Ahmad, Bilal, Gilani, Syed Asfandyar, Iqbal, Razi, Sherazi, Hafiz Husnain Raza ORCID: https://orcid.org/0000-0001-8152-4065 and Iranmanesh, Vahab (2015) Deployment of VoIP communications in B&A spy agency: design and implementation. International Journal of Computer Networks and Communications Security, 3 (11). pp. 424-431. ISSN 2410-0595
Aiash, Mahdi and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2014) Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. International Journal of Communication Systems, 27 (12). pp. 3600-3618. ISSN 1074-5351
Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Azad, Muhammad Ajmal, Abdellatif, Mohammad Mahmoud, Rehman, Muhammad Habib Ur and Salah, Khaled (2019) COLIDE: A collaborative intrusion detection framework for internet of things. IET Networks, 8 (1). pp. 3-14. ISSN 2047-4954
Asif, Waqar ORCID: https://orcid.org/0000-0001-6774-3050, Bilal Qasim, Muhammad, Musa Raza Tirmzi, Syed and Muhammad Khan, Usman (2009) Performance evaluation of WiMAX (802.16) using different encoding schemes.
Azad, Muhammad Ajmal, Alazab, Mamoun, Riaz, Farhan, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Abdullah, Tariq (2019) Socioscope: I know who you are, a robo, human caller or service number. Future Generation Computer Systems, 105. pp. 297-307. ISSN 0167-739X
Azad, Muhammad Ajmal, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Mahmoud, Shazia, Salah, Khaled and Imran, Muhammad (2019) A privacy‐preserving framework for smart context‐aware healthcare applications. Transactions on Emerging Telecommunications Technologies.
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Saridakis, George and Tennakoon, Hemamali (2015) Information disclosure of social media users : does control over personal information, user awareness and security notices matter? Information Technology & People, 28 (3). pp. 426-441. ISSN 0959-3845
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Saridakis, George and Tennakoon, Hemamali (2015) Purpose of social networking use and victimisation: are there any differences between university students and those not in HE? Computers in Human Behavior, 51 (B). pp. 867-872. ISSN 0747-5632
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Saridakis, George, Tennakoon, Hemamali and Jean-Noel, Ezingeard (2015) The role of security notices and online consumer behaviour: an empirical study of social networking users. International Journal of Human-Computer Studies, 80. pp. 36-44. ISSN 1071-5819
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 and Turksen, Umut (2017) Privacy, security and politics: current issues and future prospects. Communications Law - The Journal of Computer, Media and Telecommunications Law, 22 (4). pp. 124-131. ISSN 1746-7616
Butt, Umair Muneer, Letchmunan, Sukumar, Hassan, Fadratul Hafinaz, Ali, Mubashir, Baqir, Anees, Koh, Tieng Wei and Sherazi, Hafiz Husnain Raza ORCID: https://orcid.org/0000-0001-8152-4065 (2021) Spatio-temporal crime predictions by leveraging artificial intelligence for citizens security in smart cities. IEEE Access, 9. pp. 47516-47529.
Edris, E.K.K., Aiash, M. and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2021) DCSS protocol for data caching and sharing security in a 5G network. Network, 1 (2). pp. 75-94.
Faiz, Mohamed Falah, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Alazab, Mamoun and Shalaginov, Andrii (2020) Predicting likelihood of legitimate data loss in email DLP. Future Generation Computer Systems, 110. pp. 744-757. ISSN 0167-739X
Gilbert, Michael and Wakefield, Alison ORCID: https://orcid.org/0000-0002-1553-9178 (2018) Tackling fraud effectively in central government departments. Journal of Financial Crime, 25 (2). pp. 384-399. ISSN 1359-0790
Hansen, Jared, Saridakis, George and Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 (2017) Risk, trust, and the interaction of perceived ease of use and behavioral control in predicting consumers’ use of social media for transactions. Computers in Human Behavior, 80. pp. 197-206. ISSN 0747-5632
Huang, Yongfeng, Liu, Chenghao, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Bai, Sen (2012) Steganography integration into a low-bit rate speech codec. IEEE Transactions on Information Forensics and Security, 7 (6). pp. 1865-1875. ISSN 1556-6013
Huang, Yongfeng and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2016) Covert Voice over Internet Protocol communications based on spatial model. Science China Technological Sciences, 59 (1). pp. 117-127. ISSN 1674-7321
Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Bao, Chunlan and Yip, Yau Jim (2011) Steganalysis of compressed speech to detect covert Voice over Internet Protocol channels. IET Information Security, 5 (1). pp. 26-32. ISSN 1751-8709
Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Yang, Wanxia (2013) An information - theoretical model for streaming media based stegosystems. Computing and Informatics, 32 (1). pp. 47-62. ISSN 1335-9150
Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Yip, Yau Jim (2008) A new security architecture for SIP-based P2P computer networks. Journal of Computer Science, Informatics and Electrical Engineering, 2 (1). pp. 1-11.
Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Yuan, Jian (2011) Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Transactions on Information Forensics and Security, 6 (2). pp. 296-306. ISSN 1556-6013
Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhang, Yuan (2011) Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis. IET Communications, 5 (7). pp. 929-936. ISSN 1751-8628
Huang, Yongfeng, Ying, Lizhi, Yuan, Jian and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2012) Network service registration based on role-goal-process-service meta-model in a P2P network. IET Communications, 6 (12). pp. 1632-1639. ISSN 1751-8628
Jiang, Yijing and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) An efficient and secure VoIP communication system with chaotic mapping and message digest. Multimedia Systems, 24 (3). ISSN 0942-4962
Jiang, Yijing, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Zhang, Liping, Xiong, Muzhou and Yip, Yau Jim (2016) Covert voice over internet protocol communications with packet loss based on fractal interpolation. ACM Transactions on Multimedia Computing, Communications and Applications, 12 (4). 54:1-54:20. ISSN 1551-6857
Khan, Kashif Mehboob, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Khan, Muhammad Mubashir (2020) Simulation of transaction malleability attack for blockchain-based e-voting. Computers & Electrical Engineering, 83. p. 106583. ISSN 0045-7906
Kos, Jernej, Aiash, Mahdi, Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 and Trček, Denis (2015) U-Sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks, 89. pp. 14-31. ISSN 1389-1286
Le, Anhtuan, Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126, Chai, Kok Keong and Aiash, Mahdi (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information, 7 (2). p. 25. ISSN 2078-2489
Li, H. and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2016) Enhanced bidirectional authentication scheme for RFID communications in Internet of Things environment. International Journal of Simulation: Systems, Science & Technology, 17 (36). 58.1-58.13. ISSN 1473-8031
Li, Haixia and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2016) An improved authentication mechanism based on dynamic game behavior in cloud computing. Journal of Computational and Theoretical Nanoscience, 13 (2). pp. 1211-1219. ISSN 1546-1955
Liu, Ran, Peng, Jinghui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: applications and extensions. Engineering Applications of Artificial Intelligence, 62. pp. 350-358. ISSN 0952-1976
Liu, Ran, Peng, Jinghui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2015) An efficient approximation method for calculating confidence level of negative survey. Mathematical Problems in Engineering, 2015. p. 958154. ISSN 1024-123X
Liu, Yang, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Liu, Ran, Zhang, Liping and Ma, Zhao (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Systems with Applications, 97. pp. 95-105. ISSN 0957-4174
Lyamin, Nikita, Vinel, Alexey, Jonsson, Magnus and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2014) Real-time detection of denial-of-service attacks in IEEE 802.11p vehicular networks. IEEE Communications Letters, 18 (1). pp. 110-113. ISSN 1089-7798
Peng, Jinghui, Jiang, Yijing, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Meziane, Farid (2019) Security of streaming media communications with logistic map and self-adaptive detection-based steganography. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971
Peng, Jinghui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2021) Covert communication over VoIP streaming media with dynamic key distribution and authentication. IEEE Transactions on Industrial Electronics, 68 (4). pp. 3619-3628. ISSN 0278-0046
Peng, Jinghui, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Jia, Li (2019) Fast Fourier Transform-based steganalysis of covert communications over streaming media. International Journal of Computer and Information Engineering, 13 (7). pp. 362-367. ISSN 2010-376X
Peng, Jinghui, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Zhang, Liping and Liu, Ran (2017) Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking. Multimedia Tools and Applications, 76 (2). pp. 2569-2589. ISSN 1380-7501
Schneller, Louisa, Porter, Cody Normitta and Wakefield, Alison ORCID: https://orcid.org/0000-0002-1553-9178 (2022) Implementing converged security risk management: drivers, barriers, and facilitators. Security Journal. ISSN 0955-1662
Soleymani, Seyed Ahmad, Goudarzi, Shidrokh ORCID: https://orcid.org/0000-0003-0383-3553, Anisi, Mohammad Hossein, Xiao, Pei, Mihaylova, Lyudmila and Wang, Wenwu (2024) MI3SE: A Multi-User Index-Based Searchable Symmetric Encryption Scheme for Improving Security of Data in Connected Electronic Devices. IEEE Transactions on Consumer Electronics.
