Academic Centre of Excellence in Cyber Security

Publications

Publications by members of the Southampton Academic Centre of Excellence in Cyber Security for the past year.

Article

2017

Stalla-Bourdillon, Sophie, Rosati, Eleonora, Turk, Karmen, Angelopoulos, Christina, Kuczerawy, Aleksandra, Peguera, Miquel and Husovec, Martin (2017) An academic perspective on the copyright reform Computer Law & Security Review, 33, (1), pp. 3-13. (doi:10.1016/j.clsr.2016.12.003).
Morgan, K.A., Fan, J., Huang, R., Zhong, L., Gowers, R., Ou, J.-Y., Jiang, L. and de Groot, C.H. (2017) Active counter electrode in a-SiC electrochemical metallization memory Journal of Physics D: Applied Physics
Redman-White, William, Kennedy, Henry, Bodnar, Rares and Lee, Teerasak (2017) Adaptive tuning of large-signal resonant circuits using phase-switched fractional capacitance IEEE Transactions on Circuits and Systems II, 64, (9), pp. 1072-1076.
Alotaibi, Hanan, Crowder, Richard and Wills, Gary (2017) Adoption of Web based Knowledge Sharing system amongst Academic Staff Journal of Advanced Management Science, 5, (1), pp. 57-63.
Fan, Junqing, Jiang, Liudi, Wang, Shuncai, Huang, Ruomeng, Morgan, Katrina, Zhong, Le and de Groot, Kees (2017) Amorphous SiC resistive memory with embedded Cu nanoparticles [in special issue: Micro/Nano Devices and Systems Edited by Bernhard Jakoby and Roman Beigelbeck] Microelectronic Engineering, 174, pp. 1-5. (doi:10.1016/j.mee.2016.12.005).
Stalla-Bourdillon, Sophie and Knight, Alison (2017) Anonymous data v. personal data—a false debate: an EU perspective on anonymization, pseudonymization and personal data Wisconsin International Law Journal, pp. 284-322.
Pruna, Radu T., Polukarov, Maria and Jennings, Nicholas R. (2017) Avoiding regret in an agent-based asset pricing model Finance Research Letters (doi:10.1016/j.frl.2017.09.014).
Alqahtani, Asma, Abdullah Jarullah Aljarullah, Crowder, Richard and Wills, Gary (2017) Barriers to the adoption of EHR systems in the Kingdom of Saudi Arabia: an exploratory study using a systematic literature review Journal of Health Informatics in Developing Countries, 11, (2)
Akhtar, Zahid, Hadid, Abdenour, Nixon, Mark, Tistarelli, Massimo, Dugelay, Jean-Luc and Marcel, Sebastien (2017) Biometrics: in search of identity and security: (Q & A) IEEE MultiMedia
Abbas, Haider Muhi, Halak, Basel and Zwolinski, Mark (2017) BTI mitigation by anti-ageing software patterns Microelectronics Reliability, 79, (12), pp. 79-90. (doi:10.1016/j.microrel.2017.10.009).
Lee, Teerasak, Kennedy, Henry, Bodnar, Rares and Redman-White, William (2017) A CMOS MF energy harvesting and data demodulator receiver for wide area low duty cycle applications with 250 mV start-up voltage Analog Integrated Circuits and Signal Processing, p. 13.
Anwar, Arif A. and Richards, David J. (2017) A comparison of EC and ABET Accreditation criteria Journal of Professional Issues in Engineering Education and Practice (In Press).
Huang, Ruomeng, Yan, Xingzhao, Ye, Sheng, Kashtiban, Reza J., Beanland, Richard, Morgan, Katrina A., Charlton, Martin D.B. and de Groot, C.H. (2017) Compliance-free ZrO2/ZrO2−x/ZrO2 resistive memory with controllable interfacial multistate switching behaviour Nanoscale Research Letters, 12, (384)
Zhang, Pei, Stalla-Bourdillon, Sophie and Gilbert, Lester (2017) A Content-Linking-Context Model for automatic assessment of web resources in “Notice-and-take-down” Procedures The Journal of Web Science, 3, (1)
Banach, Richard, Butler, Michael, Qin, Shengchao and Zhu, Huibao (2017) Core Hybrid Event-B II: Multiple cooperating Hybrid Event-B machines Science of Computer Programming, 139, pp. 1-35.
Dalvandi, Mohammadsadegh, Butler, Michael and Rezazadeh, Abdolbaghi (2017) Derivation of algorithmic control structures in Event-B refinement Science of Computer Programming, 148, pp. 49-65. (doi:10.1016/j.scico.2017.05.010).
Yang, Mu, Margheri, Andrea, Hu, Runshan and Sassone, Vladimiro (2017) Differentially private data sharing in Cloud Federation with blockchain Cloud Computing Magazine (Submitted).
