Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Chapter (peer-reviewed)
  2. Published

    Human and Organizational Issues for Resilient Communications

    Anderson, T., Busby, J., Gouglidis, A., Hough, K., Hutchison, D. & Rouncefield, M., 2020, Guide to Disaster-Resilient Communication Networks. Rak, J. & Hutchison, D. (eds.). Cham: Springer, p. 791-807 17 p. (Computer Communications and Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  3. Published

    Increasing Light Absorption and Collection Using Engineered Structures

    Noori, Y., Woodhead, C. S. & Young, R. J., 4/04/2018, Two-dimensional Materials for Photodetector. Nayak, P. K. (ed.). InTech, p. 193-212 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  4. Published

    Verbal lie detection

    Vrij, A., Taylor, P. J. & Picornell, I., 13/11/2015, Communication in investigative and legal contexts: integrated approaches from forensic psychology, linguistics and law enforcement. Oxburgh, G., Myklebust, T., Grant, T. & Milne, R. (eds.). Wiley, (Psychology of Crime, Policing and Law).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  5. Published

    Trust-based approaches to safety and production

    Conchie, S. M., Woodcock, H. E. & Taylor, P. J., 6/11/2015, The Wiley Blackwell handbook of the psychology of occupational safety and workplace health. Clarke, S., Probst, T., Guldenmund, F. & Passmore, J. (eds.). Chichester: Wiley-Blackwell, p. 111-132 22 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  6. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  7. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  8. Published

    The role of language in conflict and conflict resolution

    Taylor, P. J., 2014, The Oxford handbook of language and social psychology. Holtgraves, T. (ed.). Oxford: Oxford University Press, p. 459-470 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  9. Published

    Cross-cultural deception detection

    Taylor, P., Larner, S., Conchie, S. & Van der Zee, S., 2014, Deception detection: current challenges and cognitive approaches. Granhag, P. A., Vrij, A. & Verschuere, B. (eds.). Chichester: Wiley Blackwell, p. 175-202 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  10. Published

    Antimonide quantum dot nanostructures for novel photonic device applications

    Krier, A., Carrington, P., Zhuang, Q., Young, R., Hayne, M., Lu, Q., James Asirvatham, J., Wagener, M., Botha, J. R., Koenraad, P. M. & Smakman, E. P., 5/11/2013, The wonder of nanotechnology: quantum optoelectronic devices and applications . SPIE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  11. Published

    Crisis negotiation: from suicide to terrorism intervention

    Wells, S., Taylor, P. & Giebels, E., 2013, Handbook of research in negotiation. Olekalns, M. & Adair, W. (eds.). London: Edward Elgar, p. 473-498 26 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  12. Published

    Technological solutions to offending

    Rashid, A., Greenwood, P., Walkerdine, J., Baron, A. & Rayson, P., 03/2012, Understanding and preventing online sexual exploitation of children. Quayle, E. & Ribisl, K. (eds.). London: Willan, p. 228-243

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  13. Published

    Tuning into the right wavelength: The importance of culture for effective crisis negotiation

    Giebels, E. & Taylor, P., 2012, The psychology of crisis intervention for law enforcement officers. St-Yves, M. & Collins, P. (eds.). Toronto: Carswell, p. 277-294 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  14. Published

    Autonomous Machine Learning (ALMA): generating rules from data streams

    Angelov, P., 19/09/2011, Proceedings of the Special International Conference on Complex Systems, COSY-2011: 16-19 September 2011. Ohrid, FYR of Macedonia, p. 249-256 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  15. Published

    Single-photon and entangled-photon sources for quantum information

    Ritchie, D. A., Stevenson, M., Young, R., Hudson, A., Salter, C., Ellis, D., Bennett, A., Atkinson, P., Cooper, K., Farrer, I., Nicoll, C. A. & Shields, A. J., 2010, 2010 Conference on Optoelectronic and Microelectronic Materials and Devices. IEEE, p. 229-230 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  16. Published

