petras logo
abstract right side


Take a look at our expanse of multidisciplinary research publications.



The Need for Sensemaking in Networked Privacy and Algorithmic Responsibility

Van Kleek M, Seymour W, Binns R, Shadbolt N.(2018). Sensemaking in a Senseless World: Workshop at ACM CHI’18.

Self-Control in Cyberspace: Applying Dual Systems Theory to a Review of Digital Self-Control Tools

Lyngs U, Lukoff K, Slovak P, Binns R, Slack A, Inzlicht M, Van Kleek M, Shadbolt N.(2019). CHI 2019.

Data Exfiltration: A Review of External Attack Vectors and Countermeasures

Ullah F, Edwards M, Ramdhany R, Chitchyan R, Babar M, Rashid A.(2016). Journal of Network and Computer Applications 101. p.18-54.

Step Intervals and Arterial Pressure in PVS Schemes

Turner H, Chizari, Lupu E.(2018). IET Conference Publications.

Design Research Opportunities in the Internet of Health Things: a review of reviews

Tsekleves E, Cooper R.(2018). DRS2018. p.2366-2379.

IoT-Enabled Highway Maintenance: Understanding Emerging Cybersecurity Threats

Trotter L, Prange S, Khamis M, Davies N, Alt F.(2018). IEEE Pervasive Computing. p.23-34.

Poster: Design Considerations for Secure and Usable Authentication on Situated Displays

Trotter L, M Harding, M Mikusz, and N Davies.(2018). 17th International Conference on Mobile and Ubiquitous Multimedia.

A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols

Tomic I, McCann J.(2017). IEEE Internet of Things Journal 4(6). p.1910-1923. 10.1109/JIOT.2017.2749883

The Limits of LoRaWAN in Event-Triggered Wireless Networked Control Systems

Tomic I, Bhatia L, Breza M, McCann J.(2018). UKACC 12th International Conference on Control (CONTROL). p.101-106 10.1109/CONTROL.2018.8516774

Antilizer: Run Time Self-Healing Security for Wireless Sensor Networks

Tomic I, Chen PY, Breza M, McCann J.(2018). 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.