Home > Research > Security Lancaster (Cyber Security) > Publications & Outputs
View graph of relations

Security Lancaster (Cyber Security)

  1. 2019
  2. Forthcoming

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 23/10/2019, (Accepted/In press) In : Software - Practice and Experience. 37 p.

    Research output: Contribution to journalJournal article

  3. E-pub ahead of print

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 17/10/2019, In : IEEE Transactions on Communications. 13 p.

    Research output: Contribution to journalJournal article

  4. In Press/Forthcoming
  5. E-pub ahead of print

    Cognitive computing and wireless communications on the edge for healthcare service robots

    Wan, S., Gu, Z. & Ni, Q., 14/10/2019, In : Computer Communications. 149, p. 99-106 8 p.

    Research output: Contribution to journalJournal article

  6. 2019
  7. Published

    Towards smarter SDN switches: revisiting the balance of intelligence in SDN networks

    Weekes, J., 30/09/2019, Lancaster University. 216 p.

    Research output: ThesisDoctoral Thesis

  8. Forthcoming

    PRISM: An Experiment Framework for Straggler Analytics within Containerized Clusters

    Lindsay, D., Gill, S. & Garraghan, P., 27/09/2019, (Accepted/In press) WoC 2019 Fifth International Workshop on Container Technologies and Container Clouds.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  9. E-pub ahead of print

    Transformative Effects of IoT, Blockchain and Artificial Intelligence on Cloud Computing: Evolution, Vision, Trends and Open Challenges

    Gill, S., Tuli, S., Xu, M., Singh, I., Singh, K., Lindsay, D., Tuli, S., Smirnova, D., Singh, M., Jain, U., Pervaiz, H., Sehgal, B., Kaila, S. S., Misra, S., Aslanpour, M. S., Mehta, H., Stankovski, V. & Garraghan, P., 19/09/2019, In : Internet of Things. 8, 26 p., 100118.

    Research output: Contribution to journalJournal article

  10. E-pub ahead of print

    Effective Secrecy Rate for a Downlink NOMA Network

    Yu, W., Chorti, A., Musavian, L., Poor, H. V. & Ni, Q., 6/09/2019, In : IEEE Transactions on Wireless Communications. 19 p.

    Research output: Contribution to journalJournal article

  11. Published

    3-D Hybrid VLC-RF Indoor IoT Systems with Light Energy Harvesting

    Pan, G., Lei, H., Ding, Z. & Ni, Q., 1/09/2019, In : IEEE Transactions on Green Communications and Networking. 3, 3, p. 853 - 865 13 p.

    Research output: Contribution to journalJournal article

  12. Published

    Proceedings of the 4th European Workshop on Usable Security

    Ur, B. (ed.) & Weir, C. (ed.), 1/09/2019, IEEE.

    Research output: Book/Report/ProceedingsProceedings

  13. Published

    Attention module-based spatial-temporal graph convolutional networks for skeleton-based action recognition

    Kong, Y., Li, L., Zhang, K., Ni, Q. & Han, J., 30/08/2019, In : Journal of Electronic Imaging. 28, 4, 043032.

    Research output: Contribution to journalJournal article

  14. E-pub ahead of print

    Stochastic Asymmetric Blotto Game Approach for Wireless Resource Allocation Strategies

    Chien, S. F., Zarakovitis, C. C., Ni, Q. & Xiao, P., 28/08/2019, In : IEEE Transactions on Wireless Communications. 15 p.

    Research output: Contribution to journalJournal article

  15. Published

    Power Interchange Analysis for Reliable Vehicle-to-Grid Connectivity

    Al-Rubaye, S., Al-Dulaimi, A. & Ni, Q., 21/08/2019, In : IEEE Communications Magazine. 57, 8, p. 105-111 7 p., 8808171.

    Research output: Contribution to journalJournal article

  16. Published

    Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search

    Zhang, J., Zhang, B. & Lin, J., 19/08/2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 211-219 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  17. Published

    Hybrid self-organizing feature map (SOM) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics

    Stephanakis, I. M., Chochliouros, I. P., Sfakianakis, E., Shirazi, S. N. & Hutchison, D., 1/08/2019, In : Information Sciences. 494, p. 247-277 31 p.

