Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2015
  2. Published

    Guidelines for normalising early modern English corpora: decisions and justifications

    Archer, D., Kytö, M., Baron, A. & Rayson, P. E., 1/03/2015, In: ICAME Journal. 39, 1, p. 5-24 20 p.

    Research output: Contribution to journalJournal articlepeer-review

  3. Published

    A framework for resilience management in the cloud

    Shirazi, S. N. U. H., Simpson, S., Oechsner, S., Mauthe, A. U. & Hutchison, D., 03/2015, In: Elektrotechnik und Informationstechnik. 132, 2, p. 122-132 11 p.

    Research output: Contribution to journalJournal articlepeer-review

  4. Published

    Atomic-scale authentication using resonant tunnelling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y. J., Young, M. P., Woodhead, C. S., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 23/02/2015, In: arxiv.org.

    Research output: Contribution to journalJournal article

  5. Published

    Fully unsupervised fault detection and identification based on recursive density estimation and self-evolving cloud-based classifier

    Costa, B. S. J., Angelov, P. & Guedes, L. A., 20/02/2015, In: Neurocomputing. 150, A, p. 289-303 15 p.

    Research output: Contribution to journalJournal articlepeer-review

  6. Published

    Malware detection in the cloud under ensemble empirical mode decomposition

    Marnerides, A., Spachos, P., Chatzimisios, P. & Mauthe, A. U., 02/2015, Proceedings of 6th International Conference on Computing, Networking and Communications, IEEE ICNC 2015. IEEE, p. 82-88 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    The future of maritime cyber security

    Fitton, O., Prince, D., Germond, B. & Lacy, M., 23/01/2015, Lancaster: Lancaster University. 36 p.

    Research output: Book/Report/ProceedingsOther report

  8. Published

    Quantum authentication

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 15/01/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  9. Published

    Power consumption profiling using energy time-frequency distributions in smart grids

    Marnerides, A., Schaeffer-Filho, A., Smith, P. & Mauthe, A., 01/2015, In: IEEE Communications Letters. 19, 1, p. 46-49 4 p.

    Research output: Contribution to journalJournal articlepeer-review

  10. Published

    Web technologies for environmental big data

    Vitolo, C., Elkhatib, Y., Reusser, D., Macleod, C. J. A. & Buytaert, W., 01/2015, In: Environmental Modelling and Software. 63, p. 185-198 14 p.

    Research output: Contribution to journalJournal articlepeer-review

  11. Published

    A public ideation of shape-changing applications

    Sturdee, M., Hardy, J., Dunn, N. & Alexander, J., 2015, ITS '15 Proceedings of the 2015 International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 219-228 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  13. Published

    An active learning technique enhanced with electronic polls

    Such, J. M., Criado Pacheco, N. & Garcia-Fornes, A., 2015, In: International Journal of Engineering Education. 31, 4, p. 1048-1057 10 p.

    Research output: Contribution to journalJournal articlepeer-review

  14. Published

    An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

    Stevenson, M. & Busby, J., 2015, In: International Journal of Operations and Production Management. 35, 1, p. 110-144 35 p.

    Research output: Contribution to journalJournal articlepeer-review

  15. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  16. Published

    Anomaly detection in secure cloud environments using a Self-Organizing Feature Map (SOFM) model For clustering sets of R-ordered vector-structured features

    Shirazi, S. N. U. H., Stephanakis, I. M., Chochliouros, I. P. & Sfakianakis, E., 2015, EANN '15: Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS). Iliadis, L. (ed.). ACM, 9 p. 27

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Are People Really Social on Porn 2.0?

    Tyson, G., Elkhatib, Y., Sastry, N. & Uhlig, S., 2015, Proceedings of the AAAI Conference on Web and Social Media (ICWSM). AAAI, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    At home with users: a comparative view of Living Labs

    Ley, B., Ogonowski, C., Mu, M., Hess, J., Race, N., Randall, D., Rouncefield, M. & Wulf, V., 2015, In: Interacting with Computers. 27, 1, p. 21-35 15 p.

