Below, you will find a list of publications written by members of the RISCS community that align with the research interests of the Institute.
2025
- Chowdhury, Partha Das, Karen Renaud, and Awais Rashid. 2025. ‘When Data Breaches Happen, Where Does the Buck Stop?… and Where Should It Stop?’ In Proceedings of the New Security Paradigms Workshop (NSPW ’24). New York: Association for Computing Machinery. 106–125. https://doi.org/10.1145/3703465.3703474
- Xu, Zhiyuan, Joseph Gardiner, and Sana Belguith. 2025. ‘The Dark Deep Side of DeepSeek: Fine-tuning Attacks Against the Safety Alignment of CoT-Enabled Models.’ arXiv. https://doi.org/10.48550/arXiv.2502.01225
2024
- Barrinha, André. 2024. ‘Cyber-Diplomacy: The Emergence of a Transient Field.’ Hague Journal of Diplomacy 19:439–466. https://doi.org/10.1163/1871191x-bja10183
- Chowdhury, Partha Das, and Karen Renaud. 2024. ‘Advocating a Policy Push Toward Inclusive and Secure “Digital-First” Societies.’ IEEE Security & Privacy 22:23–31. https://ieeexplore.ieee.org/abstract/document/10638760
- Cristiano, Fabio, Xymena Kurowska, Tim Stevens, Louise Marie Hurel, Noran Fouad, Miriam Dunn Cavelty, Dennis Broeders, Tobias Liebetrau, and James Shires. 2024. ‘Cybersecurity and the Politics of Knowledge Production: Towards a Reflexive Practice.’ Journal of Cyber Policy 8:331–364. https://doi.org/10.1080/23738871.2023.2287687
- Dwyer, Andrew. 2024. ‘The Recursive, Geopolitical, and Infrastructural Expertise of Malware Analysis and Detection.’ In R. Slayton and L. Muller eds. The Practices and Politics of Cybersecurity Expertise. H-Diplo RJISSF Policy Roundtable III-4. 33–38.
- Fernet, Laouen, Sebastian Mödersheim, and Luca Viganò. 2024. ‘A Decision Procedure for Alpha-Beta Privacy for a Bounded Number of Transitions.’ In 2024 IEEE 37th Computer Security Foundations Symposium (CSF). IEEE Computer Society Press. 17–32. https://doi.org/10.1109/CSF61375.2024.00011.
- Haggman, Andreas. 2024. ‘Playful Learning About Cybersecurity.’ In F. Smith III, N. Kollars, and B. Schechter eds. Cyber Wargaming: Research and Education for Security in a Dangerous Digital World. Georgetown University Press. 109–123. https://doi.org/10.2307/jj.2458922.12.
- Katagiri, Nori. 2024. ‘Advanced Persistent Threats and the “Big Four”: State-Sponsored Hackers in China, Iran, Russia, and North Korea in 2003-2021.’ Comparative Strategy 43:280–299. https://doi.org/10.1080/01495933.2024.2317251.
- Katagiri, Nori. 2024. ‘Between Cyber Retaliation and Escalation: Explaining Variation in State Response to Cyber Attack.’ Politics & Policy 52:712–727. https://doi.org/10.1111/polp.12590.
- Katagiri, Nori. 2024. How Liberal Democracies Defend Their Cyber Networks From Hackers: Strategies of Deterrence. Palgrave Macmillan. https://doi.org/10.1007/978-3-031-54561-0.
-
Liu, Zhijie, Yutian Tang, Xiapu Luo, Yuming Zhou, and Liang Feng Zhang. 2024. ‘No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT.’ IEEE Transactions on Software Engineering 50:1548–1584. doi:10.1109/TSE.2024.3392499
-
Stevens, Tim. 2024. ‘Cybersecurity.’ In: N. Rossi and M. Riemann eds. Security Studies: An Applied Introduction. Sage. 353–373.
-
Stevens, Tim and Joe Devanny eds. 2024. Research Handbook on Cyberwarfare. Edward Elgar.