Song, Jun, He, Chunjiao, Zhang, Lei, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhang, Huanguo (2014) Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs. China Communications, 11 (9). pp. 93-103. ISSN 1673-5447
Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Chen, Qing, Zhang, Wei and Huang, Yongfeng (2016) Universal steganography model for low bit-rate speech codec. Security and Communication Networks, 9 (8). pp. 747-754. ISSN 1939-0114
Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Jiang, Yijing, Zhang, Liping and Zhou, Zhangbing (2014) Audio steganography with AES for real-time covert Voice over Internet Protocol communications. Science China Information Sciences, 57 (3). pp. 1-14. ISSN 1674-733X
Xiao, Hannan, Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2009) A purchase protocol with multichannel authentication. Journal of Information Assurance and Security, 4 (4). pp. 361-371. ISSN 1554-1010
Yang, Wanxia and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) Steganalysis of low embedding rates LSB speech based on histogram moments in frequency domain. Chinese Journal of Electronics, 26 (6). pp. 1254-1260. ISSN 1022-4653
Yang, Wanxia, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Li, Miaoqi, Zhou, Beibei and Jiang, Yijing (2018) Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates. Multimedia Tools and Applications, 77 (14). pp. 17937-17952. ISSN 1380-7501
Yang, Wanxia, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Wang, GuanPing (2018) RTP timestamp steganography detection method. IETE Technical Review, 35 (1). pp. 59-67. ISSN 0256-4602
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 and Brown, Akoto Derick (2020) Digital forensics investigation jurisprudence: issues of admissibility of digital evidence. Journal of Forensic, Legal & Investigative Sciences, 6 (1). pp. 1-8. ISSN 2473-733X
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 and Opoku-Boateng, Francisca Afua (2023) Mitigating cybercrimes in an evolving organizational landscape. Continuity & Resilience Review. ISSN 2516-7502
Yuapeng, Zheng, Tiankui, Zhang and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2023) Dynamic Multi-time Scale User Admission and Resource Allocation for Semantic Extraction in MEC Systems. IEEE Transactions on Vehicular Technology.
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Cai, Zhihua (2014) Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards. Security and Communication Networks, 7 (12). pp. 2405-2411. ISSN 1939-0114
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Cai, Zhihua (2014) Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card. International Journal of Communication Systems, 27 (11). pp. 2691-2702. ISSN 1074-5351
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Cai, Zhihua (2014) Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications. IET Communications, 8 (1). pp. 83-91. ISSN 1751-8628
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Chen, Jing and Zhu, Shaohui (2015) Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography. Wireless Personal Communications, 81 (1). pp. 53-75. ISSN 0929-6212
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Luo, He (2016) Elliptic curve cryptography-based authentication with identity protection for smart grids. PLoS ONE, 11 (3). pp. 1-15.
