Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  2. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2014, SMS communication: a linguistic approach. Cougnon, L-A. & Fairon, C. (eds.). John Benjamins Publishing Company, p. 217-237 21 p. (Benjamins Current Topics; vol. 61).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2012, In : Lingvisticæ Investigationes. 35, 2, p. 367-388 22 p.

    Research output: Contribution to journalJournal article

  4. Published

    "I didn't spel that wrong did i. Oops": Analysis and standardisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 27/05/2010. 23 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  5. Published

    "I feel stupid I can't delete...": a study of users' cloud deletion practices and coping strategies

    Ramokapane, K. M., Rashid, A. & Such, J., 12/07/2017, Proceedings of SOUPS 2017 Thirteenth Symposium on Usable Privacy and Security. USENIX Association, p. 241-256 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  6. Published

    "Things that went well - no serious injuries or deaths": ethical reasoning in the design process

    Lloyd, P. A. & Busby, J. S., 2001, 13th International Conference on Engineering Design ICED01 (Glasgow) - 2001. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  7. Published

    (Plenary Talk) Combined coding and encryption techniques and their applications

    Honary, B., 10/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  8. Published

    2012 IEEE Conference on Evolving and Adaptive Intelligent Systems, EAIS-2012

    Angelov, P. (ed.), Filev, D. (ed.), Kasabov, N. (ed.) & Iglesias, J. A. (ed.), 2012, IEEE. 107 p.

    Research output: Book/Report/ProceedingsProceedings

  9. Published

    3-D Hybrid VLC-RF Indoor IoT Systems with Light Energy Harvesting

    Pan, G., Lei, H., Ding, Z. & Ni, Q., 1/09/2019, In : IEEE Transactions on Green Communications and Networking. 3, 3, p. 853 - 865 13 p.

    Research output: Contribution to journalJournal article

  10. Published

    5G communications: race for more capacity triggers LTE in unlicensed band

    Al-Dulaimi, A., Al-Rubaye, S., Ni, Q. & Sousa, E., 24/09/2014, 33rd Wireless World Research Forum Proceedings. Guildford, Surrey: WWRF, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  11. Published

    5G communications race: pursuit of more capacity triggers LTE in unlicensed band

    Al-dulaimi, A., Al-rubaye, S., Ni, Q. & Sousa, E., 1/03/2015, In : IEEE Vehicular Technology Magazine. 10, 1, p. 43-51 9 p.

    Research output: Contribution to journalJournal article

  12. Published

    5G multimedia massive MIMO communications systems

    Ge, X., Wang, H., Zi, R., Li, Q. & Ni, Q., 16/08/2016, In : Wireless Communications and Mobile Computing. 16, 11, p. 1377-1388 12 p.

    Research output: Contribution to journalJournal article

  13. Published

    6LoWPAN Extension for IPsec

    Raza, S., Voigt, T. & Roedig, U., 25/03/2011, Proceedings of the IETF-IAB International Workshop on Interconnecting Smart Objects with the Internet. 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  14. Published

    A bio-inspired HTTP-based Adaptive Streaming Player

    Sani, Y., Mauthe, A. U., Edwards, C. J. & Mu, M., 11/07/2016, Multimedia & Expo Workshops (ICMEW), 2016 IEEE International Conference on. IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  15. Published

    A Caching Architecture for Content Delivery to Mobile Devices

    Kara, H. & Edwards, C., 09/2003, p. 241-248. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  16. Published

    A cascade of deep learning fuzzy rule-based image classifier and SVM

    Angelov, P. P. & Gu, X., 5/10/2017, Systems, Man, and Cybernetics (SMC), 2017 IEEE International Conference on: Human Intelligence for Systems and Cybernetics. IEEE, p. 746-751 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  17. Published

    A Case for Hybrid Content Distribution for Interactive Video-on-Demand

    MacQuire, A., Brampton, A., Race, N. J. P., Mathy, L. & Fry, M., 2008, Proceedings of the 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies. IEEE Computer Society, p. 556-561 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  18. Published

    A cell specific reference signal interference cancellation scheme for LTE cellular access systems

    Li, W., Zhang, Y., Huang, L., Cosmas, J. & Ni, Q., 06/2015, Broadband Multimedia Systems and Broadcasting (BMSB), 2015 IEEE International Symposium on . IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  19. Published

    A Characterization of Actuation Techniques for Generating Movement in Shape-Changing Interfaces

    Taher, F., Vidler, J. & Alexander, J., 05/2017, In : International Journal of Human-Computer Interaction. 33, 5, p. 385-398 14 p.