    Interaction patterns of social influence in crisis negotiation

    Giebels, E. & Taylor, P., 2010, Contemporary theory, research, and practice of crisis and hostage negotiation. Rogan, R. & Lanceley, F. (eds.). Cresskill, NJ: Hampton Press, p. 59-76 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  17. Published

    Être sur la même longueur d'onde : la communication interculturelle en contexte de négociation de crise

    Giebels, E. & Taylor, P., 2010, Psychologie de l'intervention policière en situation de crise. St-Yves, M. & Collins, P. (eds.). Editions Yvon Blais

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  18. Published

    Supporting atomic user actions on the table

    Aliakseyeu, D., Subramanian, S. & Alexander, J., 2010, Tabletops - Horizontal Interactive Displays. London: Springer Verlag London Ltd, 25 p. (Human-Computer Interaction Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  19. Published

    Entangled photon generation by quantum dots

    Shields, A. J., Stevenson, R. M. & Young, R., 1/01/2009, Single Semiconductor Quantum Dots. Michler, P. (ed.). Berlin: Springer, p. 227-266 40 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  20. Published

    Investigative sense-making in criminal contexts

    Ormerod, T. C., Barrett, E. & Taylor, P. J., 07/2008, Naturalistic decision making and macrocognition. Shraagen, J. M., Militello, L., Ormerod, T. C. & Lipshitz, R. (eds.). London: Ashgate

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  21. Published

    Quantum Dots in Planar Cavities

    Young, R., Stevenson, R. M., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 1/01/2008, Advances in Solid State Physics 46. Haug, R. (ed.). Berlin: Springer, p. 55-64 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  22. Published

    Entangled Photon Pair Emission and Interference from Single Quantum Dots

    Stevenson, R. M., Young, R. & Shields, A. J., 2008, Semiconductor Quantum Bits. Henneberger, F. & Benson, O. (eds.). Singapore: Pan Stanford, p. 369-388 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  23. Published

    Generating triggered single and entangled photons with a semiconductor source

    Young, R., Stevenson, R. M., Hudson, A., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 1/01/2007, Quantum Communication and Security. Żukowski, M., Kilin, S. & Kowalik, J. (eds.). IOS Press, p. 146-154 9 p. (NATO Science for Peace and Security Series - D: Information and Communication Security Volume 11; vol. 11).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  24. Published

    Investigative psychology

    Donald, I. J. & Taylor, P., 2007, Encyclopedia of law and society: American and global perspectives. Clark, D. S. (ed.). London: Sage

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  25. Published

    Quantum dots for single photon and photon pair technology

    Stevenson, R. M., Young, R., Thompson, R. M., Yuan, Z., Kardynal, B. E., Farrer, I., Ward, M. B., Ritchie, D. A. & Shields, A. J., 2006, Quantum Computing in Solid State Systems. Ruggiero, B., Delsing, P., Granata, C., Pashkin, Y. & Silvestrini, P. (eds.). New York: Springer, p. 288-297 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  26. Published

    Hostage negotiation opens up

    Taylor, P. & Donohue, W. A., 2006, The negotiator's fieldbook: the desk reference for the experienced negotiator. Schneider, A. & Honeymoon, C. (eds.). Chicago: American Bar Association, p. 667-674 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  27. Published

    IPv6 Transitioning Management Laying the Foundation for Managed IPv4/IPv6 Interoperation

    Mackay, M. & Edwards, C., 7/06/2004, TERENA networking conference 2004 .

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  28. Published

    Problems of classification in investigative psychology

    Taylor, P., Bennell, C. & Snook, B., 2002, Classification, clustering, and data analysis: Recent advances and applications. Jajuga, K., Sokolowski, A. & Bock, H-H. (eds.). Heidelberg: Springer Verlag, p. 479-487 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  29. Chapter
  30. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  31. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  32. Published

    Big Data and Natural Language Processing for Analysing Railway Safety

    Syeda, K. N., Shirazi, S. N. U. H., Naqvi, S. A. A., Parkinson, H. J. & Bamford, G., 11/2017, Innovative Applications of Big Data in the Railway Industry. Kohli, D. S., Kumar, D. A. V. S., Easton, D. J. M. & Roberts, P. C. (eds.). IGI Global Publishing, p. 240-267 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  33. Published

