Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. 2015
  2. Published

    A working memory test battery: Java-based collection of seven working memory tasks

    Stone, J. M. & Towse, J., 5/06/2015, In: Journal of Open Research Software. 3, 9 p., e5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Lifetime bounds of Wi-Fi enabled sensor nodes

    Bor, M., King, A. & Roedig, U., 4/06/2015, In: Procedia Computer Science. 52, p. 1108-1113 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Development of the multilingual semantic annotation system

    Piao, S., Bianchi, F., Dayrell, C., D'egidio, A. & Rayson, P., 1/06/2015, The 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Proceedings of the Conference. Association for Computational Linguistics, p. 1268-1274 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Stress detection using wearable physiological sensors

    Sandulescu, V., Andrews, S., Ellis, D., Bellotto, N. & Martinez-Mozos, O., 1/06/2015, Artificial computation in biology and medicine . Cham: Springer, p. 526-532 7 p. (Lecture Notes in Computer Science; vol. 9107).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    Walls and other unremarkable boundaries in South London: impenetrable infrastructure or portals of time, space and cultural difference?

    Knott, K., 1/06/2015, In: New Diversities. 17, 2, p. 15-34 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A cell specific reference signal interference cancellation scheme for LTE cellular access systems

    Li, W., Zhang, Y., Huang, L., Cosmas, J. & Ni, Q., 06/2015, Broadband Multimedia Systems and Broadcasting (BMSB), 2015 IEEE International Symposium on . IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Multi-carrier link-layer energy efficiency and effective capacity tradeoff

    Yu, W., Musavian, L. & Ni, Q., 06/2015, Communication Workshop (ICCW), 2015 IEEE International Conference on. IEEE, p. 2763-2768 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Similitude: decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A-M., Maddock, C., Mauthe, A. U., Roman, P-L. & Taiani, F., 06/2015, Distributed Applications and Interoperable Systems: 15th IFIP WG 6.1 International Conference, DAIS 2015, Held as Part of the 10th International Federated Conference on Distributed Computing Techniques, DisCoTec 2015, Grenoble, France, June 2-4, 2015, Proceedings. Bessani, A. & Bounchenak, S. (eds.). Springer, p. 51-65 15 p. (Lecture Notes in Computer Science; vol. 9038).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    The design of a generalised approach to the programming of systems of systems

    Coulson, G., Blair, G., Elkhatib, Y. & Mauthe, A., 06/2015, World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2015 IEEE 16th International Symposium on a . IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Large-scale time-sensitive semantic analysis of historical corpora

    Rayson, P., Baron, A., Piao, S. & Wattam, S., 27/05/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  13. Published

    Analysis and recommendations for standardisation in penetration testing and vulnerability assessment: penetration testing market survey

    Knowles, W., Baron, A. & McGarr, T., 26/05/2015, London: BSI. 20 p.

    Research output: Book/Report/ProceedingsCommissioned report

  14. Published

    Fault diagnosis in DSL networks using support vector machines

    Marnerides, A., Malinowski, S., Morla, R. & Kim, H. S., 15/05/2015, In: Computer Communications. 62, p. 72-84 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    A multi-level resilience framework for unified networked environments

    Marnerides, A., Bhandari, A., Murthy, H. & Mauthe, A. U., 05/2015, Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on. IEEE, p. 1369-1372 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Computational tools and methods for corpus compilation and analysis

    Rayson, P. E., 05/2015, The Cambridge Handbook of English corpus linguistics. Biber, D. & Reppen, R. (eds.). Cambridge: Cambridge University Press, p. 32-49 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  17. Published

    Dementia and social sustainability: challenges for software engineering

    Sawyer, P., Sutcliffe, A., Rayson, P. & Bull, C., 05/2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on (Volume:2 ) . IEEE, p. 527-530 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Exploring interactions with physically dynamic bar charts

    Taher, F., Hardy, J., Karnik, A., Weichel, C., Jansen, Y., Hornbaek, K. & Alexander, J., 18/04/2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 3237-3246 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    ShapeClip: towards rapid prototyping with shape-changing displays for designers

    Hardy, J., Weichel, C., Taher, F., Vidler, J. & Alexander, J., 18/04/2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 19-28 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Rod-type photonic crystals For colloidal quantum dot light coupling

    Noori, Y., Roberts, J., Woodhead, C., Young, M. & Young, R., 17/04/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  21. Published

    OpenCache: a software-defined content caching platform

    Broadbent, M., King, D., Baildon, S., Georgalas, N. & Race, N., 13/04/2015, Network Softwarization (NetSoft), 2015 1st IEEE Conference on. IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Connected tools in digital design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 1/04/2015, In: IEEE Pervasive Computing. 14, 2, p. 18-21 4 p.

