Picture of small jelly fish in ocean

Open Access research that better understands changing marine ecologies...

Strathprints makes available scholarly Open Access content by researchers in the Department of Mathematics & Statistics.

Mathematics & Statistics hosts the Marine Population Modelling group which is engaged in research into topics surrounding marine resource modelling and ecology. Recent work has included important developments in the population modelling of marine species.

Explore the Open Access research of Mathematics & Statistics. Or explore all of Strathclyde's Open Access research...

Browse by Author or creator

Group by: Publication Date | Item type | No Grouping
Jump to: 2024 | 2023 | 2022 | 2021 | 2019 | 2016 | 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2006 | 2005 | 2004 | 2003 | 2002 | 2000 | 1999 | 1997
Number of items: 56.

2024

Ahmad, Rufai and Terzis, Sotirios and Renaud, Karen (2024) Getting users to click : a content analysis of phishers’ tactics and techniques in mobile instant messaging phishing. Information and Computer Security, 32 (4). pp. 420-435. ISSN 2056-4961

Fongta, Phongsathon and Terzis, Sotirios; (2024) A trust management delegation protocol for fog computing applications. In: 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, GBR, pp. 62-67. ISBN 9798350375367

Bamaga, Arwa and Zafar, Bassam and Terzis, Sotirios (2024) An empirical study comparing social media tools on e-learning. WSEAS Transaction on Computer Research. ISSN 1991-8755 (In Press)

Bamaga, Arwa and Zafar, Bassam and Terzis, Sotirios (2024) Assessing the quality factors affecting e-Learning : a comparative study of South African Universities and Saudi Higher Education. International Journal of Learning and Teaching. ISSN 2377-2891 (In Press)

2023

Bamaga, Arwa and Terzis, Sotirios and Zafar, Bassam (2023) Quality factors impacting e-learning within the mobile environment in Saudi Arabia universities : an interview study. International Journal of Data and Network Science, 8 (1). pp. 269-288. ISSN 2561-8156

Ahmad, Rufai and Terzis, Sotirios and Renaud, Karen; Moallem, Abbas, ed. (2023) Investigating mobile instant messaging phishing : a study into user awareness and preventive measures. In: HCI for Cybersecurity, Privacy and Trust. Springer, DNK, pp. 381-398. ISBN 9783031358227

2022

Ahmad, Rufai and Terzis, Sotirios; Clarke, Nathan and Furnell, Steven, eds. (2022) Understanding phishing in mobile instant messaging : a study into user behaviour toward shared links. In: Human Aspects of Information Security and Assurance. IFIP Advances in Information and Communication Technology (IFIPAICT) . Springer, GRC, pp. 197-206. ISBN 9783031121722

2021

Bamaga, Arwa and Terzis, Sotirios and Zafar, Bassam (2021) Understanding the use of LMS in Saudi Arabia Higher Education : a study of Blackboard in King Abdulaziz University. In: SICSA Conference 2021, 2021-09-13 - 2021-09-14, University of Dundee (virtual).

2019

Abadi, Aydin and Terzis, Sotirios and Metere, Roberto and Dong, Changyu (2019) Efficient delegated private set intersection on outsourced private datasets. IEEE Transactions on Dependable and Secure Computing, 16 (4). pp. 608-624. ISSN 1545-5971

2016

Abadi, Aydin and Terzis, Sotirios and Dong, Changyu; Grossklags, Jens and Preneel, Bart, eds. (2016) VD-PSI : verifiable delegated private set intersection on outsourced private datasets. In: Financial Cryptography and Data Security. Lecture Notes in Computer Science, 9603 . Springer-Verlag Berlin, BRB, pp. 149-168. ISBN 978-3-662-54969-8

2015

Abadi, Aydin and Terzis, Sortirios and Dong, Changyu (2015) O-PSI : delegated private set intersection on outsourced datasets. In: International Conference on ICT Systems Security and Privacy Protection, 2015-05-26 - 2015-05-28.

