Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2018
  2. Published

    The influence of social reciprocity in the investigative interview

    Weiher, L., Winters, C., Taylor, P. J. & Luther, K., 11/07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  3. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  4. Published

    Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC) 2018

    Weir, C. A. F. (ed.) & Mazurek, M. (ed.), 1/07/2018, Reston, VA: Internet Society.

    Research output: Book/Report/ProceedingsBook

  5. Published

    Controlling the interview: The influencing techniques of suspects of control and coercion

    Watson, S., Luther, K., Taylor, P. J., Jackson, J. & Alison, L., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  6. Published

    Safe space: Examining the effect of interview location on self-disclosure

    Winters, C., Taylor, P. J. & Luther, K., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  7. Published

    Semi-supervised deep rule-based approach for image classification

    Gu, X. & Angelov, P. P., 07/2018, In : Applied Soft Computing. 68, p. 53-68 16 p.

    Research output: Contribution to journalJournal article

  8. E-pub ahead of print

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 26/06/2018, In : IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to journalJournal article

  9. Published

    A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems

    Birkholz, H., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Arul, T., Heinrich, M., Katzenbeisser, S., Suri, N., Vateva-Gurova, T. & Schlehuber, C., 25/06/2018. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  10. Published

    Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Gouglidis, A., Grompanopoulos, C. & Mavridou, A., 25/06/2018, Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018). Bliudze, S. & Bensalem, S. (eds.). EPTCS, p. 52-64 13 p. (EPTCS; vol. 272).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  11. Published

    Whetstone: Reliable monitoring of cloud services

    Zhang, H., Luna, J., Trapero, R. & Suri, N., 18/06/2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, p. 115-122 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  12. Published

    A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  13. Published

    ActuEating: Designing, Studying and Exploring Actuating Decorative Artefacts

    Nabil, S., Everitt, A., Sturdee, M. A., Alexander, J. M., Bowen, S., Wright, P. & Kirk, D., 8/06/2018, DIS '18 Proceedings of the 2018 Designing Interactive Systems Conference. New York: ACM, p. 327-339 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  14. Published

    Lancaster at SemEval-2018 Task 3: Investigating Ironic Features in English Tweets

    Dearden, E. & Baron, A., 6/06/2018, Proceedings of the 12th International Workshop on Semantic Evaluation (SemEval-2018). Association for Computational Linguistics, p. 587-593 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  15. Published

    Correntropy-Based Evolving Fuzzy Neural System

    Bao, R., Rong, H., Angelov, P. P., Chen, B. & Wong, P. K., 06/2018, In : IEEE Transactions on Fuzzy Systems. 26, 3, p. 1324-1338 14 p.

    Research output: Contribution to journalJournal article

  16. Published

    On the trajectory of video quality transition in HTTP adaptive video streaming

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 06/2018, In : Multimedia Systems. 24, 3, p. 327-340 14 p.

    Research output: Contribution to journalJournal article

  17. Published

    Self-Organising Fuzzy Logic Classifier

    Gu, X. & Angelov, P. P., 06/2018, In : Information Sciences. 447, p. 36-51 16 p.

    Research output: Contribution to journalJournal article

  18. Published

    Random Damage in Interconnected Networks

    König, S. & Gouglidis, A., 31/05/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  19. Published

    Siren: A platform for deploying virtual network services in the cloud to Fog continuum

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 31/05/2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, p. 202-207 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  20. Published

    Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

  21. Published

    Strong PUFs from arrays of resonant tunnelling diodes

    Astbury, B., Bagci, I. E., McGrath, T., Sexton, J., Missous, M., Roedig, U., Bernardo Gavito, R. & Young, R. J., 10/05/2018, In : arXiv.

    Research output: Contribution to journalLetter

  22. Published

    Anomalous behaviour detection based on heterogeneous data and data fusion

    Mohd Ali, A. & Angelov, P., 05/2018, In : Soft Computing. 22, 10, p. 3187-3201 15 p.

