Secure and Resilient Systems Publications
Find details of SRS group members' publications.
2017
- Wen Z, Cala J, Watson P, Romanovsky A. Cost Effective, Reliable and Secure Workflow Deployment over Federated Clouds. IEEE Transactions on Services Computing 2017, 10(6), 929-941.
- Stankaitis P, Iliasov A, Romanovsky A. A Railway Simulation Suite For Modelling Advanced Railway Control Systems. International Journal of Transport Development and Integration 2017, 1(3), 558-567.
- Gensh R, Rafiev A, Romanovsky A, Garcia A, Xia F, Yakovlev A. Architecting Holistic Fault Tolerance. In: 18th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2017). 2017, Singapore: IEEE Computer Society.
2016
- Hao F, Clarke D, Zorzo AF. Deleting Secret Data with Public Verifiability. IEEE Transactions on Dependable and Secure Computing 2016, 13(6), 617-629.
- Mehrnezhad M, Toreini E, Shahandashti SF, Hao F. TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript. Journal of Information Security and Applications 2016, 26, 23-38.
- McCorry P, Shahandashti SF, Hao F. Refund Attacks on Bitcoin's Payment Protocol. In: 20th Financial Cryptography and Data Security (FC'16). 2016. Submitted.
- Iliasov A, Romanovsky A, Troubitsyna E, Laibinis L. Formalisation-Driven Development of Safety-Critical Systems. In: 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE). 2016, Orlando, Florida: IEEE.
- Iliasov A, Romanovsky A. Formal Analysis of railway signalling data. In: 17th IEEE International Symposium on High Assurance Systems Engineering (HASE 2016). 2016, Orlando, Florida: IEEE.
- Yevseyeva I, Morisset C, van Moorsel A. Modeling and analysis of influence power for information security decisions. Performance Evaluation 2016, 98, 36-51.
- Thieme A, McCarthy J, Johnson P, Wallace J, Lindley S, Ladha K, Jackson D, Nowacka D, Rafiev A, Ladha C, Nappey T, Kipling M, Wright P, Meyer TD, Olivier P. Challenges for Designing new Technology for Health and Wellbeing in a Complex Mental Healthcare Context. In: ACM Conference on Human Factors in Computing Systems 2016. 2016, San Jose, CA, USA: ACM.
- Abadi A, Terzis S, Dong C. VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets. In: Financial Cryptography and Data Security 2016 (FC 2016). 2016, Barbados: International Financial Cryptography Association.
- Li B, Koutny M, Randell B. SONCraft: A Tool for Construction, Simulation and Verification of Structured Occurrence Nets. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2016. School of Computing Science Technical Report Series 1493.
- Ko R, Singh J, Pasquier T, Dong C, Eyers D, Bacon J. Information Flow Control with Minimal Tag Disclosure. In: ICC '16 International Conference on Internet of things and Cloud Computing. 2016, Cambridge, UK: ACM.
- Al-Hayanni M, Rafiev A, Shafik RA, Xia F, Yakovlev A. Extended Power and Energy Normalized Performance Models for Many-Core Systems. Newcastle upon Tyne: School of Electrical and Electronic Engineering, Newcastle University, 2016. ASYNC Technical Report Series NCL-EEE-MICRO-TR-2016-198 198.
- Al-Hayanni M, Rafiev A, Shafik RA, Xia F. Power and Energy Normalized Speedup Models for Heterogeneous Many Core Computing. In: International Conference on Application of Concurrency to System Design (ACSD). 2016, Toruń, Poland: IEEE.
- Gross T, Coopamootoo KPL, Al-Jabri A. Effect of Cognitive Depletion on Password Choice. In: Learning from Authoritative Security Experiment Results Workshop (LASER). 2016, San Jose, CA, USA: IEEE.
- Missier P, Romanovsky A, Miu T, Pal A, Daniilakis M, Garcia A, Cedrim D, Sousa L. Tracking Dengue Epidemics using Twitter Content Classification and Topic Modelling. In: 2nd International Workshop on Mining the Social Web (SoWeMine 2016) - co-located with ICWE 2016. 2016, Lugano, Switzerland: Springer.
- Aalsaud A, Shafik R, Rafiev A, Xia F, Yang S, Yakovlev A. Power-Aware Performance Adaptation of Concurrent Applications in Heterogeneous Many-Core Systems. In: Proceedings of the 2016 International Symposium on Low Power Electronics and Design (ISLPED 16). 2016, San Franciso Airport, CA, USA: ACM.
