knowledge-based Program Implementations with Synchronous Semantics. In: In the Fourteenth conference on Theoretical Aspects of Rationality and Knowledge (TARK 2013), 2013.

K

Kearney, Paul (2013) Multi-Stage Attack Modelling: your new weapon against sophisticated cyber attacks. European Union.

Kearney, Paul (2013) Should you get your retaliation in first? BT.

This list was generated on Thu Jun 17 06:06:40 2021 UTC.

Research

In this section...