    Research output: Contribution to journalJournal article

  18. Published

    Energy-Efficient Multi-User Mobile-Edge Computation Offloading in Massive MIMO Enabled HetNets

    Hao, Y., Ni, Q., Li, H. & Hou, S., 15/07/2019, IEEE International Conference on Communications (ICC 2019). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  19. E-pub ahead of print

    SonarSnoop: active acoustic side-channel attacks

    Cheng, P., Bagci, I., Roedig, U. & Yan, J., 5/07/2019, In : International Journal of Information Security. 16 p.

    Research output: Contribution to journalJournal article

  20. E-pub ahead of print

    Local Optimality of Self-Organising Neuro-Fuzzy Inference Systems

    Gu, X., Angelov, P. P. & Rong, H., 3/07/2019, In : Information Sciences. 503, p. 351-380 30 p.

    Research output: Contribution to journalJournal article

  21. Published

    Defending Adversarial Attacks on Cloud-aided Automatic Speech Recognition Systems

    Zhang, J., Zhang, B. & Zhang, B., 2/07/2019, SCC '19 Proceedings of the Seventh International Workshop on Security in Cloud Computing. New York: ACM, p. 23-31 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  22. Published

    Adversarial Machine Learning in Smart Energy Systems

    Bor, M., Marnerides, A., Molineux, A., Wattam, S. & Roedig, U., 25/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 413-415 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  23. Published

    Low-Power Wide-Area Networks for Sustainable IoT

    Qin, Z., Li, F. Y., Li, G. Y., A. Mccann, J. & Ni, Q., 1/06/2019, In : IEEE Wireless Communications. 26, 3, p. 140-145 6 p.

    Research output: Contribution to journalJournal article

  24. Published

    Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Blair, L., Becker, I., Noble, J., Sasse, A. & Rashid, A., 25/05/2019, Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice Track. Sharpe, H. & Whalen, M. (eds.). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  25. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 23/05/2019, SafeThings 2019 : IEEE Workshop on the Internet of Safe Things. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  26. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X. & Ni, Q., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8762016. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  27. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I., Yan, J. & Roedig, U., 20/05/2019. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  28. Published

    Energy Efficient Resource Allocation in Hybrid Non-Orthogonal Multiple Access Systems

    Shi, J., Yu, W., Ni, Q., Liang, W., Li, Z. & Xiao, P., 1/05/2019, In : IEEE Transactions on Communications. 67, 5, p. 3496-3511 16 p.

    Research output: Contribution to journalJournal article

  29. Published

    A Framework for Measuring the Costs of Security at Runtime

    Ivkic, I., Pichler, H., Zsilak, M., Mauthe, A. & Tauber, M., 05/2019, CLOSER 2019 : International Conference on Cloud Computing and Services Science.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  30. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In : IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to journalJournal article

  31. Published

    To freeze or not to freeze: A culture-sensitive motion capture approach to detecting deceit

    Van der Zee, S., Poppe, R., Taylor, P. J. & Anderson, R., 12/04/2019, In : PLoS ONE. 14, 4, 18 p., e0215000.

    Research output: Contribution to journalJournal article

  32. Published

    Relay Selections for Cooperative Underlay CR Systems with Energy Harvesting

    Ye, J., Liu, Z., Zhao, H., Pan, G., Ni, Q. & Alouini, M., 2/04/2019, In : IEEE Transactions on Cognitive Communications and Networking. 5, 2, p. 358-369 12 p.

    Research output: Contribution to journalJournal article

  33. Published

    A K-Anonymity Based Schema for Location Privacy Preservation

    Fei, F., Li, S., Dai, H., Hu, C., Dou, W. & Ni, Q., 1/04/2019, In : IEEE Transactions on Sustainable Computing. 4, 2, p. 156-167 12 p.