Duan, Liang, Ma, Shuai, Aggarwal, Charu, Ma, Tiejun and Huai, Jinpeng (2017) An ensemble approach to link prediction IEEE Transactions on Knowledge and Data Engineering, 29, (11), pp. 2402-2416. (doi:10.1109/TKDE.2017.2730207).
Sanchez Garcia, Ruben, Lafont, Jean-Francois, Ortiz, Ivonne and Rham, Alexander (2017) Equivariant K-homology for hyperbolic reflection groups The Quarterly Journal of Mathematics (Submitted).
Degrijse, Dieter and Leary, Ian J. (2017) Equivariant vector bundles over classifying spaces for proper actions Algebraic & Geometric Topology, 17, (1), pp. 131-156. (doi:10.2140/agt.2017.17.131).
Mcgee, Richard and Johnson, Johnnie (2017) Everyone's a winner: The market impact of technologically advantaged agents Economics Letters, 156, pp. 95-98. (doi:10.1016/j.econlet.2017.04.021).
Alharthi, Abdulrahman, Alassafi, Madini, Wills, Gary and Walters, Robert (2017) An exploratory study for investigating the critical success factors for cloud migration in the Saudi Arabian higher education context Telematics and Informatics, 34, (2), pp. 664-678.
Mohd Tuah, Nooralisa, Wanick, Vanissa, Ranchhod, Ashokkumar and Wills, Gary B. (2017) Exploring avatar roles for motivational effects in gameful environments EAI Endorsed Transactions on Creative Technologies, 17, (10) (doi:10.4108/eai.4-9-2017.153055).
Guest, Richard, Miguel-Hurtado, Oscar, Stevenage, Sarah and Black, Sue (2017) Exploring the relationship between stride, stature and hand size for forensic assessment Journal of Forensic and Legal Medicine, 52, pp. 46-55. (doi:10.1016/j.jflm.2017.08.006).
Huang, Ruomeng, Ye, Sheng, Sun, Kai, Kiang, Kian and De Groot, Cornelis (2017) Fermi level tuning of ZnO films through supercycled atomic layer deposition Nanoscale Research Letters (doi:10.1186/s11671-017-2308-1).
Alassafi, Madini O., Alharthi, Abdulrahman, Walters, Robert J. and Wills, Gary B. (2017) A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies Telematics and Informatics, 31, (5) (doi:10.1016/j.tele.2017.04.010).
Thorburn, Robert, Stalla-Bourdillon, Sophie and Rosati, Eleonora (2017) iCLIC Data Mining and Data Sharing workshop: the present and future of data mining and data sharing in the EU Computer Law & Security Review, pp. 1-9. (doi:10.1016/j.clsr.2016.12.004).
Tsakalakis, Niko, Stalla-Bourdillon, Sophie and O'Hara, Kieron (2017) Identity Assurance in the UK: technical implementation and legal implications under eIDAS The Journal of Web Science
Restocchi, Valerio, Mcgroarty, Frank, Gerding, Enrico and Johnson, Johnnie (2017) The impact of transaction costs on state-contingent claims mispricing Finance Research Letters (doi:10.1016/j.frl.2017.02.006).
Jeamwatthanachai, Watthanasak, Wald, Michael and Wills, Gary (2017) Map data representation for indoor navigation by blind people International Journal of Chaotic Computing, 4, (1), pp. 70-78.
Stein, Sebastian, Gerding, Enrico, Nedea, Adrian, Rosenfeld, Avi and Jennings, Nicholas (2017) Market interfaces for electric vehicle charging Journal of Artificial Intelligence Research, 59, pp. 175-227. (doi:10.1613/jair.5387).
Wang, Lei, Coombs, William M., Augarde, Charles E., Brown, Michael, Knappett, Jonathan, Brennan, Andrew, Richards, David and Blake, Anthony (2017) Modelling screwpile installation using the MPM Physics Procedia, 175, (1), pp. 124-132. (doi:10.1016/j.proeng.2017.01.040).
Sai, Gaole, Halak, Basel and Zwolinski, Mark (2017) Multi-Path Ageing Sensor for Cost-efficient Delay Fault Prediction IEEE Transactions on Circuits and Systems Part II: Analog and Digital Signal Processing (doi:10.1109/TCSII.2017.2732028).
Riedel, Christoph A., Sun, Kai, Muskens, Otto L. and De Groot, Kees (2017) Nanoscale modeling of electro-plasmonic tunable devices for modulators and metasurfaces Optics Express, 25, (9), p. 10031. (doi:10.1364/OE.25.010031).
Kontogeorgaki, Styliani, Sanchez Garcia, Ruben, Zygalakis, Konstantinos, Ewing, Robert and Macarthur, Benjamin (2017) Noise-processing by signaling networks Scientific Reports, 7 (doi:10.1038/s41598-017-00659-x). (Submitted).