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhu, Shanyu (2016) An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications, 59. pp. 126-133. ISSN 1084-8045
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhu, Shaohui (2017) Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol. Wireless Networks, 23 (6). pp. 1901-1916. ISSN 1022-0038
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhu, Shaohui (2016) A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP. Peer-to-Peer Networking and Applications, 9 (1). pp. 108-126. ISSN 1936-6442
Zhang, Liping, Zhang, Yixin, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Luo, He (2018) Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement. IEEE Transactions on Industrial Electronics, 65 (3). pp. 2795-2805. ISSN 0278-0046
Zhang, Liping, Zhu, Shaohui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE Journal of Biomedical and Health Informatics, 21 (2). pp. 465-475. ISSN 2168-2194
Zhang, Wei, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Zhang, Liping, Ma, Zhao and Song, Jun (2015) Chaotic stream cipher-based secure data communications over intelligent transportation network. International Journal of Antennas and Propagation, 2015. p. 315721. ISSN 1687-5869
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 (2011) Social networking and trust: is personalisation the only defence technique? In: Semantic Web Personalization and Context Awareness: Management of Personal Identities and Social Networking. IGI Global, Hershey, USA, pp. 32-41. ISBN 9781615209217
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, McAlaney, John and Frumkin, Lara (2018) Emerging threats for the human element and countermeasures in current cyber security landscape. In: Psychological and Behavioral Examinations in Cyber Security. Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, Hershey, PA, pp. 266-271. ISBN 9781522540533
Paraskevas, Alexandros ORCID: https://orcid.org/0000-0003-1556-5293 (2022) Cyber threat actors. In: Encyclopedia of Tourism Management and Marketing. Edward Elgar Publishing, Cheltenham, UK, pp. 750-753. ISBN 9781800377479
Paraskevas, Alexandros ORCID: https://orcid.org/0000-0003-1556-5293 (2022) Cyberattacks. In: Encyclopedia of Tourism Management and Marketing. Edward Elgar Publishing, Cheltenham, UK, pp. 747-750. ISBN 9781800377479
Aggarwal, Akash, Asif, Waqar ORCID: https://orcid.org/0000-0001-6774-3050, Azam, Habibul, Markovic, Milan, Rajarajan, Muttukrishnan and Edwards, Peter (2019) User privacy risk analysis for the Internet of Things. In: 6th IEEE International Conference on Internet of Things: Systems, Management and Security, 22-25 Oct, Spain.
Karbassi, Payam (2022) Anonymously request for pictures & video on your mobile from others based on location. In: School of Computing and Engineering Research and Industry Day 2022, 29 Jun 2022, London, United Kingdom. (Unpublished)
Nazar, Nauman, Darvishi, Iman and Yeboah-ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 (2022) Cyber threat analysis on online learning and its mitigation techniques amid Covid-19. In: 2022 IEEE International Smart Cities Conference (ISC2), 26-29 Sep 2022, Pafos, Cyprus.
Ngalo, Tamsanqa, Xiao, Hannan, Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2018) Threat Analysis of Software Agents in Online Banking and Payments. In: The 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018), 12-15 August 2018, Athens, Greece.
Olazabal, Alessandra Alvarez, Kaur, Jasmeet and Yeboah-ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 (2022) Deploying Man-In-the-Middle attack on IoT devices connected to Long Range Wide Area Networks (LoRaWAN). In: 2022 IEEE International Smart Cities Conference (ISC2), 26-29 Sep 2022, Pafos, Cyprus.
Sample, Char, Bakdash, Jonathan, Abdelnour-Nocera, Jose ORCID: https://orcid.org/0000-0001-7935-7368 and Maple, Carsten (2017) What's in a name? Cultural observations on nationally named hacking groups. In: 12th International Conference on Cyber Warfare and Security (ICCWS 2017), 2-3 Mar 2017, Dayton, USA.
Tennakoon, Hemamali, Ezingeard, Jean-Noel and Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 (2011) Information security and its impact on online user behaviour: open research questions in social media business model. In: The 2nd Annual Faculty of Business and Law Conference: Emerging Issues in Business and Law, 10 May 2011, Kingston upon Thames, UK. (Unpublished)
Tennakoon, Hemamali, Ezingeard, Jean-Noel and Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 (2012) Social networks and information security: extant research and future perspectives. In: British Academy of Management (BAM) Conference 2012: Management Research Revisited: Prospects for Theory and Practice, 11-13 Sep 2012, Cardiff, UK. (Unpublished)
Xiao, Hannan, Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2008) A purchase protocol with live cardholder authentication for online credit card payment. In: The Fourth International Conference on Information Assurance and Security, 8-10 September 2008, Napoli, Italy.
Xiao, Hannan, Malcolm, James A., Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2007) Hierarchical trustworthy authentication for pervasive computing. In: The 4th Annual International Conference on Mobile and Ubiquitous System: Computing, Networking and Services, 6-10 August 2007, Philadelphia, USA.
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 and Morgan, Stephanie, eds. (2014) Implications of social media use in personal and professional settings. IGI Global, Hershey, USA. ISBN 9781466674011
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 (2018) Psychological and Behavioral Examinations in Cyber Security. IGI Global, Hershey, USA. ISBN 9781522540533
Peng, Jinghui (2020) Secure covert communications over streaming media using dynamic steganography. Doctoral thesis, University of West London.
Sanders, Kevin (2018) Technology has changed the face of privacy: here’s what you need to do next. Rights Info.