    Research output: Contribution to journalJournal article

  20. Published

    A Class of Composite Codes with Minimum Distance 8.

    Boyarinov, I., Martin, I. & Honary, B., 10/2001, In : Problems of Information Transmission. 37, 4, p. 353-364 12 p.

    Research output: Contribution to journalJournal article

  21. Published

    A cloud based tool for knowledge exchange on local scale flood risk

    Wilkinson, M., Mackay, E., Quinn, P. F., Stutter, M., Beven, K., Macleod, C. J. A., Macklin, M. G., Elkhatib, Y., Percy, B. J., Vitolo, C. & Haygarth, P., 15/09/2015, In : Journal of Environmental Management. 161, p. 38-50 13 p.

    Research output: Contribution to journalJournal article

  22. Published

    A Cloud-based Virtual Observatory for Environmental Science

    Blair, G. S. & El-khatib, Y., 04/2011, OpenWater symposium 19th April, 2011, at UNESCO-IHE, Delft, The Netherlands : Extended abstracts. Delft: Unesco-IHE, p. 102-103 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  23. Published

    A collaborative AAA architecture to enable secure real-world network mobility

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2011, NETWORKING'11: 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part I. Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A. & Scoglio, C. (eds.). Berlin: Springer-Verlag, p. 212-226 15 p. (Lecture Notes in Computer Science; vol. 6640).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  24. Published

    A Common Architecture for Cross Layer and Network Context Awareness

    Sifalakis, M., Fry, M. & Hutchison, D., 08/2007, Self-Organizing Systems. 2007 ed. Springer-Verlag, Vol. 4725. p. 103-118 16 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    A comparative performance study of IPv6 transitioning mechanisms - NAT-PT vs. TRT vs. DSTM

    Mackay, M., Edwards, C., Boavida, F. (ed.), Plagemann, T. (ed.), Stiller, B. (ed.), Westphal, C. (ed.) & Monteiro, E. (ed.), 2006, p. 1125-1131. 7 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  26. Published

    A comparative study of autonomous learning outlier detection methods applied to fault detection

    Bezerra, C. G., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 08/2015, Proceedings of the 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) . IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  27. Published

    A comparative study of data transport protocols in wireless sensor networks

    Shaikh, F. K., Khelil, A. & Suri, N., 23/06/2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  28. Published

    A Comparative Study of two Approaches for Data-Driven Design of Evolving Fuzzy Systems: eTS and FLEXFIS

    Angelov, P. & Lughofer, E., 02/2008, In : International Journal of General Systems. 37, 1, p. 45-67 23 p.

    Research output: Contribution to journalJournal article

  29. Published

    A Comparative Study on Iterative Methods Regarding Cross-Layer Optimization for OFDMA Systems

    C. Zarakovitis, C., Nikolaros, I., Skordoulis, D., Hadjinicolaou, M. & Ni, Q., 08/2010, IEEE International Conference on Computer and Information Technology (CIT), 10.1109/CIT.2010.98. IEEE, p. 420-425 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  30. Published

    A comparison of MANET emulation techniques for the production of a realistic testbed with global communication capabilities

    Palmer, W., McCarthy, B. & Edwards, C., 04/2009, Wireless Telecommunications Symposium, 2009. WTS 2009. IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  31. Published

    A comparison of static and dynamic component models for Wireless Sensor Networks

    Porter, B., Roedig, U., Taiani, F. & Coulson, G., 04/2010, Proceedings of the The First International Workshop on Networks of Cooperating Objects (CONET2010). 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  32. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  33. Published

    A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 03/2008, In : Journal of Networks. 3, 3

    Research output: Contribution to journalJournal article

  34. Published

    A comprehensive review on handcrafted and learning-based action representation approaches for human activity recognition

    Bux, A., Angelov, P. P. & Habib, Z., 23/01/2017, In : Applied Sciences. 7, 1, 37 p., 110.

    Research output: Contribution to journalJournal article

  35. Published
  36. Published

    A connection-level call admission control using genetic algorithm for multi-class multimedia services in wireless networks

    Hong, X., Xiao, Y., Ni, Q. & Li, T., 2006, In : International Journal of Mobile Communications. 4, 5, p. 568-580 13 p.

