2024
- Barrinha, André. 2024. Cyber-diplomacy: The Emergence of a Transient Field. Hague Journal of Diplomacy, 1-28. https://doi.org/10.1163/1871191x-bja10183
- Chowdhury, Partha Das, and Karen Renaud. “Advocating a Policy Push Toward Inclusive and Secure “Digital-First” Societies.” IEEE Security & Privacy (2024). https://ieeexplore.ieee.org/abstract/document/10638760
- Cristiano, Fabio, Kurowska, Xymena, Stevens, Tim, Hurel, Louise Marie, Fouad, Noran, Dunn Cavelty, Myriam, Broeders, Dennis, Liebetrau, Tobias and Shires, James. 2024. Cybersecurity and the politics of knowledge production: Towards a reflexive practice. Journal of Cyber Policy. https://doi.org/10.1080/23738871.2023.2287687
- Dwyer, Andrew. 2024. The Recursive, Geopolitical, and Infrastructural Expertise of Malware Analysis and Detection. In The Practices and Politics of Cybersecurity Expertise, edited by Rebecca Slayton and Lilly Muller. Vol. Policy Roundtable III-4. H-Diplo, 33 – 38.
- Haggman, Andreas. 2024. Playful Learning about Cybersecurity. In: Smith III, Frank L., Kollars, Nina A. & Schechter, Benjamin H. (eds) Cyber Wargaming: Research and Education for Security in a Dangerous Digital World. Georgetown University Press. 109-123
- Katagiri, Nori. 2024. Advanced Persistent Threats and the “Big Four”: State-Sponsored Hackers in China, Iran, Russia, and North Korea in 2003-2021, Comparative Strategy, Vol. 43, No. 3
- Katagiri, Nori. Between cyber retaliation and escalation: Explaining variation in state response to cyber attack. 2024. Politics & Policy.
- Katagiri, Nori. How liberal democracies defend their cyber networks from hackers: Strategies of deterrence. 2024. Palgrave Macmillan.
-
Liu, Zhijie,Tang, Yutian, Luo, Xiapu, Zhou, Yuming and Zhang, Liang Feng. 2024. No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT. IEEE Transactions on Software Engineering, doi:10.1109/TSE.2024.3392499
- Fernet, Laouen PK, Mödersheim, Sebastian and Viganò, Luca. 2024. A decision procedure for alpha-beta privacy for a bounded number of transitions. 37th IEEE Computer Security Foundations Symposium (CSF), IEEE Computer Society Press.
-
Stevens, Tim. 2024. Cybersecurity. In: Rossi, N. & Riemann, M. (eds) Security Studies: An Applied Introduction. Sage, 353-373.
-
Stevens, Tim and Devanny, Joe (eds). 2024. Research Handbook on Cyberwarfare. Edward Elgar.
- Viganò, Luca. 2024. The Cybersecurity of Fairy Tales. Journal of Cybersecurity, Volume 10, Issue 1. https://doi.org/10.1093/cybsec/tyae005
- Weir, C., Dyson, A., Jogunola, O., Dennis, L., Paxton-Fear, K. 2024. Interlinked Computing in 2040: Safety, Truth, Ownership and Accountability. In: Computer. 57, 1, p. 59-68. 9 p.
2023
- Burton, Joe and Stevens,Tim. 2023. System, alliance, domain: a three-frame analysis of NATO’s contribution to cyber stability. In: R. Chesney, J. Shires & M. Smeets (eds) Cyberspace and Instability. Edinburgh University Press, 129-152. https://doi.org/10.1515/9781399512510-007
- Cheetham, Kim and Michalec, Ola. 2023. Home alone?: Exploring the geographies of digitally-mediated privacy practices at home during the COVID-19 pandemic
- Chowdhury, Partha Das, Coles-Kemp, Lizzie, Follis, Karolina, Milivojevic, Sanja, Rashid, Awais, Liveley, Genevieve, Netto, Gina, Dominguez, Andres, Anderson, Ross, Ramokapane, Kopo Marvin and Michalec, Ola. 2023. From Utility to Capability: A Manifesto for Equitable Security and Privacy for All
- Cook, Andrew and Viganò, Luca. 2023. Formal Analysis of Security Protocols with Movement. ITASEC 2023: The Italian Conference on CyberSecurity CEUR, 2023
- Csenkey, Kristen and Nina Bindel. 2023. Post-quantum cryptographic assemblages and the governance of the quantum threat. Journal of Cybersecurity 9 (1): 1-14. https://doi.org/10.1093/cybsec/tyad001
- Devanny, Joe, and Andrew Dwyer. 2023. From Cyber Security to Cyber Power: Appraising the Emergence of ‘Responsible, Democratic Cyber Power’ in UK Strategy. In 15th International Conference on Cyber Conflict Meeting Reality, edited by T Jančárková, D Giovannelli, K Podiņš, and I Winther, 381–97. International Conference on Cyber Conflict (CyCon). NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE).