Rosa Marreiros, Helia, Tonin, Mirco, Vlassopoulos, Michael and Schraefel, Monica (2017) “Now that you mention it”: a survey experiment on information, inattention and online privacy Journal of Economic Behavior & Organization (doi:10.1016/j.jebo.2017.03.024).
Leary, Ian J. and Petrosyan, Nansen (2017) On dimensions of groups with cocompact classifying spaces for proper actions Advances in Mathematics, 311, pp. 730-747. (doi:10.1016/j.aim.2017.03.008).
Dawson, I., Johnson, J.E.V and Luke, M. (2017) One too many? Understanding the influence of risk factor quantity on perceptions of risk Risk Analysis, 37, (6), pp. 1157-1169. (doi:10.1111/risa.12690).
Parker, Ben, Gilmour, Steven and Schormans, John (2017) Optimal design of experiments on connected units with application to social networks Journal of the Royal Statistical Society. Series C: Applied Statistics, pp. 1-24. (doi:10.1111/rssc.12170).
Hamadou, Sardouna, Palamidessi, Catuscia and Sassone, Vladimiro (2017) Quantifying leakage in the presence of unreliable sources of information Journal of Computer and System Sciences, 88, pp. 27-52. (doi:10.1016/j.jcss.2017.03.013).
Huang, Ruomeng, Yan, Xingzhao, Morgan, Katrina A., Charlton, Martin D.B. and De Groot, C.H. (Kees) (2017) Selection by current compliance of negative and positive bipolar resistive switching behaviour in ZrO2−x/ZrO2 bilayer memory Journal of Physics D: Applied Physics, 50, (17) (doi:10.1088/1361-6463/aa64bc).
Almudhahka, Nawaf, Yousef, Nixon, Mark and Hare, Jonathon (2017) Semantic face signatures: recognizing and retrieving faces by verbal descriptions IEEE Transactions on Information Forensics and Security, 14, (8) (doi:10.1109/TIFS.2017.2765519).
Ma, Tiejun and Mcgroarty, Frank (2017) Social Machines: How recent technological advances have aided financialisation Journal of Information Technology, pp. 1-16.
Leary, Ian J. (2017) Subgroups of almost finitely presented groups arXiv, pp. 1-7.
Chatzikyriakou, Eleni, Potter, Kenneth and De Groot, Cornelis (2017) A systematic method for simulating total ionizing dose effects using the finite elements method Journal of Computational Electronics, pp. 1-8.
Moreau, Luc, Batlajery, Belfrit Victor, Huynh, Dong, Michaelides, Danius and Packer, Heather (2017) A templating system to generate provenance IEEE Transactions on Software Engineering (In Press).
Hoang, Son, Voisin, Laurent, Salehi Fathabadi, Asieh, Butler, Michael, Wilkinson, Toby and Beauger, Nicolas (2017) Theory plug-in for Rodin 3.x Computing Research Repository, abs/1701.08625, pp. 1-9.
Hussein, Raid Khalid, Alenezi, Ahmed, Atlam, Hany F., Mohammed, Mohammed Q., Walters, Robert J. and Wills, Gary B. (2017) Toward confirming a framework for securing the virtual machine image in cloud computing Advances in Science, Technology and Engineering Systems Journal, 2, (4), pp. 44-50.
Nixon, Mark, Guo, Bingchen, Stevenage, Sarah, Jaha, Emad, Almudhahka, Nawaf and Martinho-Corbishley, Daniel (2017) Towards automated eyewitness descriptions: describing the face, body and clothing for recognition Visual Cognition (doi:10.1080/13506285.2016.1266426).
Stevenage, Sarah, Bennett, Alice and Pitfield, Christy (2017) Training and performance measures for novices to the area of fingerprint analysis Forensic Science International (doi:10.1016/j.dib.2017.06.036).
Leary, Ian J. (2017) Uncountably many groups of type FP arXiv, pp. 1-35.
Selmo, David, Sturt, Fraser, Miles, James, Edward, Basford, Philip, Malzbender, Tom, Martinez, Kirk, Thompson, Charlie, Earl, Graeme and Bevan, George (2017) Underwater reflectance transformation imaging: a technology for in situ underwater cultural heritage object-level recording Journal of Electronic Imaging, 26, (1)
Hoang, Thai Son, Snook, Colin, Salehi Fathabadi, Asieh, Butler, Michael and Ladenberger, Lukas (2017) Validating and verifying the requirements and design of a haemodialysis machine using the rodin toolset Science of Computer Programming (doi:10.1016/j.scico.2017.11.002).

