Follow

Submissions from 2024

PDF

Building Societal Resilience against Child Grooming using Digital Technologies: The Solution Design, Christina Thorpe, Armin Shams, and Matt Bowden

Submissions from 2019

PDF

A new network model for cyber threat intelligence sharing using blockchain technology, Daire Homan, Ian Shiel, and Christina Thorpe

Submissions from 2017

PDF

Improving the Stealthiness of DNS-Based Covert Communication, Stephen Sheridan and Anthony Keane

Submissions from 2015

PDF

Detection of DNS Based Covert Channels, Stephen Sheridan and Anthony Keane

Submissions from 2013

PDF

Robust Digital Video Watermarking using Reversible Data Hiding and Visual Cryptography, Manoj Kumar and Arnold Hensman