Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Book
  2. Published

    Signal processing for telecommunications and multimedia

    Wysocki, T. A. (ed.), Honary, B. (ed.) & Wysocki, B. J. (ed.), 09/2004, New York: Springer. 285 p. (Multimedia Systems and Applications Series; vol. 27)

    Research output: Book/Report/ProceedingsBook

  3. Published

    Management of Multimedia Networks and Services 7th IFIP/IEEE International Conference, MMNS 2004, San Diego, CA, USA, October 3-6, 2004. Proceedings

    Vicente, J. (ed.) & Hutchison, D. (ed.), 2004, Berlin: Springer Verlag. (Lecture Notes in Computer Science; vol. 3271)

    Research output: Book/Report/ProceedingsBook

  4. Published

    Hacker Contest: Sicherheitsprobleme, Lösungen, Beispiele

    Schumacher, M., Roedig, U. & Moschgath, M. L., 2003, Springer Verlag. 320 p. (Xpert.press)

    Research output: Book/Report/ProceedingsBook

  5. Published

    Advanced signal processing for communication systems

    Wysocki, T. A. (ed.), Darnell, M. (ed.) & Honary, B. (ed.), 10/2002, Kluwer Academic Publishers. (The International Series in Engineering and Computer Science; vol. 703)

    Research output: Book/Report/ProceedingsBook

  6. Published

    Intelligent adaptive systems

    Hadjiski, M., Angelov, P., Hadjiski, M. (ed.) & Angelov, P. (ed.), 09/2002, Varna, Bulgaria: IEEE Press. 66 p.

    Research output: Book/Report/ProceedingsBook

  7. Published

    Evolving Rule-based Models: A Tool for Design of Flexible Adaptive Systems

    Angelov, P., 1/02/2002, Heidelberg, Germany: Springer Verlag. 213 p. (Studies in Fuzziness and Soft Computing)

    Research output: Book/Report/ProceedingsBook

  8. Published

    Proceedings of the 8th international workshop on interactive distributed multimedia systems (IDMS 2001)

    Shepherd, W. (ed.), Finney, J. (ed.), Mathy, L. (ed.) & Race, N. J. P. (ed.), 01/2001, Springer. (Lecture Notes in Computer Science; vol. 2158)

    Research output: Book/Report/ProceedingsBook

  9. Published

    Cryptography and coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings

    Honary, B. (ed.), 2001, Berlin: Springer Verlag. 416 p. (Lecture Notes in Computer Science; vol. 2260)

    Research output: Book/Report/ProceedingsBook

  10. Commissioned report
  11. Published

    Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

  12. Published

    Developer Essentials: Top Five Interventions to Support Secure Software Development

    Weir, C., Rashid, A. & Noble, J., 30/03/2017, Lancaster: Lancaster University. 9 p.

    Research output: Book/Report/ProceedingsCommissioned report

  13. Published

    The North West cyber security industry: export potential assessment

    Prince, D. D. C. & Fitton, O. J., 27/01/2016, Lancaster: Lancaster University. 60 p.

    Research output: Book/Report/ProceedingsCommissioned report

  14. Published

    Analysis and recommendations for standardisation in penetration testing and vulnerability assessment: penetration testing market survey

    Knowles, W., Baron, A. & McGarr, T., 26/05/2015, London: BSI. 20 p.

    Research output: Book/Report/ProceedingsCommissioned report

  15. Published

    Risk leadership and organisational type

    Busby, J. & Collins, A., 2009, HSE. 58 p.

    Research output: Book/Report/ProceedingsCommissioned report

  16. Other report
  17. Published

    The future of maritime cyber security

    Fitton, O., Prince, D., Germond, B. & Lacy, M., 23/01/2015, Lancaster: Lancaster University. 36 p.

    Research output: Book/Report/ProceedingsOther report

  18. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  19. Published

    Cyber security controls effectiveness: a qualitative assessment of cyber essentials

    Such, J. M., Vidler, J., Seabrook, T. & Rashid, A., 2015, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  20. Published

    The future of mobile devices: security and mobility

    Fitton, O. & Prince, D., 17/11/2014, Lancaster: Lancaster University. 34 p.

    Research output: Book/Report/ProceedingsOther report

  21. Published

    Cyber policing in the North West: regional and local co-ordination

    Prince, D. D. C., 4/09/2014, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  22. Published

    Detecting and Preventing Data Exfiltration

    Rashid, A., Ramdhany, R., Edwards, M., Kibirige Mukisa, S., Ali Babar, M., Hutchison, D. & Chitchyan, R., 04/2014, Lancaster: Lancaster University. 40 p.

    Research output: Book/Report/ProceedingsOther report

  23. Published

    Understanding cyber criminals and measuring their future activity

    Hargreaves, C. & Prince, D., 1/07/2013, Lancaster: Lancaster University. (Future of ...)