    Research output: Contribution to journalJournal article

  37. Published

    A control theory approach for analyzing the effects of data errors in safety-critical control systems

    Askerdal, O., Gäfvert, M., Hiller, M. & Suri, N., 16/12/2002, Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings. IEEE, p. 105-114 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  38. Published

    A cylindrical model of communication behaviour in crisis negotiations.

    Taylor, P. J., 1/01/2002, In : Human Communication Research. 28, 1, p. 7-48 42 p.

    Research output: Contribution to journalJournal article

  39. Published

    A Deep Rule-based Approach for Satellite Scene Image Analysis

    Gu, X. & Angelov, P. P., 7/10/2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, p. 2778-2783 6 p. (2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  40. Published

    A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  41. Published

    A Discrete Perceptual Impact Evaluation Quality Assessment Framework for IPTV Services

    Mu, M., Mauthe, A. & Garcia, F., 07/2010, IEEE International Conference on Multimedia and Expo (ICME), 2010 . IEEE, p. 1505-1510 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  42. Published

    A Distributed Approach for Intelligent Reconfiguration of Wireless Mobile Networks

    Madani, K., Karran, T., Justo, G., Lohi, M., Lund, D., Martin, I., Honary, B., Imre, S., Rabai, G., Kovacs, J., Kacsuk, P. & Lanyi, A., 06/2002, IST Mobile & Wireless Telecommunications Summit 2002. Thessaloniki, Greece, p. 179–183 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  43. Published

    A Distributed Caching Approach for Improved Data Availability in Rural Wireless Mesh Networks

    Ajayi, A. O., Edwards, C. J. & Roedig, U., 16/12/2016, Computational Science and Computational Intelligence (CSCI), 2016 International Conference on. 16772962: IEEE, p. 904 - 910 7 p. 16772962

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  44. Published

    A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data

    Qi, L., Zhang, X., Dou, W. & Ni, Q., 11/2017, In : IEEE Journal on Selected Areas in Communications. 35, 11, p. 2616-2624 9 p.

    Research output: Contribution to journalJournal article

  45. Published

    A dynamic spectrum access scheme for cognitive radio networks

    Du, K. -L., Swamy, M. N. S. & Ni, Q., 2009, Electrical and Computer Engineering, 2009. CCECE '09. Canadian Conference on. NEW yORK: IEEE, p. 450-454 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  46. Published

    A fast approach to novelty detection in video streams using recursive density estimation.

    Ramezani, R., Angelov, P. & Zhou, X., 8/09/2008, Intelligent Systems, 2008. IS '08. 4th International IEEE Conference. IEEE, p. 14-2 - 14-7 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  47. Published

    A Fast Recursive Approach to Autonomous Detection, Identification and Tracking of Multiple Objects in Video Streams under Uncertainties

    Sadeghi-Tehran, P., Angelov, P. & Ramezani, R., 07/2010, Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications : 13th International Conference, IPMU 2010, Dortmund, Germany, June 28–July 2, 2010. Proceedings, Part II. Hüllermeier, E., Kruse, R. & Hoffmann, F. (eds.). Berlin: Springer, p. 30-43 14 p. (Communications in Computer and Information Science; vol. 81).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  48. Published

    A foundation for defining security requirements in grid computing

    Gouglidis, A. & Mavridis, I., 4/12/2009, PCI 2009 - 13th Panhellenic Conference on Informatics. IEEE, p. 180-184 5 p. 5298349

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  49. Published

    A Framework for Measuring the Costs of Security at Runtime

    Ivkic, I., Pichler, H., Zsilak, M., Mauthe, A. & Tauber, M., 05/2019, CLOSER 2019 : International Conference on Cloud Computing and Services Science.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  50. Published

    A framework for privacy aware design in future mobile applications

    Kibirige Mukisa, S., 30/07/2019, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  51. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  52. Published

    A framework for resilience management in the cloud

    Shirazi, S. N. U. H., Simpson, S., Oechsner, S., Mauthe, A. U. & Hutchison, D., 03/2015, In : Elektrotechnik und Informationstechnik. 132, 2, p. 122-132 11 p.