- Viganò, Luca. 2024. ‘The Cybersecurity of Fairy Tales.’ Journal of Cybersecurity 10. https://doi.org/10.1093/cybsec/tyae005
- Weir, Charles, Anna Dyson, Olamide Jogunola, Louise Dennis, and Katie Paxton-Fear. 2024. ‘Interlinked Computing in 2040: Safety, Truth, Ownership and Accountability.’ Computer 57:59–68. https://doi.org/10.1109/MC.2023.3318377.
2023
- Burton, Joe and Tim Stevens. 2023. ‘System, Alliance, Domain: A Three-Frame Analysis of NATO’s Contribution to Cyber Stability.’ In R. Chesney, J. Shires, and M. Smeets eds. Cyberspace and Instability. Edinburgh University Press. 129–152. https://doi.org/10.1515/9781399512510-007
- Cheetham, Kim and Ola Michalec. 2024. ‘Home Alone? Exploring the Geographies of Digitally-Mediated Privacy Practices at Home During the COVID-19 Pandemic.’ In K. Rannenberg, P. Drogkaris, and C. Lauradoux eds. Privacy Technologies and Policy. Springer, Cham. 109–141. https://doi.org/10.1007/978-3-031-61089-9_6.
- Chowdhury, Partha Das, Lizzie Coles-Kemp, Karolina Follis, Sanja Milivojevic, Awais Rashid, Genevieve Liveley, Gina Netto, Andres Dominguez, Ross Anderson, Kopo Marvin Ramokapane, and Ola Michalec. 2023. From Utility to Capability: A Manifesto for Equitable Security and Privacy for All.
- Chowdhury, Partha Das and Karen Renaud. 2023. ‘”Ought” Should Not Assume “Can”? Basic Capabilities in Cybersecurity to Ground Sen’s Capability Approach.’ In Proceedings of the 2023 New Security Paradigms Workshop. Association for Computing Machinery. 76–91. https://doi.org/10.1145/3633500.3633506
- Cook, Andrew and Luca Viganò. 2023. ‘Formal Analysis of Security Protocols with Movement.’ In ITASEC 2023: The Italian Conference on CyberSecurity CEUR.
- Csenkey, Kristen and Nina Bindel. 2023. ‘Post-Quantum Cryptographic Assemblages and the Governance of the Quantum Threat.’ Journal of Cybersecurity 9:1–14. https://doi.org/10.1093/cybsec/tyad001.
- Devanny, Joe, and Andrew Dwyer. 2023. ‘From Cyber Security to Cyber Power: Appraising the Emergence of ‘Responsible, Democratic Cyber Power’ in UK Strategy.’ In T. Jančárková, D. Giovannelli, K. Podiņš, and I. Winther eds. 15th International Conference on Cyber Conflict Meeting Reality. 381–97.
- Domínguez Hernández, Andrés, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Michalec, Emily Johnstone, Emily Godwin, Alicia Cork, and Awais Rashid. 2023. ‘Co-Creating a Transdisciplinary Map of Technology-Mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities.’ Proceedings of the ACM on Human-Computer Interaction 7:1–21. https://doi.org/10.1145/3610179.
- Dwyer, Andrew C. 2023a. ‘Cybersecurity’s Grammars: A More-than-Human Geopolitics of Computation.’ Area 55:10–17. https://doi.org/10.1111/area.12728.
- Dwyer, Andrew C. 2023b. ‘The Unknowable Conflict: Tracing AI, Recognition, and the Death of the (Human) Loop.’ In D. Broeders, F. Cristiano, F. Delerue, F. Douzet, and A. Géry eds. Artificial Intelligence and International Conflict in Cyberspace. Routledge. 19–46. https://doi.org/10.4324/9781003284093-3.
- Dwyer, Andrew, Kathrin Moog, Jantje Silomon, and Mischa Hansel. 2023. ‘On the Use and Strategic Implications of Cyber Ranges in Military Contexts: A Dual Typology.’ ICCWS 2023 18th International Conference on Cyber Warfare and Security 18: 57–66. https://doi.org/10.34190/iccws.18.1.981.
- Dwyer, Andrew, Andreas Langenohl, and Philipp Lottholz. 2023. ‘Topologies of Security: Inquiring In/Security Across Postcolonial and Postsocialist Scenes.’ Critical Studies on Security 11:1–13. https://doi.org/10.1080/21624887.2023.2208942.
