Currently browsing: Items authored or edited by Mu Yang

9 items in this list.
Generated on Mon Oct 25 06:34:19 2021 BST.

Book SectionTo Top

Yang, Mu; Sassone, Vladimiro and O'Hara, Kieron (2012). Annex 3: Practical examples of some key anonymisation techniques. In: Information Commissioner's Office, (ICO) ed. Anonymisation: Managing Data Protection Risk: Code of Practice. Wilmslow: Information Commissioner's Office, pp. 80–103.

Journal ItemTo Top

Hamadou, Sardaouna; Vladimiro, Sassone and Yang, Mu (2015). An analysis of trust in anonymity networks in the presence of adaptive attackers. Mathematical Structures in Computer Science, 25(02) pp. 429–456.

Conference or Workshop ItemTo Top

Tun, T. T.; Yang, M.; Bandara, A. K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K. M. and Nuseibeh, B. (2018). Requirements and Specifications for Adaptive Security: Concepts and Analysis. In: SEAMS ’18: Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, ACM, New York, pp. 161–171.

Yu, Yijun; Yang, Mu and Nuseibeh, Bashar (2017). Live Blackboxes: Requirements for Tracking and Verifying Aircraft in Motion. In: SCiA 2017 : 4th Software Challenges in Aerospace Symposium, 9-13 Jan 2017, Grapevine, Texas.

Rafiq, Yasmin; Dickens, Luke; Russo, Alessandra; Bandara, Arosha; Yang, Mu; Stuart, Avelie; Levine, Mark; Calikli, Gul; Price, Blaine and Nuseibeh, Bashar (2017). Learning to Share: Engineering Adaptive Decision-Support for Online Social Networks. In: 32nd IEEE/ACM International Conference on Automated Software Engineering, 30 Oct - 3 Nov 2017, Chicago, IL.

Yang, Mu; Yu, Yijun; Bandara, Arosha and Nuseibeh, Bashar (2014). Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit. In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), 24-26 Sep 2014, Beijing, China, IEEE, pp. 45–52.

Yang, Mu; Sassone, Vladimiro and Hamadou, Sardaouna (2012). A game-theoretic analysis of cooperation in anonymity networks. In: Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings, Lecture Notes in Computer Science, Springer, pp. 269–289.

Yang, Mu and Sassone, Vladimiro (2011). Minimising anonymity loss in anonymity networks under DoS attacks. In: Information and Communications Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings, LNCS, pp. 414–429.

Sassone, Vladimiro; Hamadou, Sardaouna and Yang, Mu (2010). Trust in anonymity networks. In: CONCUR 2010-Concurrency theory: 21st International Conference, CONCUR 2010 Paris, France, August/September 2010, Proceedings, LNCS, Springer, pp. 48–70.


Subscribe to these results

get details to embed this page in another page Embed as feed [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0