Survey on security challenges for swarm robotics F Higgins, A Tomlinson, KM Martin 2009 Fifth International Conference on Autonomic and Autonomous Systems, 307-312, 2009 | 114 | 2009 |
Threats to the swarm: Security considerations for swarm robotics F Higgins, A Tomlinson, KM Martin International Journal on Advances in Security 2 (2&3), 2009 | 96 | 2009 |
Introduction to the TPM A Tomlinson Smart Cards, Tokens, Security and Applications, 173-191, 2017 | 80 | 2017 |
Controlling transmission of broadcast content A Tomlinson, AW Dent US Patent 7,698,554, 2010 | 41 | 2010 |
Secure virtual disk images for grid computing C Gebhardt, A Tomlinson 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 19-29, 2008 | 29 | 2008 |
Secure delivery of conditional access applications to mobile receivers E Gallery, A Tomlinson Trusted Computing, 195-237, 2005 | 24 | 2005 |
Conditional access in mobile systems: Securing the application E Gallery, A Tomlinson First International Conference on Distributed Frameworks for Multimedia …, 2005 | 22 | 2005 |
Review of potential attacks on robotic swarms I Sargeant, A Tomlinson Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016: Volume …, 2018 | 19 | 2018 |
Challenges for Inter Virtual Machine Communication C Gebhardt, A Tomlinson Technical Report RHUL-MA-2010-12, Department of Mathematics, Royal Holloway …, 2010 | 19 | 2010 |
A distinguishing attack with a neural network WAR De Souza, A Tomlinson 2013 IEEE 13th International Conference on Data Mining Workshops, 154-161, 2013 | 18 | 2013 |
Security challenges in the personal distributed environment S Schwiderski-Grosche, A Tomlinson, SK Goo, JM Irvine Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th 5, 3267 …, 2004 | 17 | 2004 |
Modelling malicious entities in a robotic swarm I Sargeant, A Tomlinson 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC), 7B1-1-7B1-12, 2013 | 16 | 2013 |
Maliciously manipulating a robotic swarm I Sargeant, A Tomlinson Proc. of ESCS 16, 2016 | 15 | 2016 |
Privacy threats in a mobile enterprise social network A Tomlinson, PW Yau, JA MacDonald Information Security Technical Report 15 (2), 57-66, 2010 | 15 | 2010 |
Securing grid workflows with trusted computing PW Yau, A Tomlinson, S Balfe, E Gallery Computational Science–ICCS 2008: 8th International Conference, Kraków …, 2008 | 14 | 2008 |
Security consideration for virtualization C Gebhardt, A Tomlinson Technical Report RHUL–MA–2008–16, Department of Mathematics, Royal Holloway …, 2009 | 13 | 2009 |
Towards privacy in a context-aware social network based recommendation system PW Yau, A Tomlinson 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 12 | 2011 |
Separating hypervisor trusted computing base supported by hardware C Gebhardt, CI Dalton, A Tomlinson Proceedings of the fifth ACM workshop on scalable trusted computing, 79-84, 2010 | 12 | 2010 |
Protection of downloadable software on SDR devices E Gallery, A Tomlinson Proceedings of the 4th Software Defined Radio Forum Technical Conference …, 2005 | 11 | 2005 |
Application of trusted computing to secure video broadcasts to mobile receivers E Gallery, A Tomlinson, R Delicata Technical Report RHUL-MA-2005-11, 2005 | 10 | 2005 |