Login (DCU Staff Only)
Login (DCU Staff Only)

DORAS | DCU Research Repository

Explore open access research and scholarly works from DCU

Advanced Search

Items where Subject is "Computer security"

[Atom feed] Atom [RSS feed] RSS 1.0 [RSS2 feed] RSS 2.0
Group by: Item Type | Creators Name | No Grouping
Number of items at this level: 50.

Article

Trestian, Ramona orcid logoORCID: 0000-0003-3315-3081, Xie, Guodong orcid logoORCID: 0000-0003-0037-8495, Lohar, Pintu orcid logoORCID: 0000-0002-5328-1585, Celeste, Edoardo orcid logoORCID: 0000-0003-1984-4142, Bendechache, Malika orcid logoORCID: 0000-0003-0069-1860, Brennan, Rob orcid logoORCID: 0000-0001-8236-362X, Jayasekera, Evgeniia, Connolly, Regina orcid logoORCID: 0000-0003-3196-2889 and Tal, Irina orcid logoORCID: 0000-0001-9656-668X (2021) Privacy in a Time of Covid-19: how concerned are you? IEEE Security & Privacy . ISSN 1540-7993

Ali, Wasim A. orcid logoORCID: 0000-0002-4602-461X, Manasa, K.N., Bendechache, Malika orcid logoORCID: 0000-0003-0069-1860, Fadhel Aljunaid, Mohammed orcid logoORCID: 0000-0001-9099-3664 and Sandhya, P. (2020) A Review of current machine learning approaches for anomaly detection in network traffic. Journal of Telecommunications and the Digital Economy, 8 (4). pp. 64-95. ISSN 2203-1693

Liu, Cong orcid logoORCID: 0000-0002-5999-2126, Zeng, QingTian orcid logoORCID: 0000-0002-6421-8223, Cheng, Long orcid logoORCID: 0000-0003-1638-059X, Duan, Hua, Zhou, MengChu orcid logoORCID: 0000-0002-5408-8752 and Cheng, JiuJun orcid logoORCID: 0000-0001-5176-4762 (2020) Privacy-preserving behavioral correctness verification of cross-organizational workflow with task synchronization patterns. IEEE Transactions on Automation Science and Engineering, 18 . pp. 1-12. ISSN 1545-5955

Tamtam, Abdalmonem and Asker, Hamida (2020) An investigation of the information security awareness and practices among third level education staff, case study in Nalut Libya. An Investigation of the Information Security Awareness and Practices among Third Level Education Staff, Case Study in Nalut Libya, 16 (15). pp. 20-32. ISSN 1857-7881

van der Werff, Lisa orcid logoORCID: 0000-0003-4529-4690, Fox, Grace orcid logoORCID: 0000-0003-1392-6833, Masevic, Ieva, Emeakaroha, Vincent C., Morrison, John P. orcid logoORCID: 0000-0002-0134-6025 and Lynn, Theo orcid logoORCID: 0000-0001-9284-7580 (2019) Building consumer trust in the cloud: an experimental analysis of the cloud trust label approach. Journal of Cloud Computing: Advances, Systems and Applications, 8 (6). ISSN 2192-113X

McCusker, Kealan and O'Connor, Noel E. orcid logoORCID: 0000-0002-4033-9135 (2011) Low-energy symmetric key distribution in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 8 (3). pp. 363-376. ISSN 1545-5971

Conway, Maura orcid logoORCID: 0000-0003-4216-8592 (2011) Against Cyberterrorism: Why cyber-based terrorist attacks are unlikely to occur. Communications of the ACM (CACM), 54 (2). pp. 26-28. ISSN 0001-0782

Thesis

O'Neill, Paul (2022) Platform protocol place: a practice-based study of critical media art practice (2007-2020). PhD thesis, Dublin City University.

Morgan, Gwenyth (2021) Ethical Issues in cybersecurity: employing red teams, responding to ransomware attacks and attempting botnet takedowns. PhD thesis, Dublin City University.

Quintas de Arcanjo, Tháis (2019) Sending cryptocurrency over mobile applications. Master of Science thesis, Dublin City University.

Cronin, Brendan (2014) Hardware acceleration of network intrusion detection and prevention. PhD thesis, Dublin City University.

Zhou, Yachao (2012) Hardware acceleration for power efficient deep packet inspection. PhD thesis, Dublin City University.

Wang, Xiaofei (2012) High performance stride-based network payload inspection. PhD thesis, Dublin City University.

Butin, Denis Frédéric (2012) Inductive analysis of security protocols in Isabelle/HOL with applications to electronic voting. PhD thesis, Dublin City University.

Kachisa, Ezekiel Justin (2011) Constructing suitable ordinary pairing-friendly curves: A case of elliptic curves and genus two hyperelliptic curves. PhD thesis, Dublin City University.

