Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In : Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to journalJournal article

  2. Published

    A Novel Game-Theoretic Cross-Layer Design for OFDMA Broadband Wireless Networks

    Zarakovitis, C. C., Ni, Q., Nikolaros, I. & Tyce, O., 2010, Communications (ICC), 2010 IEEE International Conference on. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  3. Published

    A novel power-efficient middleware scheme for sensor grid applications

    Miridakis, N. I., Giotsas, V., Vergados, D. D. & Douligeris, C., 2009, Quality of Service in Heterogeneous Networks: 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and 3rd International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, AAA-IDEA 2009, Las Palmas, Gran Canaria, November 23-25, 2009 Proceedings. Bartolini, N., Nikoletseas, S., Cardellini, V. & Mahanti, A. (eds.). Berlin: Springer, p. 476-492 17 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 22).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. Published

    A Novel Simplified Implementation of LDPC Decoding Using Neural Networks

    Momahed Heravi, B. & Honary, B., 09/2006, The Second International Symposium on Broadband Communication (ISBC’06). Lancaster: HW Communications

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  5. Published

    A partial order scalogram analysis of communication behavior in crisis negotiation with the prediction of outcome.

    Taylor, P. J., 2002, In : International Journal of Conflict Management. 13, 1, p. 4-37 34 p.

    Research output: Contribution to journalJournal article

  6. Published

    A Passive Approach to Autonomous Collision Detection and Avoidance in Uninhabited Aerial Systems.

    Angelov, P., Bocaniala, C. D., Xydeas, C., Pattchett, C., Ansell, D., Everett, M. & Leng, G., 04/2008, Tenth International Conference on Computer Modeling and Simulation, 2008. UKSIM 2008. . IEEE, p. 64-69 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  7. Published

    A Peer-to-Peer Content Distribution Network

    Mauthe, A., Heckmann, O., Liebau, N., Darlagiannis, V. & Bock, A., 01/2005, Lecture Notes in Computer Science: From Integrated Publication and Information Systems to Information and Knowledge Environments.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. Published

    A performance comparative study on the implementation methods for OFDMA cross-layer optimization

    C. Zarakovitis, C. & Ni, Q., 06/2012, In : Future Generation Computer Systems. 28, 6, p. 923-929 7 p.

    Research output: Contribution to journalJournal article

  9. Published

    A performance evaluation of three multiagent platforms

    Alberola, J. M., Such, J. M., Garcia-Fornes, A., Espinosa, A. & Botti, V., 08/2010, In : Artificial Intelligence Review. 34, 2, p. 145-176 32 p.

    Research output: Contribution to journalJournal article

  10. Published

    A performance study of RSVP with proposed extensions

    Mathy, L., Hutchison, D., Schmid, S. & Simpson, S., 1/12/2002, In : Computer Communications. 25, 18, p. 1782-1798 17 p.

    Research output: Contribution to journalJournal article

  11. Published

    A Photonic Device

    Young, R. J. & Noori, Y., 24/10/2018, Patent No. GB 2561590 (A), 24/10/2018, Priority date 19/04/2017, Priority No. GB1706216.7

    Research output: Patent

  12. Published

    A practical approach of VLC architecture for smart city

    Ayub, S., Honary, M., Kariyawasam Katukolihe Gamage, S. & Honary, B., 11/2013, Antennas and Propagation Conference (LAPC), 2013 Loughborough . IEEE, p. 106-111 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  13. Published

    A practical implementation of self-evolving cloud-based control of a pilot plant

    Costa, B., Skrjanc, I., Blazic, S. & Angelov, P., 2013, 2013 IEEE International Conference on Cybernetics, CYBCONF-2013, Lausanne, Switzerland13-15 June, 2013. Piscataway, N.J.: IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  14. Published

    A practical soft decision feedback turbo equalizer for time varying channels

    Fagoonee, L., Clarke, P. & Honary, B., 07/2003, Proceedings of the Seventh International Symposium on Communications Theory and Applications held on 13-18 July 2003 at St. Martin's College, Ambleside, UK.. Lancaster: HW Communications Limited

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  15. Published

    A Predictive Controler for Object Tracking of a Mobile Robot

    Zhou, X., Angelov, P. & Wang, C., 11/05/2008, p. 73-82. 10 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  16. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In : Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to journalJournal article

