Publications

Coulton, P, Lindley, J.G, & Cooper, R. (2018). ISBN 978-1-86220-346-4

Transforming health care: body sensor networks, wearables, and the Internet of Things
Lo, B. P., Ip, H., & Yang, G. Z. (2016). Transforming health care: body sensor networks, wearables, and the Internet of Things. IEEE Pulse, Volume 7, Issue 1.Link.

Incorporating failures of System Protection Schemes into power system operation
Calvo, Jose L., Simon H. Tindemans, and Goran Strbac. (2016) Incorporating failures of System Protection Schemes into power system operation.” Sustainable Energy, Grids and Networks 8: 98-110.Link.

Not On Demand: Internet of Things Enabled Energy Temporality
Lindley, J. G., Coulton, P., & Cooper, R. (2017). Not On Demand: Internet of Things Enabled Energy Temporality. In DIS ’17 Companion Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems. (pp. 23-27). New York: ACM. DOI: 10.1145/3064857.3079112. Link.

On the Internet Everybody Knows You’re a Whatchamacallit (or a Thing)
Lindley, J. G., & Coulton, P. (2017). On the Internet Everybody Knows You’re a Whatchamacallit (or a Thing). Paper presented at CHI 2017 Workshop, Denver, United States. Link.

Vapourworlds and design fiction: the role of intentionality
Coulton, P., & Lindley, J. G. (2017). Vapourworlds and design fiction: the role of intentionality. In Proceedings of EAD 2017 through Design Journal.Link.

Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours
Blythe J., Michie S., Watson J, & Leferve, C. E. (2017). Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours. Frontiers event abstract .Link.

Regulating IoT: Enabling or Disabling the Capacity of the Internet of Things?
Brass, I., Tanczer, L., Carr, M., & Blackstock, J. (2017). Regulating IoT: Enabling or Disabling the Capacity of the Internet of Things?. Risk&Regulation.Link.

The IoT Effect: The Future of Data Protection and Information Security in the UK.
Brass, I., Carr, M., & Blackstock, J. (2017). The IoT Effect: The Future of Data Protection and Information Security in the UK. Political Studies Association (PSA). 67th Annual International Conference, 10-12 April, Glasgow, EU and UK Regulation in Transition Panel. Link.

The Role of Transnational Expert Associations in Governing the Cybersecurity Risks of the Internet of Things
Sowelle J., Carr M., & Blackstock, J. (2017). The Role of Transnational Expert Associations in Governing the Cybersecurity Risks of the Internet of Things. IPPA conference presentation Singapore .Link.

Secure Multi-party Computation: Information Flow of Outputs and Game Theory
Ah-Fat, P., & Huth, M. (2017, April). Secure Multi-party Computation: Information Flow of Outputs and Game Theory. In International Conference on Principles of Security and Trust (pp. 71-92). Springer, Berlin, Heidelberg. Link.

Optimizing Governed Blockchains for Financial Process Authentications
Lundbaek, L. N., D’Iddio, A. C., & Huth, M. (2016). Optimizing Governed Blockchains for Financial Process Authentications. arXiv preprint arXiv:1612.00407.Link.

An in-depth case study: modelling an information barrier with Bayesian Belief Networks
Huth, M. R. A., Day, E., Evans, N., Haworth, S., Plant, T., & Roberts, C. An in-depth case study: modelling an information barrier with Bayesian Belief Networks.Proceedings of the 57th INMM Annual Meeting. Link.

Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving
D’Iddio, A. C., & Huth, M. (2017). Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving. arXiv preprint arXiv:1702.01332.Link.

From Risk ManagementT to Risk Engineering: Challenges in Future ICT Systems
Huth, M., Vishik, C., & Masucci, R. (2016). From Risk Management to Risk Engineering: Challenges in Future ICT Systems. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems, 131.

Stateful applied pi calculus: Observational equivalence and labelled bisimilarity
Arapinis, M., Liu, J., Ritter, E., & Ryan, M. (2017). Stateful applied pi calculus: Observational equivalence and labelled bisimilarity. Journal of Logical and Algebraic Methods in Programming, 89, 95-149.Link.

Design fiction: anticipating adoption
Coulton, P., & Lindley, J. G. (2017). Design fiction: anticipating adoption. IEEE Pervasive Computing, 16(1), 43-47. DOI: 10.1109/MPRV.2017.5.Link.

PETRAS – Cyber Security of the Internet of Things
Watson, J., & Lupu, J. G. (2016). PETRAS – Cyber Security of the Internet of Things. Crest Security Review Magazine, Issue 2 Cyber Security. Link.

PETRAS – Cyber Security of the Internet of Things.
Watson, J. & Lupu E. (2016). PETRAS – Cyber Security of the Internet of Things. AG Adjacent Government, pp. 288-289. Link.

Why the internet of things needs object orientated ontology
Lindley, J. G., Coulton, P., & Cooper, R. (2017). Why the internet of things needs object orientated ontology. In Proceedings of EAD 2017 through Design Journal. Link.