Book

Book Section

2017

Hu, Runshan, Stalla-Bourdillon, Sophie, Yang, Mu, Schiavo, Valeria and Sassone, Vladimiro (2017) Bridging policy, regulation and practice? A techno-legal analysis of three types of data in the GDPR In, Leenes, Ronald, van Brakel, Rosamunde, Gutwirth, Serge and De Hert, Paul (eds.) Data Protection and Privacy: the Age of Intelligent Machines. Haywards Heath, Hart (Computers, Privacy and Data Protection, 10).
Stalla-Bourdillon, Sophie (2017) Internet intermediaries as responsible actors? Why it is time to rethink the e-Commerce Directive as well... In, Taddeo, Mariarosaria and Floridi, Luciano (eds.) The Responsibilities of Online Service Providers. Cham, CH, Springer International Publishing (Law, Governance and Technology Series, 31). (doi:10.1007/978-3-319-47852-4_15).
Aaber, Zeyad, Sabah, Wills, Gary B. and Crowder, Richard M. (2017) Protecting Document Outside Enterprise Network: A Confirmed Framework In, Chang, Victor, Ramachandran, Muthu, Walters, Robert J. and Wills, Gary (eds.) Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papers. Cham, Springer International Publishing pp. 259-275.
Stalla-Bourdillon, Sophie (2017) Qui sonne le glas des intermédiaires de l’Internet In, Sénéchal, Juliette and Stalla-Bourdillon, Sophie (eds.) Rôle et Responsabilité Juridiques des Plateformes en Ligne: Approche(s) Transversale(s) ou Approches Sectorielles? IRJS Editions
Butler, Michael (2017) Reasoned modelling with Event-B In, Bowen, Jonathan P., Liu, Zhiming and Zhang, Zili (eds.) Engineering Trustworthy Software Systems. Heidelberg, DE, Springer pp. 51-109. (Lecture Notes in Computer Science, 10215).
Alassafi, Madini, Obad, Hussein, Raid, Khalid Hussein, Wills, Gary, Gashgari, Ghada, Abdalaziz A and Walters, Robert (2017) Security in organisations: governance, risks and vulnerabilities in moving to the cloud In, Chang, V., Ramachandran, M., Walters, R. and Wills, G. (eds.) Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papers. Cham, Switzerland, Springer International Publishing (Lecture Notes in Computer Science, 10131). (doi:10.1007/978-3-319-54380-2_11).
Yahya, Fara, Walters, Robert J. and Wills, Gary B. (2017) Using Goal-Question-Metric (GQM) approach to assess security in cloud storage In, Chang, Victor, Ramachandran, M., Walters, R. and Wills, Gary (eds.) Enterprise Security. Springer pp. 223-240. (Lecture Notes in Computer Science, 10131). (doi:10.1007/978-3-319-54380-2_10).

2018

Cradock, Emma and Stalla-Bourdillon, Sophie (2018) Article 11 of the General Data Protection Regulation In, Spiecker Döhmann, Indra, Papakonstantinou, Vagelis, Hornung, Gerrit and de Hert, Paul (eds.) Commentary on the General Data Protection Regulation. Nomos (In Press).
Cradock, Emma and Stalla-Bourdillon, Sophie (2018) Article 21 of the General Data Protection Regulation In, Spiecker Döhmann, Indra, Papakonstantinou, Vagelis, Hornung, Gerrit and de Hert, Paul (eds.) Commentary on the General Data Protection Regulation. Nomos (In Press).
Cradock, Emma and Stalla-Bourdillon, Sophie (2018) Article 30 of the General Data Protection Regulation In, Spiecker Döhmann, Indra, Papakonstantinou, Vagelis, Hornung, Gerrit and de Hert, Paul (eds.) Commentary on the General Data Protection Regulation. Nomos (In Press).
Papadaki, Evangelia and Stalla-Bourdillon, Sophie (2018) Article 32 of the General Data Protection Regulation In, Spiecker Döhmann, Indra, Papakonstantinou, Vagelis, Hornung, Gerrit and de Hert, Paul (eds.) Commentary on the General Data Protection Regulation. Nomos (In Press).
Tsakalakis, Niko and Stalla-Bourdillon, Sophie (2018) Article 87 of the Generral Data Protection Regulation In, Spiecker Döhmann, Indra, Papakonstantinou, Vagelis, Hornung, Gerrit and de Hert, Paul (eds.) Commentary on the General Data Protection Regulation. Nomos (In Press).
Cradock, Emma and Stalla-Bourdillon, Sophie (2018) Article 89 of the General Data Protection Regulation In, Spiecker Döhmann, Indra, Papakonstantinou, Vagelis, Hornung, Gerrit and de Hert, Paul (eds.) Commentary on the General Data Protection Regulation. Nomos (In Press).
Smart, Paul R. and Shadbolt, Nigel (2018) The World Wide Web In, Chase, James and Coady, David (eds.) Routledge Handbook of Applied Epistemology. New York, New York, USA, Routledge