  17. Published

    A Preliminary Look into Unsolicited Mobile App Traffic

    Lyko, T. & Elkhatib, Y., 24/04/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  18. Published

    A privacy preserving approach to energy theft detection in smart grids

    Richardson, C., Race, N. & Smith, P., 1/09/2016, 2016 IEEE International Smart Cities Conference (ISC2). IEEE, p. 1-4 4 p. (Smart Cities Conference (ISC2), 2016 IEEE International).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  19. Published

    A programmable SDN+NFV-based architecture for UAV telemetry monitoring

    White, K., Denney, E., Knudson, M. D., Marnerides, A. & Pezaros, D., 20/07/2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, p. 522-527 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  20. Published

    A public ideation of shape-changing applications

    Sturdee, M., Hardy, J., Dunn, N. & Alexander, J., 2015, ITS '15 Proceedings of the 2015 International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 219-228 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  21. Published

    A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In : Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to journalJournal article

  22. Published

    A randomized neural network for data streams

    Pratama, M., Angelov, P. P., Lu, J., Lughofer, E., Seera, M. & Lim, C. P., 19/05/2017, Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN). USA: IEEE, p. 3423-3430 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  23. Published

    A Ray-Tracing Technique for Ultra Wideband Channel Modelling

    Asif, H., Zeng, Y., Memari, B. & Honary, B., 07/2009, IEEE 10th International Symposium on Communication Theory and Applications”, (ISCTA’09). Ambleside, UK, p. 262–265 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  24. Published

    A real-time approach for autonomous detection and tracking of moving objects from UAV

    Sadeghi Tehran, P., Clarke, C. & Angelov, P. P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Piscataway, N. J.: IEEE, p. 43-49 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  25. Published

    A Real-time Approach for Novelty Detection and Trajectories Analysis for Anomaly Recognition in Video Surveillance Systems

    Sadeghi-Tehran, P. & Angelov, P., 2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on . IEEE, p. 108-113 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  26. Published

    A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems

    Birkholz, H., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Arul, T., Heinrich, M., Katzenbeisser, S., Suri, N., Vateva-Gurova, T. & Schlehuber, C., 25/06/2018. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  27. Published

    A Reflective Middleware to Support Peer-to-Peer Overlay Adaptation

    Tyson, G., Grace, P., Mauthe, A., Blair, G. S., Kaune, S. & Content Network of Excellence (FP6-IST-038423) (Funder), 9/06/2009, Distributed Applications and Interoperable Systems : 9th IFIP WG 6.1 International Conference, DAIS 2009, Lisbon, Portugal, June 9-11, 2009. Proceedings. Senivongse, T. & Oliveira, R. (eds.). Berlin: Springer, p. 30-43 14 p. (Lecture Notes in Computer Science; vol. 5523).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  28. Published

    A Reinforcement Learning-based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks

    Ling, M. H., Yau, K. A., Qadir, J. & Ni, Q., 1/03/2019, In : IEEE Transactions on Cognitive Communications and Networking. 5, 1, p. 28 - 43 17 p.

    Research output: Contribution to journalJournal article

  29. Published

    A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways

    Eiza, M. H. & Ni, Q., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1578-1585 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  30. Published

    A retrospective analysis of QoS deployment, operation and use in enterprise and provider networks

    Mackay, M. & Edwards, C., 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Barolli, L., Xhafa, F., Takizawa, M., Enokido, T. & Hsu, H. H. (eds.). New York: IEEE, p. 583-588 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  31. Published

    A retrospective comparative study of three data modelling techniques in anticoagulation therapy.

    McDonald, S., Angelov, P. & Xydeas, C., 28/05/2008, BMEI 2008. International Conference on BioMedical Engineering and Informatics, 2008.. Sanya, China: IEEE, p. 219-225 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  32. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  33. Published

    A route towards practical quantum communication

    Roberts, J., Young, M., Noori, Y., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R., 10/07/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  34. Published

    A same kind of different: affordances, terrorism and the internet

    Taylor, P. J., Holbrook, D. & Joinson, A., 02/2017, In : Criminology and Public Policy. 16, 1, p. 127-133 7 p.