2013

Nosseir, A. and Terzis, Sortirios (2013) Exploring user perceptions of authentication scheme security. In: Symposium on Usable Privacy and Security, 2013-07-24 - 2013-07-26, Northumbria University.

2012

Vella, Mark Joseph and Terzis, Sortirios and Roper, Marc; Davide, Balzarotti and Salvatore.J., Stolfo and Marco, Cova, eds. (2012) Distress detection. In: Research in Attacks, Intrusions, and Defenses. Lecture Notes in Computer Science . Springer, NLD, pp. 384-385. ISBN 978-3-642-33337-8

Thomson, Graham and Terzis, Sortirios; Goschka, Karl and Haridi, Seif, eds. (2012) A middleware for pervasive situation-awareness. In: Distributed Applications and Interoperable Systems. Springer: Lecture Notes in Computer Science, pp. 148-161. ISBN 9783642308222

2011

Nosseir, A. and Terzis, Sotirios; (2011) Novice user perception of e-services : a study in the Egyptian public sector. In: Applied electrical engineering and computing technologies. IEEE, JOR, pp. 1-6. ISBN 9781457710834

Terzis, Sotirios and Nosseir, A. (2011) Novice user perception of e-services : a study in the Egyptian public sector. In: IEEE Conference on Applied Electrical Engineering and Computing Technologies (AEECT 2011), 2011-12-06 - 2011-12-08, Amman. (In Press)

Nosseir, A. and Terzis, Sotirios; Filipe, Joaquim and Cordeiro, Jose, eds. (2011) Towards authentication via selected extraction from electronic personal histories. In: Enterprise Information Systems. Lecture Notes in Business Information Processing . Springer, PRT, pp. 571-586. ISBN 9783642198014

2010

Nosseir, A. and Terzis, S.; Cordeiro, Jose, ed. (2010) A study in authentication via electronic personal history questions. In: Proceedings of the 12th International Conference on Enterprise Information Systems. UNSPECIFIED, PRT, pp. 63-70.

Vella, M. and Roper, M. and Terzis, S.; Hart, Emma and McEwan, Chris and Timmis, Jon and Hone, Andy, eds. (2010) Danger theory and intrusion detection : possibilities and limitations of the analogy. In: Artificial Immune Systems. Lecture Notes in Computer Science . Springer, GBR, pp. 276-289. ISBN 978-3-642-14546-9

2009

Terzis, S. (2009) The Many Faces of Trust. IEEE.

2006

Thomson, Graham and Terzis, Sotirios and Nixon, Paddy (2006) A model and architecture for situation determination. In: 16th Annual International Conference on Computer Science and Software Engineering (CASCON), 2006-10-16 - 2006-10-19.

English, Colin and Terzis, Sotirios and Nixon, Paddy (2006) Towards self-protecting ubiquitous systems : monitoring trust-based interactions. Personal and Ubiquitous Computing, 10 (1). pp. 50-54. ISSN 1617-4909

English, C. and Terzis, S.; Stolen, K. and Winsborough, W.H. and Martinelli, F. and Massaci, F., eds. (2006) Gathering experience in trust-based interactions. In: Proceedings of 4th International Conference on Trust Management. Lecture Notes in Computer Science . Springer, pp. 62-76. ISBN 3540342958

Nosseir, A. and Connor, R. and Revie, C. and Terzis, S.; (2006) Question-based authentication using context data. In: Proceedings of the 4th Nordic Conference on Human-Computer Interaction: Changing Roles. ACM International Conference Proceeding Series, 189 . ACM Press, Oslo, Norway, pp. 429-432. ISBN 1-59593-325-5

Thomson, G. and Terzis, S. and Nixon, P.; (2006) Situation determination with reusable situation specifications. In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2006. IEEE, pp. 620-623. ISBN 0769525202

Thomson, G. and Stevenson, G. and Terzis, S. and Nixon, P.; Nugent, C. and Augusto, J., eds. (2006) A self-managing infrastructure for ad-hoc situation determination. In: Smart Homes and Beyond - ICOST2006 4th International Conference On Smart homes and health Telematics. Assistive Technology Research Series . IOS Press, pp. 157-164. ISBN 978-1-58603-623-2

2005

Thomson, G. and Nixon, P. and Terzis, S.; (2005) Situation determination with distributed context histories. In: Proceedings of 1st International Workshop on Exploiting Context Histories in Smart Environments. IEEE, Munich, Germany, pp. 21-25.