    Research output: Contribution to journalJournal articlepeer-review

  19. Published

    ATDT: Autonomous Template-based Detection and Tracking of objects from airborne camera

    Sadeghi Tehran, P. & Angelov, P., 2015, Intelligent Systems 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland, Volume 2: Tools, Architectures, Systems, Applications. Filev, D., Jabłkowski, J., Kacprzyk, J., Krawczak, M., Popchev, I., Rutkowski, L., Sgurev, V., Sotirova, E., Szynkarczyk, P. & Zadrozny, S. (eds.). Springer, p. 555-565 11 p. (Advances in Intelligent Systems and Computing; vol. 323).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Cyber security controls effectiveness: a qualitative assessment of cyber essentials

    Such, J. M., Vidler, J., Seabrook, T. & Rashid, A., 2015, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  21. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  22. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (ed.), Herrera-Joancomartí, J. (ed.), Lupu, E. (ed.), Posegga, J. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2015, Springer-Verlag. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  23. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  24. Published

    Foreword from the QASA 2014 program chairs

    Aldini, A., Martinelli, F., Suri, N., J., P. (ed.), N., S., E., L. (ed.), J., H-J. (ed.), J., G-A., F., M. & A., A., 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Springer-Verlag, Vol. 8872. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  25. Published

    Gaze+RST: integrating Gaze and multitouch for remote Rotate-Scale-Translate tasks

    Turner, J., Alexander, J., Bulling, A. & Gellersen, H., 2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 4179-4188 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Gaze-supported gaming: MAGIC techniques for first person shooters

    Velloso, E., Fleming, A., Alexander, J. & Gellersen, H., 2015, CHI PLAY '15 Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. New York: ACM, p. 343-347 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Geographically distributed sensemaking: developing understanding in forum-based software development teams

    Shreeve, B., Sawyer, P., Ralph, P. & Stacey, P., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  28. Published

    Horizon 2020 TWEETHER project for W-band high data rate wireless communications

    Paoloni, C., Letizia, R., Napoli, F., Ni, Q., Rennie, A., Zimmerman, R., Andre, F., Pham, K., Krozer, V., Magne, F., Burciu, I., Ramirez, A., Rocchi, M., Marilier, M. & Vilar, R., 2015, Vacuum Electronics Conference (IVEC), 2015 IEEE International . IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

    Pellegrino, G., Balzarotti, D., Winter, S. & Suri, N., 2015. 16 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  30. Published

    Incremental anomaly identification in flight data analysis by adapted one-class SVM method

    Kolev, D., Suvorov, M., Morozov, E., Markarian, G. & Angelov, P., 2015, Artificial neural networks: methods and applications in bio-/neuroinformatics. Koprinkova-Hristova, P., Mladenov, V. & Kasabov, N. K. (eds.). Springer, p. 373-391 19 p. (Springer Series in Bio-/Neuroinformatics; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Intelligent Systems' 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland

    Angelov, P. (ed.), T. Atanassov, K. (ed.), Doukovska, L. (ed.), Hadjiski, M. (ed.), Jotsov, V. (ed.), Kacprzyk, J. (ed.), Kasabov, N. (ed.), Sotirov, S. (ed.), Szmidt, E. (ed.) & Zadrozny, S. (ed.), 2015, Springer. 863 p. (Advances in Intelligent Systems and Computing; vol. 322)

    Research output: Book/Report/ProceedingsProceedings

  32. Published

    Inter-cell collaborative spectrum monitoring for cognitive cellular networks in fading environment

    Deepak, G. C., Navaie, K. & Ni, Q., 2015, IEEE International Conference on Communications (ICC), 2015 . IEEE, p. 7498-7503 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    IPv6 AS relationships, cliques, and congruence

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 2015, Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Mirkovic, J. & Liu, Y. (eds.). Berlin: Springer, p. 111-122 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Leveraging SDN to provide an in-network QoE measurement framework

    Farshad, A., Georgopoulos, P., Broadbent, M., Mu, M. & Race, N., 2015, Computer Communications Workshops (INFOCOM WKSHPS), 2015 IEEE Conference on. IEEE, p. 239-244 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  36. Published

    Open challenges in relationship-based privacy mechanisms for social network services

    Fogues, R. L., Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2015, In: International Journal of Human-Computer Interaction. 31, 5, p. 350-370 21 p.