    Research output: Contribution to journalJournal article

  23. Published

    High-Stakes Conflicts and the Link between Theory and Practice: Celebrating the Work of Ellen Giebels

    Oostinga, M., Rispens, S., Taylor, P. J. & Ufkes, E., 05/2018, In : Negotiation and Conflict Management Research. 11, 2, p. 146-159 14 p.

    Research output: Contribution to journalJournal article

  24. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  25. Published

    Grand Challenges in Shape-Changing Interface Research

    Alexander, J., Roudaut, A., Steimle, J., Hornbaek, K., Bruns Alonso, M., Follmer, S. & Merritt, T., 23/04/2018, CHI '18 Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. New York: ACM, 14 p. 299

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  26. Published

    Sketch & The Lizard King: Supporting Image Inclusion in HCI Publishing

    Sturdee, M. A., Alexander, J. M., Coulton, P. & Carpendale, S., 23/04/2018, CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. New York: ACM, 10 p. alt15

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  27. Published

    Message from the IC2E 2018 General Chairs

    Hua, K. A., Suri, N., J., L. (ed.), A., C. (ed.), T., G. (ed.) & Y., C. (ed.), 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. xiii 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  28. Published

    Monitoring path discovery for supporting indirect monitoring of cloud services

    Zhang, H., Manzoor, S., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 274-277 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  29. Published

    Threat modeling and analysis for the cloud ecosystem

    Manzoor, S., Zhang, H., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 278-281 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  30. Published

    Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience

    Gouglidis, A. & Hutchison, D., 10/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  31. Published

    Internet traffic characterisation: Third-order statistics & higher-order spectra for precise traffic modelling

    Marnerides, A., Pezaros, D. & Hutchison, D., 7/04/2018, In : Computer Networks. 134, p. 183-201 19 p.

    Research output: Contribution to journalJournal article

  32. Published

    Increasing Light Absorption and Collection Using Engineered Structures

    Noori, Y., Woodhead, C. S. & Young, R. J., 4/04/2018, Two-dimensional Materials for Photodetector. Nayak, P. K. (ed.). InTech, p. 193-212 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  33. Published

    IoT-Driven Automated Object Detection Algorithm for Urban Surveillance Systems in Smart Cities

    Hu, L. & Ni, Q., 1/04/2018, In : IEEE Internet of Things Journal. 5, 2, p. 747-754 8 p.

    Research output: Contribution to journalJournal article

  34. Published

    Performance Analysis of Relaying Systems with Fixed and Energy Harvesting Batteries

    Siddiqui, A. M., Musavian, L., Aissa, S. & Ni, Q., 04/2018, In : IEEE Transactions on Communications. 66, 4, p. 1386-1398 14 p.

    Research output: Contribution to journalJournal article

  35. Published

    Appliance-level Short-term Load Forecasting using Deep Neural Networks

    Ud Din, G. M., Mauthe, A. U. & Marnerides, A., 8/03/2018, 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 53-57 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  36. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In : Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to journalJournal article

  37. Published

    A Massively Parallel Deep Rule-Based Ensemble Classifier for Remote Sensing Scenes

    Gu, X., Angelov, P. P., Zhang, C. & Atkinson, P. M., 03/2018, In : IEEE Geoscience and Remote Sensing Letters. 15, 3, p. 345-349 5 p.

    Research output: Contribution to journalJournal article

  38. Published

    Parsimonious Random Vector Functional Link Network for Data Streams

    Pratama, M., Angelov, P. P., Lughofer, E. & Joo Er, M., 03/2018, In : Information Sciences. 430-431, p. 519-537 19 p.

    Research output: Contribution to journalJournal article

  39. Published

    Large Area Heterostructures from Graphene and Silica Encapsulated Colloidal Quantum Dots via the Langmuir-Blodgett Method

    Black, A., Roberts, J., Acebron, M., Bernardo Gavito, R., Alsharif, G., J. Urbanos, F., Juarez, B. H., Kolosov, O. V., Robinson, B. J., Vázquez De Parga, A. L., Granados, D. & Young, R. J., 28/02/2018, In : ACS Applied Materials and Interfaces. 10, 8, p. 6805-6809 5 p., 10.

