Paul Smith

According to our database1, Paul Smith
  • authored at least 118 papers between 1977 and 2017.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 




STPA-SafeSec: Safety and security analysis for cyber-physical systems.
J. Inf. Sec. Appl., 2017

"Think aloud" and "Near live" usability testing of two complex clinical decision support tools.
I. J. Medical Informatics, 2017

Tool support for data protection impact assessment in the smart grid.
Elektrotechnik und Informationstechnik, 2017

Security assurance assessment methodology for hybrid clouds.
Computers & Security, 2017

The Threshold for Jigsaw Percolation on Random Graphs.
Electr. J. Comb., 2017

Evidential Network Modeling for Cyber-Physical System State Inference.
IEEE Access, 2017

A cyber-physical resilience metric for smart grids.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017

Artistic Interpretation of a Malaria Transmission Scenario.
Proceedings of the Electronic Visualisation and the Arts, 2017

The relation between content providers and distributors: Lessons from the regulation of television distribution in the United Kingdom.
Telematics and Informatics, 2016

From old to new: Assessing cybersecurity risks for an evolving smart grid.
Computers & Security, 2016

Towards secure and resilient networked power distribution grids: Process and tool adoption.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Disaster-resilient communication networks: Principles and best practices.
Proceedings of the 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), 2016

Analysing cyber-physical attacks to a Smart Grid: A voltage control use case.
Proceedings of the Power Systems Computation Conference, 2016

A privacy preserving approach to energy theft detection in smart grids.
Proceedings of the IEEE International Smart Cities Conference, 2016

A multi-level approach to resilience of critical infrastructures and services.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Data Integrity Attacks in Smart Grid Wide Area Monitoring.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Towards a Resilience Metric Framework for Cyber-Physical Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

A One-Class NIDS for SDN-Based SCADA Systems.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Real Snail Mail.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

The time of bootstrap percolation with dense initial sets for all thresholds.
Random Struct. Algorithms, 2015

Power Consumption Profiling Using Energy Time-Frequency Distributions in Smart Grids.
IEEE Communications Letters, 2015

The Sharp Threshold for Maximum-Size Sum-Free Subsets in Even-Order Abelian Groups.
Combinatorics, Probability & Computing, 2015

Monotone Cellular Automata in a Random Environment.
Combinatorics, Probability & Computing, 2015

Resilience support in software-defined networking: A survey.
Computer Networks, 2015

A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid Operation.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Piezoresistive nanocomposite as an embedded stress sensor in instrumented knee prosthesis.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Dreams of Mice.
Proceedings of the 2015 ACM SIGCHI Conference on Creativity and Cognition, 2015

Towards a Cyber-Physical Resilience Framework for Smart Grids.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

Redundancy, diversity, and connectivity to achieve multilevel network resilience, survivability, and disruption tolerance invited paper.
Telecommunication Systems, 2014

Resilience and opportunistic forwarding: Beyond average value analysis.
Computer Communications, 2014

Network resilience with reusable management patterns.
IEEE Communications Magazine, 2014

Management Patterns for Smart Grid Resilience.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Management patterns: SDN-enabled network resilience management.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

Network anomaly detection in the cloud: The challenges of virtual service migration.
Proceedings of the IEEE International Conference on Communications, 2014

Management Patterns for Network Resilience: Design and Verification of Policy Configurations.
Proceedings of the Cyberpatterns, 2014

Accurate map-based indoor navigation on the mobile.
J. Location Based Services, 2013

Secure Smart Grids or Say ‘Goodnight Vienna!'.
ERCIM News, 2013

SECCRIT: Secure Cloud Computing for High Assurance Services.
ERCIM News, 2013

Towards an autonomous resilience strategy the implementation of a self evolving rate limiter.
Proceedings of the 13th UK Workshop on Computational Intelligence, 2013

Resilience and opportunistic forwarding: beyond average value analysis.
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks, 2013

Situational Awareness for Improving Network Resilience Management.
Proceedings of the Information Security Practice and Experience, 2013

Simulation and evaluation of network resilience with PReSET.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

