The new threats of information hiding: The road ahead K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander IT professional 20 (3), 31-39, 2018 | 132 | 2018 |
Will quantum computers be the end of public key encryption? W Buchanan, A Woodward Journal of Cyber Security Technology 1 (1), 1-22, 2017 | 75 | 2017 |
Analysis of the adoption of security headers in HTTP WJ Buchanan, S Helme, A Woodward IET Information Security 12 (2), 118-126, 2018 | 45 | 2018 |
Cryptography across industry sectors WJ Buchanan, A Woodward, S Helme Journal of Cyber Security Technology 1 (3-4), 145-162, 2017 | 11 | 2017 |
Image forensics of digital cameras by analysing image variations using statistical process control P Bateman, ATS Ho, A Woodward 2009 7th International Conference on Information, Communications and Signal …, 2009 | 8 | 2009 |
Special issue on threat detection, analysis and defense S Li, K Rieck, A Woodward Journal of Information Security and Applications 19, 163-164, 2014 | 4 | 2014 |
Accurate detection of out-of-control variations from digital camera devices P Bateman, ATS Ho, A Woodward Proceedings of 2010 IEEE International Symposium on Circuits and Systems …, 2010 | 3 | 2010 |
Winning success from Babbage's failure A Woodward Computing and Control Engineering 16 (5), 18-21, 2005 | 1 | 2005 |
How to have yourself a merry cyber-safe Christmas A Woodward http://www.bbc.co.uk/news/technology-35121375, 2015 | | 2015 |
Internet Organised Crime Threat Assessment 2015 EC M. Levi, M, Gercke, Alan Woodward https://www.europol.europa.eu/iocta/2015/, 2015 | | 2015 |
Internet Organised CRime Threat Assessment 2014 EC M. Levi, M, Gercke, Alan Woodward https://www.europol.europa.eu/iocta/2014/, 2014 | | 2014 |
12 Cyber Scams Of Christmas A Woodward http://www.bbc.co.uk/news/technology-25200338, 2013 | | 2013 |
Exploding the urban myths about how to stay safe online A Woodward http://www.bbc.co.uk/news/technology-22278613, 2013 | | 2013 |
Unexpected Risks of Intelligent Infrastructure http://blogs.scientificamerican.com/guest-blog/unexpected-risks-of …, 2013 | | 2013 |
Small Firms Prove To Be The Weak Link For Hackers A Woodward http://www.bbc.co.uk/news/technology-20320573, 2012 | | 2012 |
Cloud Storage A Woodward http://blogs.scientificamerican.com/guest-blog/cloud-storage/, 2012 | | 2012 |
How Safe Is Your Mobile A Woodward http://blogs.scientificamerican.com/guest-blog/how-safe-is-your-mobile/, 2012 | | 2012 |
Who's Responsible For Meeting The Cyber Threat A Woodward http://blogs.scientificamerican.com/guest-blog/whos-responsible-for-meeting …, 2012 | | 2012 |
How hackers could decapitate the internet A Woodward http://www.bbc.co.uk/news/technology-17472447, 2012 | | 2012 |
How Hackers Are Caught Out By Law Enforcers A Woodward http://www.bbc.co.uk/news/technology-17302656, 2012 | | 2012 |