Publications

Transforming health care: body sensor networks, wearables, and the Internet of Things
Lo, B. P., Ip, H., & Yang, G. Z. (2016). Transforming health care: body sensor networks, wearables, and the Internet of Things. IEEE Pulse, Volume 7, Issue 1.Link.

Incorporating failures of System Protection Schemes into power system operation
Calvo, Jose L., Simon H. Tindemans, and Goran Strbac. “Incorporating failures of System Protection Schemes into power system operation.” Sustainable Energy, Grids and Networks 8 (2016): 98-110.Link.

Not On Demand: Internet of Things Enabled Energy Temporality
Lindley, J. G., Coulton, P., & Cooper, R. (2017). Not On Demand: Internet of Things Enabled Energy Temporality. In DIS ’17 Companion Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems. (pp. 23-27). New York: ACM. DOI: 10.1145/3064857.3079112. Link.

Old, Sick And No Health Insurance: Will You Need A Permit To Use Your Homemade Health Wearable?
Stead, M., & Coulton, P. (2017). Old, Sick And No Health Insurance: Will You Need A Permit To Use Your Homemade Health Wearable? In DIS ’17 Companion Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems. (pp. 101-105). Edinburgh: ACM. DOI: 10.1145/3064857.3079127. Link.

On the Internet Everybody Knows You’re a Whatchamacallit (or a Thing)
Lindley, J. G., & Coulton, P. (2017). On the Internet Everybody Knows You’re a Whatchamacallit (or a Thing). Paper presented at CHI 2017 Workshop, Denver, United States. Link.

Implications for Adoption
Lindley, J. G., Coulton, P., & Sturdee, M. (2017). Implications for Adoption. In CHI ’17 Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. New York: ACM. DOI: 10.1145/3025453.3025742. Link.

Vapourworlds and design fiction: the role of intentionality
Coulton, P., & Lindley, J. G. (2017). Vapourworlds and design fiction: the role of intentionality. In Proceedings of EAD 2017 through Design Journal.Link.

Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours
Blythe J., Michie S., Watson J, & Leferve, C. E. (2017). Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours. Frontiers event abstract .Link.

Regulating IoT: Enabling or Disabling the Capacity of the Internet of Things?
Brass, I., Tanczer, L., Carr, M., & Blackstock, J. (2017). Regulating IoT: Enabling or Disabling the Capacity of the Internet of Things?. Risk&Regulation.Link.

The IoT Effect: The Future of Data Protection and Information Security in the UK.
Brass, I., Carr, M., & Blackstock, J. (2017). Political Studies Association (PSA). 67th Annual International Conference, 10-12 April, Glasgow, EU and UK Regulation in Transition Panel. Link.

The Role of Transnational Expert Associations in Governing the Cybersecurity Risks of the Internet of Things
Sowelle J., Carr M., &Blackstock, J. (2017). The Role of Transnational Expert Associations in Governing the Cybersecurity Risks of the Internet of Things. IPPA conference presentation Singapore .Link.

Secure Multi-party Computation: Information Flow of Outputs and Game Theory
Ah-Fat, P., & Huth, M. (2017, April). Secure Multi-party Computation: Information Flow of Outputs and Game Theory. In International Conference on Principles of Security and Trust (pp. 71-92). Springer, Berlin, Heidelberg. Link.

Optimizing Governed Blockchains for Financial Process Authentications
Lundbaek, L. N., D’Iddio, A. C., & Huth, M. (2016). Optimizing Governed Blockchains for Financial Process Authentications. arXiv preprint arXiv:1612.00407.Link.

An in-depth case study: modelling an information barrier with Bayesian Belief Networks
Huth, M. R. A., Day, E., Evans, N., Haworth, S., Plant, T., & Roberts, C. An in-depth case study: modelling an information barrier with Bayesian Belief Networks.Proceedings of the 57th INMM Annual Meeting. Link.

Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving
D’Iddio, A. C., & Huth, M. (2017). Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving. arXiv preprint arXiv:1702.01332.Link.

From Risk ManagementT to Risk Engineering: Challenges in Future ICT Systems
Huth, M., Vishik, C., & Masucci, R. (2016). From Risk ManagementT to Risk Engineering: Challenges in Future ICT Systems. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems, 131.

Stateful applied pi calculus: Observational equivalence and labelled bisimilarity
Arapinis, M., Liu, J., Ritter, E., & Ryan, M. (2017). Stateful applied pi calculus: Observational equivalence and labelled bisimilarity. Journal of Logical and Algebraic Methods in Programming, 89, 95-149.Link.