    Research output: Contribution to journalJournal article

  53. Published

    A framework for the design and evaluation of network resilience management

    Schaeffer-Filho, A., Smith, P., Mauthe, A., Hutchison, D., Yu, Y. & Fry, M., 1/04/2012, Network Operations and Management Symposium (NOMS), 2012 IEEE. IEEE, p. 401-408 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  54. Published

    A framework for the design and validation of efficient fail-safe fault-tolerant programs

    Jhumka, A., Suri, N. & Hiller, M., 2003, Software and Compilers for Embedded Systems . Springer-Verlag, Vol. 2826. p. 182-197 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  55. Published

    A fully autonomous data density based clustering algorithm

    Hyde, R. & Angelov, P., 9/12/2014, Evolving and Autonomous Learning Systems (EALS), 2014 IEEE Symposium on. Piscataway, N.J.: IEEE, p. 116-123 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  56. Published

    A fuzzy controller with evolving structure.

    Angelov, P., 5/04/2004, In : Information Sciences. 161, 1-2, p. 21-35 15 p.

    Research output: Contribution to journalJournal article

  57. Published

    A game theoretical network-assisted user-centric design for resource allocation in 5G heterogeneous networks

    Munir, H., Hassan, S. A., Pervaiz, H. B. & Ni, Q., 15/05/2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  58. Published

    A general purpose intelligent surveillance system for mobile devices using deep learning

    Antoniou, A. & Angelov, P. P., 24/07/2016, 2016 International Joint Conference on Neural Networks (IJCNN). Vancouver Canada: IEEE, p. 2879-2886 8 p. (Neural Networks (IJCNN), 2016 International Joint Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  59. Published

    A Generalized Methodology for Data Analysis

    Angelov, P. P., Gu, X. & Principe, J., 10/2018, In : IEEE Transactions on Cybernetics. 48, 10, p. 2981-2993 13 p.

    Research output: Contribution to journalJournal article

  60. Unpublished

    A generic active service deployment protocol

    Sifalakis, M., Schmid, S., Hutchison, D. & Chart, T., 05/2003, (Unpublished)

    Research output: Other contribution

  61. Published

    A Generic Hand-Over Framework for 4G Networks

    Roedig, U. & Sreenan, C. J., 10/2006.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  62. Published

    A geospatial framework to support integrated biogeochemical modelling in the United Kingdom

    Greene, S., Johnes, P. J., Bloomfield, J. P., Reaney, S. M., Lawley, R. S., Elkhatib, Y., Freer, J., Odoni, N., Macleod, C. J. A. & Percy, B. J., 06/2015, In : Environmental Modelling and Software. 68, p. 219-232 14 p.

    Research output: Contribution to journalJournal article

  63. Published

    A group-oriented secure multiagent platform

    Such, J. M., Alberola, J. M., Espinosa, A. & Garcia-Fornes, A., 10/2011, In : Software: Practice and Experience. 41, 11, p. 1289-1302 14 p.

    Research output: Contribution to journalJournal article

  64. Published

    A Hierarchical P2PSIP Architecture to Support Skype-like Services

    Martinez-Yelmo, I., Guerrero, C., Cuevas, R. & Mauthe, A., 2009, PDP '09: Proceedings of the 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. Washington, DC, USA: IEEE Computer Society, p. 316-322 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  65. Published

    A hopping code for MMFSK in a power-line channel

    Adebisi, B., Ali, S. & Honary, B., 07/2009, In : Journal of Communications. 4, 6, p. 429-436 8 p.

    Research output: Contribution to journalJournal article

  66. Published

    A K-Anonymity Based Schema for Location Privacy Preservation

    Fei, F., Li, S., Dai, H., Hu, C., Dou, W. & Ni, Q., 1/04/2019, In : IEEE Transactions on Sustainable Computing. 4, 2, p. 156-167 12 p.

    Research output: Contribution to journalJournal article

  67. Published

    A Key Exchange Protocol for Wireless Ad-hoc Networks Using ECC

    Catterall, N., Katsaros, I. & Honary, B., 12/2004, First International Symposium on Broadband Communications. Harrogate, p. 30

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  68. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In : IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to journalJournal article

  69. Published

    A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing

    Benachour, P., Farrell, P. & Honary, B., 2001, Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 166-175 10 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  70. Published

    A MAC Protocol for Industrial Process Automation and Control

    Suriyachai, P., Brown, J. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  71. Published

    A managed IPv6 transitioning architecture for large network deployments

    Mackay, M. & Edwards, C., 1/07/2009, In : IEEE Internet Computing. 13, 4, p. 42 -51 10 p.