- Bhattacharyya A, Li B, Randell B. Time in Structured Occurrence Nets. Newcastle upon Tyne: School of Computing Science University of Newcastle upon Tyne, 2016. School of Computing Science Technical Report Series 1495.
- Bhattacharyya A, Li B, Randell B. Time in Structured Occurrence Nets. In: International Workshop on Petri Nets and Software Engineering (PNSE’16). 2016, Torun, Poland: CEUR-WS.org.
- Iliasov A, Stankaitis P, Adjepon-Yamoah D, Romanovsky A. Rodin Platform Why3 Plug-In. In: 5th International Conference ABZ 2016. 2016, Linz, Austria: Springer.
- Wen Z, Qasha R, Li Z, Ranjan R, Watson P, Romanovsky A. Dynamically Partitioning Workflow over Federated Clouds For Optimising the Monetary Cost and Handling Run-Time Failures. IEEE Transactions on Cloud Computing 2016, Epub ahead of print.
- Gross T, Coopamootoo K, Al-Jabri A. Effect of Cognitive Depletion on Password Choice. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2016. School of Computing Science Technical Report Series 1496.
- Shahandashti SF, Hao F. DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities. In: ESORICS 2016. 2016, Springer.
- Gensh R, Rafiev a, Romanovsky A, Garcia A, Xia F, Yakovlev A. Architecting Holistic Fault Tolerance. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2016. School of Computing Science Technical Report Series 1505.
- Romanovsky A, Iliasov A. Introducing SafeCap, a safety-focused tool for optimising route capacity. Institution of Railway Signal Engineers. IRSE NEWS 2016, (223), pp.7.
2015
- Preston A, Balaam M, Seedhouse P, Rafiev A, Jackson D, Olivier P. Can a kitchen teach languages? Linking theory and practice in the design of context-aware language learning environments. Smart Learning Environments 2015, 2(9).
- Yevseyeva I, Turland J, Morisset C, Coventry L, Gross T, van Moorsel A. Addressing consumerization of IT risks with nudging. International Journal of Information Systems and Project Management 2015, 3(3), 5-22.
- Rafiev A, Xia F, Iliasov A, Gensh R, Aalsaud A, Romanovsky A, Yakovlev A. Power-proportional modelling fidelity. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1443.
- Iliasov A, Romanovsky A. Formal Modelling of Railway Safety and Capacity. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1444.
- Iliasov A, Rafiev A, Xia F, Gensh R, Romanovsky A, Yakovlev A. A formal specification and prototyping language for multi-core system management. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1445.
- Li B, Randell B. SONCraft user manual. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1448.
- Toreini E, Randell B, Hao F. An Acoustic Side Channel Attack on Enigma. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1455.
- Iliasov A, Laibinis L, Troubitsyna E, Adjepon-Yamoah D, Romanovsky A. Refinement-based Approach to Co-engineering Requirements and Formal Models. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1456.
- Alajrami S, Romanovsky A, Watson P. On Cloud-Based Software Processes. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1458.
- Arief B, Bin Adzmi MA, Gross T. Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers. IEEE Security & Privacy 2015, 13(1), 71-76.
- Iliasov A, Romanovsky A. Formal Modelling of Railway Safety and Capacity. In: 23rd Safety-Critical Systems Symposium 2015 (SSS'15). 2015, Bristol, UK.
- Rafiev A, Iliasov A, Romanovsky A, Mokhov A, Xia F, Yakovlev A. Studying the Interplay of Concurrency, Performance, Energy and Reliability with ArchOn - An Architecture-Open Resource-Driven Cross-Layer Modelling Framework. In: 14th International Conference on Application of Concurrency to System Design (ACSD 2014). 2015, Tunis, Tunisia: IEEE Computer Society.
- Iliasov A, Lopatkin I, Romanovsky A. Practical Formal Methods in Railways - The SafeCap Approach. In: 19th Ada-Europe International Conference on Reliable Software Technologies. 2015, Paris, France: Springer.
- Clarke D, Toreini E, Hao F. Determining User Passwords From Partial Information. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1461.
- Iliasov A, Romanovsky A. SafeCap: The Train Advisory System for Real-Time Traffic Management. In: The Stephenson Conference 2015: Research for Railways. 2015, London, UK: Institution of Mechanical Engineers, London.
