Currently browsing: Items authored or edited by Mu Yang

9 items in this list.
Generated on Mon Jul 22 17:01:12 2024 BST.

Jump to:

2018 | 2017 | 2015 | 2014 | 2012 | 2011 | 2010

2018To Top

Tun, T. T.; Yang, M.; Bandara, A. K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K. M. and Nuseibeh, B. (2018). Requirements and Specifications for Adaptive Security: Concepts and Analysis. In: SEAMS ’18: Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, ACM, New York, pp. 161–171.

2017To Top

Yu, Yijun; Yang, Mu and Nuseibeh, Bashar (2017). Live Blackboxes: Requirements for Tracking and Verifying Aircraft in Motion. In: SCiA 2017 : 4th Software Challenges in Aerospace Symposium, 9-13 Jan 2017, Grapevine, Texas.

Rafiq, Yasmin; Dickens, Luke; Russo, Alessandra; Bandara, Arosha; Yang, Mu; Stuart, Avelie; Levine, Mark; Calikli, Gul; Price, Blaine and Nuseibeh, Bashar (2017). Learning to Share: Engineering Adaptive Decision-Support for Online Social Networks. In: 32nd IEEE/ACM International Conference on Automated Software Engineering, 30 Oct - 3 Nov 2017, Chicago, IL.

2015To Top

Hamadou, Sardaouna; Vladimiro, Sassone and Yang, Mu (2015). An analysis of trust in anonymity networks in the presence of adaptive attackers. Mathematical Structures in Computer Science, 25(02) pp. 429–456.

2014To Top

Yang, Mu; Yu, Yijun; Bandara, Arosha and Nuseibeh, Bashar (2014). Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit. In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), 24-26 Sep 2014, Beijing, China, IEEE, pp. 45–52.

2012To Top

Yang, Mu; Sassone, Vladimiro and O'Hara, Kieron (2012). Annex 3: Practical examples of some key anonymisation techniques. In: Information Commissioner's Office, (ICO) ed. Anonymisation: Managing Data Protection Risk: Code of Practice. Wilmslow: Information Commissioner's Office, pp. 80–103.

Yang, Mu; Sassone, Vladimiro and Hamadou, Sardaouna (2012). A game-theoretic analysis of cooperation in anonymity networks. In: Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings, Lecture Notes in Computer Science, Springer, pp. 269–289.

2011To Top

Yang, Mu and Sassone, Vladimiro (2011). Minimising anonymity loss in anonymity networks under DoS attacks. In: Information and Communications Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings, LNCS, pp. 414–429.

2010To Top

Sassone, Vladimiro; Hamadou, Sardaouna and Yang, Mu (2010). Trust in anonymity networks. In: CONCUR 2010-Concurrency theory: 21st International Conference, CONCUR 2010 Paris, France, August/September 2010, Proceedings, LNCS, Springer, pp. 48–70.


Subscribe to these results

get details to embed this page in another page Embed as feed [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0