Issue Date | Title | Author(s) |
21-Mar-2025 | Advanced Near-Field Radar Imaging Approaches in Security: An overview on signal processing challenges, opportunities, and future directions | Molaei, AM; Hu, S; Fusco, V; Fromenteze, T; Kumar, R; Abbasi, MAB; Yurduseven, O |
2023 | Anomaly detection for IoT networks using machine learning | Abdulla, Husain |
8-Mar-2021 | Blockchain and Contact Tracing Applications for COVID-19: The Opportunity and the Challenges | Kassab, M; Destefanis, G |
29-Jul-2019 | ‘Crocodiles in the Corridors’: Security Vetting, Race and Whitehall, 1945–1968 | Lomas, DWB |
22-Feb-2023 | Denial of Service Detection for IoT Networks Using Machine Learning | Abdulla, H; Al-Raweshidy, HS; Awad, W |
15-May-2024 | Drone Safety and Security Surveillance System (D4S) | AL-Dosari, K; Hunaiti, Z; Balachandran, W |
2-Jul-2021 | #ForgetJamesBond: diversity, inclusion and the UK’s intelligence agencies | Lomas, DWB |
6-Jan-2023 | The hidden side of migration: Understanding sexuality as an aspiration to migrate | Usta, DD; Özbilgin, MF |
30-Aug-2022 | A Novel Blockchain Based Approach to Exchanging Information and Data in Power Systems | Amjad, M; Taylor, G; Lai, CS; Huang, Z; Li, M |
22-Feb-2021 | On improving 5G internet of radio light security based on led fingerprint identification method | Shi, D; Zhang, X; Shi, L; Vladimirescu, A; Mazurczyk, W; Cabaj, K; Meunier, B; Ali, K; Cosmas, J; Zhang, Y |
13-Jan-2021 | Party politics and intelligence: the Labour Party, British intelligence and oversight, 1979-1994 | Lomas, DWB |
12-Oct-2021 | Proportional-Integral Observer Design for Uncertain Time-Delay Systems Subject to Deception Attacks: An Outlier-Resistant Approach | Zhao, D; Wang, Z; Han, Q-L; Wei, G |
31-Oct-2024 | Secure and Efficient Blockchain Scheme for Resource Optimization in Internet of Things (IoT) Systems | Datiri, DD; Li, M |
26-Nov-2021 | State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and Insecurity | Xu, W; Wang, Z; Hu, L; Kurths, J |
19-Jul-2021 | Trust in Home: Rethinking Interface Design in IoT | Manohar, A; Sengul, C; Chen, J |
1-Sep-2024 | A typology and model of privacy- and security-concerned users' attitudes towards digital footprints and consequent influence on their social media adaptation | Muhammad, S; Dey, B; Bala, H; Alwi, S; Asaad, Y |
2013 | Working on the edge: Remediation work in the UK travel sector | Ball, K; Canhoto, A; Daniel, E; Dibb, S; Meadows, M; Spiller, K |