SCULI publications
Other relevant publications from the project team
Priyanka Badva, Kopo M. Ramokapane, Eleonora Pantano, Awais Rashid (2024). Unveiling the Hunter-Gatherers: Exploring Threat Hunting Practices and Challenges in Cyber Defense. USENIX Security Symposium 2024. https://www.usenix.org/conference/usenixsecurity24/presentation/badva
Eleni Philippou, Sylvain Frey, Awais Rashid (2020). Contextualising and aligning security metrics and business objectives: A GQM-based methodology. Computers & Security 88. https://doi.org/10.1016/j.cose.2019.101634
Awais Rashid, Syed Asad Ali Naqvi, Rajiv Ramdhany, Matthew Edwards, Ruzanna Chitchyan, Muhammad Ali Babar (2016). Discovering “unknown known” security requirements. Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016, pp. 866-876. https://doi.org/10.1145/2884781.2884785
Neeraj Suri. Distributed Systems Security chapter in CyBOK (Cyber Security Body of Knowledge) https://www.cybok.org/media/downloads/Distributed_Systems_Security_issue_1.0.pdf
S. Manzoor, A. Gouglidis, M. Bradbury and N. Suri (2024). Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments in IEEE Transactions on Cloud Computing, vol. 12, no. 1, pp. 319-336, Jan.-March 2024 https://ssg.lancs.ac.uk/wp-content/uploads/IEEE_TCC_ThreatPro.pdf
J. Luna, A. Taha, R. Trapero and N. Suri (2017). Quantitative Reasoning about Cloud Security Using Service Level Agreements, in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 457-471, 1 July-Sept. 2017 https://ssg.lancs.ac.uk/wp-content/uploads/jesus-quanti.pdf
Matthew Bradbury, Arshad Jhumka, and Tim Watson. Trust Trackers for Computation Offloading in Edge-Based IoT Networks. In IEEE INFOCOM, 1–10. Vancouver, BC, Canada, 10–13 May 2021. IEEE. doi:10.1109/INFOCOM42981.2021.9488844
https://ieeexplore.ieee.org/document/10540922/authors#authors
Machine Learning Security of Connected Autonomous Vehicles: A Systems Perspective. IEEE International Conference on Industrial Technology (ICIT)Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh and Tooska Dargahi (2020). PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications, in Future Generation Computer Systems, vol. 111, October 2020, pp 899-918 https://www.sciencedirect.com/science/article/abs/pii/S0167739X1930130X
https://ieeexplore.ieee.org/document/9040586
A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases, in IEEE Sensors Journal, vol. 21, issue 14.