    Research output: Contribution to journalJournal article

  40. Published

    Optical reading of a security element [2]

    Young, R. J. & Roedig, U., 21/02/2018, IPC No. G06K19/06; G06K7/12; G06K9/00, Patent No. GB20170013634 20170824 , Priority date 24/08/2017, Priority No. GB20170013634 20170824

    Research output: Patent

  41. Published

    Generating a Nondeterministic Response to a Challenge

    Roberts, J., Bernardo Gavito, R. & Young, R. J., 1/02/2018, IPC No. G06F7/58; H04L9/32, Patent No. GB1613003.1 GB2543126 (A) GB2543126 (B) WO2018020202, Priority date 27/07/2016, Priority No. GB20160013003 20160727

    Research output: Patent

  42. Published

    Generating a unique response to a challenge

    Bernardo Gavito, R., Roberts, J., Roedig, U. & Young, R. J., 1/02/2018, IPC No. G06F21/73; H04L9/32, Patent No. GB1613002.3 WO2018020201 (A1) GB2543125 (A) GB2543125 (B) , Priority date 27/07/2016, Priority No. GB20160013002 20160727

    Research output: Patent

  43. Published

    Communication error management in law enforcement interactions: a receiver’s perspective

    Oostinga, M., Giebels, E. & Taylor, P. J., 02/2018, In : Psychology, Crime and Law. 24, 2, p. 134-155 22 p.

    Research output: Contribution to journalJournal article

  44. Published

    Empirical Fuzzy Sets

    Angelov, P. P. & Gu, X., 02/2018, In : International Journal of Intelligent Systems. 33, 2, p. 362-395 34 p.

    Research output: Contribution to journalJournal article

  45. Published

    Guest Editorial: Body Sensor Networks

    Koutsakis, P., Spachos, P. & Marnerides, A., 29/01/2018, In : IET Wireless Sensor Systems. 8, 1, p. 1-2 2 p.

    Research output: Contribution to journalEditorial

  46. Published

    IMPROVEMENTS RELATING TO THE AUTHENTICATION OF PHYSICAL ENTITIES

    Young, R. J. & Falko, V., 18/01/2018, IPC No. G06K19/10; G06K7/14; G06Q30/00; G07D7/12; B42D25/29, Patent No. US2018018846 (A1) AU2016211063 (A1) CN107810517 (A) EP3251103 (A1) GB2538181 (A) GB2538181 (B) , Priority date 27/01/2015, Priority No. GB20150001342 20150127 ; WO2016GB50164 20160126

    Research output: Patent

  47. Published

    Room temperature mid-infrared emission from faceted InAsSb multi quantum wells embedded in InAs nanowires

    Alhodaib, A., Noori, Y., Carrington, P. J., Sanchez, A., Thompson, M. D., Young, R. J., Krier, A. & Marshall, A. R. J., 10/01/2018, In : Nano Letters. 18, 1, p. 235-240 6 p.

    Research output: Contribution to journalJournal article

  48. Published

    Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research

    Sturdee, M. & Alexander, J., 3/01/2018, In : ACM Computing Surveys. 51, 1, p. 2:1-2:32 32 p., 2.

    Research output: Contribution to journalJournal article

  49. Published

    'An error is feedback’: the experience of communication error management in crisis negotiations

    Oostinga, M., Giebels, E. & Taylor, P. J., 01/2018, In : Police Practice and Research. 19, 1, p. 17-30 14 p.

    Research output: Contribution to journalJournal article

  50. Published

    Drone-Aided Communication as a Key Enabler for 5G and Resilient Public Safety Networks

    Naqvi, S. A. R., Hassan, S. A., Pervaiz, H. & Ni, Q., 01/2018, In : IEEE Communications Magazine. 56, 1, p. 36-42 7 p.

    Research output: Contribution to journalJournal article

  51. Published

    Self-organised direction aware data partitioning algorithm

    Gu, X., Angelov, P. P., Kangin, D. & Principe, J., 01/2018, In : Information Sciences. 423, p. 80-95 16 p.

    Research output: Contribution to journalJournal article

  52. E-pub ahead of print

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 2018, p. 1-34, 34 p.

