Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2020
  2. Forthcoming

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 18/05/2020, (Accepted/In press) The 17th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2020). Springer

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  3. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, In : Journal of Cybersecurity. 30 p.

    Research output: Contribution to journalJournal article

  4. Published

    SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage

    Xiong, S., Ni, Q., Wang, L. & Wang, Q., 14/04/2020, In : IEEE Internet of Things Journal. 7, 4, p. 2914-2927 14 p.

    Research output: Contribution to journalJournal article

  5. Published

    UAV-Assisted Wireless Powered Cooperative Mobile Edge Computing: Joint Offloading, CPU Control, and Trajectory Optimization

    Liu, Y., Xiong, K., Ni, Q., Fan, P. & Letaief, K. B., 14/04/2020, In : IEEE Internet of Things Journal. 7, 4, p. 2777-2790 14 p.

    Research output: Contribution to journalJournal article

  6. Forthcoming

    Honeypots for Automatic Network-Level Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 13/03/2020, (Accepted/In press). 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  7. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In : IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to journalJournal article

  8. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In : Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to journalJournal article

  9. Published

    Secrecy Spectrum and Energy Efficiency Analysis in Massive MIMO-enabled Multi-Tier Hybrid HetNets

    Umer, A., Hassan, S. A., Pervaiz, H., Musavian, L., Ni, Q. & Imran, M. A., 1/03/2020, In : IEEE Transactions on Green Communications and Networking. 4, 1, p. 246-262 17 p.

    Research output: Contribution to journalJournal article

  10. Published

    SonarSnoop: active acoustic side-channel attacks

    Cheng, P., Bagci, I., Roedig, U. & Yan, J., 1/03/2020, In : International Journal of Information Security. 19, p. 213-228 16 p.

    Research output: Contribution to journalJournal article

  11. Forthcoming

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 28/02/2020, (Accepted/In press) USENIX Security '20 Proceedings. USENIX Association, 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

Previous 1 2 3 4 5 6 7 8 ...193 Next

Back to top