    Research output: Contribution to journalJournal article

  34. Published

    Energy efficiency using cloud management of LTE networks employing fronthaul and virtualized baseband processing pool

    Al-dulaimi, A., Al-rubaye, S. & Ni, Q., 1/04/2019, In : IEEE Transactions on Cloud Computing. 7, 2, p. 1-12 12 p.

    Research output: Contribution to journalJournal article

  35. Published

    Self-Organization and Resilience for Networked Systems: Design Principles and Open Research Issues

    Dobson, S., Hutchison, D., Mauthe, A. U., Schaeffer-Filho, A. E., Smith, P. & Sterbenz, J. PG., 1/04/2019, In : Proceedings of the IEEE . 107, 4, p. 819-834 16 p.

    Research output: Contribution to journalJournal article

  36. E-pub ahead of print

    Intelligent Multisensor Cooperative Localization Under Cooperative Redundancy Validation

    Yin, L., Ni, Q. & Deng, Z., 12/03/2019, In : IEEE Transactions on Cybernetics. 13 p.

    Research output: Contribution to journalJournal article

  37. Published

    A Reinforcement Learning-based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks

    Ling, M. H., Yau, K. A., Qadir, J. & Ni, Q., 1/03/2019, In : IEEE Transactions on Cognitive Communications and Networking. 5, 1, p. 28 - 43 17 p.

    Research output: Contribution to journalJournal article

  38. Published

    An offloading method using decentralized P2P-enabled mobile edge servers in edge computing

    Tang, W., Zhao, X., Rafique, W., Qi, L., Dou, W. & Ni, Q., 1/03/2019, In : Journal of Systems Architecture. 94, p. 1-13 13 p.

    Research output: Contribution to journalJournal article

  39. Published

    A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In : Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to journalJournal article

  40. Published

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 25/02/2019. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  41. Forthcoming

    Fool’s Errand: Looking at April Fools Hoaxes as Disinformation through the Lens of Deception and Humour

    Dearden, E. & Baron, A., 22/02/2019, (Accepted/In press) 20th International Conference on Computational Linguistics and Intelligent Text Processing. Springer, 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  42. Published

    Location Assisted Subcarrier and Power Allocation in Underlay Mobile Cognitive Radio Networks

    Farooq-I-Azam, M., Yu, W., Ni, Q., Dong, M. & Ul Quddus, A., 19/02/2019, 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 6 p. 8644427

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  43. Forthcoming

    Fool's Gold: Understanding the Linguistic Features of Deception and Humour Through April Fools’ Hoaxes

    Dearden, E. & Baron, A., 14/02/2019, (Accepted/In press).

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  44. Published

    Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency

    Al-rubaye, S., Kadhum, E., Ni, Q. & Anpalagan, A., 1/02/2019, In : IEEE Internet of Things Journal. 6, 1, p. 267-277 11 p.

    Research output: Contribution to journalJournal article

  45. Published

    Cooperative Non-Orthogonal Layered Multicast Multiple Access for Heterogeneous Networks

    Yang, L., Ni, Q., Lv, L., Chen, J., Xue, X., Zhang, H. & Jiang, H., 02/2019, In : IEEE Transactions on Communications. 67, 2, p. 1148 - 1165 18 p.

    Research output: Contribution to journalJournal article

  46. Published

    Coverage and Handoff Analysis of 5G Fractal Small Cell Networks

    Chen, J., Ge, X. & Ni, Q., 02/2019, In : IEEE Transactions on Wireless Communications. 18, 2, p. 1263 - 1276 14 p.

    Research output: Contribution to journalJournal article

  47. Forthcoming

    Maximum Achievable Sum Rate in Highly Dynamic Licensed Shared Access

    Onidare, S., Navaie, K. & Ni, Q., 22/01/2019, (Accepted/In press) IEEE VTC-S 2019 .

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  48. Published

    Email fraud: The search for psychological predictors of susceptibility

    Jones, H., Towse, J. N., Race, N. J. P. & Harrison, T., 16/01/2019, In : PLoS ONE. 14, 1, 15 p., e0209684.