    Research output: Contribution to journalJournal article

  35. Published

    A scalable user fairness model for adaptive video streaming over SDN-assisted future networks

    Mu, M., Broadbent, M., Farshad, A., Hart, N., Hutchison, D., Ni, Q. & Race, N., 1/08/2016, In : IEEE Journal on Selected Areas in Communications. 34, 8, p. 2168-2184 17 p.

    Research output: Contribution to journalJournal article

  36. Published

    A Scenario-Based Review of IPv6 Transition Tools

    Mackay, M., Edwards, C., Dunmore, M., Chown, T. & Carvalho, G., 2003, In : IEEE Internet Computing. 7, 3, p. 27-35 9 p.

    Research output: Contribution to journalJournal article

  37. Published

    A Secure Group-Oriented Framework for Intelligent Virtual Environments

    Such, J. M., Alberola, J. M., Barella, A. & Garcia-Fornes, A., 2011, In : Computing and Informatics. 30, 6, p. 1225-1246 22 p.

    Research output: Contribution to journalJournal article

  38. Unpublished

    A Secure Quorum Based Membership Mechanism for P2P Systems

    Mauthe, A., Liebau, N., Heckmann, O., Kovacevic, A., Tafreschi, O., Fidler, M. & Steinmetz, R., 08/2006, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  39. Published

    A secure ubiquitous healthcare system based on IMS and the HL7 standards

    Nikolidakis, S. A., Georgakakis, E., Giotsas, V., Vergados, D. D. & Douligeris, C., 2010, PETRA '10 Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments. New York: ACM, 42

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  40. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (ed.), Tonetta, S. (ed.) & Schoitsch, E. (ed.), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  41. Published

    A security metrics framework for the Cloud

    Luna, J., Ghani, H., Germanus, D. & Suri, N., 18/07/2011, Proceedings of the International Conference on Security and Cryptography 2011. IEEE, p. 245-250 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  42. Published

    A Selective Delayed Channel Access (SDCA) for the high-throughput IEEE 802.11n

    Skordoulis, D., Ni, Q. & C. Zarakovitis, C., 2009, Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE. New York: IEEE, p. 1173-1178 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  43. Published

    A Self-Learning Fuzzy Classifier with Feature Selection for Intelligent interrogation of mid-IR spectroscopy data from exfoliative cervical cytology using selflearning classifier eClass.

    Kelly, J. G., Angelov, P. P., Walsh, M. J., Pollock, H. M., Pitt, M. A., Martin-Hirsch, P. L. & Martin, F. L., 2008, In : International Journal of Computational Intelligence Research. 4, 4, p. 392-401 10 p.

    Research output: Contribution to journalJournal article

  44. Published

    A Semi-autonomic Framework for Intrusion Tolerance in Heterogeneous Networks

    D'Antonio, S., Romano, S., Simpson, S., Smith, P. & Hutchison, D., 10/2008, Self-Organizing Systems: Third International Workshop, IWSOS 2008, Vienna, Austria, December 10-12, 2008. Proceedings. Hummel, K. A. & Sterbenz, J. P. G. (eds.). Berlin: Springer, p. 230-241 12 p. (Lecture Notes in Computer Science; vol. 5343).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  45. Published

    A semiconductor source of triggered entangled photon pairs

    Stevenson, R. M., Young, R. J., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 12/01/2006, In : Nature. 439, 7073, p. 179-182 4 p.

    Research output: Contribution to journalJournal article

  46. Published

    A Sensor Fusion Method for Smart phone Orientation Estimation

    Ayub, S., Bahraminasab, A. & Honary, B., 06/2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting . Liverpool

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  47. Published

    A simple fuzzy rule-based system through vector membership and kernel-based granulation.

    Angelov, P. & Yager, R., 9/07/2010, 5th IEEE International Conference Intelligent Systems (IS), 2010 . IEEE, p. 349-354 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  48. Published

    A Simple Soft-Input/Soft-Output Decoder for Hamming Codes

    Hirst, S. A. & Honary, B., 2001, Cryptography and Coding : 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 38-43 6 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  49. Published

    A site-controlled quantum dot system offering both high uniformity and spectral purity

    Mereni, L. O., Dimastrodonato, V., Young, R. J. & Pelucchi, E., 1/06/2009, In : Applied Physics Letters. 94, 22, p. - 3 p., 223121.