Terzis, Sotirios and Nixon, Paddy and Narasimhan, Nitya and Walsh, Tim (2005) Middleware for pervasive and ad-hoc computing. Personal and Ubiquitous Computing, 9 (6). ISSN 1617-4909

Terzis, S. and Wagealla, W. and English, C. and Nixon, P.; Priami, C. and Quaglia, P., eds. (2005) Trust lifecycle management in a global computing environment. In: Global Computing. Lecture Notes in Computer Science, 3267/2005 . Springer, pp. 291-313. ISBN 978-3-540-24101-0

2004

Nixon, P. and Wagealla, W. and English, C. and Terzis, S.; Cook, D. and Das, S. and Cook, Diane J. and Das, Sajal K., eds. (2004) Security, Privacy and Trust Issues in Smart Environments. In: Smart Environments. John Wiley & Sons Inc., London, UK, pp. 220-240. ISBN 9780471544487

Terzis, S. (2004) Trust lifecycle management in ad-hoc collaborations. In: Second UK-UbiNet Workshop, 2004-05-05 - 2004-05-07.

Thomson, G. and Nixon, P. and Terzis, S. (2004) Towards ad-hoc situation determination. In: First International Workshop on Advanced Context Modelling, Reasoning And Management, 2004-01-01.

English, C. and Terzis, S. and Wagealla, W. (2004) Engineering trust based collaborations in a global computing environment. In: Second International Conference on Trust Management, 2004-03-29 - 2004-04-01.

Terzis, S. and Wagealla, W. and English, C. and Nixon, P. and McGettrick, A. (2004) Preliminary Trust Evolution Model. SECURE.

Terzis, S. and Wagealla, W. and English, C. and Nixon, P. and McGettrick, A. (2004) Preliminary Trust Exploitation Model. SECURE.

Terzis, S. and Wagealla, W. and English, C. and Nixon, P. and McGettrick, A. (2004) Preliminary Trust Formation Model. University of Strathclyde, Glasgow, United Kingdom.

2003

Thomson, G. and Richmond, M. and Terzis, S. and Nixon, P. (2003) An Approach to dynamic context discovery and composition. In: Proceedings of UbiSys '03, System Support for Ubiquitous Computing Workshop, 2003-01-01.

Wagealla, W. and Terzis, S. and English, C. (2003) Trust-based model for privacy control in context aware systems. In: Second Workshop on Security in Ubiquitous Computing at the Fifth Annual Conference on Ubiquitous Computing (UbiComp2003), 2003-10-12 - 2003-10-15.

Wagealla, Waleed and Carbone, Marco and English, Colin and Terzis, Sotirios and Nixon, Paddy (2003) A formal model of trust lifecycle management. In: Workshop on Formal Aspects of Security and Trust (FAST2003) as part of the 12th Formal Methods Europe Symposium (FM2003), 2003-09-08 - 2003-09-12.

Glassey, Richard and Stevenson, Graeme and Richmond, Matthew and Nixon, Paddy and Terzis, Sotitios and Wang, Feng and Ferguson, Ian (2003) Towards a middleware for generalised context management. In: First International Workshop on Middleware for Pervasive and Ad Hoc Computing, Middleware 2003, 2003-06-17.

English, Colin and Terzis, Sotirios and Wagealla, Waleed and Lowe, Helen and Nixon, Paddy and McGettrick, Andrew (2003) Trust dynamics for collaborative global computing. In: IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-2003): Eighth International Workshop on Enabling Technologies, 2003-06-09 - 2003-06-11.

