Browsing by Subject security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 17 of 17
Issue DateTitleAuthor(s)
21-Mar-2025Advanced Near-Field Radar Imaging Approaches in Security: An overview on signal processing challenges, opportunities, and future directionsMolaei, AM; Hu, S; Fusco, V; Fromenteze, T; Kumar, R; Abbasi, MAB; Yurduseven, O
2023Anomaly detection for IoT networks using machine learningAbdulla, Husain
8-Mar-2021Blockchain and Contact Tracing Applications for COVID-19: The Opportunity and the ChallengesKassab, M; Destefanis, G
29-Jul-2019‘Crocodiles in the Corridors’: Security Vetting, Race and Whitehall, 1945–1968Lomas, DWB
22-Feb-2023Denial of Service Detection for IoT Networks Using Machine LearningAbdulla, H; Al-Raweshidy, HS; Awad, W
15-May-2024Drone Safety and Security Surveillance System (D4S)AL-Dosari, K; Hunaiti, Z; Balachandran, W
2-Jul-2021#ForgetJamesBond: diversity, inclusion and the UK’s intelligence agenciesLomas, DWB
6-Jan-2023The hidden side of migration: Understanding sexuality as an aspiration to migrateUsta, DD; Özbilgin, MF
30-Aug-2022A Novel Blockchain Based Approach to Exchanging Information and Data in Power SystemsAmjad, M; Taylor, G; Lai, CS; Huang, Z; Li, M
22-Feb-2021On improving 5G internet of radio light security based on led fingerprint identification methodShi, D; Zhang, X; Shi, L; Vladimirescu, A; Mazurczyk, W; Cabaj, K; Meunier, B; Ali, K; Cosmas, J; Zhang, Y
13-Jan-2021Party politics and intelligence: the Labour Party, British intelligence and oversight, 1979-1994Lomas, DWB
12-Oct-2021Proportional-Integral Observer Design for Uncertain Time-Delay Systems Subject to Deception Attacks: An Outlier-Resistant ApproachZhao, D; Wang, Z; Han, Q-L; Wei, G
31-Oct-2024Secure and Efficient Blockchain Scheme for Resource Optimization in Internet of Things (IoT) SystemsDatiri, DD; Li, M
26-Nov-2021State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and InsecurityXu, W; Wang, Z; Hu, L; Kurths, J
19-Jul-2021Trust in Home: Rethinking Interface Design in IoTManohar, A; Sengul, C; Chen, J
1-Sep-2024A typology and model of privacy- and security-concerned users' attitudes towards digital footprints and consequent influence on their social media adaptationMuhammad, S; Dey, B; Bala, H; Alwi, S; Asaad, Y
2013Working on the edge: Remediation work in the UK travel sectorBall, K; Canhoto, A; Daniel, E; Dibb, S; Meadows, M; Spiller, K