-
Liu, Zhilie, Liang Feng Zhang, and Yutian Tang. 2023. ‘Enhancing Malware Detection for Android Apps: Detecting Fine-Granularity Malicious Components.’ 2023. 38th IEEE/ACM International Conference on Automated Software Engineering (ASE), 1212–1224, doi: 10.1109/ASE56229.2023.00074.
- Mei, Yuanqing, Yi Rong, Shiran Liu, Zhaoqiang Guo, Yibiao Yang, Hongmin Lu, Yutian Tang, and Yuming Zhou. 2023. ‘Deriving Thresholds of Object-Oriented Metrics to Predict Defect-Proneness of Classes: A Large-Scale Meta-Analysis.’ International Journal of Software Engineering and Knowledge Engineering 33:651–695. https://doi.org/10.1142/S0218194023500110.
- Michalec, Ola, Kim Barker, Kovila Coopamootoo, Lynne Coventry, Francois Duppresoir, Matthew Edwards, Shane Johnson, Emily Johnstone, Olga Jurasz, Maryam Mehrnezhad, Wendy Moncur, Frances Ridout, Francesca Stevens, Angelika Strothmayer, and Leonie Tanczer. 2023. Towards a Research Agenda: Tackling Violence Against Women and Girls Online. REPHRAIN white paper. https://oro.open.ac.uk/92708/.
- Michalec, Ola, Ben Shreeve, and Awais Rashid. 2023. ‘Who Will Keep the Lights On? Expertise and Inclusion in Cyber Security Visions of Future Energy Systems.’ Energy Research & Social Science 106:103327. https://doi.org/10.1016/j.erss.2023.103327.
- Sempreboni, Diego and Luca Viganò. 2023. ‘A Mutation-Based Approach for the Formal and Automated Analysis of Security Ceremonies.’ Journal of Computer Security 31:293–364. https://doi.org/10.3233/JCS-210075.
- Spencer, Matt and Daniele Pizio. 2023. ‘The De-Perimeterisation of Information Security: The Jericho Forum, Zero Trust, and Narrativity.’ Social Studies of Science 54:655–677. https://doi.org/10.1177/03063127231221107
-
Stevens, Tim and Joe Burton. 2023. ‘NATO and Strategic Competition in Cyberspace.’ NATO Review, 6 June 2023.
-
Stevens, Tim. 2023. What is Cybersecurity For? Bristol University Press. https://doi.org/10.2307/jj.1544765
-
Stevens, Tim, Rory Cormac, Erica Lonergan, Pia Huesch, and Joe Devanny. 2023. ‘Evaluating the National Cyber Force’s ‘Responsible Cyber Power in Practice.’ RUSI Commentary, 14 April 2023.
- Tokat, Yasin. (2023). ‘Towards a Safe and Secure Global Information Technology Ecosystem: The Importance of Ethical Approaches and International Cooperation in Addressing Persistent Challenges.’ Multidiszciplináris Kihívások, Sokszínű Válaszok. 239–269. https://doi.org/10.33565/MKSV.2023.02.09
- Wang, Yang, Peng Zhang, Maolin Sun, Zeyu Lu, Yibiao Yang, Yutian Tang, Junyan Qian, Zhi Li, and Yuming Zhou. 2023. ‘Uncovering Bugs in Code Coverage Profilers via Control Flow Constraint Solving.’ IEEE Transactions on Software Engineering 49:4964–4987. https://doi.org/10.1109/tse.2023.3321381.
- Weir, Charles, Ingolf Becker, and Lynne Blair. 2023. ‘Incorporating Software Security: Using Developer Workshops to Engage Product Managers.’ Empirical Software Engineering 28:21. https://doi.org/10.1007/s10664-022-10252-0.
- Weir, Charles, Anna Dyson, and Daniel Prince. 2023b. ‘A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software.’ In Proceedings of the 2023 IEEE Secure Development Conference (SecDev). IEEE.
- Weir, Charles, Anna Dyson, and Daniel Prince. 2023a. ‘Do You Speak Cyber?: Talking Security with Developers of Health Systems and Devices.’ IEEE Security & Privacy 21:27–36. https://doi.org/10.1109/MSEC.2022.3221616.