- Mccorry P, Shahandashti SF, Clarke D, Hao F. Authenticated Key Exchange over Bitcoin. In: Security Standardisation Research : Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015. Cham: Springer International Publishing, 2015, pp.3-20.
- Hao F, Xun Y, Liqun C, Shahandashti SF. The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. In: 1st ACM Workshop on IoT Privacy, Trust and Security, ASIACCS IoTPTS’15. 2015, Singapore: ACM.
- Mehrnezhad M, Toreini E, Shahandashti SF, Hao F. TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript. In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS'15). 2015, Singapore: ACM.
- Ali ST, McCorry P, Lee HJP, Hao F. ZombieCoin: Powering Next-Generation Botnets with Bitcoin. In: 2nd Workshop on Bitcoin Research, 19th International Conference - Financial Cryptography and Data Security 2015. 2015, Puerto Rico: International Financial Cryptography Association / Springer.
- Gross T. Signatures and Efficient Proofs on Committed Graphs and NP-Statements. In: 19th International Conference on Financial Cryptography and Data Security 2015. 2015, San Juan, Puerto Rico: International Financial Cryptography Association.
- Mace J, Morisset C, van Moorsel A. Quantitative Workflow Resiliency. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1467.
- Mace J, Morisset C, van Moorsel A. Modelling User Availability in Workflow Resiliency Analysis. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1468.
- Mace J, Morisset C, van Moorsel A. Impact of Policy Design on Workflow Resiliency Computation Time. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1469.
- Adjepon-Yamoah D, Romanovsky A, Iliasov A. A Reactive Architecture for Cloud-Based System Engineering. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2015. School of Computing Science Technical Report Series 1474.
- Rafiev A, Xia F, Iliasov A, Gensh R, Aalsaud A, Romanovsky A, Yakovlev A. Order Graphs and Cross-Layer Parametric Significance-driven Modelling. In: 15th International Conference on Application of Concurrency to System Design (ACSD'15). 2015, Brussels, Belgium: IEEE Computer Society.
- Yi X, Hao F, Chen L, Liu J. Practical Threshold Password-Authenticated Secret Sharing Protocol. In: 20th European Symposium on Research in Computer Security (ESORICS '15). 2015, Vienna, Austria: Spinger.
- Mehrnezhad M, Hao F, Shahandashti SF. Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment. In: 2nd International Conference on Research in Security Standardisation (SSR'15). 2015, Tokyo, Japan: Springer.
- Iliasov A, Rafiev A, Xia F, Gensh R, Romanovsky A, Yakovlev A. A formal specification and prototyping language for multi-core system management. In: 23rd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2015). 2015, Turku: IEEE.
- Iliasov A, Adjepon-Yamoah D, Stankaitis P, Romanovsky A. Putting Provers on the Cloud. In: 23rd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2015). 2015, Turku, Finland.
- Adjepon-Yamoa D, Romanovsky A, Iliasov A. A reactive architecture for cloud-based system engineering. In: 2015 International Conference on Software and System Process ICSSP-2015. 2015, Tallinn, Estonia: ACM.
- Wen Z, Cala J, Watson P, Romanovsky A. Cost Effective, Reliable and Secure Workflow Deployment over Federated Clouds. In: 8th IEEE International Conference on Cloud Computing (CLOUD). 2015, New York, NY, USA: IEEE.
- Gensh R, Romanovsky A, Yakovlev A. Engineering Cross-Layer Fault Tolerance in Many-Core Systems. In: 7th International Workshop, SERENE-2015. 2015, Paris, France: Springer.
- Iliasov A, Romanovsky A, Laibinis L, Troubitsyna E. OSLC-based Support for Integrated Development of Dependable Systems. In: EDCC 2015. 2015, Paris, France.
- Laibinis L, Troubitsyna E, Prokhorova Y, Iliasov A, Romanovsky A. From Requirements Engineering to Safety Assurance:Refinement Approach. In: 1st Symposium on Dependable Software Engineering; Theories, Tools and Applications. 2015, Nanjing, China: Springer.
- Hao F. On the Trust of Trusted Computing in the Post-Snowden Age. In: 8th IEEE CSF Workshop on Analysis of Security APIs 2015. 2015, Verona, Italy.