    Research output: Contribution to journalJournal article

  49. Published

    User-Pair Selection in Multiuser Cooperative Networks With an Untrusted Relay

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 15/01/2019, In : IEEE Transactions on Vehicular Technology. 68, 1, p. 869-882 14 p.

    Research output: Contribution to journalJournal article

  50. E-pub ahead of print

    Resonant-Tunnelling Diodes as PUF Building Blocks

    Bagci, I. E., McGrath, T., Barthelmes, C., Dean, S., Bernardo Gavito, R., Young, R. J. & Roedig, U., 14/01/2019, In : IEEE Transactions on Emerging Topics in Computing. 6 p.

    Research output: Contribution to journalJournal article

  51. Published

    Towards a Security Cost Model for Cyber-Physical Systems

    Ivkic, I., Mauthe, A. & Tauber, M., 11/01/2019, 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  52. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  53. Published

    Usable assured deletion in the cloud

    Ramokapane, K. M., 2019, Lancaster University. 190 p.

    Research output: ThesisDoctoral Thesis

  54. 2018
  55. Published

    Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  56. Published

    Robust Transmit Designs for Secrecy Rate Constrained MISO NOMA System

    Su, B., Ni, Q. & He, B., 20/12/2018, 29th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  57. Published

    Low Latency Driven Effective Capacity Analysis for Non-Orthogonal and Orthogonal Spectrum Access

    Yu, W., Musavian, L., Quddus, A. U., Ni, Q. & Xiao, P., 13/12/2018, 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  58. Published

    Interference-Aware Radio Resource Allocation for 5G Ultra-Reliable Low-Latency Communication

    Malik, H., Alam, M. M., Le Moullec, Y. & Ni, Q., 9/12/2018, 2018 IEEE Globecom Workshops, GC Wkshps 2018 - Proceedings. IEEE, 6 p. 8644301

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  59. Published

    Joint Antenna and User Selection for Untrusted Relay Networks

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 9/12/2018, 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings. IEEE, 6 p. 8647350

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  60. Published

    Foreign Currency Exchange Rate Prediction using Neuro-Fuzzy Systems

    Yong, Y. L., Lee, Y., Gu, X., Angelov, P. P., Ling Ngo, D. C. & Shafipour Yourdshahi, E., 1/12/2018, Procedia Computer Science. Elsevier, Vol. 144. p. 232-238 7 p. (Procedia Computer Science; vol. 144).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  61. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In : Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to journalJournal article

  62. Published

    On the sustainability of blockchain funding

    Zhang, B. & Balogun, H., 20/11/2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, p. 89-96 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  63. Published

    A Photonic Device

    Young, R. J. & Noori, Y., 24/10/2018, Patent No. GB 2561590 (A), 24/10/2018, Priority date 19/04/2017, Priority No. GB1706216.7

    Research output: Patent

  64. Published

    Towards Reactive Acoustic Jamming for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 15/10/2018, 2nd International Workshop on Multimedia Privacy and Security. ACM Press, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  65. Published

    A Deep Rule-based Approach for Satellite Scene Image Analysis

    Gu, X. & Angelov, P. P., 7/10/2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, p. 2778-2783 6 p. (2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  66. Published

    A Generalized Methodology for Data Analysis

    Angelov, P. P., Gu, X. & Principe, J., 10/2018, In : IEEE Transactions on Cybernetics. 48, 10, p. 2981-2993 13 p.

    Research output: Contribution to journalJournal article

  67. Published

    Deep rule-based classifier with human-level performance and characteristics

    Angelov, P. P. & Gu, X., 10/2018, In : Information Sciences. 463-464, p. 196-213 18 p.

    Research output: Contribution to journalJournal article

  68. Published

    Stability of Evolving Fuzzy Systems based on Data Clouds

    Rong, H., Angelov, P. P., Gu, X. & Bai, J., 10/2018, In : IEEE Transactions on Fuzzy Systems. 26, 5, p. 2774-2784 11 p.

