Home > Research > Browse

Results for security

Publications & Outputs

  1. Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H. 12/2018 In : Energy Informatics. 1, 1, 24 p., 15

    Research output: Contribution to journalJournal article

  2. Find Me A Safe Zone: A Countermeasure for Channel State Information Based Attacks

    Zhang, J., Tang, Z., Li, M., Fang, D., Chen, X. & Wang, Z. 13/10/2018 In : Computers and Security. 80, p. 273-290 18 p.

    Research output: Contribution to journalJournal article

  3. Secure and Privacy-preserving Data Sharing in the Cloud based on Lossless Image Coding

    Khelifi, F., Brahimi, T., Han, J. & Li, X. 07/2018 In : Signal Processing. 148, p. 91-101 11 p.

    Research output: Contribution to journalJournal article

  4. Insurgency in the Indian Northeast: Student Voices from Kolkata

    Mukherjee, K. 06/2018 In : International Journal on Minority and Group Rights. 25, 2, p. 261-282 22 p.

    Research output: Contribution to journalJournal article

  5. Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C. A. F., Blair, L., Noble, J., Becker, I. & Sasse, A. 24/05/2018 (Accepted/In press) Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsOther report

  6. Assessing security relations in the Asia Pacific: the cases of China, India and Pakistan

    Mukherjee, K. 03/2018 In : Canadian Foreign Policy Journal. 24, 1, p. 56-73 18 p.

    Research output: Contribution to journalJournal article

  7. Ali Smith's necessary-contingent, or navigating the global

    Evans, J. C. 2018 In : Textual Practice. 32, 4, p. 629-648 20 p.

    Research output: Contribution to journalJournal article

  8. Ernst Jünger, total mobilisation and the work of war

    Costea, B. & Amiridis, K. 07/2017 In : Organization. 24, 4, p. 475-490 16 p.

    Research output: Contribution to journalJournal article

  9. Emerging trust implications of data-rich systems

    Knowles, B. H. 25/10/2016 In : IEEE Pervasive Computing. 15, 4, p. 76-84 9 p.

    Research output: Contribution to journalJournal article

  10. MobiSys 2016

    Mikusz, M., Clinch, S. E. & Sen, S. 25/10/2016 In : IEEE Pervasive Computing. 15, 4, p. 85-88 4 p.

    Research output: Contribution to journalJournal article

  11. Fusion: coalesced confidential storage and communication framework for the IoT

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T. 10/2016 In : Security and Communication Networks. 9, 15, p. 2656-2673 18 p.

    Research output: Contribution to journalJournal article

More results »

??????

  1. Future of International Law and Cyber Warfare (Funded by SECURITY FUTURES)

    Chatterjee, B. B., Summers, J., Lacy, M. & Prince, D.

    17/07/1319/07/13

    Project: Non-funded ProjectResearch