- Mace JC, Morisset C, van Moorsel A. Modelling user availability in workflow resiliency analysis. In: HotSoS '15 Symposium and Bootcamp on the Science of Security. 2015, Urbana-Champaign, IL, USA: ACM.
- Mace JC, Morisset C, van Moorsel A. Impact of policy design on workflow resiliency computation time. In: J Campos and B.R Haverkort, ed. Quantitative Evaluation of Systems. Springer International, 2015, pp.244-259.
- Mace JC, Morisset C, van Moorsel A. Resiliency Variance in Workflows with Choice. In: A Fantechi and P Patrizio, ed. Software Engineering for Resilient Systems. Springer International, 2015, pp.128-143.
- Ali ST, McCorry P, Lee PHJ, Hao F. ZombieCoin: Powering Next-Generation Botnets with Bitcoin. In: FC 2015 International Workshops, BITCOIN, WAHC, and Wearable. 2015, San Juan, Puerto Rico: Springer.
- Mallios Y, Bauer L, Kaynar D, Martinelli F, Morisset C. Probabilistic cost enforcement of security policies. Journal of Computer Security 2015, 23(6), 759-787.
- Crampton J, Morisset C, Zannone N. On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. In: 20th ACM Symposium on Access Control Models and Technologies (SACMAT '15). 2015, Vienna: ACM.
- Bleikertz S, Gross T, Mödersheim S, Vogel C. Proactive Security Analysis of Changes in Virtualized Infrastructure. In: 31st Annual Computer Security Applications Conference (ACSAC'2015). 2015, Los Angeles, CA, USA: ACM Press.
- Randell B. Reminiscences of Project Y and the ACS Project. IEEE Annals of the History of Computing 2015, 37(3), 56-66.
- McCorry P, Shahandashti SF, Clarke D, Hao F. Authenticated Key Exchange over Bitcoin. In: 2nd International Conference on Research in Security Standardisation. 2015, Tokyo, Japan: Springer International Publishing.
2014
- Hao F. On robust key agreement based on public key authentication. Security and Communication Networks 2014, 7(1), 77-87.
- Mokhov A, Iliasov A, Sokolov D, Rykunov M, Yakovlev A, Romanovsky A. Synthesis of Processor Instruction Sets from High-Level ISA Specifications. IEEE Transactions on Computers 2014, 63(6), 1552-1566.
- Iliasov A, Lopatkin I, Romanovsky A. Practical formal methods in railways - the SafeCap Approach. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2014. School of Computing Science Technical Report Series 1404.
- Rafiev A, Iliasov A, Romanovsky A, Mokhov A, Xia F, Yakovlev A. Studying the Interplay of Concurrency, Performance, Energy and Reliability with ArchOn – an Architecture-open Resource-driven Cross-layer Modelling Framework. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2014. School of Computing Science Technical Report Series 1408.
- Gomes T, Abade T, Campos JC, Harrison MD, Silva JL. A Virtual Environment based Serious Game to Support Health Education. EAI Endorsed Transactions on Ambient Systems 2014, 14(3), e5.
- Silva JL, Campos JC, Harrison MD. Prototyping and analysing ubiquitous computing environments using multiple layers. International Journal of Human-Computer Studies 2014, 72(5), 488-506.
- Seedhouse P, Preston A, Olivier P, Jackson D, Heslop P, Balaam M, Rafiev A, Kipling M. The European Digital Kitchen Project. Bellaterra Journal of Teaching & Learning Language & Literature 2014, 7(1), 1-16.
- Iliasov A, Lopatkin I, Mihut A, Romanovsky A. Real-time ATO reconfiguration for operational stability. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2014. School of Computing Science Technical Report Series 1412.
- Rafiev A, Iliasov A, Romanovsky A, Mokhov A, Xia F, Yakovlev A. Resource-driven Modelling of Complex Digital Systems with Uncertainty. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2014. School of Computing Science Technical Report Series 1413.
- Sousa M, Campos JC, Alves M, Harrison MD. Formal Verification of Safety-Critical User Interfaces: A Space System Case Study. In: AAAI Spring Symposium - Technical Report. 2014, Standford, CA, USA: AAAI Press.
- Emms M, Arief B, Freitas L, Hannon J, van Moorsel A. Harvesting high value foreign currency transactions from EMV contactless cards without the PIN. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2014. School of Computing Science Technical Report Series 1421.