    Research output: Contribution to journalJournal article

  50. Published

    A Situation Aware Information Infrastructure (SAI^2) Framework

    Marnerides, A., Pezaros, D., Jose, J., Mauthe, A. U. & Hutchison, D., 2017, Smart Objects and Technologies for Social Good Second International Conference, GOODTECHS 2016, Venice, Italy, November 30 – December 1, 2016, Proceedings. Gaggi, O., Manzoni, P., Palazzi, C., Bujari, A. & Marquez-Barja, J. (eds.). Cham: Springer, p. 186-194 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 195).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  51. Published

    A situational analysis of how barriers to systemic failure are undermined during accident sequences

    Busby, J. S., Chung, P. W. H. & Wen, Q., 2004, In : Journal of Risk Research. 7, 7/8, p. 811-826 16 p.

    Research output: Contribution to journalJournal article

  52. Published

    A Smart approach for GPT cryptosystem based on rank codes

    Rashwan, H., Gabidulin, E. M. & Honary, B., 2010, Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on. IEEE, p. 2463-2467 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  53. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In : Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to journalJournal article

  54. Published

    A Stitch in Time: Supporting Android Developers in Writing Secure Code

    Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C. A. F. & Fahl, S., 30/10/2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1065-1077 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  55. Published

    A study of LBS accuracy in the UK and a novel approach to inferring the positioning technology employed.

    Mohr, M., Edwards, C. & McCarthy, B., 18/04/2008, In : Computer Communications. 31, 6, p. 1148 - 1159

    Research output: Contribution to journalJournal article

  56. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In : International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to journalJournal article

  57. Published

    A survey of key management for secure group communications.

    Rafaeli, S. & Hutchison, D., 1/09/2003, In : ACM Computing Surveys. 35, 3, p. 309-329 21 p.

    Research output: Contribution to journalJournal article

  58. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In : Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to journalJournal article

  59. Published

    A survey of mobility in information-centric networks

    Tyson, G., Sastry, N., Cuevas, R., Rimac, I. & Mauthe, A., 1/12/2013, In : Communications of the ACM. 56, 12, p. 90-98 9 p.

    Research output: Contribution to journalJournal article

  60. Published

    A survey of mobility in information-centric networks: challenges and research directions

    Tyson, G., Sastry, N., Rimac, I., Cuevas, R. & Mauthe, A., 2012, NoM '12: Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications. New York: ACM, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  61. Published

    A survey of pervasive displays for information presentation

    Clinch, S. E., Alexander, J. M. & Gehring, S., 07/2016, In : IEEE Pervasive Computing. 15, 3, p. 14-22 9 p.

    Research output: Contribution to journalJournal article

  62. Published

    A survey of privacy in multi-agent systems

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 06/2014, In : Knowledge Engineering Review. 29, 3, p. 314-344 31 p.

    Research output: Contribution to journalJournal article

  63. Published

    A survey of QoS enhancements for IEEE 802.11 wireless LAN

    Ni, Q., Romdhani, L. & Turletti, T., 2004, In : Wireless Communications and Mobile Computing. 4, 5, p. 547-566 20 p.

    Research output: Contribution to journalJournal article

  64. Published

    A survey of rural Wireless Mesh Network (WMN) deployments

    Ajayi, A. O., Roedig, U., Edwards, C. & Race, N., 28/08/2014, Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, p. 119-125 7 p. 14664869

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  65. Published

    A Survey-based Study of Grid Traffic

    El khatib, Y., Edwards, C. & EC-GIN (Funder), 17/10/2007.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  66. Published

    A Symmetric Key Generation and Pre-Distribution Scheme for WSN Using MRD Codes

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 06/2011, 12th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting . Liverpool, UK: Liverpool John Moores University, p. 135-140 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  67. Published

    A time-sensitive historical thesaurus-based semantic tagger for deep semantic annotation

    Piao, S. S., Dallachy, F., Baron, A., Demmen, J. E., Wattam, S., Durkin, P., McCracken, J., Rayson, P. E. & Alexander, M., 11/2017, In : Computer Speech and Language. 46, p. 113-135 23 p.

