petras logo
abstract right side


Take a look at our expanse of multidisciplinary research publications.



Design Research Opportunities in the Internet of Health Things: a review of reviews

Tsekleves E, Cooper R.(2018). DRS2018. p.2366-2379.

IoT-Enabled Highway Maintenance: Understanding Emerging Cybersecurity Threats

Trotter L, Prange S, Khamis M, Davies N, Alt F.(2018). IEEE Pervasive Computing. p.23-34.

Poster: Design Considerations for Secure and Usable Authentication on Situated Displays

Trotter L, M Harding, M Mikusz, and N Davies.(2018). 17th International Conference on Mobile and Ubiquitous Multimedia.

A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols

Tomic I, McCann J.(2017). IEEE Internet of Things Journal 4(6). p.1910-1923. 10.1109/JIOT.2017.2749883

The Limits of LoRaWAN in Event-Triggered Wireless Networked Control Systems

Tomic I, Bhatia L, Breza M, McCann J.(2018). UKACC 12th International Conference on Control (CONTROL). p.101-106 10.1109/CONTROL.2018.8516774

Antilizer: Run Time Self-Healing Security for Wireless Sensor Networks

Tomic I, Chen PY, Breza M, McCann J.(2018). 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.

The Role of Crowdsourcing in the Emerging Internet-Of-Things

Tinati R, Madaan A, Hall W.(2017). Proceedings of the 26th International Conference on World Wide Web Companion. p.1669–1672.

Internet of Things: realising the potential of a trusted smart world

Taylor P.(2018).

Emerging Risks in the IoT Ecosystem: Who’s Afraid of the Big Bad Smart Fridge?

Tanczer L, Steenmans I, Elsden M, Blackstock J, Carr M.(2018). Living in the Internet of Things: Cybersecurity of the IoT.

The United Kingdom’s Emerging Internet of Things (IoT) Policy Landscape

Tanczer L, Brass I, Elsden M, Carr M, Blackstock J.(2018). in Rewired: Cybersecurity Governance. p.37–56.