    Research output: Contribution to journalJournal articlepeer-review

  37. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  38. Published

    RDE with forgetting: an approximate solution for large values of k with an application to fault detection problems

    Bezerra, C. G., Costa, B., Guedes, L. A. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 169-178 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Recursive SVM based on TEDA

    Kangin, D. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Cham: Springer, p. 156-168 13 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Scenarios and use cases in Tweether: W-band for Internet Everywhere

    Paoloni, C., Letizia, R., Ni, Q., Krozer, V., Andre, F., Magne, F., Marilier, M., Zimmerman, R., Ramirez, A., Vilar, R. & Burciu, I., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  41. Published

    Social computing privacy and online relationships

    Misra, G. & Such, J. M., 2015, AISB Social Aspects of Cognition and Computing Symposium. p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    SPATA: Spatio-tangible tools for fabrication-aware design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 2015, TEI '15 Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. New York: ACM, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Supply chain resilience: definition, review and theoretical foundations for further study

    Tukamuhabwa Rwakira, B., Stevenson, M., Busby, J. & Zorzini, M., 2015, In: International Journal of Production Research. 53, 18, p. 5592-5623 32 p.

    Research output: Contribution to journalJournal articlepeer-review

  45. Published

    Susceptibility to email fraud: a review of psychological perspectives, data-collection methods, and ethical considerations

    Jones, H., Towse, J. & Race, N., 2015, In: International Journal of Cyber Behavior, Psychology and Learning. 5, 3, p. 13-29 17 p.

    Research output: Contribution to journalJournal articlepeer-review

  46. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  47. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  48. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Towards implicit contextual integrity

    Criado, N. & Such, J. M., 2015, The Second International Workshop on Agents and CyberSecurity (ACySE). p. 23-26 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Video Clarity: High Speed Data Mining for Video

    Fisher, P., Alhabib, A., Giotsas, V. & Andreopoulos, I., 2015, IBC 2015. London: Institution of Engineering and Technology, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. 2014
  53. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  54. Published

    A fully autonomous data density based clustering algorithm

    Hyde, R. & Angelov, P., 9/12/2014, Evolving and Autonomous Learning Systems (EALS), 2014 IEEE Symposium on. Piscataway, N.J.: IEEE, p. 116-123 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    RTSDE: recursive total-sum-distances-based density estimation approach and its application for autonomous real-time video analytics

    Angelov, P. & Wilding, A., 9/12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE, p. 81-86 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Editorial message: CrossCloud Brokers 2014

    Elkhatib, Y. & Walraven, S., 8/12/2014, CrossCloud Brokers 2014: proceedings of the 2nd International Workshop on Cross-Cloud Systems . New York: ACM

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    Event pattern discovery on IDS traces of cloud services

    Huang, S-Y., Huang, Y. & Suri, N., 3/12/2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. IEEE, p. 25-32 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to journalJournal articlepeer-review

  59. Published

    A multi-layer and multi-tenant cloud assurance evaluation methodology

    Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E. R., 12/2014, Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE, p. 386-393 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    A real-time approach for autonomous detection and tracking of moving objects from UAV

    Sadeghi Tehran, P., Clarke, C. & Angelov, P. P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Piscataway, N. J.: IEEE, p. 43-49 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Anomaly detection based on eccentricity analysis

    Angelov, P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE Press, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  63. Published

    Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols

    Ghamari, M., Momahed Heravi, B., Roedig, U. & Honary, B., 12/2014, In: IET Networks. 3, 4, p. 284-292 9 p.

