Home > Research > Browse

Results for security

Publications & Outputs

  1. Kaliningrad: A Dual Shift in Cooperation and Conflict

    Maass, A-S., 14/05/2020, In : East European Politics.

    Research output: Contribution to journalJournal article

  2. Development programs, security, and violence reduction: Evidence from an insurgency in India

    Kaila, H., Singhal, S. & Tuteja, D., 10/03/2020, In : World Development. 130, 14 p., 104911.

    Research output: Contribution to journalJournal article

  3. Countering Violent Extremism Online: The Experiences of Informal Counter Messaging Actors

    Lee, B., 1/03/2020, In : Policy & Internet. 12, 1, p. 66-87 22 p.

    Research output: Contribution to journalJournal article

  4. From Vilnius to the Kerch Strait: wide-ranging security risks of the Ukraine crisis

    Maass, A. S., 20/10/2019, In : European Politics and Society. 20, 5, p. 609-623 15 p.

    Research output: Contribution to journalJournal article

  5. The gig economy in the UK: a regional perspective

    Johnes, G., 15/08/2019, In : Journal of Global Responsibility. 10, 3, p. 197-210 14 p.

    Research output: Contribution to journalJournal article

  6. Securing the blue: political ecologies of the blue economy in Africa

    Childs, J. & Hicks, C., 1/08/2019, In : Journal of Political Ecology. 26, 1, p. 323-340 18 p.

    Research output: Contribution to journalJournal article

  7. Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In : Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to journalJournal article

  8. An architecture for dependable connectivity in OSGi-enabled dynamic distributed systems

    Raza, A., Navaie, K. & Nicholson, R., 30/11/2018, 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018. Institute of Electrical and Electronics Engineers Inc., p. 99-106 8 p. 8554682

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  9. Secure and Privacy-preserving Data Sharing in the Cloud based on Lossless Image Coding

    Khelifi, F., Brahimi, T., Han, J. & Li, X., 07/2018, In : Signal Processing. 148, p. 91-101 11 p.

    Research output: Contribution to journalJournal article

  10. Insurgency in the Indian Northeast: Student Voices from Kolkata

    Mukherjee, K., 1/06/2018, In : International Journal on Minority and Group Rights. 25, 2, p. 261-282 22 p.

    Research output: Contribution to journalJournal article

  11. Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

More results »

??????

  1. Future of International Law and Cyber Warfare (Funded by SECURITY FUTURES)

    Chatterjee, B. B., Summers, J., Lacy, M. & Prince, D.

    17/07/1319/07/13

    Project: NonFunded ProjectResearch