    Research output: Working paper

  53. Published

    Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization

    Tian, D., Zhou, J., Chen, M., Sheng, Z., Ni, Q. & Leung, V. C. M., 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. IEEE, p. 90-98 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  54. Published

    CreativeTeams: exploring the creative performance of co-located and virtual teams

    Shreeve, B., 2018, Lancaster University. 185 p.

    Research output: ThesisDoctoral Thesis

  55. Published

    G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games

    Alshawish, A., Amine Abid, M., de Meer, H., Schauer, S., König, S., Gouglidis, A. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice . Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 129-156 28 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  56. Published

    Looking at the same interaction and seeing something different: The role of information, judgment perspective and behavioral coding on judgment 'accuracy'

    Wall, H., Taylor, P. J., Campbell, C., Heim, D. & Richardson, B., 2018, In : Journal of Individual Differences. 39, p. 123-141 19 p.

    Research output: Contribution to journalJournal article

  57. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  58. 2017
  59. Published

    Extracting random numbers from quantum tunnelling through a single diode

    Bernardo Gavito, R., Bagci, I. E., Roberts, J., Sexton, J., Astbury, B., Shokeir, H., Mcgrath, T., Noori, Y., Woodhead, C., Missous, M., Roedig, U. & Young, R. J., 19/12/2017, In : Scientific Reports. 7, 6 p., 17879.

    Research output: Contribution to journalJournal article

  60. Published
  61. Published

    Navigating Diverse Data Science Learning: Critical Reflections Towards Future Practice

    Elkhatib, Y., 11/12/2017, Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, p. 357-362 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  62. Published

    Using DSML for Handling Multi-tenant Evolution in Cloud Applications

    Jumagaliyev, A., Whittle, J. N. D. & Elkhatib, Y., 11/12/2017, Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, p. 272-279 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  63. Published

    Malware detection in migrated virtual machines

    El-Moussa, F., Mauthe, A. U., Marnerides, A. & Watson, M., 7/12/2017, Patent No. 20170351861

    Research output: Patent

  64. Published

    Supply chain resilience in a developing country context: A case study on the interconnectedness of threats, strategies, and outcomes

    Tukamuhabwa Rwakira, B., Stevenson, M. & Busby, J. S., 4/12/2017, In : Supply Chain Management: An International Journal. 22, 6, p. 486-505 20 p.

    Research output: Contribution to journalJournal article

  65. Published

    Adaptive management of cognitive radio networks employing femtocells

    Al-dulaimi, A., Anpalagan, A., Al-rubaye, S. & Ni, Q., 12/2017, In : IEEE Systems Journal. 11, 4, p. 2687-2698 12 p.

    Research output: Contribution to journalJournal article

  66. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In : IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to journalJournal article

  67. Published

    Empirical data analytics

    Angelov, P. P., Gu, X. & Kangin, D., 12/2017, In : International Journal of Intelligent Systems. 32, 12, p. 1261-1284 24 p.

    Research output: Contribution to journalJournal article

  68. Published

    NOMA-Enabled Cooperative Unicast–Multicast: Design and Outage Analysis

    Yang, L., Chen, J., Ni, Q., Shi, J. & Xue, X., 12/2017, In : IEEE Transactions on Wireless Communications. 16, 12, p. 7870-7889 20 p.

    Research output: Contribution to journalJournal article

  69. Published

    Charting an Intent Driven Network

    Elkhatib, Y., Coulson, G. & Tyson, G., 26/11/2017, 2017 13th International Conference on Network and Service Management (CNSM). IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  70. Published

    Modeling Server Workloads for Campus Email Traffic Using Recurrent Neural Networks

    Boukoros, S., Nugaliyadde, A., Marnerides, A., Vassilakis, C., Koutsakis, P. & Wai Wong, K., 14/11/2017, Neural Information Processing. ICONIP 2017. Liu, D., Xie, S., Li, Y., Zhou, D. & El-Alfy, E. S. (eds.). Cham: Springer, p. 57-66 10 p. (Lecture Notes in Computer Science; vol. 10638).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  71. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  72. Published

    Inferring BGP blackholing activity in the Internet

    Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A. & Berger, A., 1/11/2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 1-14 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  73. Published

    A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data

    Qi, L., Zhang, X., Dou, W. & Ni, Q., 11/2017, In : IEEE Journal on Selected Areas in Communications. 35, 11, p. 2616-2624 9 p.