- Morisset C, Yevseyeva I, Gross T, van Moorsel A. Formalization of Influencing in Information Security. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2014. School of Computing Science Technical Report Series 1423.
- Emms M, Arief B, Freitas L, Hannon J, van Moorsel A. Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. In: 21st ACM Conference on Computer and Communications Security (CCS). 2014, Scottsdale, Arizona, USA: ACM.
- Emms M, Arief B, van Moorsel A. Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. In: Bart Preneel and Demosthenes Ikonomou, ed. Privacy Technologies and Policy. Berlin: Springer Berlin Heidelberg, 2014, pp.203-214.
- Arief B, Coopamootoo KPL, Emms M, van Moorsel A. Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. In: Workshop on Privacy in the Electronic Society (WPES'14). 2014, Scottsdale, Arizona, USA.
- Zeng W, Koutny M, van Moorsel A. Performance Modelling and Evaluation of Enterprise Information Security Technologies. In: 14th IEEE International Conference on Computer and Information Technology (CIT 2014). 2014, Xi'an: IEEE.
- Emms M, Freitas L, van Moorsel A. Rigorous Design and Implementation of an Emulator for EMV Contactless Payments. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2014. School of Computing Science Technical Report Series 1426.
- Mehrnezhad M, Hao F, Shahandashti SF. Tap-Tap and Pay (TTP): Preventing Man-In-The-Middle Attacks in NFC Payment Using Mobile Sensors. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2014. School of Computing Science Technical Report Series 1428.
- Iliasov A, Romanovsky A. SafeCap: The Train Advisory System for Real-Time Traffic Management. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2014. School of Computing Science Technical Report Series 1433.
- Hao F, Shahandashti SF. The SPEKE Protocol Revisited. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2014. School of Computing Science Technical Report Series 1434.
- Zeng W, Koutny M, van Moorsel A. Performance Modelling and Evaluation of Enterprise Information Security Technologies. In: 14th IEEE International Conference on Computer and Information Technology (CIT). 2014, Xi'an, China: IEEE.
- Hao F, Kreeger MN, Randell B, Clarke D, Shahandashti SF, Lee PHJ. Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting. USENIX Journal of Election Technology and Systems (JETS) 2014, 2(3), 1-25.
- Yevseyeva I, Morisset C, Gross T, vanMoorsel A. A Decision Making Model of Influencing Behavior in Information Security. In: 11th European Workshop on Performance Evaluation, EPEW 2014. 2014, Florence, Italy: Springer.
- Morisset C, Yevseyeva I, Gross T, van Moorsel A. A Formal Model for Soft Enforcement: Influencing the Decision-Maker. In: 10th International Workshop on Security and Trust Management. 2014, Wroclaw, Poland: Springer.
- Yevseyeva I, Morisset C, Turland J, Coventry L, Gross T, Laing C, van Moorsel A. Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging. In: CENTERIS 2014: 6th Conference on ENTERprise Information Systems. 2014, Troia, Portugal: Elsevier BV.
- Morisset C, Gross T, vanMoorsel A, Yevseyeva I. Nudging for Quantitative Access Control Systems. In: Second International Conference on Human Aspects of Information Security, Privacy, and Trust.Held as Part of HCI International 2014. 2014, Heraklion, Crete, Greece: Springer.
- Clarke D, Hao F. Cryptanalysis of the Dragonfly key exchange protocol. IET Information Security 2014, 8(6), 283-289.
- Iliasov A, Palacin R, Romanovsky A. Advanced Modelling, Simulation and Verification for Future Traffic Regulation Optimisation. In: 6th International Workshop, SERENE 2014. 2014, Budapest, Hungary: Springer.
- Coopamootoo KPL, Gross T. Mental Models for Usable Privacy: A Position Paper. In: Human Aspects of Information Security, Privacy, and Trust at HCI International. 2014, Heraklion, Crete, Greece: HCI International.
- Coopamootoo KPL, Gross T. Mental models: an approach to identify privacy concern and behaviour. In: Workshop on Privacy Personas and Segmentation (PPS) at SOUPS. 2014, Menlo Park, CA: SOUPS.
- Coopamootoo KPL, Gross T. Cognitive effort in privacy decision-making vs. 3x4: evaluation of a pilot experiment design. In: WIP at Learning from Authoritative Security Experiment Results (LASER). 2014, Arlington, Virginia, USA: LASER.