    Research output: Contribution to journalJournal articlepeer-review

  64. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In: Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to journalJournal articlepeer-review

  65. Published

    Using agent-based simulation to analyse the effect of broadcast and narrowcast on public perception: a case in social risk amplification

    Onggo, S., Busby, J. & Liu, Y., 12/2014, Proceedings of the 2014 Winter Simulation Conference. IEEE, p. 322-333 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    The future of mobile devices: security and mobility

    Fitton, O. & Prince, D., 17/11/2014, Lancaster: Lancaster University. 34 p.

    Research output: Book/Report/ProceedingsOther report

  67. Published

    Traffic anomaly diagnosis in Internet backbone networks: a survey

    Marnerides, A., Schaeffer-Filho, A. & Mauthe, A., 14/11/2014, In: Computer Networks. 73, p. 224-243 20 p.

    Research output: Contribution to journalJournal articlepeer-review

  68. Published

    Inferring complex AS relationships

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 5/11/2014, IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    Robust and real-time communication on heterogeneous networks for smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 3/11/2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 386-391 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    Photoluminescence studies of individual and few GaSb/GaAs quantum rings

    Young, M. P., Woodhead, C. S., Roberts, J., Noori, Y. J., Noble, M. T., Krier, A., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R. J., 1/11/2014, In: AIP Advances. 4, 11, 6 p., 117127.

    Research output: Contribution to journalJournal articlepeer-review

  71. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Characterising the physicality of everyday buttons

    Alexander, J., Hardy, J. & Wattam, S., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 205-208 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    Just browsing? understanding user journeys in online TV

    Elkhatib, Y., Killick, R., Mu, M. & Race, N., 11/2014, MM '14 Proceedings of the ACM International Conference on Multimedia. New York: ACM, p. 965-968 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Mitigating eclipse attacks in peer-to-peer networks

    Germanus, D., Roos, S., Strufe, T. & Suri, N., 29/10/2014, 2014 IEEE Conference on Communications and Network Security. Springer-Verlag, p. 400-408 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    New energy efficiency metric with imperfect channel considerations for OFDMA systems

    C. Zarakovitis, C., Ni, Q. & Spiliotis, J., 9/10/2014, In: IEEE Wireless Communications Letters. 3, 5, p. 473-476 4 p.

    Research output: Contribution to journalJournal articlepeer-review

  76. Unpublished

    Data structuring and searching method and apparatus

    Angelov, P. & Sadeghi Tehran, P., 8/10/2014, (Unpublished) Patent No. GB1417807.3, priority date 8 October 2014, Priority date 8/10/2014, Priority No. GB1417807.3

    Research output: Patent

  77. Published

    Real-time novelty detection in video using background subtraction techniques: state of the art a practical review

    Morris, G. & Angelov, P., 8/10/2014, 2014 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE Press, p. 537-543 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence

    King, A., Brown, J. & Roedig, U., 1/10/2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, p. 45-50 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  79. Published

    Adaptation for the masses: towards decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A-M., Maddock, C., Mauthe, A. & Taïani, F., 10/2014, ARM '14 Proceedings of 13th Workshop on Adaptive and Reflective Middleware. New York: ACM, 6 p. 4

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    Assessing the impact of intra-cloud live migration on anomaly detection

    Shirazi, S. N. U. H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A. & Hutchison, D., 10/2014, Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE, p. 52-57 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    Gaze-touch: combining gaze with multi-touch for interaction on the same surface

    Pfeuffer, K., Alexander, J., Chong, M. K. & Gellersen, H., 10/2014, UIST '14 Proceedings of the 27th annual ACM symposium on User interface software and technology. New York: ACM, p. 509-518 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    User adaptive QoS aware selection method for cooperative heterogeneous wireless systems: a dynamic contextual approach

    Pervaiz, H., Ni, Q. & Zarakovitis, C. C., 10/2014, In: Future Generation Computer Systems. 39, p. 75-87 13 p.