    Research output: Contribution to journalJournal article

  68. Published

    A trace-driven analysis of caching in content-centric networks

    Tyson, G., Kaune, S., Miles, S., El-khatib, Y., Mauthe, A. & Taweel, A., 07/2012, Computer Communications and Networks (ICCCN), 2012 21st International Conference on . IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  69. E-pub ahead of print

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 2018, p. 1-34, 34 p.

    Research output: Working paper

  70. Published

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 25/02/2019. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  71. Published

    A tunable add-on diagnostic protocol for time-triggered systems

    Serafini, M., Suri, N., Vinter, J., Ademaj, A., Brandstätter, W., Tagliabò, F. & Koch, J., 25/06/2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07). IEEE, p. 164-173 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  72. Published

    A use-based approach for enhancing UCON

    Grompanopoulos, C., Gouglidis, A. & Mavridis, I., 1/12/2013, Security and Trust Management. Jøsang, A., Samarati, P. & Petrocchi, M. (eds.). Berlin: Springer Verlag, p. 81-96 16 p. (Lecture Notes in Computer Science ; vol. 7783 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  73. Published

    A Utility-based QoS Model for Emerging Multimedia Applications

    Mu, M., Mauthe, A. & Garcia, F., 2009, The Second International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Xplore, p. 521-528 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  74. Published

    Abortable fork-linearizable storage

    Majuntke, M., Dobre, D., Serafini, M. & Suri, N., 2009, Principles of Distributed Systems: 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. Springer, Vol. 5923 LNCS. p. 255-269 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  75. Published

    Accounting in Peer-to-Peer Systems

    Mauthe, A., Liebau, N., Darlagiannis, V. & Heckmann, O., 01/2005, EPRINTS-BOOK-TITLE.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  76. Published

    Achieving ICS resilience and security through granular data flow management

    Green, B., Krotofil, M. & Hutchison, D., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 93-101 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  77. Published

    Acoustic-channel attack and defence methods for personal voice assistants

    Cheng, P., 2020, Lancaster University. 232 p.

    Research output: ThesisDoctoral Thesis

  78. Published

    Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  79. Published

    ActuEating: Designing, Studying and Exploring Actuating Decorative Artefacts

    Nabil, S., Everitt, A., Sturdee, M. A., Alexander, J. M., Bowen, S., Wright, P. & Kirk, D., 8/06/2018, DIS '18 Proceedings of the 2018 Designing Interactive Systems Conference. New York: ACM, p. 327-339 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  80. Published

    Adaptation for the masses: towards decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A-M., Maddock, C., Mauthe, A. & Taïani, F., 10/2014, ARM '14 Proceedings of 13th Workshop on Adaptive and Reflective Middleware. New York: ACM, 6 p. 4

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  81. Published

    Adaptive BCH Encoder/Decoder for DVB-S2 Applications Design and Implementation

    Wells, A. & Honary, B., 07/2007, 9th International Symposium on Communication Theory and Applications. Lancaster: HW Communications

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  82. Published

    Adaptive bitrate selection: a survey

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 11/2017, In : Communications Surveys and Tutorials, IEEE Communications Society. 19, 4, p. 2985-3014 30 p.

    Research output: Contribution to journalJournal article

  83. Published

    Adaptive Coded Modulation for Time Varying Channels

    Clarke, P., Honary, B. & Shavgulidze, S., 07/2003, Proceedings of the Seventh International Symposium on Communications Theory and Applications held on 13-18 July 2003 at St. Martin's College, Ambleside, UK.. Lancaster: HW Communications Limited

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  84. Published

    Adaptive conflict resolution mechanism for multi-party privacy management in social media

    Such, J. M. & Criado, N., 2014, WPES '14 Proceedings of the 13th Workshop on Privacy in the Electronic Society. New York: ACM, p. 69-72 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  85. Published

    Adaptive contention resolution procedure for emerging WiMAX networks

    Delicado, J., Delicado, F. M., Orozco-Barbosa, L. & Ni, Q., 2010, Wireless and Mobile Networking Conference (WMNC), 2010 Third Joint IFIP. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  86. Published

    Adaptive delayed channel access for IEEE 802.11n WLANs

    Skordoulis, D., Ni, Q., Min, G. & Borg, K., 05/2008, Circuits and Systems for Communications, 2008. ICCSC 2008. 4th IEEE International Conference on. IEEE, p. 167-171 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  87. Published

