Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2022
  2. Published

    Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss

    Bradbury, M. & Jhumka, A., 31/12/2022, In: IEEE Transactions on Information Forensics and Security. 17, p. 3890-3905 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    SlowCoach: Mutating Code to Simulate Performance Bugs

    Chen, Y., Schwahn, O., Natella, R., Bradbury, M. & Suri, N., 21/12/2022, 33rd IEEE International Symposium on Software Reliability Engineering. New York: IEEE, p. 274-285 12 p. (2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A Dynamic Service Trading in a DLT-Assisted Industrial IoT Marketplace

    Hu, J., Reed, M., Thomos, N., Al-Naday, M. F. & Yang, K., 1/12/2022, In: IEEE Transactions on Network and Service Management. 19, 4, p. 4691-4705 15 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system

    Kumar, A., Yadav, A. S., Gill, S. S., Pervaiz, H., Ni, Q. & Buyya, R., 30/11/2022, In: Simulation Modelling Practice and Theory. 120, 27 p., 102621.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Characterizing positively invariant sets: Inductive and topological methods

    Ghorbal, K. & Sogokon, A., 30/11/2022, In: Journal of Symbolic Computation. 113, p. 1-28 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Entropy-based Reinforcement Learning for computation offloading service in software-defined multi-access edge computing

    Li, K., Wang, X., Ni, Q. & Huang, M., 30/11/2022, In: Future Generation Computer Systems. 136, p. 241-251 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Ka-band linearizer structure studies for a compact light source

    Castilla, A., Apsimon, R., Burt, G., Wu, X., Latina, A., Liu, X., Syratchev, I., Wuensch, W., Spataro, B. & Cross, A. W., 30/11/2022, In: Physical Review Accelerators and Beams. 25, 11, 13 p., 112001.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Yin, H. & Stavrou, A. (eds.). New York: ACM, p. 3415-3417 3 p. (Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Poster: Multi-Layer Threat Analysis of the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, p. 3419-3421. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  11. Published

    Information Management for Trust Computation on Resource-constrained IoT Devices

    Bradbury, M., Jhumka, A. & Watson, T., 31/10/2022, In: Future Generation Computer Systems. 135, p. 348-363 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1...3 4 5 6 7 8 9 10 ...254 Next

Back to top