Dominguez Perez, Luis Julian (2011) Developing an Automatic Generation Tool for Cryptographic Pairing Functions. PhD thesis, Dublin City University.

Charlemagne, Manuel (2010) Pairings in Cryptology: efficiency, security and applications. PhD thesis, Dublin City University.

Graham, Michelle (2010) A System for the Verication of Location Claims. PhD thesis, Dublin City University.

Benger, Naomi (2010) Cryptographic Pairings: Efficiency and DLP security. PhD thesis, Dublin City University.

Costigan, Neil (2010) Elliptic Curve Cryptography on Modern Processor Architectures. PhD thesis, Dublin City University.

Luan, Hai Ying (2010) Intrusion detection and management over the world wide web. Master of Science thesis, Dublin City University.

Fitzpatrick, Darren (2010) Intrusion Detection and Security Assessment in a University Network. Master of Science thesis, Dublin City University.

Sheedy, Caroline (2010) Privacy Enhancing Protocols using Pairing Based Cryptography. PhD thesis, Dublin City University.

Dunne, Cameron R. (2009) An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet. PhD thesis, Dublin City University.

Whelan, Claire (2007) Investigating power and fault analysis with specific application to bilinear pairings. PhD thesis, Dublin City University.

Oehl, Frederic Enoha (2006) Defining an approximation to formally verify cryptographic protocols. Master of Science thesis, Dublin City University.

Ó hÉigeartaigh, Colm (2006) Pairing computation on hyperelliptic curves of genus 2. PhD thesis, Dublin City University.

Tunney, David (2005) A language based on the Pi-calculus. Master of Science thesis, Dublin City University.

Candebat, Thibault (2005) A secure architecture enabling end-user privacy in the context of commercial wide-area location-enhanced web services. PhD thesis, Dublin City University.

McCullagh, Noel Michael (2005) Crytographic applications of bilinear maps. PhD thesis, Dublin City University.

Costigan, Neil (2004) Implementation of an identity based encryption sub-system for secure e-mail and other applications. Master of Science thesis, Dublin City University.

Aziz, Benyamin Y. Y. (2003) A static analysis framework for security properties in mobile and cryptographic systems. PhD thesis, Dublin City University.

Brady, Paul (1988) Software and hardware implementation of the RSA public key cipher. Master of Engineering thesis, Dublin City University.

Conference or Workshop Item

Bendechache, Malika orcid logoORCID: 0000-0003-0069-1860, Tal, Irina orcid logoORCID: 0000-0001-9656-668X, Wall, P.J orcid logoORCID: 0000-0002-5859-4425, Grehan, Laura, Clarke, Emma orcid logoORCID: 0000-0003-4483-0172, O'Driscoll, Aidan, Van Der Haegen, Laurence, Leong, Brenda, Kearns, Anne and Brennan, Rob orcid logoORCID: 0000-0001-8236-362X (2021) AI in my life: AI, ethics & privacy workshops for 15-16-year-olds. In: WebSci '21: 13th ACM Web Science Conference 2021, 21-25 June 2021, Online.

Bendechache, Malika orcid logoORCID: 0000-0003-0069-1860, Saber, Takfarinas orcid logoORCID: 0000-0003-2958-7979, Muntean, Gabriel-Miro orcid logoORCID: 0000-0003-2958-7979 and Tal, Irina orcid logoORCID: 0000-0001-9656-668X (2020) Application of blockchain technology to 5G-enabled vehicular networks: survey and future directions. In: 18th International Symposium on High Performance Mobile Computing & Wireless Networks for HPC (MCWN 2020), 10-14 Dec 2020, Barcelona, Spain (Online).

Nguyen, Dac, Nguyen, Quy H., Dao, Minh-Son, Dang-Nguyen, Duc-Tien orcid logoORCID: 0000-0002-2761-2213, Gurrin, Cathal orcid logoORCID: 0000-0003-2903-3968 and Nguyen, Binh T. (2020) Duplicate identification algorithms in SaaS platforms. In: 2020 Intelligent Cross-Data Analysis and Retrieval Workshop (ICDAR'20), 20-26 Oct 2020, Dublin, Ireland. ISBN 978-1-4503-7509-2

Nguyen, Nhu T., Pham, Thuy T., Dang, Tien X., Dao, Minh-Son, Dang-Nguyen, Duc-Tien orcid logoORCID: 0000-0002-2761-2213, Gurrin, Cathal orcid logoORCID: 0000-0003-2903-3968 and Nguyen, Binh T. (2020) Malware detection using system logs. In: 2020 Intelligent Cross-Data Analysis and Retrieval Workshop (ICDAR'20), 26 Oct 2020, Dublin, Ireland. ISBN 978-1-4503-7087-5

MacMahon, Silvana Togneri orcid logoORCID: 0000-0003-0179-2436, Alfano, Marco orcid logoORCID: 0000-0001-7200-9547, Lenzitti, Biagio orcid logoORCID: 0000-0003-2664-7788, Lo Bosco, Giosuè, McCaffery, Fergal, Taibi, Davide orcid logoORCID: 0000-0002-0785-6771 and Helfert, Markus orcid logoORCID: 0000-0001-6546-6408 (2020) Improving communication in risk management of health information technology systems by means of medical text simplification. In: 2019 IEEE Symposium on Computers and Communications (ISCC), 30 June 2019, Barcelona, Spain.