- Das Chowdhury, Partha and Renaud, Karen. 2023. ‘Ought’ should not assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability Approach. In Proceedings of the 2023 New Security Paradigms Workshop, pp. 76-91. https://doi.org/10.1145/3633500.3633506
- Domínguez Hernández, Andrés , Ramokapane, Kopo M, Das Chowdhury, Partha, Michalec, Ola, Johnstone, Emily, Godwin, Emily, Cork, and Rashid, Awais. 2023. Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, ambivalences and opportunities. Proceedings of the ACM on Human-Computer Interaction
- Dwyer, Andrew C. 2023a. Cybersecurity’s Grammars: A More-than-Human Geopolitics of Computation. Area 55 (1): 10–17. https://doi.org/10.1111/area.12728
- Dwyer, Andrew C. 2023b. The Unknowable Conflict: Tracing AI, Recognition, and the Death of the (Human) Loop. In Artificial Intelligence and International Conflict in Cyberspace, edited by Dennis Broeders, Fabio Cristiano, François Delerue, Frédérick Douzet, and Aude Géry, 1st ed., 19–46. Routledge. https://doi.org/10.4324/9781003284093-3
- Dwyer, Andrew C, Kathrin Moog, Jantje Silomon, and Mischa Hansel. 2023. On the Use and Strategic Implications of Cyber Ranges in Military Contexts: A Dual Typology. ICCWS 2023 18th International Conference on Cyber Warfare and Security 18 (1). https://doi.org/10.34190/iccws.18.1.981
- Dwyer, Andrew, Andreas Langenohl, and Philipp Lottholz. 2023. Topologies of Security: Inquiring In/Security Across Postcolonial and Postsocialist Scenes. Critical Studies on Security 11 (1): 1–13. https://doi.org/10.1080/21624887.2023.2208942
-
Liu, Zhilie, Zhang, L and Tang, Yutian. 2023. Enhancing Malware Detection for Android Apps: Detecting Fine-Granularity Malicious Components. 2023. 38th IEEE/ACM International Conference on Automated Software Engineering (ASE), Luxembourg, Luxembourg, 2023, pp. 1212-1224, doi: 10.1109/ASE56229.2023.00074.
- Mei, Yuanqing, Rong, Yi, Liu, Shiran, Guo, Zhaoqiang, Yang, Yibiao, Lu, Hongmin, Tang, Yutian and Zhou, Yuming. 2023. Deriving thresholds of object-oriented metrics to predict defect-proneness of classes: a large-scale meta-analysis. International Journal of Software Engineering and Knowledge Engineering, 33(5), pp. 651-695.
- Michalec, Ola, Barker, Kim, Coopamootoo, Kovila, Coventry, Lynne, Duppresoir, Francois, Edwards, Matthew, Johnson, Shane, Johnstone, Emily, Jurasz, Olga, Mehrnezhad, Maryam, Moncur, Wendy, Ridout, Frances, Stevens, Francesca, Strothmayer, Angelika and Tanczer, Leonie. 2023. Towards a research agenda: tackling violence against women and girls online.
- Michalec, Ola, Shreeve, Ben and Rashid, Awais. 2023. Who will keep the lights on? Expertise and inclusion in cyber security visions of future energy systems. Energy Research & Social Science 106, 103327
- Sempreboni, Diego and Viganò, Luca. 2023. A mutation-based approach for the formal and automated analysis of security ceremonies. Journal of Computer Security 31 (4), 293-364. DOI: 10.3233/JCS-210075
- Spencer, M. and Pizio, D., 2023. The de-perimeterisation of information security: The Jericho Forum, zero trust, and narrativity. Social Studies of Science. https://doi.org/10.1177/03063127231221107
-
Stevens, Tim and Burton, Joe. 2023. NATO and strategic competition in cyberspace. NATO Review.
-
Stevens, Tim. 2023. What is Cybersecurity For? Bristol University Press. https://doi.org/10.2307/jj.1544765
-
Stevens, Tim, Cormac, Rory, Lonergan, Erica, Huesch, Pia and Devanny, Joe. 2023. Evaluating the National Cyber Force’s ‘Responsible Cyber Power in Practice. RUSI Commentary.
- Tokat, Yasin. (2023). Towards a Safe and Secure Global Information Technology Ecosystem: The Importance of Ethical Approaches and International Cooperation in Addressing Persistent Challenges. Journal of Economic and Organizational Sciences. Budapest Business School, Hungary. https://doi.org/10.33565/MKSV.2023.02.09
- Wang, Yang, Zhang, Peng, Sun, Maolin, Lu, Zeyu, Yang, Yibiao, Tang, Yutian., Qian, Junyan, Li, Zhi and Zhou, Yuming. 2023. Uncovering bugs in code coverage profilers via control flow constraint solving. IEEE Transactions on Software Engineering.
- Weir, C., Becker, I., Blair, L. 2023. Incorporating Software Security: Using Developer Workshops to Engage Product Managers. In: Empirical Software Engineering. 28, 2, 33 p.
- Weir, C., Dyson, A., Prince, D. 2023. A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software
- Weir, C., Dyson, A., Prince, D. 2023. Do You Speak Cyber?: Talking Security with Developers of Health Systems and Devices. In: IEEE Security and Privacy Magazine. 21, 1, p. 27-36. 10 p.