Home > Research > Browse

Results for security

Publications & Outputs

  1. The gig economy in the UK: a regional perspective

    Johnes, G., 15/08/2019, In : Journal of Global Responsibility. 10, 3, p. 197-210 14 p.

    Research output: Contribution to journalJournal article

  2. Securing the blue: political ecologies of the blue economy in Africa

    Childs, J. & Hicks, C., 1/08/2019, In : Journal of Political Ecology. 26, 1, p. 323-340 18 p.

    Research output: Contribution to journalJournal article

  3. Countering Violent Extremism Online: The Experiences of Informal Counter Messaging Actors

    Lee, B., 11/07/2019, In : Policy & Internet. 22 p.

    Research output: Contribution to journalJournal article

  4. From Vilnius to the Kerch Strait: wide-ranging security risks of the Ukraine crisis

    Maass, A. S., 22/01/2019, In : European Politics and Society. 15 p.

    Research output: Contribution to journalJournal article

  5. Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In : Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to journalJournal article

  6. An architecture for dependable connectivity in OSGi-enabled dynamic distributed systems

    Raza, A., Navaie, K. & Nicholson, R., 30/11/2018, 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018. Institute of Electrical and Electronics Engineers Inc., p. 99-106 8 p. 8554682

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  7. Secure and Privacy-preserving Data Sharing in the Cloud based on Lossless Image Coding

    Khelifi, F., Brahimi, T., Han, J. & Li, X., 07/2018, In : Signal Processing. 148, p. 91-101 11 p.

    Research output: Contribution to journalJournal article

  8. Insurgency in the Indian Northeast: Student Voices from Kolkata

    Mukherjee, K., 1/06/2018, In : International Journal on Minority and Group Rights. 25, 2, p. 261-282 22 p.

    Research output: Contribution to journalJournal article

  9. Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

  10. Assessing security relations in the Asia Pacific: the cases of China, India and Pakistan

    Mukherjee, K., 03/2018, In : Canadian Foreign Policy Journal. 24, 1, p. 56-73 18 p.

    Research output: Contribution to journalJournal article

  11. Ali Smith's necessary-contingent, or navigating the global

    Evans, J. C., 2018, In : Textual Practice. 32, 4, p. 629-648 20 p.

    Research output: Contribution to journalJournal article

More results »

??????

  1. Future of International Law and Cyber Warfare (Funded by SECURITY FUTURES)

    Chatterjee, B. B., Summers, J., Lacy, M. & Prince, D.

    17/07/1319/07/13

    Project: NonFunded ProjectResearch