Design fiction: anticipating adoption
Coulton, P., & Lindley, J. G. (2017). Design fiction: anticipating adoption. IEEE Pervasive Computing, 16(1), 43-47. DOI: 10.1109/MPRV.2017.5.Link.

PETRAS – Cyber Security of the Internet of Things
Watson, J., & Lupu, J. G. (2016). PETRAS – Cyber Security of the Internet of Things. Crest Security Review Magazine, Issue 2 Cyber Security. Link.

PETRAS – Cyber Security of the Internet of Things.
Watson, J, Lupu E. (2016). AG Adjacent Government, pp. 288-289. Link.

Why the internet of things needs object orientated ontology
Lindley, J. G., Coulton, P., & Cooper, R. (2017). Why the internet of things needs object orientated ontology. In Proceedings of EAD 2017 through Design Journal. Link.

The ethics of algorithms: Mapping the debate. Big Data & Society
Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 2053951716679679. Link.

What is data ethics?. Philosophical transactions.
Floridi L, Taddeo M, (2016). Series A, Mathematical, physical, and engineering sciences, 374 (2083). Link.

From Individual to Group Privacy in Big Data Analytics
Mittelstadt, B. (2017). From Individual to Group Privacy in Big Data Analytics. Philosophy & Technology, 1-20.Link.\

Data philanthropy and the design of the infraethics for information societies
Taddeo, M. (2016). Data philanthropy and the design of the infraethics for information societies. Phil. Trans. R. Soc. A, 374(2083), 20160113.Link.

Cyber security standards and issues in V2X communications
Ivanov, I., Lee, S. W., Watson, T., & Maple, C. (2016). Cyber security standards and issues in V2X communications. Proceedings of 63rd International Conference on Vehicular, Mobile and Wearable Technology (ICVMWT). Link.

The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., & Gabrys, B. (2016, July). In Evolutionary Computation (CEC), 2016 IEEE Congress on (pp. 1015-1021). IEEE.Link.

Secure key generation using gait features for Body Sensor Networks
Sun, Y., Wong, C., Yang, G. Z., & Lo, B. (2017, May). Secure key generation using gait features for Body Sensor Networks. In Wearable and Implantable Body Sensor Networks (BSN), (2017) IEEE 14th International Conference on (pp. 206-210). IEEE. Link.

Deep Learning for Health Informatics.
Ravı, D., Wong, C., Deligianni, F., Berthelot, M., Andreu-Perez, J., & Lo, B. (2017) IEEE journal of biomedical and health informatics, 21 (1), pp. 56-64. Link.

A deep learning approach to on-node sensor data analytics for mobile or wearable devices
Ravì, D., Wong, C., Lo, B., & Yang, G. Z. (2017). A deep learning approach to on-node sensor data analytics for mobile or wearable devices. IEEE journal of biomedical and health informatics, 21(1), 56-64. Link.

Towards Pervasive Gait Analysis for Medicine with Wearable Sensors: A Systematic Review for Clinicians and Medical Researchers. (2016) Chen S, Lach J, Lo B, Yang G,.
IEEE journal of biomedical and health informatics. Link.

Faultless responsibility: on the nature and allocation of moral responsibility for distributed moral actions.
Floridi, L. (2016) Phil. Trans. R. Soc. A374(2083), 20160112. Link.

Next generation physical analytics for digital signage.
Mikusz, M., Noulas, A., Davies, N., Clinch, S., & Friday, A. (2016, June). Next generation physical analytics for digital signage. In Proceedings of the 3rd International on Workshop on Physical Analytics (pp. 19-24). ACM. Link.

Understanding Mobile User Interactions with the IoT.

Mikusz M, Bates O, Clinch S, Davies N, Friday A, Noulas A, (2016). Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion. Link.

Better off: when should pervasive displays be powered down?
Davies, N., Clinch, S., Mikusz, M., Bates, O., Turner, H., & Friday, A. (2017, June). Better off: when should pervasive displays be powered down?. In Proceedings of the 6th ACM International Symposium on Pervasive Displays (p. 19). ACM. Link.

Unbundling the Emerging Cyber-Physical Risks in Connected and Autonomous Vehicles.
Brass I, Carr M, Tanczer L, Carsten M, Blackstock J. (2017). Link.

A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols.
I. Tomić and J. A. McCann, IEEE Internet of Things Journal, 2017. Link.