    Research output: Book/Report/ProceedingsOther report

  24. Published

    The future of digital disrupters: rethinking the digital divide

    Lacy, M. & Prince, D., 12/06/2013, Lancaster: Lancaster University. 46 p. (Future of...)

    Research output: Book/Report/ProceedingsOther report

  25. Published

    Small business cyber security workshop 2013: towards digitally secure business growth

    Prince, D. & King, N., 29/04/2013, Lancaster: Lancaster University. 22 p.

    Research output: Book/Report/ProceedingsOther report

  26. Published

    Small Business Cyber Security Survey 2012

    Prince, D. & King, N., 10/2012, Lancaster: Lancaster University. 38 p.

    Research output: Book/Report/ProceedingsOther report

  27. Monograph
  28. Published

    Autonomous Learning Systems: From Data to Knowledge in Real Time

    Angelov, P., 1/12/2012, Chichester: John Willey and Sons. 288 p.

    Research output: Book/Report/ProceedingsMonograph

  29. Proceedings
  30. Published

    Proceedings of the 4th European Workshop on Usable Security

    Ur, B. (ed.) & Weir, C. (ed.), 1/09/2019, IEEE.

    Research output: Book/Report/ProceedingsProceedings

  31. Published

    Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Livraga, G. (ed.), Torra, V. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2016, Springer.

    Research output: Book/Report/ProceedingsProceedings

  32. Published

    Program and abstracts of 2015 IEEE International Conference on Evolving and Adaptive Intelligent Systems (EAIS)

    Sayed-Mouchaweh, M. (ed.), Fleury, A. (ed.), Angelov, P. P. (ed.), Lughofer, E. (ed.) & Iglesias, J. A. (ed.), 3/12/2015, IEEE. 26 p.

    Research output: Book/Report/ProceedingsProceedings

  33. Published

    Intelligent Systems' 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland

    Angelov, P. (ed.), T. Atanassov, K. (ed.), Doukovska, L. (ed.), Hadjiski, M. (ed.), Jotsov, V. (ed.), Kacprzyk, J. (ed.), Kasabov, N. (ed.), Sotirov, S. (ed.), Szmidt, E. (ed.) & Zadrozny, S. (ed.), 2015, Springer. 863 p. (Advances in Intelligent Systems and Computing; vol. 322)

    Research output: Book/Report/ProceedingsProceedings

  34. Published

    Proceedings of the 2014 IEEE Conference on Evolving and Adaptive Intelligent Systems

    Angelov, P. (ed.), Filev, D. (ed.), Kasabov, N. (ed.), Lughofer, E. (ed.), Klement, E. P. (ed.) & Saminger-Platz, S. (ed.), 06/2014, Piscataway, N.J.: IEEE. 150 p.

    Research output: Book/Report/ProceedingsProceedings

  35. Published

    Proceedings of the IEEE Conference on Cybernetics 2013

    Angelov, P. (ed.), Filev, D. (ed.), MIllan, J. D. R. (ed.) & Abraham, A. (ed.), 07/2013, IEEE.

    Research output: Book/Report/ProceedingsProceedings

  36. Published

    Proceedings of the 2013 IEEE Conference on Evolving and Adaptive Intelligent Systems

    Angelov, P. (ed.), Kasabov, N. (ed.) & Filev, D. (ed.), 04/2013, IEEE. 120 p.

    Research output: Book/Report/ProceedingsProceedings

  37. Published

    Proceedings of the 2013 International Joint Conference on Neural Networks

    Angelov, P. (ed.), Levine, D. (ed.) & Erdi, P. (ed.), 2013, Piscataway, N.J.: IEEE. 3000 p.

    Research output: Book/Report/ProceedingsProceedings

  38. Published

    2012 IEEE Conference on Evolving and Adaptive Intelligent Systems, EAIS-2012

    Angelov, P. (ed.), Filev, D. (ed.), Kasabov, N. (ed.) & Iglesias, J. A. (ed.), 2012, IEEE. 107 p.

    Research output: Book/Report/ProceedingsProceedings

  39. Published
  40. Published

    Service Availability: Second International Service Availability Symposium, ISAS 2005, Berlin, Germany, April 25-26, 2005, Revised Selected Papers

    Malek, M. (ed.), Nett, E. (ed.) & Suri, N. (ed.), 2005, Springer.

    Research output: Book/Report/ProceedingsProceedings

  41. Conference article
  42. Published

    Time-resolved studies of single quantum dots in magnetic fields

    Stevenson, R. M., Young, R. J., See, P., Faffer, I., Ritchie, D. A. & Shields, A. J., 1/03/2004, In : Physica E: Low-dimensional Systems and Nanostructures. 21, 2-4, p. 381-384 4 p.

    Research output: Contribution to journalConference articlepeer-review

Previous 1...16 17 18 19 20 Next

Back to top