    Research output: Contribution to journalJournal article

  74. Published

    A time-sensitive historical thesaurus-based semantic tagger for deep semantic annotation

    Piao, S. S., Dallachy, F., Baron, A., Demmen, J. E., Wattam, S., Durkin, P., McCracken, J., Rayson, P. E. & Alexander, M., 11/2017, In : Computer Speech and Language. 46, p. 113-135 23 p.

    Research output: Contribution to journalJournal article

  75. Published

    Adaptive bitrate selection: a survey

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 11/2017, In : Communications Surveys and Tutorials, IEEE Communications Society. 19, 4, p. 2985-3014 30 p.

    Research output: Contribution to journalJournal article

  76. Published

    Big Data and Natural Language Processing for Analysing Railway Safety

    Syeda, K. N., Shirazi, S. N. U. H., Naqvi, S. A. A., Parkinson, H. J. & Bamford, G., 11/2017, Innovative Applications of Big Data in the Railway Industry. Kohli, D. S., Kumar, D. A. V. S., Easton, D. J. M. & Roberts, P. C. (eds.). IGI Global Publishing, p. 240-267 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  77. Published

    Network service orchestration standardization: a technology survey

    Rotsos, C., King, D., Farshad, A., Bird, J., Fawcett, L., Georgalas, N., Gunkel, M., Shiomoto, K., Wang, A., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 11/2017, In : Computer Standards and Interfaces. 54, 4, p. 203-215 13 p.

    Research output: Contribution to journalJournal article

  78. Published

    On the Energy and Spectral Efficiency Tradeoff in Massive MIMO Enabled HetNets with Capacity-Constrained Backhaul Links

    Hao, Y., Ni, Q., Li, H. & Hou, S., 11/2017, In : IEEE Transactions on Communications. 65, 11, p. 4720-4733 14 p.

    Research output: Contribution to journalJournal article

  79. Published

    The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective

    Shirazi, S. N. U. H., Gouglidis, A., Farshad, A. & Hutchison, D., 11/2017, In : IEEE Journal on Selected Areas in Communications. 35, 11, p. 2586-2595 10 p.

    Research output: Contribution to journalJournal article

  80. Published

    A Stitch in Time: Supporting Android Developers in Writing Secure Code

    Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C. A. F. & Fahl, S., 30/10/2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1065-1077 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  81. Published

    Quick verification of concurrent programs by iteratively relaxed scheduling

    Metzler, P., Saissi, H., Bokor, P., Suri, N., T.N., N. (ed.), G., R. (ed.) & M., D. P. (ed.), 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 776-781 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  82. Published

    TrEKer: Tracing error propagation in operating system kernels

    Coppik, N., Schwahn, O., Winter, S., Suri, N., T.N., N. (ed.), G., R. & M., D. P., 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 377-387 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  83. Published

    A cascade of deep learning fuzzy rule-based image classifier and SVM

    Angelov, P. P. & Gu, X., 5/10/2017, Systems, Man, and Cybernetics (SMC), 2017 IEEE International Conference on: Human Intelligence for Systems and Cybernetics. IEEE, p. 746-751 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  84. Published

    Mobile Live Video Streaming Optimization via Crowdsourcing Brokerage

    Wu, T., Dou, W., Ni, Q., Yu, S. & Chen, G., 10/2017, In : IEEE Transactions on Multimedia. 19, 10, p. 2267-2281 15 p.

    Research output: Contribution to journalJournal article

  85. Published

    Self-organized Relay Selection for Cooperative Transmission in Vehicular Ad-hoc Networks

    Tian, D., Zhou, J., Sheng, Z., Chen, M., Ni, Q. & Leung, V. C. M., 10/2017, In : IEEE Transactions on Vehicular Technology. 66, 10, p. 9534-9549 16 p.