PReSET: A toolset for the evaluation of network resilience strategies.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Radiometric absolute accuracy improvements for imaging spectrometry with HySICS.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

OpenFlow: A security analysis.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2013

An Architectural Model for Deploying Critical Infrastructure Services in the Cloud.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

C# interpreter and unity 3D for educational programming games.
Proceedings of the 18th International Conference on Computer Games: AI, 2013

Towards a Layered Architectural View for Security Analysis in SCADA Systems
CoRR, 2012

Resilience Strategies for Networked Malware Detection and Remediation.
Proceedings of the Network and System Security - 6th International Conference, 2012

A framework for the design and evaluation of network resilience management.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Indoor navigation on wheels (and on foot) using smartphones.
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation, 2012

Adaptive resilience for computer networks: Using online fuzzy learning.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

Designing a Cyber Attack Information System for National Situational Awareness.
Proceedings of the Future Security - 7th Security Research Conference, 2012

Computing group cohomology rings from the Lyndon-Hochschild-Serre spectral sequence.
J. Symb. Comput., 2011

Network resilience: a systematic approach.
IEEE Communications Magazine, 2011

Policy-driven network simulation: a resilience case study.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

FootPath: Accurate map-based indoor navigation using smartphones.
Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation, 2011

Assessing risk for network resilience.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

An adaptive approach to network resilience: Evolving challenge detection and mitigation.
Proceedings of the 8th International Workshop on the Design of Reliable Communication Networks, 2011

Designing for social interaction with mundane technologies: issues of security and trust.
Personal and Ubiquitous Computing, 2010

Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines.
Computer Networks, 2010

Facial Expression Tracking for Remote Conferencing Applications: An Approach to Tackling the Disadvantages of Remote Worker Multitasking.
Proceedings of the Second International Conference on Games and Virtual Worlds for Serious Applications, 2010

Challenge identification for network resilience.
Proceedings of the Next Generation Internet (NGI), 2010

Strategies for Network Resilience: Capitalising on Policies.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

Mobile technology for crime scene examination.
Int. J. Hum.-Comput. Stud., 2009

Implementation of an electronic health records system in a small clinic: the viewpoint of clinic staff.
Behaviour & IT, 2009

OpenLIDS: a lightweight intrusion detection system for wireless mesh networks.
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, 2009

Network Heterogeneity and Cascading Failures - An Evaluation for the Case of BGP Vulnerability.
Proceedings of the Self-Organizing Systems, 4th IFIP TC 6 International Workshop, 2009

Intelligent Condition Monitoring for Fire Prevention of Diesel Electric Locomotive.
Proceedings of the 2009 International Conference on Artificial Intelligence, 2009

EMAGE - Edinburgh Mouse Atlas of Gene Expression: 2008 update.
Nucleic Acids Research, 2008

An experiment with reflective middleware to support grid-based flood monitoring.
Concurrency and Computation: Practice and Experience, 2008

Towards an Understanding of Security Concerns within Communities.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Managing Heterogeneous Data Flows in Wireless Sensor Networks Using a "Split Personality" Mote Platform.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

Intrusion detection systems for community wireless mesh networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks.
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008

From Detection to Remediation: A Self-Organized System for Addressing Flash Crowd Problems.
Proceedings of IEEE International Conference on Communications, 2008

Resolving hand over face occlusion.
Image Vision Comput., 2007

Supporting Implicit Coordination Between Distributed Teams in Disaster Management.
Proceedings of the Mobile Response, 2007

Multi-Platform Crime Scene Investigation Field Tool.
Proceedings of the 11th IEEE International Symposium on Wearable Computers (ISWC 2007), 2007

Two families: dynamical policy models in interactive storytelling.
Proceedings of the 4th Australasian Conference on Interactive Entertainment, 2007

Automatic Relocalisation for a Single-Camera Simultaneous Localisation and Mapping System.
Proceedings of the 2007 IEEE International Conference on Robotics and Automation, 2007