Conference or Workshop Item

2017

Abuzaina, Anas, Nixon, Mark and Carter, John (2017) 3D Motion Estimation By Evidence Gathering In 2016 23rd International Conference on Pattern Recognition (ICPR 2016): Proceedings of a meeting held 4-8 December 2016, Cancun, Mexico. IEEE.. (doi:10.1109/ICPR.2016.7899890).
Duan, Shengyu, Halak, Basel and Zwolinski, Mark (2017) An ageing-aware Digital Synthesis Approach In 14th International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design: SMACD 2017. IEEE..
Almansour, Ibrahem, Abdullah, Gerding, Enrico and Wills, Gary (2017) An Agent Trading on Behalf of V2G Drivers in a Day-Ahead Price Market At International Conference on Vehicle Technology and Intelligent Transport Systems, Porto, Portugal. 22 - 24 Apr 2017. 7 pp.
Snook, Colin, Hoang, Thai Son and Butler, Michael (2017) Analysing security protocols using refinement in iUML-B At 9th NASA Formal Methods Symposium, Moffett Field, CA, United States. 16 - 18 May 2017. 15 pp, pp. 84-98.
Pruna, Radu, Polukarov, Maria and Jennings, Nicholas (2017) An asset pricing model with loss aversion and its stylized facts At IEEE SSCI 2016, Greece. 06 - 09 Dec 2016. 8 pp. (doi:10.1109/SSCI.2016.7850003).
Baarslag, Tim, Alper, Alan, Gomer, Richard, Alam, Muddasser, Charith, Perera, Gerding, Enrico and schraefel, m.c. (2017) An automated negotiation agent for permission management At AAMAS 2017, Sao Paulo, Brazil. 08 - 12 May 2017. 8 pp.
Almudhahka, Nawaf, Yousef, Nixon, Mark and Hare, Jonathon (2017) Automatic semantic face recognition At The 12th IEEE International Conference on Automatic Face and Gesture Recognition, Washington, United States. 30 May - 03 Jun 2017.
Gaetani, Edoardo, Aniello, Leonardo, Baldoni, Roberto, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro (2017) Blockchain-based database to ensure data integrity in cloud computing environments At Italian Conference on Cybersecurity, Venice, Italy. 17 - 20 Jan 2017. 10 pp.
Yahya, Fara, Walters, Robert J and Wills, Gary B (2017) Clustering goal-driven security factors for protecting data in cloud storage using Exploratory Factor Analysis (EFA): an empirical study In Proceedings of the 7th International Conference on Cloud Computing and Services Science. vol. 1 - CLOSER, INSTICC. 482 pp, p. 475.
Marmion, Vincent, Joseph, Bishop, Felicity, Millard, David E. and Stevenage, Sarah V. (2017) The cognitive heuristics behind disclosure decisions In Social Informatics. SocInfo 2017. vol. 10539, Springer., pp. 591-607.
Cobos, Ruth, Wilde, Adriana and Zaluska, Ed (2017) Comparing attrition prediction in FutureLearn and edX MOOCs At FutureLearn Workshop in Learning Analytics and Knowledge 2017, Vancouver, Canada. 13 - 17 Mar 2017. 20 pp.
Hoang, Thai Son, Dghaym, Dana, Snook, Colin and Butler, Michael (2017) A composition mechanism for refinement-based methods At 22nd International Conference on Engineering of Complex Computer Systems, Fukuoka, Japan. 05 - 08 Nov 2017. 10 pp.
Nguyen, Truc L., Fischer, Bernd, La Torre, Salvatore and Parlato, Gennaro (2017) Concurrent program verification with Lazy sequentialization and interval analysis In The 5th Edition of The International Conference on Networked sYStems. Springer. 15 pp, pp. 255-271. (doi:10.1007/978-3-319-59647-1_20).
Redman-White, William, Bodnar, Rares and Kennedy, Henry (2017) Continuous tuning of inductive link antennae with zero voltage switched fractional capacitance At 59th IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2016, Abu Dhabi, United Arab Emirates. 16 - 19 Oct 2016.
Sai, Gaole, Halak, Basel and Zwolinski, Mark (2017) A cost-efficient delay-fault monitor In IEEE International Symposium on Circuits and Systems: ISCAS 2017. IEEE. 4 pp. (doi:10.1109/ISCAS.2017.8050830).
Nicoletti, Luca, Lombardi, Federico, Margheri, Andrea, Sassone, Vladimiro and Schiavo, Francesco Paolo (2017) Cross-cloud management of sensitive data via Blockchain: a payslip calculation use case At Italian Conference on Cybersecurity, Venice, Italy. 17 - 20 Jan 2017. 5 pp. (Submitted).
Ferdous, Md Sadek, Margheri, Andrea, Paci, Federica, Yang, Mu and Sassone, Vladimiro (2017) Decentralised runtime monitoring for access control systems in cloud federations At IEEE International Conference on Distributed Computing, Atlanta, United States. 05 - 08 Jun 2017.
Atlam, Hany F., Wills, Gary B., Walters, Robert J., Alenezi, Ahmed and Daniel, Joshua (2017) Developing an adaptive Risk-based access control model for the Internet of Things In 10th IEEE International conference on Internet of Things (iThings-2017). IEEE Press. 7 pp, pp. 1-7.
Alansari, Shorouq, Paci, Federica and Sassone, Vladimiro (2017) A distributed access control system for cloud federations At IEEE International Conference on Distributed Computing, Atlanta, United States. 05 - 08 Jun 2017. 6 pp.
Margheri, Andrea, Ferdous, Md Sadek, Yang, Mu and Sassone, Vladimiro (2017) A distributed infrastructure for democratic cloud federations At IEEE International Conference on Cloud Computing 2017, Honolulu, United States. 25 - 30 Jun 2017.
