David McLuskie
Calculated based on number of publications stored in Pure and citations from Scopus
20082023

Research activity per year

Filter
Conference contribution

Search results

  • 2023

    Near-ultrasonic covert channels using software-defined radio techniques

    Sherry, R., Bayne, E. & McLuskie, D., 8 Mar 2023, Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20-21 June; Wales. Onwubiko, C., Rosati, P., Rege, A., Erola, A., Bellekens, X., Hindy, H. & Jaatun, M. G. (eds.). Singapore: Springer, p. 169-189 21 p. (Springer Proceedings in Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    17 Downloads (Pure)
  • 2020

    Investigation into the security and privacy of iOS VPN applications

    Wilson, J., McLuskie, D. & Bayne, E., 25 Aug 2020, ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security. New York: Association for Computing Machinery (ACM), 9 p. 40

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    1024 Downloads (Pure)
  • 2018

    X.509 certificate error testing

    McLuskie, D. & Bellekens, X., 27 Aug 2018, Proceedings of the 13th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM), 8 p. 42

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    1 Citation (Scopus)
    303 Downloads (Pure)
  • 2017

    A methodology for testing virtualisation security

    Donaldson, S., Coull, N. & McLuskie, D., 19 Oct 2017, Proceedings of the International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA). IEEE , 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    3 Citations (Scopus)
    797 Downloads (Pure)