University of Hertfordshire

Professor Bruce Christianson MSc DPhil FBS FNZMS

Bruce Christianson

Professor Bruce Christianson MSc DPhil FBS FNZMS

Publications

  1. 2022
  2. A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks

    Chiejina, E., Xiao, H., Christianson, B., Mylonas, A. & Chiejina, C., 12 Jan 2022, In: Sensors. 22, 2, 32 p., 571.

    Research output: Contribution to journalArticlepeer-review

  3. 2021
  4. Edge Security for SIP-enabled IoT Devices with P4

    Febro, A., Xiao, H., Spring, W. J. & Christianson, B., 11 Feb 2022, In: Computer Networks. 203, 25 p., 108698.

    Research output: Contribution to journalArticlepeer-review

  5. Reflections on Designing the Academic Dress of the University of Hertfordshire

    Christianson, B. & Waters, P., 9 Oct 2021, In: Transactions of the Burgon Society. 20, p. 150-161 12 p.

    Research output: Contribution to journalArticlepeer-review

  6. 2019
  7. A comparison of methods for traversing regions of non-convexity in optimization problems

    Bartholomew-Biggs, M., Beddiaf, S. & Christianson, B., 13 Nov 2019, (E-pub ahead of print) In: Numerical Algorithms. p. 1-23 23 p.

    Research output: Contribution to journalArticlepeer-review

  8. 2018
  9. Differentiating through Conjugate Gradient

    Christianson, B., 2 Nov 2018, In: Optimization Methods and Software. 33, 4-6, p. 988-994 7 p.

    Research output: Contribution to journalArticlepeer-review

  10. Threat Analysis of Software Agents in Online Banking and Payments

    Ngalo, T., Xiao, H., Christianson, B. & Zhang, Y., 29 Oct 2018, The 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018). IEEE, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. A comparison of methods for traversing non-convex regions in optimization problems

    Bartholomew-Biggs, M. C., Beddiaf, S. & Christianson, B., 3 Jul 2018, Optimization Online, 19 p.

    Research output: Working paper

  12. 2017
  13. Simulating Perceptions of Security

    Wernick, P., Christianson, B. & Spring, W., 29 Nov 2017, Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers. Stajano, F., Anderson, J., Christianson, B. & Matyáš, V. (eds.). 1 ed. Springer International Publishing, Vol. 10476 LNCS. p. 60-68 9 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Secure Communication Method/Procédé de Communication Sécureisée/Laborgerät für eine Gesteuerte Umgebung. European Patent 09784674.5

    Christianson, B., Turitsin, S. & Shafarenko, A., 1 Aug 2017, (Accepted/In press) IPC No. WO 2010/00 4290, Patent No. EPP6755, Priority date 11 Jul 2008, Priority No. PCT/GB2009/001714

    Research output: Patent

  15. Entry in progress

    Preface

    Anderson, J., Christianson, B., Matyas, V. & Stajano, F., 19 Jul 2017, In: Lecture Notes in Computer Science. 10368 LNCS

    Research output: Contribution to journalEditorialpeer-review

  16. Entry in progress

    The price of belief: Insuring credible trust? (Transcript of discussion)

    Christianson, B., 19 Jul 2017, Security Protocols XXIV - 24th International Workshop, Revised Selected Papers. Springer Verlag, Vol. 10368 LNCS. p. 39-46 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10368 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Entry in progress

    The price of belief: Insuring credible trust?

    Wernick, P. & Christianson, B., 19 Jul 2017, Security Protocols XXIV - 24th International Workshop, Revised Selected Papers. Springer Verlag, Vol. 10368 LNCS. p. 35-38 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10368 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. A Cloud-based RFID Authentication Protocol with Insecure Communication Channels

    Xiao, H., Alshehri, A. & Christianson, B., 9 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, p. 332-339 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Self attestation of things

    Das Chowdhury, P. & Christianson, B., 1 Jan 2017, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10476 LNCS, p. 76-84 9 p.

    Research output: Contribution to journalArticlepeer-review

  20. 2016
  21. A Portrait of an Oxford Nobleman, circa 1705

    Christianson, B. & Kendall, J., 9 Oct 2016, In: Transactions of the Burgon Society. 15, p. 30-40 11 p.

    Research output: Contribution to journalArticlepeer-review

  22. Building an Ensemble for Software Defect Prediction Based on Diversity Selection

    Petri, J., Bowes, D., Hall, T., Christianson, B. & Baddoo, N., 9 Sep 2016, Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. New York, NY, USA: ACM Press, p. 46:1-46:10 (ESEM '16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. The Jinx on the NASA software defect data sets

    Petrić, J., Bowes, D., Hall, T., Christianson, B. & Baddoo, N., 1 Jun 2016, Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering (EASE). NY, New York : ACM Press, Vol. 01-03-June-2016. a13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. BTG-AC: Break-The-Glass Access Control Model for Medical Data in Wireless Sensor Networks

    Maw, H., Xiao, H., Christianson, B. & Malcolm, J., 3 May 2016, In: IEEE Journal of Biomedical and Health Informatics. 20, 2, p. 763-774

    Research output: Contribution to journalArticlepeer-review

  25. Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks

    Alocious, C., Xiao, H. & Christianson, B., Apr 2016, 2016 IEEE Wireless Communications and Networking Conference (IEEE WCNC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. 2015
  27. Pico without public keys

    Christianson, B., Stajano, F., Lomas, M., Jenkinson, G., Jeunese, P., Stafford-Fraser, Q. & Spencer, M., 25 Nov 2015, (E-pub ahead of print) Security Protocols XXIII. Springer-Verlag, (Berlin-Heidelberg), p. 195-211 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks

    Alocious, C., Xiao, H. & Christianson, B., 5 Oct 2015, Procs 11th Int Wireless Communication & Mobile Computing Conference. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Guarantor and Reputation Based Trust Model for Social Internet of Things

    Xiao, H., Sidhu, N. & Christianson, B., 5 Oct 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, p. 600-605 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots

    Alocious, C., Xiao, H., Christianson, B. & Malcolm, J., Oct 2015, Procs of the 13th IEEE Int Conf on Dependable, Autonomic and Secure Computing: (DASC-2015). IEEE, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Will Technology Make Information Security Impossible? And Must Technology be Invented Just Because We Can? Thoughts Occasioned by Brunner’s “The Productions of Time” and Asimov’s “The Dead Past” (Paper and discussion transcript)

    Wernick, P. & Christianson, B., 1 Sep 2015, (Accepted/In press) Security Protocols XXIII 23rd International Workshop. Springer, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Chiejina, E., Xiao, H. & Christianson, B., 17 Apr 2015, In: Computers. 4, 2, p. 87-112 26 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 5 6 7 Next