- Alajrami S, Romanovsky A, Watson P, Roth A. Towards Cloud-Based Software Process Modelling and Enactment. In: ACM/IEEE 17th International Conference on Model Driven Engineering Languages and Systems. 2014, Valencia, Spain.
- Iliasov A, Lopatkin I, Romanovsky A. Unified Train Driving Policy. In: Boulanger, J-L, ed. Formal Methods Applied to Complex Systems. New Jersey, USA: Wiley, 2014, pp.447-473.
- Iliasov A, Lopatkin I, Mihut A, Romanovsky A. Real-time ATO Reconfiguration For Operational Stability. In: Brebbia,C.A; Tomii,N; Tzieropoulos,P; Mera,J.M, ed. Computers in Railways XIV: Railway Engineering Design and Optimization. WIT Press, 2014, pp.163-173.
- Rafiev A, Iliasov A, Romanovsky A, Mokhov A, Xia F, Yakovlev A. ArchOn: Architecture-open Resource-driven Cross-layer Modelling Framework. In: ES4CPS@DATE 2014 - International Workshop on Engineering Simulations for Cyber-Physical Systems. 2014, Dresden, Germany.
- Hao F, Shahandashti SF. The SPEKE Protocol Revisited. In: First International Conference on Security Standardisation Research, SSR 2014. 2014, London: Springer.
- Yi Xun, Hao F, Bertino E. ID-Based Two-Server Password-Authenticated Key Exchange. In: European Symposium on Research in Computer Security (ESORICS 2014). 2014, Wroclaw, Poland: Springer.
- Satvat K, Forshaw M, Hao F, Toreini E. On the Privacy of Private Browsing - A Forensic Approach. Journal of Information Security and Applications 2014, 19(1), 88-100.
- Satvat K, Forshaw M, Hao F, Toreini E. On The Privacy Of Private Browsing - A Forensic Approach (short paper). In: European Symposium on Research in Computer Security (ESORICS) 2013, 8th DPM International Workshop on Data Privacy Management. 2014, Egham, UK.
- Gross T. Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs. In: 6th ACM Workshop at 21st ACM Conference on Computer and Communications Security (CCSW'14). 2014, Arizona, USA: ACM.
2013
- Wongthai W, Liberal Rocha F, van Moorsel A. A Generic Logging Template for Infrastructure as a Service Cloud. Newcastle upon Tyne: Newcastle University, 2013. School of Computing Science Technical Report Series 1367.
- Iliasov A, Troubitsyna E, Laibinis L, Romanovsky A, Varpaaniemi K, Ilic D, Latvala T. Developing mode-rich satellite software by refinement in Event-B. Science of Computer Programming 2013, 78(7), 884-905.
- Clarke D, Hao F. Cryptanalysis of the Dragonfly Key Exchange Protocol. Newcaslte upon Tyne: Newcastle University, 2013. School of Computing Science Technical Report Series 1370.
- Andrews Z, Fitzgerald J, Payne R, Romanovsky A. Fault Modelling for Systems of Systems. In: 11th International Symposium on Autonomous Decentralized Systems (ISADS 2013). 2013, Mexico City, Mexico: IEEE.
- Emms M, Arief B, Little N, van Moorsel A. Risks of Offline Verify PIN on Contactless Cards. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2013. School of Computing Science Technical Report Series 1369.
- Randell B. Incremental Construction of Structured Occurrence Nets. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2013. School of Computing Science Technical Report Series 1384.
- Hao F, Clarke D, Shepherd C. Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2013. School of Computing Science Technical Report Series 1385.
- Satvat K, Forshaw M, Hao F, Toreini E. On the Privacy of Private Browsing - A Forensic Approach. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2013. School of Computing Science Technical Report Series 1397.
- Wongthai W, Rocha F, van Moorsel A. Logging Solutions to Mitigate Risks Associated With Threats in Infrastructure as a Service Cloud. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2013. School of Computing Science Technical Report Series 1403.
- Emms M, Arief B, Hannon J, van Moorsel A. POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards. Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne, 2013. School of Computing Science Technical Report Series 1386.
- Emms M, Arief B, Little N, van Moorsel A. Risks of Offline Verify PIN on Contactless Cards. In: Ahmad-Reza Sadeghi, ed. Financial Cryptography and Data Security. Berlin: Springer Berlin Heidelberg, 2013, pp.313-321.