    Research output: Contribution to journalJournal articlepeer-review

  83. Published

    5G communications: race for more capacity triggers LTE in unlicensed band

    Al-Dulaimi, A., Al-Rubaye, S., Ni, Q. & Sousa, E., 24/09/2014, 33rd Wireless World Research Forum Proceedings. Guildford, Surrey: WWRF, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Semiconductor devices for quantum technologies

    Young, R., 22/09/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  86. Published

    Socio-technical security analysis of Industrial Control Systems (ICS)

    Green, B., Prince, D., Roedig, U., Busby, J. & Hutchison, D., 11/09/2014, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. Janicke, H. (ed.). Swindon: BCS Learning and Development Limited, p. 10-14 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    Data density based clustering

    Hyde, R. & Angelov, P., 8/09/2014, Computational Intelligence (UKCI), 2014 14th UK Workshop on. IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    Estimating packet reception rate in noisy environments

    Brown, J., Roedig, U., Boano, C. A. & Roemer, K., 8/09/2014, Proceedings of the 39rd IEEE Conference on Local Computer Networks, 2014. LCN 2014. IEEE, p. 583-591 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    Cyber policing in the North West: regional and local co-ordination

    Prince, D. D. C., 4/09/2014, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  90. Published

    AMAB: automated measurement and analysis of body motion

    Poppe, R., Van der Zee, S., Heylen, D. & Taylor, P. J., 09/2014, In: Behavior Research Methods. 46, 3, p. 625-633 9 p.

    Research output: Contribution to journalJournal articlepeer-review

  91. Published

    Dataset on usage of a live & VoD P2P IPTV service

    Elkhatib, Y., Mu, M. & Race, N., 09/2014, 14th IEEE International Conference on Peer-to-Peer Computing (P2P). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Organizational sensemaking about risk controls: the case of offshore hydrocarbons production

    Busby, J. & Collins, A., 09/2014, In: Risk Analysis. 34, 9, p. 1738-1752 15 p.

    Research output: Contribution to journalJournal articlepeer-review

  93. Published

    A survey of rural Wireless Mesh Network (WMN) deployments

    Ajayi, A. O., Roedig, U., Edwards, C. & Race, N., 28/08/2014, Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, p. 119-125 7 p. 14664869

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Practical use of formal verification for safety critical cyber-physical systems: A case study

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 25/08/2014, 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications. IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Constructing schedules for time-critical data delivery in wireless sensor networks

    Pöttner, W-B., Seidel, H., Brown, J., Roedig, U. & Wolf, L., 15/08/2014, In: ACM Transactions on Sensor Networks. 10, 3, 31 p., 44.

    Research output: Contribution to journalJournal articlepeer-review

  97. Published

    DEC: dynamically evolving clustering autonomous and its application to structure

    Dutta Baruah, R. & Angelov, P., 14/08/2014, In: IEEE Transactions on Cybernetics. 44, 9, p. 1619-1631 13 p.

    Research output: Contribution to journalJournal articlepeer-review

  98. Published

    Designing Mobile Augmented Reality interfaces for locative games and playful experiences

    Burnett, D., Coulton, P., Murphy, E. & Race, N., 6/08/2014, Proceedings of Digital Games Research Conference 2014. Digital Games Research Association - DiGRA, 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 08/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  100. Published
  101. Published

    Language style matching and police interrogation outcomes

    Richardson, B., Taylor, P. J., Snook, B., Conchie, S. & Bennell, C., 08/2014, In: Law and Human Behavior. 38, 4, p. 357-366 10 p.

    Research output: Contribution to journalJournal articlepeer-review

  102. Published

    Real-time fault detection using recursive density estimation

    Costa, B. S. J., Angelov, P. & Guedes, L. A., 08/2014, In: Journal of Control, Automation and Electrical Systems. 25, 4, p. 428-437 10 p.

    Research output: Contribution to journalJournal articlepeer-review

Previous 1...3 4 5 6 7 8 9 10 ...20 Next

Back to top