Home > Research > Browse

Results for Security

Publications & Outputs

  1. Race relations, Nationalism and the Humanitarian Rohingya Crisis in Contemporary Myanmar

    Mukherjee, K., 1/07/2019, In : Asian Journal of Political Science. 27, 2, p. 235-251 17 p.

    Research output: Contribution to journalJournal article

  2. On the Cost of Security Compliance in Information Systems

    Hofbauer, D., Ivkic, I., Maksuti, S., Aldrian, A. & Tauber, M., 1/03/2019, The 10th International Multi-Conference on Complexity, Informatics and Cybernetics: IMCIC 2019. IMCIC

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  3. Climate Change and Maritime Security

    Germond, B. Y. & Mazaris, A., 01/2019, In : Marine Policy. 99, p. 262-266 5 p.

    Research output: Contribution to journalJournal article

  4. Find Me A Safe Zone: A Countermeasure for Channel State Information Based Attacks

    Zhang, J., Tang, Z., Li, M., Fang, D., Chen, X. & Wang, Z., 01/2019, In : Computers and Security. 80, p. 273-290 18 p.

    Research output: Contribution to journalJournal article

  5. Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  6. Applying the study of religions in the security domain: knowledge, skills and collaboration

    Knott, K., 11/2018, In : Journal of Religious and Political Practice. 4, 3, p. 332-351 20 p.

    Research output: Contribution to journalJournal article

  7. A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation

    Saeed, A., Garraghan, P., Craggs, B., van der Linden, D., Rashid, A. & Asad Hussain, S., 2/07/2018, 2018 IEEE International Conference on Cloud Computing (CLOUD). IEEE, p. 606-613 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. Siren: A platform for deploying virtual network services in the cloud to Fog continuum

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 31/05/2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, p. 202-207 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  9. Resource allocation and secure communication design in simultaneous wireless information and power transfer systems

    Yuan, Y., 2018, (Unpublished) Lancaster University. 173 p.

    Research output: ThesisDoctoral Thesis

  10. Towards a Security Baseline for IaaS-Cloud Back-Ends in Industry 4.0

    Bauer, E., Schluga, O., Maksuti, S., Bicaku, A., Hofbauer, D., Ivkic, I., Tauber, M. G. & Woehrer, A., 11/12/2017, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 427-432 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  11. Tracking and Targeting: Sociotechnologies of (In)security

    Suchman, L. A., Follis, K. & Weber, J., 1/11/2017, In : Science, Technology, and Human Values. 42, 6, p. 983-1002 19 p.

    Research output: Contribution to journalJournal article

More results »

Activities

  1. Computers, Privacy & Data Protection (CPDP), 7th International Conference: Reforming Data Protection: The Global Perspective

    Kristrun Gunnarsdottir (Invited speaker)
    21/01/201423/01/2014

    Activity: Participating in or organising an event typesParticipation in conference

  2. 4S Annual Meeting 2013

    Kristrun Gunnarsdottir (Speaker)
    9/10/201312/10/2013

    Activity: Participating in or organising an event typesParticipation in conference

  3. Routledge (Publisher)

    Daniel Prince (Editor)
    2013

    Activity: Publication peer-review and editorial work typesEditorial activity

  4. Mobilizing Emergency/Disaster Response Workshop

    Monika Buscher (Host)
    10/09/2012

    Activity: Other activity typesTypes of Business and Community - Hosting of external, non-academic visitor

  5. ITEC 2012

    Daniel Prince (Invited speaker)
    23/05/2012

    Activity: Participating in or organising an event typesParticipation in conference

  6. Challenges of ICT for Public Policy

    Kristrun Gunnarsdottir (Member of programme committee)
    23/03/2011

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course

  7. Human Security in the context of Ambient Intelligence: In search of a shared Ethical, Social and Legal Approach

    Kristrun Gunnarsdottir (Speaker)
    26/11/201027/11/2010

    Activity: Participating in or organising an event typesParticipation in workshop, seminar, course