Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2020
  2. Published

    Resource Cube: Multi-Virtual Resource Management for Integrated Satellite-Terrestrial Industrial IoT Networks

    Chen, D., Yang, C., Gong, P., Chang, L., Shao, J., Ni, Q., Anpalagan, A. & Guizani, M., 22/10/2020, In : IEEE Transactions on Vehicular Technology. 69, 10, p. 11963-11974 12 p.

    Research output: Contribution to journalJournal article

  3. Published

    Transformers: Intrusion Detection Data In Disguise

    Boorman, J., Prince, D. & Green, B., 18/09/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  4. Published

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 12/08/2020, USENIX Security '20 Proceedings. USENIX Association, p. 289-305 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  5. Published

    Energy Efficient Uplink Transmissions in LoRa Networks

    Su, B., Qin, Z. & Ni, Q., 1/08/2020, In : IEEE Transactions on Communications. 68, 8, p. 4960-4972 13 p.

    Research output: Contribution to journalJournal article

  6. Forthcoming

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 18/05/2020, (Accepted/In press) The 17th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2020). Springer

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  7. Published

    Honeypots for Automatic Network-Level Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 27/04/2020. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  8. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, In : Journal of Cybersecurity. 30 p.

    Research output: Contribution to journalJournal article

  9. Published

    SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage

    Xiong, S., Ni, Q., Wang, L. & Wang, Q., 14/04/2020, In : IEEE Internet of Things Journal. 7, 4, p. 2914-2927 14 p.

    Research output: Contribution to journalJournal article

  10. Published

    UAV-Assisted Wireless Powered Cooperative Mobile Edge Computing: Joint Offloading, CPU Control, and Trajectory Optimization

    Liu, Y., Xiong, K., Ni, Q., Fan, P. & Letaief, K. B., 14/04/2020, In : IEEE Internet of Things Journal. 7, 4, p. 2777-2790 14 p.

    Research output: Contribution to journalJournal article

  11. Published

    HoneyPlant: A Distributed Hybrid Honeypot System for ICS Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 17/03/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

Previous 1 2 3 4 5 6 7 8 ...194 Next

Back to top