Skip to main content

Research Repository

Advanced Search

Outputs (133)

A holistic approach for cyber assurance of critical infrastructure with the viable system model (2014)
Presentation / Conference Contribution

© IFIP International Federation for Information Processing 2014. Industrial Control Systems (ICSs) are of the most important components of National Critical Infrastructure. They can provide control capabilities in complex systems of critical importan... Read More about A holistic approach for cyber assurance of critical infrastructure with the viable system model.

Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method (2014)
Presentation / Conference Contribution

One of the most popular contemporary graphical password approaches is the Pattern-Lock authentication mechanism that comes integrated with the Android mobile operating system. In this paper we investigate the impact of password strength meters on the... Read More about Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method.

Scheduling policies based on dynamic throughput and fairness tradeoff control in LTE-A networks (2014)
Presentation / Conference Contribution

© 2014 IEEE. In LTE-A cellular networks there is a fundamental trade-off between the cell throughput and fairness levels for preselected users which are sharing the same amount of resources at one transmission time interval (TTI). The static paramete... Read More about Scheduling policies based on dynamic throughput and fairness tradeoff control in LTE-A networks.