    Research output: Contribution to Journal/MagazineJournal article

  23. Published

    Automatically analysing large texts in a GIS environment: the Registrar General’s reports and cholera in the nineteenth century

    Murrieta-Flores, P., Baron, A., Gregory, I. N., Hardie, A. & Rayson, P. E., 04/2015, In: Transactions in GIS. 19, 2, p. 296-320 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Opportunities and challenges for data physicalization

    Jansen, Y., Dragicevic, P., Isenberg, P., Alexander, J., Karnik, A., Kildal, J., Subramanian, S. & Hornbaek, K., 04/2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 3227-3236 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Shape Display Shader Language (SDSL): a new programming model for shape changing displays

    Weichel, C., Alexander, J. & Hardy, J., 04/2015, CHI EA '15 Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. New York: ACM, p. 1121-1126 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    End-to-end verifiable elections in the standard model

    Kiayias, A., Zacharias, T. & Zhang, B., 17/03/2015, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Oswald, E. & Fischlin, M. (eds.). Springer, Vol. II. p. 468-498 31 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published
  28. Published

    Hybrid type-I InAs/GaAs and type-II GaSb/GaAs quantum dot structure with enhanced photoluminescence

    Ji, H., Liang, B., Simmonds, P. J., Juang, B., Yang, T., Young, R. J. & Huffaker, D. L., 9/03/2015, In: Applied Physics Letters. 106, 10, 5 p., 103104.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    5G communications race: pursuit of more capacity triggers LTE in unlicensed band

    Al-dulaimi, A., Al-rubaye, S., Ni, Q. & Sousa, E., 1/03/2015, In: IEEE Vehicular Technology Magazine. 10, 1, p. 43-51 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Geoparsing, GIS, and Textual Analysis: Current Developments in Spatial Humanities Research

    Gregory, I. N. (ed.), Donaldson, C. E. (ed.), Murrieta-Flores, P. (ed.) & Rayson, P. E. (ed.), 1/03/2015, In: International Journal of Humanities and Arts Computing. 9, 1, p. 1-14 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Guidelines for normalising early modern English corpora: decisions and justifications

    Archer, D., Kytö, M., Baron, A. & Rayson, P. E., 1/03/2015, In: ICAME Journal. 39, 1, p. 5-24 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    A framework for resilience management in the cloud

    Shirazi, S. N. U. H., Simpson, S., Oechsner, S., Mauthe, A. U. & Hutchison, D., 03/2015, In: Elektrotechnik und Informationstechnik. 132, 2, p. 122-132 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Atomic-scale authentication using resonant tunnelling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y. J., Young, M. P., Woodhead, C. S., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 23/02/2015, In: arxiv.org.

    Research output: Contribution to Journal/MagazineJournal article

  34. Published

    Fully unsupervised fault detection and identification based on recursive density estimation and self-evolving cloud-based classifier

    Costa, B. S. J., Angelov, P. & Guedes, L. A., 20/02/2015, In: Neurocomputing. 150, A, p. 289-303 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Spatializing and analysing digital texts: corpora, GIS and places

    Gregory, I., Cooper, D., Hardie, A. & Rayson, P., 4/02/2015, Deep maps and spatial narratives. Bodenhamer, D., Corrigan, J. & Harris, T. (eds.). Bloomington, Ind.: Indiana University Press, p. 150-178 29 p. (Spatial Humanities).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  36. Published

    Malware detection in the cloud under ensemble empirical mode decomposition

    Marnerides, A., Spachos, P., Chatzimisios, P. & Mauthe, A. U., 02/2015, Proceedings of 6th International Conference on Computing, Networking and Communications, IEEE ICNC 2015. IEEE, p. 82-88 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    You cannot hide your telephone lies: providing a model statement as an aid to detect deception in insurance telephone calls

    Leal, S., Vrij, A., Warmelink, L., Vernham, Z. & Fisher, R. P., 02/2015, In: Legal and Criminological Psychology. 20, 1, p. 129-146 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    The future of maritime cyber security

    Fitton, O., Prince, D., Germond, B. & Lacy, M., 23/01/2015, Lancaster: Lancaster University. 36 p.

