Home > Research > Browse

Results for security

Publications & Outputs

  1. The gig economy in the UK: a regional perspective

    Johnes, G., 17/01/2019, (Accepted/In press) In : Journal of Global Responsibility.

    Research output: Contribution to journalJournal article

  2. Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In : Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to journalJournal article

  3. An architecture for dependable connectivity in OSGi-enabled dynamic distributed systems

    Raza, A., Navaie, K. & Nicholson, R., 30/11/2018, 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018. Institute of Electrical and Electronics Engineers Inc., p. 99-106 8 p. 8554682

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution

  4. Secure and Privacy-preserving Data Sharing in the Cloud based on Lossless Image Coding

    Khelifi, F., Brahimi, T., Han, J. & Li, X., 07/2018, In : Signal Processing. 148, p. 91-101 11 p.

    Research output: Contribution to journalJournal article

  5. Insurgency in the Indian Northeast: Student Voices from Kolkata

    Mukherjee, K., 1/06/2018, In : International Journal on Minority and Group Rights. 25, 2, p. 261-282 22 p.

    Research output: Contribution to journalJournal article

  6. Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

  7. Assessing security relations in the Asia Pacific: the cases of China, India and Pakistan

    Mukherjee, K., 03/2018, In : Canadian Foreign Policy Journal. 24, 1, p. 56-73 18 p.

    Research output: Contribution to journalJournal article

  8. Ali Smith's necessary-contingent, or navigating the global

    Evans, J. C., 2018, In : Textual Practice. 32, 4, p. 629-648 20 p.

    Research output: Contribution to journalJournal article

  9. Ernst Jünger, total mobilisation and the work of war

    Costea, B. & Amiridis, K., 07/2017, In : Organization. 24, 4, p. 475-490 16 p.

    Research output: Contribution to journalJournal article

  10. Emerging trust implications of data-rich systems

    Knowles, B. H., 25/10/2016, In : IEEE Pervasive Computing. 15, 4, p. 76-84 9 p.

    Research output: Contribution to journalJournal article

  11. MobiSys 2016

    Mikusz, M., Clinch, S. E. & Sen, S., 25/10/2016, In : IEEE Pervasive Computing. 15, 4, p. 85-88 4 p.

    Research output: Contribution to journalJournal article

More results »

??????

  1. Future of International Law and Cyber Warfare (Funded by SECURITY FUTURES)

    Chatterjee, B. B., Summers, J., Lacy, M. & Prince, D.

    17/07/1319/07/13

    Project: NonFunded ProjectResearch