The ethics of algorithms: Mapping the debate. Big Data & Society
Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 2053951716679679. Link.

What is data ethics?. Philosophical transactions.
Floridi L, Taddeo M, (2016). What is data ethics?. Philosophical transactions. Series A, Mathematical, physical, and engineering sciences, 374 (2083). Link.

From Individual to Group Privacy in Big Data Analytics
Mittelstadt, B. (2017). From Individual to Group Privacy in Big Data Analytics. Philosophy & Technology, 1-20.Link.\

Data philanthropy and the design of the infraethics for information societies
Taddeo, M. (2016). Data philanthropy and the design of the infraethics for information societies. Phil. Trans. R. Soc. A, 374(2083), 20160113.Link.

Cyber security standards and issues in V2X communications
Ivanov, I., Lee, S. W., Watson, T., & Maple, C. (2016). Cyber security standards and issues in V2X communications. Proceedings of 63rd International Conference on Vehicular, Mobile and Wearable Technology (ICVMWT). Link.

The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence.
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., & Gabrys, B. (2016, July). The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Evolutionary Computation (CEC), 2016 IEEE Congress on (pp. 1015-1021). IEEE.Link.

Secure key generation using gait features for Body Sensor Networks
Sun, Y., Wong, C., Yang, G. Z., & Lo, B. (2017, May). Secure key generation using gait features for Body Sensor Networks. In Wearable and Implantable Body Sensor Networks (BSN), (2017) IEEE 14th International Conference on (pp. 206-210). IEEE. Link.

Deep Learning for Health Informatics.
Ravı, D., Wong, C., Deligianni, F., Berthelot, M., Andreu-Perez, J., & Lo, B. (2017) Deep Learning for Health Informatics. IEEE journal of biomedical and health informatics, 21 (1), pp. 56-64. Link.

A deep learning approach to on-node sensor data analytics for mobile or wearable devices
Ravì, D., Wong, C., Lo, B., & Yang, G. Z. (2017). A deep learning approach to on-node sensor data analytics for mobile or wearable devices. IEEE journal of biomedical and health informatics, 21(1), 56-64. Link.

Towards Pervasive Gait Analysis for Medicine with Wearable Sensors: A Systematic Review for Clinicians and Medical Researchers.
Chen S, Lach J, Lo B, Yang G,. (2016) Towards Pervasive Gait Analysis for Medicine with Wearable Sensors: A Systematic Review for Clinicians and Medical Chen. IEEE journal of biomedical and health informatics. Link.

Faultless responsibility: on the nature and allocation of moral responsibility for distributed moral actions.
Floridi, L. (2016) Faultless responsibility: on the nature and allocation of moral responsibility for distributed moral actions. Phil. Trans. R. Soc. A374(2083), 20160112. Link.

Next generation physical analytics for digital signage.
Mikusz, M., Noulas, A., Davies, N., Clinch, S., & Friday, A. (2016, June). Next generation physical analytics for digital signage. In Proceedings of the 3rd International on Workshop on Physical Analytics (pp. 19-24). ACM. Link.

Understanding Mobile User Interactions with the IoT.
Mikusz M, Bates O, Clinch S, Davies N, Friday A, Noulas A, (2016). Understanding Mobile User Interactions with the IoT.
Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion. Link.

Better off: when should pervasive displays be powered down?
Davies, N., Clinch, S., Mikusz, M., Bates, O., Turner, H., & Friday, A. (2017, June). Better off: when should pervasive displays be powered down? Proceedings of the 6th ACM International Symposium on Pervasive Displays (p. 19). ACM. Link.

Unbundling the Emerging Cyber-Physical Risks in Connected and Autonomous Vehicles.
Brass I, Carr M, Tanczer L, Carsten M. & Blackstock J. (2017). Unbundling the Emerging Cyber-Physical Risks in Connected and Autonomous Vehicles. Link.

A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols.
Tomić, I. & McCann, J, A., (2017) A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols.IEEE Internet of Things Journal. Link.

Cybersecurity and Liability in Autonomous and Intelligent Transport.
Brass I. (2017) Cybersecurity and Liability in Autonomous and Intelligent Transport.

IoT and its Implications for Informed Consent.
Tanczer, L, Brass, I., Carr, M. & Blackstock, J. (2017) IoT and its Implications for Informed Consent.

Oligarchic control of business-to-business blockchains.
Lundbaek L, N., & Huth, M. (2017, April). Security and Privacy Workshops. (2017) Oligarchic control of business-to-business blockchains. IEEE European Symposium on pp. 68-71. Link.

Centrally Governed Blockchains: Optimizing Security, Cost, and Availability.
Lundbæk, L, N., Beutel, D, J., Huth, M, & Kirk, L. (2017). Centrally Governed Blockchains: Optimizing Security, Cost, and Availability. Models, Algorithms, Logics and Tools – Essays Dedicated to Kim Guldstrand Larsen on his 60th Birthday. pp. 578-599. Link

Making Sense of Cybersecurity in Emerging Technology Areas.
Vishik, C., Huth, M., John, L, & Balduccini M. (2017). Making Sense of Cybersecurity in Emerging Technology Areas. Oxford Handbook of Cybersecurity.