    Research output: Book/Report/ProceedingsOther report

  39. Published

    Quantum authentication

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 15/01/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  40. Published

    Spatializing and analyzing digital texts: Corpora, GIS, and places

    Gregory, I., Cooper, D., Hardie, A. & Rayson, P., 1/01/2015, Deep Maps and Spatial Narratives. Bodenhamer, D. J., Corrigan, J. & Harris, T. M. (eds.). Indiana University Press, p. 150-178 29 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  41. Published

    Automatic and portable mapping of data parallel programs to OpenCL for GPU-based heterogeneous systems

    Wang, Z., Grewe, D. & O'Boyle, M., 01/2015, In: ACM Transactions on Architecture and Code Optimization. 11, 4, 26 p., 42.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    Intelligent heuristic construction with active learning

    Ogilvie, W., Wang, Z., Petoumenos, P. & Leather, H., 01/2015, Compilers for Parallel Computing (CPC).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Power consumption profiling using energy time-frequency distributions in smart grids

    Marnerides, A., Schaeffer-Filho, A., Smith, P. & Mauthe, A., 01/2015, In: IEEE Communications Letters. 19, 1, p. 46-49 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    “Return? It never left.”: exploring the "sacred" as a resource for bridging the gap between the religious and the secular

    Francis, M., Knott, K., Kutz, C. (ed.), Riss, H. (ed.) & Roy, O., 2015, Religious norms in the public sphere: proceedings of a conference held at UC Berkeley on May 6-7, 2011. Kutz, C., Riss, H. & Roy, O. (eds.). Florence, Italy: European University Institute, p. 48-57 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  45. Published

    A public ideation of shape-changing applications

    Sturdee, M., Hardy, J., Dunn, N. & Alexander, J., 2015, ITS '15 Proceedings of the 2015 International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 219-228 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  47. Published

    An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

    Stevenson, M. & Busby, J., 2015, In: International Journal of Operations and Production Management. 35, 1, p. 110-144 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  49. Published

    At home with users: a comparative view of Living Labs

    Ley, B., Ogonowski, C., Mu, M., Hess, J., Race, N., Randall, D., Rouncefield, M. & Wulf, V., 2015, In: Interacting with Computers. 27, 1, p. 21-35 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    ATDT: Autonomous Template-based Detection and Tracking of objects from airborne camera

    Sadeghi Tehran, P. & Angelov, P., 2015, Intelligent Systems 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland, Volume 2: Tools, Architectures, Systems, Applications. Filev, D., Jabłkowski, J., Kacprzyk, J., Krawczak, M., Popchev, I., Rutkowski, L., Sgurev, V., Sotirova, E., Szynkarczyk, P. & Zadrozny, S. (eds.). Springer, p. 555-565 11 p. (Advances in Intelligent Systems and Computing; vol. 323).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  52. Published

    Disaster Victim Management: Role of Anthropologist

    Mundorff, A. Z., Black, S. M., Blau, S., Drawdy, S. M. & Kosalka Shore, R. C., 2015, Encyclopedia of Forensic and Legal Medicine. Payne-James, J. & Byard, R. W. (eds.). 2nd ed. Elsevier Inc., p. 281-287 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  53. Published

    Exploring fine-grained sentiment values in online product reviews

    Teh, P. L., Rayson, P., Pak, I. & Piao, S., 2015, 2015 IEEE Conference on Open Systems. IEEE, p. 114-118 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    Gaze+RST: integrating Gaze and multitouch for remote Rotate-Scale-Translate tasks

    Turner, J., Alexander, J., Bulling, A. & Gellersen, H., 2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 4179-4188 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Gaze-supported gaming: MAGIC techniques for first person shooters

    Velloso, E., Fleming, A., Alexander, J. & Gellersen, H., 2015, CHI PLAY '15 Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. New York: ACM, p. 343-347 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Geoparsing, GIS and textual analysis: current developments in spatial humanities research

    Gregory, I., Donaldson, C., Murrieta-Flores, P. & Rayson, P., 2015, In: International Journal of Humanities and Arts Computing. 9, 1, p. 1-14 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    Geoparsing, GIS and textual analysis: Current developments in Spatial Humanities research

    Gregory, I. N., Donaldson, C. E., Murrieta-Flores, P. & Rayson, P. E., 2015, In: International Journal of Humanities and Arts Computing. 9, 1, p. 1-14 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Horizon 2020 TWEETHER project for W-band high data rate wireless communications