Theatre of Restless Automata.
Proceedings of the Computational Aesthetics 2007: Eurographics Workshop on Computational Aesthetics in Graphics, 2007

Integrating multiple levels of zoom to enable activity analysis.
Computer Vision and Image Understanding, 2006

Locating resources in a programmable networking environment.
Computer Networks, 2006

Using grid technologies to optimise a wireless sensor network for flood management.
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 2006

Real-Time Monocular SLAM with Straight Lines.
Proceedings of the British Machine Vision Conference 2006, 2006

Impacts of E-Learning on Organisational Strategy.
Proceedings of the WEBIST 2005, 2005

Proceedings of the 32. International Conference on Computer Graphics and Interactive Techniques, 2005

Towards Resilient Networks Using Programmable Networking Technologies.
Proceedings of the Active and Programmable Networks, 2005

Supporting Shared Analysis for Mobile Investigators.
Proceedings of the International Workshop on Annotation for Collaboration, 2005

Wearable Technology for Crime Scene Investigation.
Proceedings of the Ninth IEEE International Symposium on Wearable Computers (ISWC 2005), 2005

Performance enhancement via two-layer support for peer-to-peer systems using active networking.
Proceedings of the 2005 International Symposium on Autonomous Decentralized Systems, 2005

TemporalBoost for Event Recognition.
Proceedings of the 10th IEEE International Conference on Computer Vision (ICCV 2005), 2005

Resolving Hand over Face Occlusion.
Proceedings of the Computer Vision in Human-Computer Interaction, 2005

Securing Organisational Internal E-Learning Development.
Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, 2005

Layered Motion Segmentation and Depth Ordering by Tracking Edges.
IEEE Trans. Pattern Anal. Mach. Intell., 2004

Integrating and Employing Multiple Levels of Zoom for Activity Recognition.
Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2004), with CD-ROM, 27 June, 2004

Programmable service deployment with peer-to-peer networks.
PhD thesis, 2003

Determining driver visual attention with one camera.
IEEE Trans. Intelligent Transportation Systems, 2003

Computing MAP trajectories by representing, propagating and combining PDFs over groups.
Proceedings of the 9th IEEE International Conference on Computer Vision (ICCV 2003), 2003

Peer-to-Peer Networking for Discovering Programmable Resources.
Proceedings of the Networked Group Communication, Fourth International COST264 Workshop, 2002

Programmable Resource Discovery Using Peer-to-Peer Networks.
Proceedings of the Active Networks, IFIP-TC6 4th International Working Conference, 2002

Technical architecture of the RDN virtual training suite: a national e-learning resource for the UK.
Proceedings of the Winds of Changing in the Sea of Learning, 2002

Component Selection for Heterogeneous Active Networking.
Proceedings of the Active Networks, IFIP-TC6 Third International Working Conference, 2001

Monitoring Head/Eye Motion for Driver Alertness with One Camera.
Proceedings of the 15th International Conference on Pattern Recognition, 2000

Motion Segmentation by Tracking Edge Information over Multiple Frames.
Proceedings of the Computer Vision - ECCV 2000, 6th European Conference on Computer Vision, Dublin, Ireland, June 26, 2000

Segmentation of Multiple Motions by Edge Tracking between Two Frames.
Proceedings of the British Machine Vision Conference 2000, 2000

Providing Tailored (Context-Aware) Information to City Visitors.
Proceedings of the Adaptive Hypermedia and Adaptive Web-Based Systems, 2000

Keynote Address: Data and Visualization Corridors.
Proceedings of the IEEE Visualization 1999, 1999

Edge Tracking for Motion Segmentation and Depth Ordering.
Proceedings of the British Machine Vision Conference 1999, 1999

Effective Corner Matching.
Proceedings of the British Machine Vision Conference 1998, 1998

Achieving interoperable security services in open systems products.
Computers & Security, 1996

The Formal Development of a Secure Transaction Mechanism.
Proceedings of the VDM '91, 1991

Of integration by man and machine.
ACM SIGSAM Bulletin, 1983

A doubly divisible nearly Kirkman system.
Discrete Mathematics, 1977