Ma, Tiejun, Moreno Paredes, Juan, Carlos, Sung, Ming-Chien and Johnson, Johnnie (2017) Do Smartphone Apps Enhance Smart Trading Decisions? At 7th Annual SKBI Conference 2017, Singapore, Singapore. 26 May 2017.
Waniek, Marcin, Tran-Thanh, Long, Michalak, Tomasz P. and Jennings, Nicholas (2017) The dollar auction with spiteful players In Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence and the Twenty-Ninth Innovative Applications of Artificial Intelligence Conference. vol. 1, Association for the Advancement of Artificial Intelligence. 7 pp.
Sethi, Aneesha, Paci, Federica and Wills, Gary (2017) EEVi – framework for evaluating the effectiveness of visualization in cyber-security At The 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Spain. 05 - 07 Dec 2016. 6 pp, pp. 340-345.
Fair, Nicholas, Sebastian Russell, Harris, Lisa and Leon Urrutia, Manuel (2017) Enhancing the student experience: integrating MOOCs into campus based modules At ICEM 2017, Naples, Italy. 20 - 22 Sep 2017. 26 pp.
Stein, Sebastian, Gerding, Enrico, Nedea, A, Rosenfeld, Avi and Jennings, Nicholas (2017) Evaluating market user interfaces for electric vehicle charging using Bid2Charge At International Joint Conference on Artificial Intelligence (IJCAI), Melbourne, Australia. 19 - 25 Aug 2017. 5 pp, pp. 4939-4943.
Sethi, Aneesha and Wills, Gary (2017) Expert-interviews led analysis of EEVi - a model for effective visualization in cyber-security At IEEE Symposium on Visualization for Cyber Security, Phoenix, United States. 02 Oct 2017. 8 pp. (doi:10.1109/VIZSEC.2017.8062195).
Dghaym, Dana, Butler, Michael and Salehi Fathabadi, Asieh (2017) Extending ERS for modelling dynamic workflows in Event-B At 22nd International Conference on Engineering of Complex Computer Systems, Fukuoka, Japan. 05 - 08 Nov 2017. 10 pp.
Fraccoli, Enrico, Stefanni, Francesco, Fummi, Franco and Zwolinski, Mark (2017) Fault analysis in analog circuits through language manipulation and abstraction At Forum on specification & Design Languages, Verona, Italy. 18 - 20 Sep 2017. 7 pp.
Howard, Giles, Butler, Michael, Colley, John and Sassone, Vladimiro (2017) Formal analysis of safety and security requirements of critical systems supported by an extended STPA methodology At 2nd Workshop on Safety & Security aSSurance, Paris, France. 29 Apr 2017. 6 pp. (In Press). (doi:10.1109/EuroSPW.2017.68).
Bogdiukiewicz, Chris, Butler, Michael, Hoang, Thai Son, Paxton, Martin, Snook, James, Harvey, Waldron, Xanthippe and Wilkinson, Toby (2017) Formal development of policing functions for intelligent systems At The 28th International Symposium on Software Reliability Engineering (ISSRE), Toulouse, France. 23 - 26 Oct 2017. 11 pp.
Bogdiukiewicz, Chris, Butler, Michael, Hoang, Thai Son, Paxton, Martin, Snook, James, Harvey, Waldron, Xanthippe and Wilkinson, Toby (2017) Formal development of policing functions for intelligent systems In 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE),. IEEE. 11 pp. (doi:10.1109/ISSRE.2017.40).
Butler, Michael, Dghaym, Dana, Fischer, Tomas, Hoang, Thai Son, Reichl, Klaus, Snook, Colin and Tummeltshammer, Peter, (2017) Formal modelling techniques for efficient development of railway control products Fantechi, A., Lecomte, T. and Romanovsky, A. (eds.) In RSSRail 2017: Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification. vol. 10598, Springer.. (doi:10.1007/978-3-319-68499-4_5).
Alenezi, Ahmed, Hussein, Raid, Khalid Hussein, Walters, Robert and Wills, Gary (2017) A Framework for Cloud Forensic Readiness in Organizations In 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). IEEE., 199 - 204.
Alqahtani, Asma Aljarullah, Crowder, Richard and Wills, Gary (2017) A framework for the adoption of EHRs by primary healthcare physicians in the Kingdom of Saudi Arabia At International Conference on Information Society, Dublin, Ireland. 17 - 19 Jul 2017. 6 pp.
Liu, Noreena, Wills, Gary and Ranchhod, Ashokkumar (2017) Games for change applications in dementia care At 27th Alzheimer Europe Conference, Berlin, Germany. 02 - 04 Oct 2017. 1 pp, p. 79.
Woo, Lai Leng, Halak, Basel and Zwolinski, Mark (2017) Hardware performance counters for system reliability monitoring In 2nd International Verification and Security Workshop: IVSW 2017. IEEE..
Stein, Sebastian, Eshghi, Soheil, Maghsudi, Setareh, Tassiulas, Leandros, Bellamy, Rachel K. E. and Jennings, Nicholas (2017) Heuristic algorithms for influence maximization in partially observable social networks In Proceedings of the 3rd International Workshop on Social Influence Analysis (SocInf 2017): in conjunction with the Twenty-Sixth International Joint Conference on Artificial Intelligence, Melbourne, Australia, August 19, 2017. vol. 1893, , pp. 20-32.
Alenezi, Ahmed, Zulkipli, Nurul H. N., Atlam, H. F.,, Walters, Robert and Wills, Gary (2017) The impact of cloud forensic readiness on security In 7th International Conference on Cloud Computing and Services Science (CLOSER). vol. 1, 7 pp, pp. 539-545. (doi:10.5220/0006332705390545).
Al-Brashdi, Ahmed, Zahran Nasser, Butler, Michael and Rezazadeh, Abdolbaghi (2017) Incremental database design using UML-B and Event-B At 2nd Workshop on Formal and Model-Driven Techniques for Developing Trustworthy Systems, Xi'an, China. 16 Nov 2017. 13 pp.
