Ikuti
Nilufer Tuptuk
Judul
Dikutip oleh
Dikutip oleh
Tahun
Security of smart manufacturing systems
N Tuptuk, S Hailes
Journal of manufacturing systems 47, 93-106, 2018
5722018
A systematic review of the state of cyber-security in water systems
N Tuptuk, P Hazell, J Watson, S Hailes
Water 13 (1), 81, 2021
1142021
Covert channel attacks in pervasive computing
N Tuptuk, S Hailes
2015 IEEE international conference on pervasive computing and communications …, 2015
402015
Evolving attackers against wireless sensor networks using genetic programming
K Mrugala, N Tuptuk, S Hailes
IET Wireless Sensor Systems 7 (4), 113-122, 2017
232017
The cyberattack on Ukraine’s power grid is a warning of what’s to come
N Tuptuk, S Hailes
The Conversation 13, 2016
212016
The TrustCoM approach to enforcing agreements between interoperating enterprises
M Wilson, A Arenas, D Chadwick, T Dimitrakos, J Doser, P Giambiagi, ...
Enterprise Interoperability: New Challenges and Approaches, 365-375, 2007
202007
Toward web services profiles for trust and security in virtual organisations
AE Arenas, I Djordjevic, T Dimitrakos, L Titkov, J Claessens, ...
Collaborative Networks and Their Breeding Environments: IFIP TC5 WG 5.5 …, 2005
182005
Aspects of trusted and secure business-oriented vo management in service oriented architectures
A Svirskas, MD Wilson, AE Arenas, EC Lupu, N Tuptuk, D Chadwick, ...
Seventh IEEE International Conference on E-Commerce Technology Workshops, 3-11, 2005
112005
Evolving attackers against wireless sensor networks
K Mrugala, N Tuptuk, S Hailes
Proceedings of the 2016 on Genetic and Evolutionary Computation Conference …, 2016
82016
The trustcom framework v0. 5
M Wilson, D Chadwick, T Dimitrakos, J Doser, A Arenas, P Giambiagi
6th IFIP Working Conference on Virtual Enterprises (PRO-VE 2005), 2005
82005
State of the art evaluation, the TrustCoM project
N Tuptuk, E Lupu
June, 2004
72004
Risk based authorisation for mobile ad hoc networks
N Tuptuk, E Lupu
Inter-Domain Management: First International Conference on Autonomous …, 2007
62007
Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation
N Tuptuk, S Hailes
Computers & Security 137, 103593, 2024
42024
Crime in the age of the Internet of Things
N Tuptuk, S Hailes
Routledge Handbook of Crime Science, 2018
32018
Systematic Literature Review: Anomaly Detection in Connected and Autonomous Vehicles
JRV Solaas, E Mariconti, N Tuptuk
IEEE Transactions on Intelligent Transportation Systems, 2024
22024
Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles
JRV Solaas, N Tuptuk, E Mariconti
arXiv preprint arXiv:2405.02731, 2024
22024
Socio-technical security modelling: analysis of state-of-the-art, application, and maturity in critical industrial infrastructure environments/domains
UD Ani, JM Watson, N Tuptuk, S Hailes, A Jawar
arXiv preprint arXiv:2305.05108, 2023
22023
Policy Briefing March 2022
UD Ani, JDMK Watson, N Tuptuk, S Hailes, M Carr, C Maple
2*2022
A Systematic Review of the State of Cyber-Security in Water Systems. Water 2021, 13, 81
N Tuptuk, P Hazell, J Watson, S Hailes
s Note: MDPI stays neu-tral with regard to jurisdictional clai-ms in …, 2021
22021
State of the Art Evaluation—Phase 1
N Tuptuk, E Lupu
Deliverable SOA-D2-Issue1, TrustCOM (IST-2002-2.3. 1.9), 32, 2004
22004
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20