2025
- Chowdhury, Partha Das, Karen Renaud, and Awais Rashid. 2025. ‘When Data Breaches Happen, Where Does the Buck Stop?… and where should it stop?’ In Proceedings of the New Security Paradigms Workshop (NSPW ’24). New York: Association for Computing Machinery. 106–125. https://doi.org/10.1145/3703465.3703474
- Xu, Zhiyuan, Joseph Gardiner, and Sana Belguith. 2025. ‘The dark deep side of DeepSeek: Fine-tuning attacks against the safety alignment of CoT-enabled models.’ arXiv. https://doi.org/10.48550/arXiv.2502.01225
2024
- Barrinha, André. 2024. ‘Cyber-diplomacy: The Emergence of a Transient Field.’ Hague Journal of Diplomacy, 1-28. https://doi.org/10.1163/1871191x-bja10183
- Chowdhury, Partha Das, and Karen Renaud. ‘Advocating a Policy Push Toward Inclusive and Secure “Digital-First” Societies.’ IEEE Security & Privacy (2024). https://ieeexplore.ieee.org/abstract/document/10638760
- Cristiano, Fabio, Kurowska, Xymena, Stevens, Tim, Hurel, Louise Marie, Fouad, Noran, Dunn Cavelty, Myriam, Broeders, Dennis, Liebetrau, Tobias and Shires, James. 2024. ‘Cybersecurity and the politics of knowledge production: Towards a reflexive practice.’ Journal of Cyber Policy. https://doi.org/10.1080/23738871.2023.2287687
- Dwyer, Andrew. 2024. ‘The Recursive, Geopolitical, and Infrastructural Expertise of Malware Analysis and Detection.’ In R. Slayton and L. Muller eds. The Practices and Politics of Cybersecurity Expertise. Vol. Policy Roundtable III-4. H-Diplo, 33 – 38.
- Fernet, Laouen, Sebastian Mödersheim, and Luca Viganò. 2024. ‘A decision procedure for alpha-beta privacy for a bounded number of transitions.’ 37th IEEE Computer Security Foundations Symposium (CSF), IEEE Computer Society Press.
- Haggman, Andreas. 2024. ‘Playful Learning about Cybersecurity.’ In F. L. Smith III, N. A. Kollars, and B. H. Schechter eds. Cyber Wargaming: Research and Education for Security in a Dangerous Digital World. Georgetown University Press. 109-123
- Katagiri, Nori. 2024. ‘Advanced Persistent Threats and the “Big Four”: State-Sponsored Hackers in China, Iran, Russia, and North Korea in 2003-2021.’ Comparative Strategy, Vol. 43, No. 3
- Katagiri, Nori. ‘Between cyber retaliation and escalation: Explaining variation in state response to cyber attack.’ 2024. Politics & Policy.
- Katagiri, Nori. How liberal democracies defend their cyber networks from hackers: Strategies of deterrence. 2024. Palgrave Macmillan.
-
Liu, Zhijie, Yutian Tang, Xiapu Luo, Yuming Zhou, and Liang Feng Zhang. 2024. ‘No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT.’ IEEE Transactions on Software Engineering. doi:10.1109/TSE.2024.3392499
-
Stevens, Tim. 2024. ‘Cybersecurity.’ In: N. Rossi and M. Riemann eds. Security Studies: An Applied Introduction. Sage, 353-373.
-
Stevens, Tim and Joe Devanny eds. 2024. Research Handbook on Cyberwarfare. Edward Elgar.
- Viganò, Luca. 2024. ‘The Cybersecurity of Fairy Tales.’ Journal of Cybersecurity 10 (1). https://doi.org/10.1093/cybsec/tyae005
- Weir, C., A. Dyson, O. Jogunola, L. Dennis, and K. Paxton-Fear. 2024. ‘Interlinked Computing in 2040: Safety, Truth, Ownership and Accountability.’ Computer 57 (1): 59-68.
2023
- Burton, Joe and Tim Stevens. 2023. ‘System, alliance, domain: a three-frame analysis of NATO’s contribution to cyber stability.’ In R. Chesney, J. Shires, and M. Smeets eds. Cyberspace and Instability. Edinburgh University Press, 129-152. https://doi.org/10.1515/9781399512510-007
- Cheetham, Kim and Michalec, Ola. 2023. Home alone?: Exploring the geographies of digitally-mediated privacy practices at home during the COVID-19 pandemic
- Chowdhury, Partha Das, Lizzie Coles-Kemp, Karolina Follis, Sanja Milivojevic, Awais Rashid, Genevieve Liveley, Gina Netto, Andres Dominguez, Ross Anderson, Kopo Marvin Ramokapane, and Ola Michalec. 2023. From Utility to Capability: A Manifesto for Equitable Security and Privacy for All
- Chowdhury, Partha Das and Karen Renaud. 2023. ‘”Ought” should not assume “Can”? Basic Capabilities in Cybersecurity to Ground Sen’s Capability Approach.’ In Proceedings of the 2023 New Security Paradigms Workshop, 76-91. https://doi.org/10.1145/3633500.3633506
- Cook, Andrew and Luca Viganò. 2023. ‘Formal Analysis of Security Protocols with Movement.’ ITASEC 2023: The Italian Conference on CyberSecurity CEUR, 2023
- Csenkey, Kristen and Nina Bindel. 2023. ‘Post-quantum cryptographic assemblages and the governance of the quantum threat.’ Journal of Cybersecurity 9 (1): 1-14. https://doi.org/10.1093/cybsec/tyad001
- Devanny, Joe, and Andrew Dwyer. 2023. ‘From Cyber Security to Cyber Power: Appraising the Emergence of ‘Responsible, Democratic Cyber Power’ in UK Strategy.’ In T. Jančárková, D. Giovannelli, K. Podiņš, and I. Winther eds. 15th International Conference on Cyber Conflict Meeting Reality, 381–97. International Conference on Cyber Conflict (CyCon). NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE).