    Research output: Contribution to journalJournal article

  86. Published

    Optical identification using imperfections in 2D materials

    Cao, Y., Robson, A. J., Alharbi, A., Roberts, J., Woodhead, C., Noori, Y., Bernardo Gavito, R., Roedig, U., Falko, V. & Young, R. J., 28/09/2017, In : 2D Materials. 4, 4, 8 p., 045021.

    Research output: Contribution to journalJournal article

  87. Published

    Developers Need Support, Too: A Survey of Security Advice for Software Developers

    Acar, Y., Stransky, C., Wermke, D., Weir, C. A. F., Mazurek, M. & Fahl, S., 24/09/2017, Proceedings of the IEEE Secure Development Conference 2017. Jaeger, T. (ed.). IEEE, p. 22-26 5 p. 17

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  88. Published

    Nondeterministic response to a challenge

    Young, R. J. & Bernardo Gavito, R., 20/09/2017, IPC No. G06F7/58, Patent No. GB2548428 WO2018029440 (A1) , Priority date 8/08/2016, Priority No. GB20160013595 20160808

    Research output: Patent

  89. Published

    Optical Reading of a Security Element

    Roberts, J. & Young, R. J., 20/09/2017, IPC No. G06K19/06; G06K9/00, Patent No. GB2548493 (B) GB2548493 (A) , Priority date 17/03/2017, Priority No. GB20170004308 20170317

    Research output: Patent

  90. Published

    Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges

    Usama, M., Qadir, J., Raza, A., Arif, H., Yau, K-L. A., Elkhatib, Y., Hussain, A. & Al-Fuqaha, A., 19/09/2017, In : arxiv.org. 37 p.

    Research output: Contribution to journalJournal article

  91. Published

    Using Design Fiction to Inform Shape-Changing Interface Design and Use

    Sturdee, M., Coulton, P. & Alexander, J. M., 6/09/2017, In : The Design Journal. 20, Suppl. 1, p. S4146-S4157 12 p.

    Research output: Contribution to journalJournal article

  92. Published

    Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study

    Kibirige Mukisa, S. & Rashid, A., 4/09/2017, 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  93. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  94. Published

    A new type of distance metric and its use for clustering

    Gu, X., Angelov, P. P., Kangin, D. & Principe, J., 09/2017, In : Evolving Systems. 8, 3, p. 167-177 11 p.

    Research output: Contribution to journalJournal article

  95. Published

    An exact algorithm for a resource allocation problem in mobile wireless communications

    Letchford, A. N., Ni, Q. & Zhong, Z., 09/2017, In : Computational Optimization and Applications. 68, 2, p. 193-208 16 p.

    Research output: Contribution to journalJournal article

  96. Published

    N-state random switching based on quantum tunnelling

    Bernardo Gavito, R., J. Urbanos, F., Roberts, J., Sexton, J., Astbury, B., Shokeir, H., Mcgrath, T., Noori, Y., Woodhead, C. S., Missous, M., Roedig, U. & Young, R. J., 31/08/2017, In : Proceedings of SPIE. 10354, p. 103541T 7 p.

    Research output: Contribution to journalJournal article

  97. Published

    C'MON: Monitoring the compliance of cloud services to contracted properties

    Alboghdady, S., Winter, S., Taha, A., Zhang, H. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 6 36

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  98. Published

    Towards DDoS attack resilient wide area monitoring systems

    Demir, K. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 7 p. 99

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  99. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (ed.), Tonetta, S. (ed.) & Schoitsch, E. (ed.), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  100. Published

    Safety verification utilizing model-based development for safety critical cyber-physical systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 15/08/2017, In : Journal of Information Processing Systems. 25, p. 797-810 14 p.

    Research output: Contribution to journalJournal article

  101. Published

    Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

    Green, B., Le, A. T., Antrobus, R., Roedig, U., Hutchison, D. & Rashid, A., 14/08/2017. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  102. Published

    Detecting peering infrastructure outages in the wild

    Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A. & Aben, E., 7/08/2017, SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication. New York: Association for Computing Machinery, Inc, p. 446-459 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

Previous 1 2 3 4 5 6 7 8 ...20 Next

Back to top