Currently viewing:
-
A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service
Semal, B., Markantonakis, K., Akram, R. N., Kalbantner, J.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1007/978-3-030-61638-0_20
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/18244/1/CLOUD_SP_2020_paper_9_1_.pdf
- Additional Links
-
View publication in Scopus
-
AM in Royal Holloway University Repository
-
Return-Oriented Programming on RISC-V
Jaloyan, G., Markantonakis, K., Akram, R. N., Robin, D., Mayes, K., Naccache, D.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1145/3320269.3384738
- Additional Links
-
View publication in Scopus
-
User Access Privacy in OAuth 2.0 and OpenID Connect
Li, W., Mitchell, C. J.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1109/EuroSPW51379.2020.00095
- Additional Links
-
View publication in Scopus
-
Blockchain and federated learning-based distributed computing defence framework for sustainable society
Sharma, P. K., Park, J. H., Cho, K.
Sustainable Cities and Society, vol. 59, 102220
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1016/j.scs.2020.102220
- Additional Links
-
View publication in Scopus
-
Driverless Vehicle Security for Military Applications
Bates, N., Akram, R. N.
Computer Weekly, vol. Jul 2020
Contributions to Journals: Articles
-
Blockchain-Based Transaction Validation Protocol for a Secure Distributed IoT Network
Sanwar Hosen, A. S., Singh, S., Sharma, P. K., Ghosh, U., Wang, J., Ra, I. H., Cho, G. H.
IEEE Access, vol. 8, pp. 117266-117277
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1109/ACCESS.2020.3004486
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/15039/1/Hosen_etal_IEEEA_Blockchain_VOR.pdf
- Additional Links
-
View publication in Scopus
-
LogEvent2vec: LogEvent-to-vector based anomaly detection for large-scale logs in internet of things
Wang, J., Tang, Y., He, S., Zhao, C., Sharma, P. K., Alfarraj, O., Tolba, A.
Sensors (Switzerland), vol. 20, no. 9, 2451
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.3390/s20092451
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/14671/1/Wang_etal_sensors_LogEvent2vec_VOR.pdf
- Additional Links
-
View publication in Scopus
-
Analysing Flow Security Properties in Virtualised Computing Systems
Mu, C.
Working Papers and Discussion Papers
- Online
-
http://arxiv.org/abs/2004.05500v1
- Digital Object Identifier
-
https://doi.org/10.48550/arXiv.2004.05500
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/20510/1/2004.05500v1.pdf
-
Wearable Computing for Defence Automation: Opportunities and Challenges in 5G Network
Sharma, P. K., Park, J., Park, J. H., Cho, K.
IEEE Access, vol. 8, pp. 65993-66002
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1109/ACCESS.2020.2985313
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/14688/1/Sharma_etal_IEEEAccess_Wearable_Computing_VOR.pdf
- Additional Links
-
View publication in Scopus
-
Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home
Kaur, M., Kaur, G., Sharma, P. K., Jolfaei, A., Singh, D.
Journal of Supercomputing, vol. 76, no. 4, pp. 2479-2502
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1007/s11227-019-02998-0
- Additional Links
-
View publication in Scopus