Press "Enter" to skip to content

Resources

SCULI publications

Awais Rashid, Sana Belguith, Matthew Bradbury, Sadie Creese, Ivan Flechais, Neeraj Suri (2025). Beyond Security-by-design: Securing a compromised system. Rossfest Symposium in memory of Ross Anderson, Cambridge, UK, 25 March 2025. https://arxiv.org/abs/2501.07207

Other relevant publications from the project team

Priyanka Badva, Kopo M. Ramokapane, Eleonora Pantano, Awais Rashid (2024). Unveiling the Hunter-Gatherers: Exploring Threat Hunting Practices and Challenges in Cyber DefenseUSENIX Security Symposium 2024. https://www.usenix.org/conference/usenixsecurity24/presentation/badva

Eleni Philippou, Sylvain Frey, Awais Rashid (2020). Contextualising and aligning security metrics and business objectives: A GQM-based methodologyComputers & Security 88. https://doi.org/10.1016/j.cose.2019.101634

Awais Rashid, Syed Asad Ali Naqvi, Rajiv Ramdhany, Matthew Edwards, Ruzanna Chitchyan, Muhammad Ali Babar (2016). Discovering “unknown known” security requirementsProceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016, pp. 866-876. https://doi.org/10.1145/2884781.2884785

Neeraj Suri. Distributed Systems Security chapter in CyBOK (Cyber Security Body of Knowledge) https://www.cybok.org/media/downloads/Distributed_Systems_Security_issue_1.0.pdf

S. Manzoor, A. Gouglidis, M. Bradbury and N. Suri (2024). Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments in IEEE Transactions on Cloud Computing, vol. 12, no. 1, pp. 319-336, Jan.-March 2024 https://ssg.lancs.ac.uk/wp-content/uploads/IEEE_TCC_ThreatPro.pdf

J. Luna, A. Taha, R. Trapero and N. Suri (2017). Quantitative Reasoning about Cloud Security Using Service Level Agreements, in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 457-471, 1 July-Sept. 2017 https://ssg.lancs.ac.uk/wp-content/uploads/jesus-quanti.pdf

Matthew Bradbury, Arshad Jhumka, and Tim Watson. Trust Trackers for Computation Offloading in Edge-Based IoT Networks. In IEEE INFOCOM, 1–10. Vancouver, BC, Canada, 10–13 May 2021. IEEE. doi:10.1109/INFOCOM42981.2021.9488844

Winston Ellis, Sana Belguith and Theo Tryfonas (2024). Machine Learning Security of Connected Autonomous Vehicles: A Systems Perspective. IEEE International Conference on Industrial Technology (ICIT) https://ieeexplore.ieee.org/document/10540922/authors#authors

Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh and Tooska Dargahi (2020). PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications, in Future Generation Computer Systems, vol. 111, October 2020, pp 899-918 https://www.sciencedirect.com/science/article/abs/pii/S0167739X1930130X

Mohammad Hammoudeh, Gregory Epiphaniou, Sana Belguith, Devrim Unal, Bamidele Adebisi and Thar Baker (2021). A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases, in IEEE Sensors Journal, vol. 21, issue 14. https://ieeexplore.ieee.org/document/9040586