    Research output: Contribution to journalJournal article

  72. Published

    A Massively Parallel Deep Rule-Based Ensemble Classifier for Remote Sensing Scenes

    Gu, X., Angelov, P. P., Zhang, C. & Atkinson, P. M., 03/2018, In : IEEE Geoscience and Remote Sensing Letters. 15, 3, p. 345-349 5 p.

    Research output: Contribution to journalJournal article

  73. Published

    A mathematical framework for spectroscopy data analysis to characterize chemical-induced alterations in the SHE assay

    Trevisan, J., Angelov, P. P., Carmichael, P. L., Scott, A. D. & Martin, F. L., 11/2010, In : Mutagenesis. 25, 6, p. 658-658 1 p.

    Research output: Contribution to journalMeeting abstract

  74. Published

    A Method for Autonomous Data Partitioning

    Gu, X., Angelov, P. P. & Principe, J., 09/2018, In : Information Sciences. 460-461, p. 65-82 18 p.

    Research output: Contribution to journalJournal article

  75. Published

    A Method for Deriving Paths Across a Distributed Web of Trust

    Tipper, P. & Edwards, C., 10/2006.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  76. Published

    A Method for Predicting Quality of the Crude Oil Distillation

    Macias, J. J., Angelov, P. & Xiaowei, Z., 8/09/2006, Evolving Fuzzy Systems, 2006 International Symposium on. IEEE, p. 214-220 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  77. Published

    A methodology for the development and verification of access control systems in cloud computing

    Gouglidis, A. & Mavridis, I., 2013, Collaborative, Trusted and Privacy-Aware e/m-Services. Douligeris, C., Polemi, N., Karantjias, A. & Lamersdorf, W. (eds.). Berlin: Springer Verlag, p. 88-99 12 p. (IFIP Advances in Information and Communication Technology ; vol. 399).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  78. Published

    A Minimum Distance guided Genetic Algorithm for Multi-User Detection in a Multi-Carrier CDMA Wireless Broadband System

    Ni, Q., Jehanzeb, J., Zhang, Y. & Guan, S-U., 2008, Broadband Communications, Networks and Systems, 2008. BROADNETS 2008. 5th International Conference on. New York: IEEE, p. 500-505 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  79. Published

    A mobile healthcare system using IMS and the HL7 framework

    Nikolidakis, S., Giotsas, V., Vergados, D. & Douligeris, C., 2009, ANCS '09 Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems. New York: ACM Press, p. 187-188 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  80. Published

    A multi variable optimization approach for the design of integrated dependable real-time embedded systems

    Islam, S. & Suri, N., 2007, Embedded and Ubiquitous Computing: International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007. Proceedings. Springer, Vol. 4808 LNCS. p. 517-530 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  81. Published

    A Multi-commodity network flow model for cloud service environments

    Stephanakis, I. M., Shirazi, S. N. U. H., Gouglidis, A. & Hutchison, D., 2016, Engineering Applications of Neural Networks: 17th International Conference, EANN 2016, Aberdeen, UK, September 2-5, 2016, Proceedings. Jayne, C. & Iliadis, L. (eds.). Cham: Springer, p. 186-197 12 p. (Communications in Computer and Information Science; vol. 629).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  82. Published

    A multi-disciplinary perspective on emergent and future innovations in peer review

    Tennant, J. P., Dugan, J. M., Graziotin, D., Jacques, D. C., Waldner, F., Mietchen, D., Elkhatib, Y., B. Collister, L., Pikas, C. K., Crick, T., Masuzzo, P., Caravaggi, A., Berg, D. R., Niemeyer, K. E., Ross-Hellauer, T., Mannheimer, S., Rigling, L., Katz, D. S., Greshake Tzovaras, B., Pacheco-Mendoza, J. & 13 others, Fatima, N., Poblet, M., Isaakidis, M., Irawan, D. E., Renaut, S., Madan, C. R., Matthias, L., Nørgaard Kjær, J., O'Donnell, D. P., Neylon, C., Kearns, S., Selvaraju, M. & Colomb, J., 20/07/2017, In : F1000Research. 6, 53 p., 1151.