    Research output: Contribution to journalJournal article

  69. Published

    ReasoNet: Inferring Network Policies Using Ontologies

    Rotsos, C., Farshad, A., King, D. & Hutchison, D., 13/09/2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft). IEEE, p. 159-167 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  70. Published

    Quantum Confinement in Security Elements

    McGrath, T., Bernardo Gavito, R., Bagci, I. E., Wang, C., Astbury, B., Young, R. J. & Roedig, U., 9/09/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  71. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In : IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to journalJournal article

  72. Published

    A Method for Autonomous Data Partitioning

    Gu, X., Angelov, P. P. & Principe, J., 09/2018, In : Information Sciences. 460-461, p. 65-82 18 p.

    Research output: Contribution to journalJournal article

  73. Published

    The Benefits of a Self-Generated Cue Mnemonic for Timeline Interviewing

    Kontogianni, F., Hope, L., Vrij, A., Taylor, P. J. & Gabbert, F., 09/2018, In : Journal of Applied Research in Memory and Cognition. 7, 3, p. 454-461 8 p.

    Research output: Contribution to journalJournal article

  74. Published

    Design and Analysis of Secure Quantum Network System with Trusted Repeaters

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 511-514 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  75. Published

    Quantum Key Distribution Random Access Network

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 174-178 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  76. Published

    Autonomous learning multi-model systems from data streams

    Angelov, P. P., Gu, X. & Principe, J., 08/2018, In : IEEE Transactions on Fuzzy Systems. 26, 4, p. 2213-2224 12 p.

    Research output: Contribution to journalJournal article

  77. Published

    Computationally Intelligent Techniques for Resource Management in MmWave Small Cell Networks

    Munir, H., Pervaiz, H., Hassan, S. A., Musavian, L., Ni, Q., Imran, M. A. & Tafazolli, R., 08/2018, In : IEEE Wireless Communications. 25, 4, p. 32-39 8 p.

    Research output: Contribution to journalJournal article

  78. Published

    The influence of social reciprocity in the investigative interview

    Weiher, L., Winters, C., Taylor, P. J. & Luther, K., 11/07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  79. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  80. Published

    Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC) 2018

    Weir, C. A. F. (ed.) & Mazurek, M. (ed.), 1/07/2018, Reston, VA: Internet Society.

    Research output: Book/Report/ProceedingsBook

  81. Published

    Controlling the interview: The influencing techniques of suspects of control and coercion

    Watson, S., Luther, K., Taylor, P. J., Jackson, J. & Alison, L., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  82. Published

    Safe space: Examining the effect of interview location on self-disclosure

    Winters, C., Taylor, P. J. & Luther, K., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  83. Published

    Semi-supervised deep rule-based approach for image classification

    Gu, X. & Angelov, P. P., 07/2018, In : Applied Soft Computing. 68, p. 53-68 16 p.

    Research output: Contribution to journalJournal article

  84. Published

    Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Gouglidis, A., Grompanopoulos, C. & Mavridou, A., 25/06/2018, Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018). Bliudze, S. & Bensalem, S. (eds.). EPTCS, p. 52-64 13 p. (EPTCS; vol. 272).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  85. Published

    ActuEating: Designing, Studying and Exploring Actuating Decorative Artefacts

    Nabil, S., Everitt, A., Sturdee, M. A., Alexander, J. M., Bowen, S., Wright, P. & Kirk, D., 8/06/2018, DIS '18 Proceedings of the 2018 Designing Interactive Systems Conference. New York: ACM, p. 327-339 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  86. Published

    Lancaster at SemEval-2018 Task 3: Investigating Ironic Features in English Tweets

    Dearden, E. & Baron, A., 6/06/2018, Proceedings of the 12th International Workshop on Semantic Evaluation (SemEval-2018). Association for Computational Linguistics, p. 587-593 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  87. Published

    Correntropy-Based Evolving Fuzzy Neural System

    Bao, R., Rong, H., Angelov, P. P., Chen, B. & Wong, P. K., 06/2018, In : IEEE Transactions on Fuzzy Systems. 26, 3, p. 1324-1338 14 p.