    Lessons from the extreme: what business negotiators can learn from hostage negotiations

    Taylor, P. J. & Donohue, W. A., 15/03/2017, The negotiator's desk reference. Honeymoon, C. & Schneider, A. (eds.). DRI Press, ( Negotiator's Desk Reference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  34. Published

    Prediction of the attention area in ambient intelligence tasks

    Shafi, J., Angelov, P. P. & Umair, M., 3/02/2016, Innovative issues in intelligent systems. Sgurev, V., Yager, R., Kacprzyk, J. & Jotsov, V. (eds.). Berlin: Springer, p. 33-56 24 p. (Studies in Computational Intelligence; vol. 623).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  35. Published

    ARTOD: Autonomous Real Time Objects Detection by a moving camera using recursive density estimation

    Sadeghi Tehran, P. & Angelov, P., 28/01/2016, Novel applications of intelligent systems. Hadjiski, M., Kasabov, N., Filev, D. & Jotsov, V. (eds.). Cham: Springer Verlag, p. 123-138 16 p. (Studies in Computational Intelligence; vol. 586).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  36. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  37. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  38. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  39. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  40. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  41. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  42. Published

    Attack pattern recognition through correlating cyber situational awareness in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 1/03/2014, Cyberpatterns: unifying design patterns with security and attack patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 125-134 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  43. Published

    Crossing boundaries: using GIS in literary studies, history and beyond

    Gregory, I. N., Baron, A., Cooper, D., Hardie, A., Murrieta-Flores, P. & Rayson, P. E., 2014, Keys for architectural history research in the digital era. Hueber, J. & Mendes da Silva, A. (eds.). Institut national d'histoire de l'art, (Actes de colloques).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  44. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2014, SMS communication: a linguistic approach. Cougnon, L-A. & Fairon, C. (eds.). John Benjamins Publishing Company, p. 217-237 21 p. (Benjamins Current Topics; vol. 61).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  45. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  46. Published

    Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  47. Published

    Quality Evaluation in Peer-to-Peer IPTV Services

    Mu, M., Knowles, W., Georgopoulos, P., Simpson, S., Cerqueira, E., Race, N., Mauthe, A. & Hutchison, D., 2013, Data Traffic Monitoring and Analysis: From Measurement, Classification and Anomaly Detection to Quality of Experience. Biersack, E., Callegari, C. & Matijasevic, M. (eds.). Berlin: Springer, p. 302-319 18 p. (Lecture Notes in Computer Science; vol. 7754).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  48. Published

    Attacks and Vulnerabilities of Trust and Reputation Models

    Such, J. M., 2013, Agreement Technologies. Ossowski, S. (ed.). Dordrecht: Springer Verlag, p. 467-477 11 p. (Law, Governance and Technology Series; vol. 8).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  49. Published

    Security issues in cloud federations

    Rak, M., Ghani, H., Ficco, M., Suri, N., Luna, J., Panica, S. & Petcu, D., 2012, Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. IGI Global, p. 176-194 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  50. Published

    Compressive sensing for wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 2012, Intelligent Sensor Networks: The Integration of Sensor Networks, Signal Processing and Machine Learning. CRC Press, p. 379-396 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  51. Published

    Monitoring and evaluation of semantic rooms

    Gönczy, L., Csertán, G., Urbanics, G., Ghani, H., Khelil, A. & Suri, N., 2012, Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware. Springer Berlin / Heidelberg, p. 99-116 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  52. Published

    Brief announcement: MP-state: State-aware software model checking of message-passing systems

    Muftuoglu, C. A., Bokor, P. & Suri, N., 2012, Stabilization, Safety, and Security of Distributed Systems: 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings. Vol. 7596 LNCS. p. 183-186 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Previous 1 2 3 4 5 6 7 8 ...39 Next

Back to top