Aboud, Edmond and O'Brien, Darragh (2018) Detection of malicious VBA macros using machine learning methods. In: Proceedings for the 26th AIAI Irish Conference on Artificial Intelligence and Cognitive Science (AICS 2018), 6-7 Dec 2018, Dublin, Ireland.

Wielogorska, Monika and O'Brien, Darragh (2017) DNS Traffic analysis for botnet detection. In: 25th Irish Conference on Artificial Intelligence and Cognitive Science, 7-8 Dec 2017, Dublin, Ireland.

Phan, Quoc Tin, Dang-Nguyen, Duc-Tien orcid logoORCID: 0000-0002-2761-2213, Boato, Giulia and De Natale, Francesco (2017) Using LDP-TOP in video-based spoofing detection. In: International Conference on Image Analysis and Processing (ICIAP), 11-15 Sept 2017, Catania, Italy. ISBN 978-3-319-68548-9

Hinbarji, Zaher, Albatal, Rami orcid logoORCID: 0000-0002-9269-8578, O'Connor, Noel E. orcid logoORCID: 0000-0002-4033-9135 and Gurrin, Cathal orcid logoORCID: 0000-0003-2903-3968 (2016) LoggerMan, a comprehensive logging and visualisation tool to capture computer usage. In: 22st International Conference on MultiMedia Modelling (MMM 2016), 4-6 Jan, 2016, Miami, FA.. ISBN 978-3-319-27673-1

Hinbarji, Zaher, Albatal, Rami orcid logoORCID: 0000-0002-9269-8578 and Gurrin, Cathal orcid logoORCID: 0000-0003-2903-3968 (2015) Dynamic user authentication based on mouse movements curves. In: 21st International Conference on MultiMedia Modelling (MMM 2015), 5-7 Jan 2015, Sydney, Australia.

Lynn, Theo orcid logoORCID: 0000-0001-9284-7580, Healy, Philip, McClatchey, Richard, Morrison, John P. orcid logoORCID: 0000-0002-0134-6025, Pahl, Claus orcid logoORCID: 0000-0002-9049-212X and Lee, Brian (2013) The case for cloud service trustmarks and assurance-as-a-service. In: Intl. Conference on Cloud Computing and Services Science Closer'13, 8-10 May 2013, Aachen, Germany.

Butin, Denis Frédéric and Bella, Giampaolo (2012) Verifying privacy by little interaction and no process equivalence. In: SECRYPT 2012, 24-27 Jul 2012, Rome, Italy.

Bella, Giampaolo, Butin, Denis Frédéric and Gray, David (2011) Holistic analysis of mix protocols. In: 7th International Conference on Information Assurance and Security (IAS 2011), 5-8 Dec 2011, Malacca, Malaysia. ISBN 978-1-4577-2154-0

McCusker, Kealan, O'Connor, Noel E. orcid logoORCID: 0000-0002-4033-9135 and Diamond, Dermot orcid logoORCID: 0000-0003-2944-4839 (2006) Low-energy finite field arithmetic primitives for implementing security in wireless sensor networks. In: ICCCAS 2006 - International Conference on Communications, Circuits And Systems, 25-28 June 2006, Guangxi, China.

Barreto, Paulo S.L.M., Kim, Hae Y., Lynn, Ben and Scott, Michael (2002) Efficient algorithms for pairing-based cryptosystems. In: Crypto 2002, 18-22 August 2002, Santa Barbara, California, USA. ISBN 978-3-540-44050-5

Book Section

Conway, Maura orcid logoORCID: 0000-0003-4216-8592 (2018) Is cyberterrorism a real threat? Yes: why we should start from this assumption. In: Jackson, Richard and Pisoiu, Daniela, (eds.) Contemporary Debates on Terrorism (2nd edition). Routledge (Taylor & Francis), Abingdon and New York, pp. 102-108. ISBN 978-1-138-93136-7

Conway, Maura orcid logoORCID: 0000-0003-4216-8592 (2014) Reality Check: assessing the (un)likelihood of cyberterrorism. In: Chen, Tom, Jarvis, Lee and Macdonald, Stuart, (eds.) Cyber Terrorism: Understanding, Assessment and Response. Springer, New York, pp. 103-122. ISBN 978-1-4939-0962-9

This list was generated on Sun Dec 8 02:49:07 2024 UTC.