Wagealla, W. and Terzis, S. and English, C. and Nixon, P. (2003) On trust and privacy in context-aware systems. In: Second Internal iTrust Workshop On Trust Management In Dynamic Open Systems, 2002-09-15 - 2002-09-17.

Terzis, S. and Wagealla, W. and English, C. and McGettrick, A. and Nixon, P. (2003) The SECURE collaboration model. University of Strathclyde, Glasgow, United Kingdom.

Thomson, G. and Terzis, S. and Nixon, P. (2003) Towards dynamic context discovery and composition. In: 1st UK-UbiNet Workshop, 2003-09-25 - 2003-09-26.

Nixon, Patrick and Terzis, Sotirios (2003) Trust management. Lecture Notes in Computer Science . Springer-Verlag Berlin, Heidelberg. ISBN 9783540402244

English, C. and Wagealla, W. and Nixon, P. and Terzis, S. and Lowe, H. and McGettrick, A.; (2003) Trusting collaboration in global computing systems. In: Trust Management. Lecture Notes in Computer Science, 2692 . Springer, pp. 136-149. ISBN 978-3-540-40224-4

Cahill, V. and Gray, E. and Seigneur, J.M. and Jensen, C. and Chen, Y. and Shand, B. and Dimmock, N. and Twigg, A. and Bacon, J. and English, C. and Wagealla, W. and Terzis, S. and Nixon, P. and Serugendo, G. and Bryce, C. and Carbone, M. and Krukow, K. and Nielsen, M. (2003) Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing, 2 (3). pp. 52-61. ISSN 1536-1268

2002

Nixon, P. and Dobson, S. and Terzis, S. and Wang, F. (2002) Architectural implications for context adaptive smart spaces. In: 5th IEEE International Workshop on Networked Appliances, 2002-10-30 - 2002-10-31.

English, Colin and Nixon, Paddy and Terzis, Sotirios and McGettrick, Andrew and Lowe, Helen (2002) Security models for trusting network appliances. In: 5th IEEE International Workshop on Networked Appliances, 2002-10-30 - 2002-10-31.

English, C. and Nixon, P. and Terzis, S. and McGettrick, A. and Lowe, H. (2002) Dynamic trust models for ubiquitous computing environments. In: First Workshop on Security in Ubiquitous Computing at the Fourth Annual Conference on Ubiquitous Computing (Ubicomp2002), 2002-09-29 - 2002-10-01.

McGettrick, A. and English, C. and Lowe, H. and Nixon, P. and Terzis, S. (2002) Trust and mobility. In: First iTrust Workshop, 2002-09-02 - 2002-09-04.

Terzis, S. and English, C. and Stevenson, G. and Lowe, H. and McGettrick, A. and Nixon, P. (2002) Using simulation to explore trust lifecycle issues. In: First iTrust Workshop, 2002-09-02 - 2002-09-04.

2000

Kapidakis, S. and Terzis, S. and Sairamesh, J. (2000) A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries. International Journal on Digital Libraries, 3 (1). pp. 19-35. ISSN 1432-5012

Terzis, S. and Nixon, P. and Wade, V. and Dobson, S. and Fuller, J.; Felipe, J., ed. (2000) The future of enterprise groupware applications. In: Enterprise Information Systems. Kluwer Academic Publishers, pp. 99-106. ISBN 978-0-7923-6239-5

1999

Terzis, S. and Nixon, P.; Vallecillo, A. and Troya, J., eds. (1999) Semantic trading: tackling interoperability problems during system integration. In: Object-Oriented Technology. ECOOP'99 Workshop Reader: ECOOP'99 Workshops, Panels, and Posters, Lisbon, Portugal, June 1999. Proceedings. Lecture Notes in Computer Science, 1743/1999 . Universidad de Malaga, pp. 35-42.

1997

Terzis, S. (1997) Performance Monitoring in Digital Library Systems. Masters thesis, University Of Strathclyde.

This list was generated on Thu Nov 21 10:41:04 2024 GMT.