    Adaptive EDCF: Enhanced service differentiation for IEEE 802.11 wireless-ad-hoc networks

    Romdhani, L., Ni, Q. & Turletti, T., 2003, Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE. New York: IEEE, p. 1373-1378 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  88. Published

    Adaptive fair channel allocation for QoS enhancement in IEEE 802.11 wireless LANs

    Malli, M., Ni, Q., Turletti, T. & Barakat, C., 2004, Communications, 2004 IEEE International Conference on. New York: IEEE, p. 3470-3475 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  89. Published

    Adaptive hybrid compression for wireless sensor networks

    Ali, A., Khelil, A., Suri, N. & Mahmudimanesh, M., 1/12/2015, In : ACM Transactions on Sensor Networks. 11, 4, 36 p., 53.

    Research output: Contribution to journalJournal article

  90. Published

    Adaptive inferential sensors based on evolving fuzzy models

    Angelov, P. & Kordon, A., 04/2010, In : IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics. 40, 2, p. 529-539 11 p.

    Research output: Contribution to journalJournal article

  91. Published

    Adaptive management of cognitive radio networks employing femtocells

    Al-dulaimi, A., Anpalagan, A., Al-rubaye, S. & Ni, Q., 12/2017, In : IEEE Systems Journal. 11, 4, p. 2687-2698 12 p.

    Research output: Contribution to journalJournal article

  92. Published

    Adaptive materials: utilising additive manufactured scaffolds to control self-organising material aggregation

    Blaney, A., Alexander, J. M., Dunn, N. S., Richards, D. C., Rennie, A. E. W. & Anwar, J., 12/2015, Proceedings of the 14th Rapid Design, Prototyping and Manufacturing Conference. Rennie, A. & Bibb, R. (eds.). Loughborough: Lancaster University, p. 49-57 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  93. Published

    Adaptive medium access control for VoIP services in IEEE 802.11 WLANs

    Abu-tair, M. I., Min, G., Ni, Q. & Liu, H., 1/05/2008, Circuits and Systems for Communications, 2008. ICCSC 2008. 4th IEEE International Conference on. IEEE, p. 487-491 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  94. Published

    Adaptive monitoring for mobile networks in challenging environments

    Richerzhagen, N., Stingl, D., Mauthe, A. U. & Steinmetz, R., 3/08/2015, Proceedings of 24th International Conference on Computer Communications and Networks, ICCCN 2015. IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  95. Published

    Adaptive Resilience for Computer Networks

    Ali, A., Hutchison, D., Angelov, P. & Smith, P., 4/10/2012. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  96. Published

    Adaptive transmission power control and coding for wireless sensor networks

    Wadekar, R., Stankovic, L. & Honary, B., 12/2007, The IET Communications Conference on Wireless, Mobile and Sensor Networks 2007. Shanghai, China: IET Press, p. 1063-1066 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  97. Published

    Adaptive VoIP transmission over heterogeneous wired/wireless networks

    Trad, A., Ni, Q. & Afifi, H., 2004, Interactive multimedia and next generation networks: Second International Workshop on Multimedia Interactive Protocols and Systems, MIPS 2004, Grenoble, France, November 16-19, 2004. Proceedings. Roca, V. & Rousseau, F. (eds.). Berlin: Springer Verlag, p. 25-36 12 p. (Lecture Notes in Computer Science; vol. 3311).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  98. Published

    Adding Haptic Feedback to Mobile TV

    Alexander, J., Marshall, M. T. & Subramanian, S., 2011, Extended Abstracts of the SIGCHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, p. 1975-1980 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  99. Published

    Adding Preemption to TinyOS

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 06/2007, EmNets '07 Proceedings of the 4th workshop on Embedded networked sensors. p. 88-92 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  100. Published

    Advanced signal processing for communication systems

    Wysocki, T. A. (ed.), Darnell, M. (ed.) & Honary, B. (ed.), 10/2002, Kluwer Academic Publishers. (The International Series in Engineering and Computer Science; vol. 703)

    Research output: Book/Report/ProceedingsBook

Previous 1 2 3 4 5 6 7 8 ...20 Next

Back to top