Bruce Christianson
Orcid: 0000-0002-3777-7476Affiliations:
- University of Hertfordshire, Hatfield, UK
According to our database1,
Bruce Christianson
authored at least 114 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
WIREs Data. Mining. Knowl. Discov., 2024
2023
Numer. Algorithms, April, 2023
Proceedings of the Security Protocols XXVIII, 2023
2022
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks.
Sensors, 2022
Comput. Networks, 2022
2020
A comparison of methods for traversing regions of non-convexity in optimization problems.
Numer. Algorithms, 2020
2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
2017
2016
BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks.
IEEE J. Biomed. Health Informatics, 2016
Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2016
Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering, 2016
2015
Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past".
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
J. Sens. Actuator Networks, 2014
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014
An evaluation of break-the-glass access control model for medical data in wireless sensor networks.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014
2013
A scalable approach to computing representative lowest common ancestor in directed acyclic graphs.
Theor. Comput. Sci., 2013
Proceedings of the Security Protocols XXI, 2013
Proceedings of the Security Protocols XXI, 2013
Artists as HRI Pioneers: A Creative Approach to Developing Novel Interactions for Living with Robots.
Proceedings of the Social Robotics - 5th International Conference, 2013
Exploring Robot Etiquette: Refining a HRI Home Companion Scenario Based on Feedback from Two Artists Who Lived with Robots in the UH Robot House.
Proceedings of the Social Robotics - 5th International Conference, 2013
A different approach of using Personas in human-robot interaction: Integrating Personas as computational models to modify robot companions' behaviour.
Proceedings of the IEEE International Symposium on Robot and Human Interactive Communication, 2013
Proceedings of the International Conference on High Performance Computing & Simulation, 2013
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013
2012
My Familiar Robot Companion: Preferences and Perceptions of CHARLY, a Companion Humanoid Autonomous Robot for Living with You.
Proceedings of the Advances in Autonomous Robotics, 2012
Proceedings of the Security Protocols XX, 2012
An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks.
Proceedings of the Q2SWinet'12, 2012
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012
Proceedings of the 16th International Conference on Evaluation & Assessment in Software Engineering, 2012
2011
Int. J. Digit. Crime Forensics, 2011
Proceedings of the Security Protocols XIX, 2011
Proceedings of the Security Protocols XIX, 2011
Proceedings of the 15th International Conference on Evaluation & Assessment in Software Engineering, 2011
The misuse of the NASA metrics data program data sets for automated software defect prediction.
Proceedings of the 15th International Conference on Evaluation & Assessment in Software Engineering, 2011
2010
Wirel. Sens. Netw., 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security Protocols XVIII, 2010
Software defect prediction using static code metrics underestimates defect-proneness.
Proceedings of the International Joint Conference on Neural Networks, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the ACHI 2010, 2010
2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Security Protocols XVII, 2009
Using the Support Vector Machine as a Classification Method for Software Defect Prediction with Static Code Metrics.
Proceedings of the Engineering Applications of Neural Networks, 2009
Proceedings of the Advances in Databases and Information Systems, 2009
2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Artificial Neural Networks, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Proceedings of the Security Protocols, 2007
Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript of Discussion).
Proceedings of the Security Protocols, 2007
Proceedings of the Security Protocols, 2007
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
Proceedings of the Advances in Computer Systems Architecture, 11th Asia-Pacific Conference, 2006
Reducing the Branch Power Cost in Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation.
Proceedings of the Advances in Computer Systems Architecture, 11th Asia-Pacific Conference, 2006
2005
Proceedings of the Security Protocols, 2005
Proceedings of the Security Protocols, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
2004
Proceedings of the Teaching Formal Methods, CoLogNET/FME Symposium, 2004
Proceedings of the Security Protocols, 2004
2003
Proceedings of the Security Protocols, 2003
2002
Proceedings of the Security Protocols, 2002
Proceedings of the Security Protocols, 2002
2001
Proceedings of the Security Protocols, 2001
Proceedings of the Security Protocols, 2001
Proceedings of the Security Protocols, 2001
2000
Proceedings of the Security Protocols, 2000
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion).
Proceedings of the Security Protocols, 2000
1999
Proceedings of the Security Protocols, 1999
1998
Proceedings of the Security Protocols, 1998
Proceedings of the Security Protocols, 1998
1997
Microprocess. Microsystems, 1997
Practical parallel processing: An introduction to problem solving in parallel : by Alan Chalmers and Jonathan Tidmus. 1996, 400 pp, ISBN 1-85032-135-3, £23.95.
Microprocess. Microsystems, 1997
Proceedings of the Security Protocols, 1997
1996
1995
Is Your Computing Environment Secure? Security Problems With Interrupt Handling Mechanisms.
ACM SIGOPS Oper. Syst. Rev., 1995
1994
1993