Skip to content

Research at St Andrews

Tristan Henderson

Person

  1. 2014
  2. Published

    "Here I am, now pay me!": privacy concerns in incentivised location-sharing systems

    Hutton, L., Henderson, T. & Kapadia, A., 23 Jul 2014, Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM, p. 81 86 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    CRAWDAD: A Wireless Network Data Archive for WiSec Researchers

    Henderson, T. & Kotz, D., 23 Jul 2014.

    Research output: Contribution to conferencePoster

  4. Published

    Data citation practices in the CRAWDAD wireless network data archive

    Henderson, T. & Kotz, D., 12 Sep 2014, Proceedings of the Second Workshop on Linking and Contextualizing Publications and Datasets.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Friend or Flood? Social prevention of flooding attacks in opportunistic networks

    Parris, I. & Henderson, T., 30 Jun 2014, Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on . IEEE, p. 16-21 6 p. (Distributed Computing Systems Workshops (ICDCSW)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    PFClust: an optimised implementation of a parameter-free clustering algorithm

    Musayeva, K., Henderson, T., Mitchell, J. B. O. & Mavridis, L., Feb 2014, In : Source Code for Biology and Medicine. 9, 5

    Research output: Contribution to journalArticle

  7. Published

    Privacy-Aware Location Privacy Preference Recommendations

    Zhao, Y., Ye, J. & Henderson, T., 2 Dec 2014, Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous). p. 120-129

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Recommending Location Privacy Preferences in Ubiquitous Computing

    Zhao, Y., Ye, J. & Henderson, T., 23 Jul 2014.

    Research output: Contribution to conferencePoster

  9. Published

    Review: Ethical research standards in a world of big data

    Henderson, T., 6 Mar 2014, F1000Research.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  10. 2013
  11. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., Apr 2013, In : ACM SIGMETRICS Performance Evaluation Review. 40, 4, p. 90-95

    Research output: Contribution to journalArticle

  12. Published

    Challenges & Opportunities in Human-Data Interaction

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D. & Crowcroft, J., 4 Nov 2013, Proceedings of DE2013: Open Digital - The Fourth Annual Digital Economy All Hands Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Editorial

    Vasalou, A., Henderson, T. & Joinson, A., Dec 2013, In : International Journal of Human-Computer Studies. 71, 12, p. 1124-1125

    Research output: Contribution to journalEditorial

  14. Published

    Incentive-aware opportunistic network routing

    Bigwood, G. & Henderson, T., 2013, Routing in Opportunistic Networks. Woungang, I., Kumar Dhurandher, S., Anpalagan, A. & Vasilakos, A. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  15. Published

    MobOCloud: Extending Cloud Computing with Mobile Opportunistic Networks

    Pal, S. & Henderson, T., 30 Sep 2013, Proceedings of ACM CHANTS 2013. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Understanding ethical concerns in social media privacy studies

    McNeilly, S., Hutton, L. & Henderson, T., 23 Feb 2013, Proceedings of the ACM CSCW Workshop on Measuring Networked Social Privacy: Qualitative & Quantitative Approaches. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. 2012
  18. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., 15 Jun 2012, Proceedings of the ACM SIGMETRICS Workshop on Privacy and Anonymity for the Digital Economy. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Ethics and online social network research - developing best practices

    Henderson, T., Hutton, L. & McNeilly, S., 11 Sep 2012, BCS HCI Workshop on HCI Research in Sensitive Contexts: Ethical Considerations. BCS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Facebook or Fakebook? The effects of simulated mobile applications on simulated mobile networks

    Parris, I. S., Ben Abdesslem, F. & Henderson, T., 2012, In : Ad Hoc Networks. 15 p.

    Research output: Contribution to journalArticle

  21. Published

    Predicting location-sharing privacy preferences in social network applications

    Bigwood, G., Abdesslem, F. B. & Henderson, T., 19 Jun 2012, Proceedings of the First Workshop on recent advances in behavior prediction and pro-active pervasive computing (AwareCast).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Privacy-enhanced social-network routing

    Parris, I. S. & Henderson, T., 1 Jan 2012, In : Computer Communications. 35, 1, p. 62-74 9 p.

    Research output: Contribution to journalArticle

  23. Published

    Reliable online social network data collection

    Abdesslem, F. B., Parris, I. & Henderson, T., 2012, Computational Social Networks: Mining and Visualization. Abraham, A. (ed.). London, UK: Springer-Verlag, p. 183-210

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1 2 3 4 Next
Top