The University of Southampton
University of Southampton Institutional Repository

Items where Division is "Current Faculties > Faculty of Engineering and Physical Sciences > School of Electronics and Computer Science > Cyber Security
School of Electronics and Computer Science > Cyber Security" and Year is 2019

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Authors/Creators | Item Type
Number of items: 30.

Biometric systems interaction assessment: the state of the art - Ramon Blanco-Gonzalo, Oscar Miguel-Hurtado and Chiara Lunerti
Type: Article | 2019 | Item not available on this server.

Exploring mobile biometric performance through identification of core factors and relationships - Matthew Boakes, Richard Guest, Farzin Deravi and Barbara Corsetti
Type: Article | 2019 | Item not available on this server.

How users interpret bugs in trigger-action programming - W. Brackenbury, A. Deora, J. Ritchey, J. Vallee, W. He, G. Wang, M.L. Littman and B. Ur
Type: Conference or Workshop Item | 2019 | ACM Press | Item not available on this server.

Face image analysis in mobile biometric accessibility evaluations - Barbara Corsetti, Raul Sanchez-Reillo, Richard M. Guest and Marco Santopietro
Type: Conference or Workshop Item | 2019 | IEEE | Item not available on this server.

Type: Conference or Workshop Item | 2019 | Item not available on this server.

Type: Article | 2019 | Item not available on this server.

Type: Article | 2019

Towards a semantic modelling for threat analysis of IoT applications: a case study on transactive energy - Nawfal Fadhel, Federico Lombardi, Leonardo Aniello, Andrea Margheri and Vladimiro Sassone
Type: Conference or Workshop Item | 2019 | Institution of Engineering and Technology | Item availability restricted.

ESBMC v6.0: Verifying C Programs Using k-Induction and Invariant Inference: (Competition Contribution) - Mikhail R. Gadelha, Felipe Monteiro, Lucas Cordeiro and Denis Nicole
Type: Conference or Workshop Item | 2019 | Springer | Item not available on this server.

SMT-based refutation of spurious bug reports in the clang static analyzer - Mikhail R. Gadelha, Enrico Steffinlongo, Lucas Cordeiro, Bernd Fischer and Denis Nicole
Type: Conference or Workshop Item | 2019 | IEEE Press | Item availability restricted.

Iris recognition technology - Richard Guest and Sarah V. Stevenage
Type: Monograph | 2019 | Home Office Biometrics; Defence Science and Technology Laboratory | Item not available on this server.

Type: Dataset | 2019 | University of Southampton

Identifying vulnerabilities in trust and reputation systems - Taha Gunes, Long Tran-Thanh and Timothy Norman
Type: Conference or Workshop Item | 2019 | International Joint Conferences on Artificial Intelligence

Fuzzy-based approach to assess and prioritize privacy risks - Stephen Hart, Anna Lisa Ferrara and Federica Paci
Type: Article | 2019 | Item not available on this server.

When smart devices are stupid: negative experiences using home smart devices - W. He, J. Martinez, R. Padhi, L. Zhang and B. Ur
Type: Conference or Workshop Item | 2019 | IEEE Press | Item not available on this server.

Type: Special issue | 2019

Threat modelling for the virtual machine image in cloud computing - Raid, Khalid Hussein Hussein and Vladimiro Sassone
Type: Conference or Workshop Item | 2019 | AIRCC Publishing Corporation | Item not available on this server.

PASCAL: An architecture for proactive auto-scaling of distributed services - Federico Lombardi, Andrea Muti, Leonardo Aniello, Roberto Baldoni, Silvia Bonomi and Leonardo Querzoni
Type: Article | 2019

Selfies for mobile biometrics: sample quality in unconstrained environments - Chiara Lunerti, Richard Guest, Ramon Blanco-Gonzalo and Raul Sanchez-Reillo
Type: Book Section | 2019 | Springer Cham | Item not available on this server.

A reliable PUF in a dual function SRAM - Mohd Syafiq Mispan, Shengyu Duan, Basel Halak and Mark Zwolinski
Type: Article | 2019 | Item not available on this server.

Access control in Internet-of-Things: A survey - Sowmya Ravidas, Alexios Lekidis, Federica Paci and Nicola Zannone
Type: Article | 2019 | Item not available on this server.

Human and machine vulnerability to disguise during voice matching tasks - Sarah V. Stevenage, Ashley Symons, Richard Guest, Iulia Motoc and Stefan Bleeck
Type: Conference or Workshop Item | 2019 | Item not available on this server.

Developing critical software in the modern threat environment - Brian Stevens, Rob Ashmore, Andrea Margheri and Vladimiro Sassone
Type: Conference or Workshop Item | 2019

Two-stage architectures for resilient lightweight PUFs - Haibo Su, Basel Halak and Mark Zwolinski
Type: Conference or Workshop Item | 2019 | IEEE | Item not available on this server.

Voice recognition in noise: a comparison of human and machine performance - Ashley Symons, Sarah V. Stevenage and Richard Guest
Type: Conference or Workshop Item | 2019 | Item not available on this server.

Type: Conference or Workshop Item | 2019

Survey of machine learning techniques for malware analysis - Daniele Ucci, Leonardo Aniello and Roberto Baldoni
Type: Article | 2019

Predictive thermal management for energy-efficient execution of concurrent applications on heterogeneous multicores - Eduardo Weber Wächter, Cédric De Bellefroid, Karunakar Reddy Basireddy, Amit Kumar Singh, Bashir M. Al-Hashimi and Geoff Merrett
Type: Article | 2019

Cognitive checkpoint: emerging technologies for biometric-enabled watchlist screening - Svetlana N. Yanushkevich, Kelly W. Sundberg, Nathan W. Twyman, Richard M. Guest and Vlad P. Shmerko
Type: Article | 2019 | Item not available on this server.

AutoTap: Synthesizing and Repairing Trigger-Action Programs Using LTL Properties - L. Zhang, W. He, J. Martinez, N. Brackenbury, S. Lu and B. Ur
Type: Conference or Workshop Item | 2019 | IEEE Press | Item not available on this server.

This list was generated on Tue Nov 19 02:32:58 2024 GMT.
Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×