- Domínguez Hernández, Andrés, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Michalec, Emily Johnstone, Emily Godwin, Alicia Cork, and Awais Rashid. 2023. ‘Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, ambivalences and opportunities.’ Proceedings of the ACM on Human-Computer Interaction, 7: 1-21.
- Dwyer, Andrew C. 2023a. ‘Cybersecurity’s Grammars: A More-than-Human Geopolitics of Computation.’ Area 55 (1): 10–17. https://doi.org/10.1111/area.12728
- Dwyer, Andrew C. 2023b. ‘The Unknowable Conflict: Tracing AI, Recognition, and the Death of the (Human) Loop.’ In Dennis Broeders, Fabio Cristiano, François Delerue, Frédérick Douzet, and Aude Géry eds. Artificial Intelligence and International Conflict in Cyberspace, 19–46. Routledge. https://doi.org/10.4324/9781003284093-3
- Dwyer, Andrew C., Kathrin Moog, Jantje Silomon, and Mischa Hansel. 2023. ‘On the Use and Strategic Implications of Cyber Ranges in Military Contexts: A Dual Typology.’ ICCWS 2023 18th International Conference on Cyber Warfare and Security 18 (1). https://doi.org/10.34190/iccws.18.1.981
- Dwyer, Andrew, Andreas Langenohl, and Philipp Lottholz. 2023. ‘Topologies of Security: Inquiring In/Security Across Postcolonial and Postsocialist Scenes.’ Critical Studies on Security 11 (1): 1–13. https://doi.org/10.1080/21624887.2023.2208942
-
Liu, Zhilie, L. Zhang, and Yutian Tang. 2023. ‘Enhancing Malware Detection for Android Apps: Detecting Fine-Granularity Malicious Components.’ 2023. 38th IEEE/ACM International Conference on Automated Software Engineering (ASE), 1212-1224, doi: 10.1109/ASE56229.2023.00074.
- Mei, Yuanqing, Yi Rong, Shiran Liu, Zhaoqiang Guo, Yibiao Yang, Hongmin Lu, Yutian Tang, and Yuming Zhou. 2023. ‘Deriving thresholds of object-oriented metrics to predict defect-proneness of classes: a large-scale meta-analysis.’ International Journal of Software Engineering and Knowledge Engineering, 33(5): 651-695.
- Michalec, Ola, Kim Barker, Kovila Coopamootoo, Lynne Coventry, Francois Duppresoir, Matthew Edwards, Shane Johnson, Emily Johnstone, Olga Jurasz, Maryam Mehrnezhad, Wendy Moncur, Frances Ridout, Francesca Stevens, Angelika Strothmayer, and Leonie Tanczer. 2023. Towards a research agenda: tackling violence against women and girls online.
- Michalec, Ola, Ben Shreeve, and Awais Rashid. 2023. ‘Who will keep the lights on? Expertise and inclusion in cyber security visions of future energy systems.’ Energy Research & Social Science 106, 103327
- Sempreboni, Diego and Luca Viganò. 2023. ‘A mutation-based approach for the formal and automated analysis of security ceremonies.’ Journal of Computer Security 31 (4): 293-364. DOI: 10.3233/JCS-210075
- Spencer, M. and D. Pizio. 2023. ‘The de-perimeterisation of information security: The Jericho Forum, zero trust, and narrativity.’ Social Studies of Science. https://doi.org/10.1177/03063127231221107
-
Stevens, Tim and Joe Burton. 2023. ‘NATO and strategic competition in cyberspace.’ NATO Review.
-
Stevens, Tim. 2023. What is Cybersecurity For? Bristol University Press. https://doi.org/10.2307/jj.1544765
-
Stevens, Tim, Rory Cormac, Erica Lonergan, Pia Huesch, and Joe Devanny. 2023. ‘Evaluating the National Cyber Force’s ‘Responsible Cyber Power in Practice.’ RUSI Commentary.
- Tokat, Yasin. (2023). ‘Towards a Safe and Secure Global Information Technology Ecosystem: The Importance of Ethical Approaches and International Cooperation in Addressing Persistent Challenges.’ Journal of Economic and Organizational Sciences. Budapest Business School, Hungary. https://doi.org/10.33565/MKSV.2023.02.09
- Wang, Yang, Peng Zhang, Maolin Sun, Zeyu Lu, Yibiao Yang, Yutian Tang, Junyan Qian, Zhi Li, and Yuming Zhou. 2023. ‘Uncovering bugs in code coverage profilers via control flow constraint solving.’ IEEE Transactions on Software Engineering.
- Weir, C., I. Becker, and L. Blair. 2023. ‘Incorporating Software Security: Using Developer Workshops to Engage Product Managers.’ Empirical Software Engineering 28 (2).
- Weir, C., A. Dyson, and D. Prince. 2023b. ‘A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software.’ In Proceedings of the 2023 IEEE Secure Development Conference (SecDev).
- Weir, C., A. Dyson, and D. Prince. 2023a. ‘Do You Speak Cyber?: Talking Security with Developers of Health Systems and Devices.’ IEEE Security and Privacy Magazine 21 (1): 27-36.