Stein, Sebastian, Eshghi, Soheil, Maghsudi, Setareh, Tassiulas, Leandros, Bellamy, Rachel K.E. and Jennings, Nicholas (2017) Influence maximisation beyond organisational boundaries In 3rd IEEE Smart World Congress (SmartWorld 2017). IEEE. 6 pp.
Luangmaneerote, Sakchan, Zaluska, Edward and Carr, Leslie (2017) Inhibiting browser fingerprinting and tracking At IEEE BigDataSecurity/HPSC/IDS 2017, Beijing Shi, China. 25 - 28 May 2017. 6 pp.
Atlam, Hany, Fathy, Alenezi, Ahmed, Alharthi, Abdulrahman, Ayad, Walters, Robert and Wills, Gary (2017) Integration of cloud computing with internet of things: challenges and open issues 6 pp, pp. 1-6.
Zulkipli, Nurul H. N.,, Alenezi, Ahmed and Wills, Gary (2017) IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things In 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS). vol. 1, (doi:10.5220/0006308703150324).
NGUYEN, TRUC L, Inverso, Omar, Fischer, Bernd, La Torre, Salvatore and Parlato, Gennaro, (2017) Lazy-CSeq 2.0: combining lazy sequentialization with abstract interpretation: (Competition contribution) Legay, Axel and Margaria, Tiziana (eds.) In Tools and Algorithms for the Construction and Analysis of Systems: 23rd International Conference, TACAS 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, P. vol. 10206, Springer. 4 pp.
Lomeli-R., Jaime and Nixon, Mark, (2017) Learning salient structures for the analysis of symmetric patterns Karray, F., Campilho, A. and Cheriet, F. (eds.) In Image Analysis and Recognition. ICIAR 2017. vol. 10317, Springer. 10 pp, pp. 286-295. (doi:10.1007/978-3-319-59876-5_32).
Mispan, Mohd Syafiq, Halak, Basel and Zwolinski, Mark (2017) Lightweight obfuscation techniques for modeling attacks resistant PUFs In 2nd International Verification and Security Workshop: IVSW 2017. IEEE..
Snow, Stephen, Auffenberg, Frederik and schraefel, m.c. (2017) Log it while it’s hot: designing human interaction with smart thermostats for shared work environments At ACM CHI Conference on Human Factors in Computing Systems, Denver, United States. 06 - 11 May 2017. 12 pp. (doi:10.1145/3025453.3025578).
Jeamwatthanachai, Watthanasak, Wald, Mike and Wills, Gary (2017) Map data representation for indoor navigation At International Conference on Information Society (i-Society-2016), Ireland. 10 - 13 Oct 2016. , pp. 1-6.
Halak, Basel, Zwolinski, Mark and Mispan, M. Syafiq (2017) Overview of PUF-Based hardware security solutions for the internet of things In 2016 IEEE 59th International Midwest Symposium on Circuits and Systems, MWSCAS 2016. IEEE. 4 pp.
Atlam, Hany, Fathy, Alenezi, Ahmed, Walters, Robert and Wills, Gary (2017) An overview of risk estimation techniques in risk-based access control for the internet of things In 2nd International Conference on Internet of Things, Big Data and Security. INSTICC. 7 pp, pp. 254-260. (doi:10.5220/0006292602540260).
Nguyen Lam, Truc, Schrammel, Peter, Fischer, Bernd, La Torre, Salvatore and Parlato, Gennaro (2017) Parallel bug-finding in concurrent programs via reduced interleaving instances At The 32nd IEEE/ACM International Conference on Automated Software Engineering, Urbana, United States. 30 Oct - 03 Nov 2017.
De Angelis, Stefano, Aniello, Leonardo, Baldoni, Roberto, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro (2017) PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain At Italian Conference on Cybersecurity, Venice, Italy. 17 - 20 Jan 2017. 11 pp. (Submitted).
Alansari, Shorouq, Paci, Federica, Margheri, Andrea and Sassone, Vladimiro (2017) Privacy-preserving access control in cloud federations At IEEE International Conference on Cloud Computing 2017, Honolulu, United States. 25 - 30 Jun 2017. 4 pp.
Aniello, Leonardo, Baldoni, Roberto, Gaetani, Edoardo, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro (2017) A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database At European Dependable Computing Conference. 05 - 09 Sep 2017. 4 pp.
Redman-White, William, Kennedy, Henry and Bodnar, Rares (2017) A Self-tuning resonant-inductive-link transmit driver using quadrature symmetric phase switched fractional capacitance At International Solid-State Circuits Conference (ISSCC 2017), United States. 05 - 09 Feb 2017.
Grace, Paul and Surridge, Michael (2017) Towards a model of user-centered privacy preservation At International Conference on Availability, Reliability and Security, Reggio Calabria, Italy. 29 Aug - 01 Sep 2017. 10 pp.
Marmion, Vincent, Joseph, Millard, David, Gerding, Enrico and Stevenage, Sarah (2017) The tragedy of the identity assurance commons At ACM Web Science 2017, Troy, United States. 25 - 28 Jun 2017.
Zenonos, Alexandros, Stein, Sebastian and Jennings, Nicholas (2017) A trust-based coordination system for participatory sensing applications At 5th AAAI Conference on Human Computation and Crowdsourcing, Quebec City, Canada. 24 - 26 Oct 2017. , pp. 226-234.
Fryer, Huw and Simperl, Elena (2017) Web science challenges in researching bug bounties In Proceedings of the 9th ACM Conference on Web Science, WebSci 2017. ACM..

