| IEEE TFS’24 Y. Li et al, Adversarial Attack Detection via Fuzzy Predictions. pdf |
| ECCV’24 Y. Li et al, Self-Supervised Representation Learning for Adversarial Attack Detection.pdf |
| ANRW ’24 S. Kastanakis et al, Investigating Location-Aware Advertisements in Anycast IP Networks. pdf |
| IJCNN ’24 Y. Li et al, Rethinking Self-Supervised Learning for Cross-Domain Adversarial Sample Recovery. pdf |
| ICANN ’24 Y. Li et al, Federated Adversarial Learning for Robust Autonomous Landing Runway Detection. pdf |
| NFM ’24 O. Gunasekera et al, Real Arithmetic in TLAPM. pdf |
| arXiv S. Winter et al, Error Propagation Analysis for Multithreaded Programs: An Empirical Approach. pdf |
| Springer Open’24 E. Chuah et al, An Empirical Study of Reflection Attacks Using NetFlow Data. pdf |
| Space Policy’23 V. Varadharajan et al, Security Challenges When Space Merges With Cyberspace. pdf |
| LANMAN’23 S. Rene et al, Scalable Content-centric Routing for Hybrid ICN. pdf |
| DAPPS’23 N. Keizer et al, Ditto: Towards Decentralised Similarity Search for Web3 Services. pdf |
| IMC’23 L. Balduf et al, The Cloud Strikes Back: Investigating the Decentralization of IPFS. pdf |
| CAMLIS’23 S. Trawicki et al, Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization. pdf |
| CAMLIS’23 L. Birch et al, Model Leeching: An Extraction Attack Targeting LLMs. pdf |
| SSCI’23 Y. Li et al, Fuzzy Detectors Against Adversarial Attacks. pdf |
| IMC’23 S. Kastanakis et al, 20 Years of Inferring Inter-domain Routing Policies. pdf |
| DASC’23 B. Yuksek et al, Federated Meta Learning for Visual Navigation in GPS-denied Urban Airspace. pdf |
| NDSS’24 S. Sridhar et al, Content Censorship in the InterPlanetary File System. pdf |
| MASS’23 Z. Yu et al, RAFL: A Robust and Adaptive Federated Meta-Learning Framework Against Adversaries. pdf |
| TOPS’23 Y. Lu et al, Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph. pdf |
| T-ASE’23 Y. Lu et al, Transactive Energy System Deployment over Insecure Communication Links. pdf |
| IJCNN’23 Y. Li et al, Domain Generalization and Feature Fusion for Cross-domain Imperceptible Adversarial Attack Detection. pdf |
| CyBok: SSG Prof. Suri defines NCSC’s CyBOK knowledge area on Distributed Systems Security |
| Prof. Suri to lead LU’s ACE-CSE |
| Security Institute to lead £3M UKRI-TAS research node to examine cybersecurity in autonomous systems.New |
| MSN’22: Z. Yu et al, PPFM: An Adaptive and Hierarchical Peer-to-Peer Federated Meta-Learning Framework. pdf |
| ToSN’22 M. Bradbury et al, Threat Modelling Guided Trust-based Task Offloading for Resource-constrained Internet of Things. pdf |
| NCA’21: E. Chuah et al, Challenges in Identifying Network Attacks Using Netflow Data. pdf |
| COSE’21: B. Green et al, PCaaD: Towards automated determination and exploitation of industrial systems.pdf |
| ISPA’21: E. Chuah et al, Failure Diagnosis for Cluster Systems using Partial Correlations. pdf |
| SIGCOMM’21: M. Fayed, V. Giotsas et al, IP Unbound: Robust, Responsive CDN-scale service without CDN-Scale Addresses |
| DSN’21: K. Alharthi, E. Chuah et al, Sentiment Analysis based Error Detection for Large-Scale Systems. |
| ToTI’21: I. Ivkic et al, A Security Cost Modelling Framework for Cyber-Physical Systems. pdf |
| ICST’21: N. Coppik et al, Fast Kernel Error Propagation Analysis in Virtualized Environments. pdf |
| ToMC’20: S. Kastanakis et al, Network-aware Recommendations in the Wild: Methodology, Realistic Evaluations, Experiments. |
| JoIPSI’20: S. Mitropoulos et al, A Categorization of Policy Conflicts in Distributed Systems and Network Management. pdf |
| STTT’20: C. Grompanopoulos et al, Specifying and Verifying Usage Control Models and Policies in TLA+. pdf |
| TSE’20: R. Natella et al, Analyzing the Effects of Bugs on Software Interfaces. pdf |
| ToN’20, V. Giotsas et al, O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs |
| USENIX Security ’20: C. Weir et al, “From Needs to Actions to Secure Apps? pdf |
| IMC’20, V. Giostas et al, Reduce, Reuse, Recycle: Repurposing existing measurements to identify stale traceroutes |
| IMC’20, T. Arnold et al, Rise of the Cloud and the Private Internet |
| USENIX Security CSET Workshop ’20: B. Green et al, “ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource”, pdf |
| INFOCOM ’20: E. Gurmerilier et al,“ (How Much) Does a Private WAN Improve Cloud Performance?” |
| DSN ’20: H. Saissi et al, “TraceSanitizer – Eliminating the Effects of Non-determinism on Error Propagation Analysis”. pdf |
| NIST: V.C. Hu et al, “ General Access Control Guidance for Cloud Systems: SP 800-210” |