Summary Report of International Developments on the Security of the Internet of Things.
Tanczer, L., Blythe, J., Yahya, F., Brass, I., Elsden, M., Blackstock, J. and Carr M. (2017) Summary Report of International Developments on the Security of the Internet of Things. DCMS pp. 1-18.

Blockchain-based dynamic key management for heterogeneous intelligent transportation systems.
Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C. P. A., & Sun, Z. (2017). IEEE Internet of Things Journal, 4(6), pp. 1832-1843. Link

Stateful applied pi calculus: Observational equivalence and labelled bisimilarity.
Arapinis, M., Liu, J., Ritter, E., & Ryan, M. (2017). Stateful applied pi calculus: Observational equivalence and labelled bisimilarity. Journal of Logical and Algebraic Methods in Programming, 89, 95-149. Link

Why the internet of things needs object orientated ontology.
Lindley, J., Coulton, P., & Cooper, R. (2017). Why the internet of things needs object orientated ontology. The Design Journal, 20(sup1), S2846-S2857. Link

Not on Demand: Internet of Things Enabled Energy Temporality.
Lindley, J., Coulton, P., & Cooper, R. (2017, June). Not on Demand: Internet of Things Enabled Energy Temporality. In Proceedings of the 2016 ACM Conference Companion Publication on Designing Interactive Systems (pp. 23-27). ACM. Link

Old, Sick And No Health Insurance.:Will You Need A Permit To Use Your Home-made Health Wearable?.
Stead, M., & Coulton, P. (2017, June). Old, Sick And No Health Insurance.:Will You Need A Permit To Use Your Home-made Health Wearable?. In Proceedings of the 2016 ACM Conference Companion Publication on Designing Interactive Systems (pp. 101-105). ACM. Link

Implications for adoption.
Lindley, J., Coulton, P., & Sturdee, M. (2017, May). Implications for adoption. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 265-277). ACM. Link

How to Build Time-Lock Encryption.
Jager, T. (2015). How to Build Time-Lock Encryption. IACR Cryptology ePrint Archive, 2015, 478. Link

Bitbarista: Exploring Perceptions of Data Transactions in the Internet of Things.
Pschetz, L., Tallyn, E., Gianni, R., & Speed, C. (2017, May). Bitbarista: Exploring Perceptions of Data Transactions in the Internet of Things. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 2964-2975). ACM. Link

New Value Transactions: Understanding and Designing for Distributed Autonomous Organisations.
Nissen, B., Symons, K., Tallyn, E., Speed, C., Maxwell, D., & Vines, J. (2017, June). New Value Transactions: Understanding and Designing for Distributed Autonomous Organisations. In Proceedings of the 2016 ACM Conference Companion Publication on Designing Interactive Systems (pp. 352-355). ACM. Link

FinBook: Literary content as digital commodity.
Gianni, R., Mehrpouya, H., Murray-Rust, D., Nissen, B., Oosthuizen, S., Speed, C., & Symons, K. (2017). FinBook: Literary content as digital commodity. In M. Garrett, N. Jones, R. Catlow, & S. Skinner (Eds.), Artists Re: Thinking The Blockchain. (pp. 25-32). Liverpool University Press. Link

Designing the health-related internet of things: ethical principles and guidelines.
Mittelstadt, B. (2017). Designing the health-related internet of things: ethical principles and guidelines. Information, 8(3), 77. Link

Ethics of the health-related internet of things: a narrative review.
Mittelstadt, B. (2017). Ethics of the health-related internet of things: a narrative review.Ethics and Information Technology, 19(3), 157-175. Link

Why a right to explanation of automated decision-making does not exist in the general data protection regulation.
Wachter, S., Mittelstadt, B., & Floridi, L. (2017). Why a right to explanation of automated decision-making does not exist in the general data protection regulation.International Data Privacy Law, 7(2), 76-99. Link

Data Philanthropy and Individual Rights.
Taddeo, M. (2017). Data Philanthropy and Individual Rights. Minds and Machines, 27(1), 1-5. Link

Trusting Digital Technologies Correctly.
Taddeo, M. (2017). Trusting Digital Technologies Correctly. Minds and Machines, 27(4), 565-568. Link

Artificial Intelligence and the ‘Good Society’: the US, EU, and UK approach.
Cath, C., Wachter, S., Mittelstadt, B., Taddeo, M., & Floridi, L. (2017). Artificial Intelligence and the ‘Good Society’: the US, EU, and UK approach. Science and engineering ethics, 1-24. Link

Practical Proof of Kernel Work & Distributed Adaptiveness.
Lundbæk, L. N., Beutel, D. J., Huth, M., & Kirk, L.  (2017) Practical Proof of Kernel Work & Distributed Adaptiveness. Link

Security risk assessment in Internet of Things systems.
Nurse, J. R., Creese, S., & De Roure, D. (2017). Security risk assessment in Internet of Things systems. IT Professional, 19(5), 20-26. Link