Monograph

2017

Gomer, Richard, Charles, Schraefel, Monica, Gerding, Enrico, Alan, Alper and Filipczuk, Dorota (2017) Building a consentful economy , Southampton University of Southampton
Ferdous, Sadek, Margheri, Andrea, Paci, Federica and Sassone, Vladimiro (2017) Decentralised runtime monitoring for access control systems in cloud federations , Southampton, GB University of Southampton 11pp.
Costa Sperb, Luis Felipe, Sung, Ming-Chien, Ma, Tiejun and Johnson, Johnnie (2017) Determining preference for weather and atmospheric conditions: methodology and an application , Southampton University of Southampton 10pp.
Buneman, Peter, Gascon Caro, Adrian, Moreau, Luc and Murray-Rust, Dave (2017) Provenance Composition in PROV
Tsakalakis, Niko and Stalla-Bourdillon, Sophie , Sel, Marc (ed.) (2017) State of the art in relation to privacy and data protection requirements (preliminary report): Deliverable 2.7 94pp.

Dataset

2017

Moreau, Luc (2017) A Canonical Form for PROV Documents: Dataset Underpinning Evaluation University of Southampton [Dataset]
Rosa Marreiros, Helia, Vlassopoulos, Michael, Tonin, Mirco and Schraefel, Monica (2017) Dataset for "Now that you mention it: A Survey Experiment on Information, Inattention and Online Privacy" University of Southampton doi:10.5258/SOTON/D0085 [Dataset]
Huang, Ruomeng, Ye, Sheng, Sun, Kai, Kiang, Kian and De Groot, Cornelis (2017) Dataset for Fermi level tuning of ZnO films through supercycled atomic layer deposition University of Southampton [Dataset]
Hoang, Thai Son, Dghaym, Dana, Snook, Colin and Butler, Michael (2017) Development of a System Controlling Cars on a Bridge using Machine Inclusion University of Southampton [Dataset]
Baarslag, Tim, Alan, Alper, Gomer, Richard, Alam, Muddasser, charith, perera, Gerding, Enrico and Schraefel, Monica (2017) Meaningful Consent Study 2 Dataset University of Southampton [Dataset]
Snook, Colin, Dghaym, Dana, Hoang, Thai, Butler, Michael, Reichl, Klaus, Fischer, Tomas and Tummeltshammer, Peter (2017) Railground RSSRail models - iUML-B/Event-B University of Southampton doi:10.5258/SOTON/D0184 [Dataset]
Hoang, Thai, Snook, Colin, Dghaym, Dana and Butler, Michael (2017) RailGround using Theory plug-in University of Southampton [Dataset]
Bogdiukiewicz, Chris, Butler, Michael, Hoang, Thai Son, Paxton, Martin, Snook, James, Harvey, Waldron, Xanthippe and Wilkinson, Toby (2017) Route Validation in Event-B University of Southampton [Dataset]

Other

2017

Bedo, Jean Sebastien, El Ayoubi, Salah Eddine, Filippou, Miltiadis, Gavras, Anastasius, Giustiniano, Domenico, Iovanna, Paola, Manzalini, Antonio, Queseth, Olav, Rokkas, Theodoros, Surridge, Michael and Tjelta, Terje (2017) 5G Innovations for New Business Opportunities

To see a full list of publications earlier than the past year, see Earlier Publications.