    Paoloni, C., Letizia, R., Napoli, F., Ni, Q., Rennie, A., Zimmerman, R., Andre, F., Pham, K., Krozer, V., Magne, F., Burciu, I., Ramirez, A., Rocchi, M., Marilier, M. & Vilar, R., 2015, Vacuum Electronics Conference (IVEC), 2015 IEEE International . IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    Identity and identification

    Black, S., 2015, Forensic science and beyond: Authenticity, Provenance and Assurance Evidence and Case Studies. London: Government Office for Science, p. 64-73 10 p. (Annual Report of the Government Chief Scientific Adviser).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  60. Published

    Implicit trust and automatic attitude activation

    Burns, C. & Conchie, S., 2015, Handbook of research methods on trust . 2nd ed. UK: Edward Elgar, p. 292-301 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  61. Published

    Incremental anomaly identification in flight data analysis by adapted one-class SVM method

    Kolev, D., Suvorov, M., Morozov, E., Markarian, G. & Angelov, P., 2015, Artificial neural networks: methods and applications in bio-/neuroinformatics. Koprinkova-Hristova, P., Mladenov, V. & Kasabov, N. K. (eds.). Springer, p. 373-391 19 p. (Springer Series in Bio-/Neuroinformatics; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Intelligent Systems' 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland

    Angelov, P. (ed.), T. Atanassov, K. (ed.), Doukovska, L. (ed.), Hadjiski, M. (ed.), Jotsov, V. (ed.), Kacprzyk, J. (ed.), Kasabov, N. (ed.), Sotirov, S. (ed.), Szmidt, E. (ed.) & Zadrozny, S. (ed.), 2015, Springer. 863 p. (Advances in Intelligent Systems and Computing; vol. 322)

    Research output: Book/Report/ProceedingsProceedings

  63. Published

    Inter-cell collaborative spectrum monitoring for cognitive cellular networks in fading environment

    Deepak, G. C., Navaie, K. & Ni, Q., 2015, IEEE International Conference on Communications (ICC), 2015 . IEEE, p. 7498-7503 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    IPv6 AS relationships, cliques, and congruence

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 2015, Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Mirkovic, J. & Liu, Y. (eds.). Berlin: Springer, p. 111-122 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    Leveraging SDN to provide an in-network QoE measurement framework

    Farshad, A., Georgopoulos, P., Broadbent, M., Mu, M. & Race, N., 2015, Computer Communications Workshops (INFOCOM WKSHPS), 2015 IEEE Conference on. IEEE, p. 239-244 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    RDE with forgetting: an approximate solution for large values of k with an application to fault detection problems

    Bezerra, C. G., Costa, B., Guedes, L. A. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 169-178 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    Recursive SVM based on TEDA

    Kangin, D. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Cham: Springer, p. 156-168 13 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    Religion, Raum und Ort: Der Spatial Turn in der Religionsforschung

    Knott, K., 2015, 103 Jahre Religionswissenschaft in Münster. Radermacher, M., Stander, J. & Wilke, A. (eds.). Münster: Lit Verlag, p. 199-225 27 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  69. Published

    Religious differentiation and diversity in discourse and practice

    Knott, K., 2015, Routledge international handbook of diversity studies. Vertovec, S. (ed.). London: Routledge, p. 91-97 7 p. (Routledge International Handbooks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  70. Published

    Scaling out for extreme scale corpus data

    Coole, M., Rayson, P. E. & Mariani, J. A., 2015, Big Data (Big Data), 2015 IEEE International Conference on. IEEE, p. 1643-1649 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Scenarios and use cases in Tweether: W-band for Internet Everywhere

    Paoloni, C., Letizia, R., Ni, Q., Krozer, V., Andre, F., Magne, F., Marilier, M., Zimmerman, R., Ramirez, A., Vilar, R. & Burciu, I., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  72. Published

    Security, technology and global politics: thinking with Virilio

    Lacy, M. J., 2015, London: Routledge. 168 p. (Prio New Security Studies)

    Research output: Book/Report/ProceedingsBook

  73. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    SPATA: Spatio-tangible tools for fabrication-aware design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 2015, TEI '15 Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. New York: ACM, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    Spatial Humanities: Present and Future

    Gregory, I. N. (ed.), Donaldson, C. E. (ed.), Murrieta-Flores, P. (ed.) & Rayson, P. E. (ed.), 2015, In: International Journal of Humanities and Arts Computing. 9, 1

    Research output: Contribution to Journal/MagazineSpecial issuepeer-review

  76. Published

    Supply chain resilience: definition, review and theoretical foundations for further study