    Research output: Contribution to journalJournal article

  83. Published

    A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes

    Fagoonee, L. & Honary, B., 12/2003, Cryptography and coding : 9th IMA International Conference on Cryptography and Coding. Paterson, K. G. (ed.). Berlin: Springer-Verlag, p. 24-34 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  84. Published

    A multi-layer and multi-tenant cloud assurance evaluation methodology

    Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E. R., 12/2014, Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE, p. 386-393 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  85. Published

    A Multi-Level Approach to Resilience of Critical Infrastructures and Services

    Gouglidis, A., Shirazi, S. N. U. H., Simpson, S., Smith, P. & Hutchison, D., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  86. Published

    A multilevel approach towards challenge detection in cloud computing

    Shirazi, S. N. U. H., Watson, M., Marnerides, A., Mauthe, A. & Hutchison, D., 07/2013, Cyberpatterns 2013 : Proceedings of the Second International Workshop on Cyberpatterns . Oxford: Oxford Brookes University, p. 103-107 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  87. Published

    A multi-level resilience framework for unified networked environments

    Marnerides, A., Bhandari, A., Murthy, H. & Mauthe, A. U., 05/2015, Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on. IEEE, p. 1369-1372 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  88. Published

    A nested hierarchy of dynamically evolving clouds for big data structuring and searching

    Angelov, P. & Sadeghi Tehran, P., 8/08/2015, In : Procedia Computer Science. 53, p. 1-8 8 p.

    Research output: Contribution to journalJournal article

  89. Published

    A new family of rank codes and applications to cryptography

    Gabidulin, E. M., Ourivski, A. V., Honary, B. & Ammar, B., 07/2002, Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on. Lausanne, Switzerland : IEEE, p. 268 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  90. Published

    A new link lifetime estimation method for greedy and contention-based routing in mobile ad hoc networks

    Noureddine, H., Ni, Q., Min, G. & Al-raweshidy, H., 03/2014, In : Telecommunication Systems. 55, 3, p. 421-433 13 p.

    Research output: Contribution to journalJournal article

  91. Published

    A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc Networks

    Noureddine, H., Ni, Q., Min, G. & Al-Raweshidy, H., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 2662-2667 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  92. Published

    A New Method for Ultra Wideband Channel Modelling Based on Ray Tracing

    Memari, B. & Honary, B., 11/2006, The IET International Conference on Wireless, Mobile & Multimedia Networks . Hangzhou, China: IET Press, p. 139-142 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  93. Published

    A new online clustering approach for data in arbitrary shaped clusters

    Hyde, R. & Angelov, P., 24/06/2015, Cybernetics (CYBCONF), 2015 IEEE 2nd International Conference on . IEEE, p. 228-233 6 p. 78

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  94. Published

    A new partial transmit sequence scheme using genetic algorithm for peak-to-average power ratio reduction in a multi-carrier code division multiple access wireless system

    Zhang, Y., Ni, Q. & Chen, H. H., 2009, In : International Journal of Autonomous and Adaptive Communications Systems. 2, 1, p. 40-57 18 p.

    Research output: Contribution to journalJournal article

  95. Published

    A new signal set for ring-BCM

    Castineira Moreira, J., Honary, B. & Farrell, P., 07/2001, Proceedings of the 6th International Symposium on Communication Theory and Applications (ISCTA 2001). Lancaster: HW Communications Limited, p. 353–357 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  96. Published

    A new type of distance metric and its use for clustering

    Gu, X., Angelov, P. P., Kangin, D. & Principe, J., 09/2017, In : Evolving Systems. 8, 3, p. 167-177 11 p.

    Research output: Contribution to journalJournal article

  97. Published

    A new type of simplified fuzzy rule-based systems

    Angelov, P. & Yager, R., 01/2012, In : International Journal of General Systems. 41, 2, p. 163-185 23 p.

    Research output: Contribution to journalJournal article

  98. Published

    A new unsupervised approach to fault detection and identification

    Costa, B., Angelov, P. & Guedes, L. A., 07/2014, Neural Networks (IJCNN), 2014 International Joint Conference on. IEEE, p. 1557-1564 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  99. Published

    A Non-linear Signal Processing Model for Signal Generation in Multilevel Two Dimensional Optical Storage

    Fagoonee, L., Coene, W. M. J., Moinian, A. & Honary, B., 02/2004, In : Optics Letters. 29, 4, p. 385-387 3 p.

    Research output: Contribution to journalJournal article

  100. Published

    A novel 3D analytical scattering model for air-to-ground fading channels

    Gulfam, S. M., Nawaz, S. J., Ahmed, A., Patwary, M. N. & Ni, Q., 4/08/2016, In : Applied Sciences. 6, 8, 21 p., 207.

    Research output: Contribution to journalJournal article

Previous 1 2 3 4 5 6 7 8 ...20 Next

Back to top