    Research output: Contribution to journalJournal article

  88. Published

    On the trajectory of video quality transition in HTTP adaptive video streaming

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 06/2018, In : Multimedia Systems. 24, 3, p. 327-340 14 p.

    Research output: Contribution to journalJournal article

  89. Published

    Self-Organising Fuzzy Logic Classifier

    Gu, X. & Angelov, P. P., 06/2018, In : Information Sciences. 447, p. 36-51 16 p.

    Research output: Contribution to journalJournal article

  90. Published

    Random Damage in Interconnected Networks

    König, S. & Gouglidis, A., 31/05/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  91. Published

    Siren: A platform for deploying virtual network services in the cloud to Fog continuum

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 31/05/2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, p. 202-207 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  92. Published

    Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

  93. Published

    Strong PUFs from arrays of resonant tunnelling diodes

    Astbury, B., Bagci, I. E., McGrath, T., Sexton, J., Missous, M., Roedig, U., Bernardo Gavito, R. & Young, R. J., 10/05/2018, In : arXiv.

    Research output: Contribution to journalLetter

  94. Published

    Anomalous behaviour detection based on heterogeneous data and data fusion

    Mohd Ali, A. & Angelov, P., 05/2018, In : Soft Computing. 22, 10, p. 3187-3201 15 p.

    Research output: Contribution to journalJournal article

  95. Published

    High-Stakes Conflicts and the Link between Theory and Practice: Celebrating the Work of Ellen Giebels

    Oostinga, M., Rispens, S., Taylor, P. J. & Ufkes, E., 05/2018, In : Negotiation and Conflict Management Research. 11, 2, p. 146-159 14 p.

    Research output: Contribution to journalJournal article

  96. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  97. Published

    Grand Challenges in Shape-Changing Interface Research

    Alexander, J., Roudaut, A., Steimle, J., Hornbaek, K., Bruns Alonso, M., Follmer, S. & Merritt, T., 23/04/2018, CHI '18 Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. New York: ACM, 14 p. 299

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  98. Published

    Sketch & The Lizard King: Supporting Image Inclusion in HCI Publishing

    Sturdee, M. A., Alexander, J. M., Coulton, P. & Carpendale, S., 23/04/2018, CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. New York: ACM, 10 p. alt15

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  99. Published

    Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience

    Gouglidis, A. & Hutchison, D., 10/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  100. Published

    Internet traffic characterisation: Third-order statistics & higher-order spectra for precise traffic modelling

    Marnerides, A., Pezaros, D. & Hutchison, D., 7/04/2018, In : Computer Networks. 134, p. 183-201 19 p.

    Research output: Contribution to journalJournal article

  101. Published

    Increasing Light Absorption and Collection Using Engineered Structures

    Noori, Y., Woodhead, C. S. & Young, R. J., 4/04/2018, Two-dimensional Materials for Photodetector. Nayak, P. K. (ed.). InTech, p. 193-212 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  102. Published

    IoT-Driven Automated Object Detection Algorithm for Urban Surveillance Systems in Smart Cities

    Hu, L. & Ni, Q., 1/04/2018, In : IEEE Internet of Things Journal. 5, 2, p. 747-754 8 p.

    Research output: Contribution to journalJournal article

  103. Published

    Performance Analysis of Relaying Systems with Fixed and Energy Harvesting Batteries

    Siddiqui, A. M., Musavian, L., Aissa, S. & Ni, Q., 04/2018, In : IEEE Transactions on Communications. 66, 4, p. 1386-1398 14 p.

    Research output: Contribution to journalJournal article

  104. Published

    Appliance-level Short-term Load Forecasting using Deep Neural Networks

    Ud Din, G. M., Mauthe, A. U. & Marnerides, A., 8/03/2018, 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 53-57 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

Previous 1 2 3 4 5 6 7 8 ...17 Next

Back to top