    Tukamuhabwa Rwakira, B., Stevenson, M., Busby, J. & Zorzini, M., 2015, In: International Journal of Production Research. 53, 18, p. 5592-5623 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Susceptibility to email fraud: a review of psychological perspectives, data-collection methods, and ethical considerations

    Jones, H., Towse, J. & Race, N., 2015, In: International Journal of Cyber Behavior, Psychology and Learning. 5, 3, p. 13-29 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  78. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  79. Published

    The epiphyseal scar: changing perceptions in relation to skeletal age estimation

    Davies, C., Hackman, L. & Black, S., 2015, In: Annals of Human Biology. 42, 4, p. 348-357 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    Towards a semantic tagger for analysing contents of Chinese corporate reports

    Piao, S. S., Hu, X. & Rayson, P. E., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  82. Published

    Video Clarity: High Speed Data Mining for Video

    Fisher, P., Alhabib, A., Giotsas, V. & Andreopoulos, I., 2015, IBC 2015. London: Institution of Engineering and Technology, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    What can we learn about immediate memory from the development of children's free recall?

    Jarrold, C., Hall, D., Harvey, C. E., Tam, H., Towse, J. N. & Zarandi, A. L., 2015, In: The Quarterly Journal of Experimental Psychology . 68, 9, p. 1871-1894 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. 2014
  86. Published

    Biometrics within the SuperIdentity project: A new approach to spanning multiple identity domains

    Guest, R., Miguel-Hurtado, O., Stevenage, S. V., Neil, G. J. & Black, S., 15/12/2014, 2014 International Carnahan Conference on Security Technology (ICCST). Institute of Electrical and Electronics Engineers Inc., p. 152-157 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  88. Published

    A fully autonomous data density based clustering algorithm

    Hyde, R. & Angelov, P., 9/12/2014, Evolving and Autonomous Learning Systems (EALS), 2014 IEEE Symposium on. Piscataway, N.J.: IEEE, p. 116-123 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    RTSDE: recursive total-sum-distances-based density estimation approach and its application for autonomous real-time video analytics

    Angelov, P. & Wilding, A., 9/12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE, p. 81-86 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    A minimum data set approach to post-mortem computed tomography reporting for anthropological biological profiling

    Brough, A. L., Morgan, B., Robinson, C., Black, S., Cunningham, C., Adams, C. & Rutty, G. N., 12/2014, In: Forensic Science, Medicine and Pathology. 10, 4, p. 504-512 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    A multi-layer and multi-tenant cloud assurance evaluation methodology

    Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E. R., 12/2014, Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE, p. 386-393 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    A real-time approach for autonomous detection and tracking of moving objects from UAV

    Sadeghi Tehran, P., Clarke, C. & Angelov, P. P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Piscataway, N. J.: IEEE, p. 43-49 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    An extended theory of planned behaviour model of the psychological factors affecting commuters’ transport mode choice

    Donald, I., Cooper, S. & Conchie, S., 12/2014, In: Journal of Environmental Psychology. 40, p. 39-48 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    Anomaly detection based on eccentricity analysis

    Angelov, P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE Press, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  96. Published

    Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols

    Ghamari, M., Momahed Heravi, B., Roedig, U. & Honary, B., 12/2014, In: IET Networks. 3, 4, p. 284-292 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In: Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    Using agent-based simulation to analyse the effect of broadcast and narrowcast on public perception: a case in social risk amplification

    Onggo, S., Busby, J. & Liu, Y., 12/2014, Proceedings of the 2014 Winter Simulation Conference. IEEE, p. 322-333 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    The future of mobile devices: security and mobility

    Fitton, O. & Prince, D., 17/11/2014, Lancaster: Lancaster University. 34 p.

    Research output: Book/Report/ProceedingsOther report

  100. Published

    Traffic anomaly diagnosis in Internet backbone networks: a survey

    Marnerides, A., Schaeffer-Filho, A. & Mauthe, A., 14/11/2014, In: Computer Networks. 73, p. 224-243 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  101. Published

    Inferring complex AS relationships

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 5/11/2014, IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  102. Published

    Photoluminescence studies of individual and few GaSb/GaAs quantum rings

    Young, M. P., Woodhead, C. S., Roberts, J., Noori, Y. J., Noble, M. T., Krier, A., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R. J., 1/11/2014, In: AIP Advances. 4, 11, 6 p., 117127.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1...4 5 6 7 8 9 10 11 ...17 Next

Back to top