Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Towards Human-Centric Endpoint Security

    In a survey of six widely used end-to-end encrypted messaging applications, we consider the post-compromise recovery process from the perspective of what security audit functions, if any, are in place to detec...

    Jenny Blessing, Partha Das Chowdhury, Maria Sameen in Security Protocols XXVIII (2023)

  2. No Access

    Chapter and Conference Paper

    Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures

    How does one defend Cyber-Physical Systems (CPSs) in the face of changing security threats without continuous manual intervention? These systems form a critical part of national infrastructure and exist within...

    Joseph Hallett, Simon N. Foley, David Manda in Critical Information Infrastructures Secur… (2023)

  3. Article

    Open Access

    Improving diabetic patients’ adherence to treatment and prevention of cardiovascular disease (Office Guidelines Applied to Practice—IMPACT Study)—a cluster randomized controlled effectiveness trial

    Despite nationwide improvements in cardiovascular disease (CVD) mortality and morbidity, CVD deaths in adults with type 2 diabetes (T2DM) are 2–4 times higher than among those without T2DM. A key contributor t...

    Adesuwa Olomu, Karen Kelly-Blake, William Hart-Davidson, Joseph Gardiner in Trials (2022)

  4. No Access

    Chapter and Conference Paper

    Building a Privacy Testbed: Use Cases and Design Considerations

    Mobile application (app) developers are often ill-equipped to understand the privacy implications of their products and services, especially with the common practice of using third-party libraries to provide c...

    Joseph Gardiner, Partha Das Chowdhury in Computer Security. ESORICS 2021 Internatio… (2022)

  5. Article

    Open Access

    Comparing multiple statistical software for multiple-indicator, multiple-cause modeling: an application of gender disparity in adult cognitive functioning using MIDUS II dataset

    The multiple-indicator, multiple-cause model (MIMIC) incorporates covariates of interest in the factor analysis. It is a special case of structural equation modeling (SEM), which is modeled under latent variab...

    Chi Chang, Joseph Gardiner, Richard Houang in BMC Medical Research Methodology (2020)

  6. Article

    Open Access

    Study of active neighborhoods in Detroit (StAND): study protocol for a natural experiment evaluating the health benefits of ecological restoration of parks

    Individuals living in deprived inner cities have disproportionately high rates of cancers, Type 2 diabetes and obesity, which have stress- and physical inactivity-related etiologies. This study aims to quantif...

    Amber L. Pearson, Karin A. Pfeiffer, Joseph Gardiner, Teresa Horton in BMC Public Health (2020)

  7. No Access

    Chapter and Conference Paper

    Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure

    Industrial Control Systems (ICS) play an important role in the monitoring, control and automation of critical infrastructure such as water, gas, oil and electricity. Recent years have seen a number of high pr...

    Awais Rashid, Joseph Gardiner in Critical Information Infrastructures Secur… (2020)

  8. Article

    Open Access

    Colonic polyp histopathology and location in a community-based sample of older adults

    Colorectal cancer and its precursors are highly prevalent in developed countries. Estimates in the available literature for prevalence of right-sided-only lesions vary between 20.5 and 48.1 %, with association...

    Heather S. Laird-Fick, Gurveen Chahal, Ade Olomu, Joseph Gardiner in BMC Gastroenterology (2016)

  9. No Access

    Chapter and Conference Paper

    On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis

    Malware attacks are increasingly popular attack vectors in online crime. As trends and anecdotal evidence show, preventing these attacks, regardless of their opportunistic or targeted nature, has proven diffic...

    Joseph Gardiner, Shishir Nagaraja in Security Protocols XXII (2014)

  10. No Access

    Article

    Intra- and inter-individual variability of urinary phthalate metabolite concentrations in Hmong women of reproductive age

    The reproducibility of urinary phthalate metabolite concentrations has not been well characterized in non-pregnant women of reproductive age. Our primary study objectives were to describe the distribution of u...

    Jennifer David Peck, Anne M Sweeney in Journal of Exposure Science & Environmenta… (2010)