Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2015
  2. Published

    Horizon 2020 TWEETHER project for W-band high data rate wireless communications

    Paoloni, C., Letizia, R., Napoli, F., Ni, Q., Rennie, A., Zimmerman, R., Andre, F., Pham, K., Krozer, V., Magne, F., Burciu, I., Ramirez, A., Rocchi, M., Marilier, M. & Vilar, R., 2015, Vacuum Electronics Conference (IVEC), 2015 IEEE International . IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  3. Published

    In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

    Pellegrino, G., Balzarotti, D., Winter, S. & Suri, N., 2015. 16 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  4. Published

    Incremental anomaly identification in flight data analysis by adapted one-class SVM method

    Kolev, D., Suvorov, M., Morozov, E., Markarian, G. & Angelov, P., 2015, Artificial neural networks: methods and applications in bio-/neuroinformatics. Koprinkova-Hristova, P., Mladenov, V. & Kasabov, N. K. (eds.). Springer, p. 373-391 19 p. (Springer Series in Bio-/Neuroinformatics; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  5. Published

    Intelligent Systems' 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland

    Angelov, P. (ed.), T. Atanassov, K. (ed.), Doukovska, L. (ed.), Hadjiski, M. (ed.), Jotsov, V. (ed.), Kacprzyk, J. (ed.), Kasabov, N. (ed.), Sotirov, S. (ed.), Szmidt, E. (ed.) & Zadrozny, S. (ed.), 2015, Springer. 863 p. (Advances in Intelligent Systems and Computing; vol. 322)

    Research output: Book/Report/ProceedingsProceedings

  6. Published

    Inter-cell collaborative spectrum monitoring for cognitive cellular networks in fading environment

    Deepak, G. C., Navaie, K. & Ni, Q., 2015, IEEE International Conference on Communications (ICC), 2015 . IEEE, p. 7498-7503 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  7. Published

    IPv6 AS relationships, cliques, and congruence

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 2015, Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Mirkovic, J. & Liu, Y. (eds.). Berlin: Springer, p. 111-122 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. Published

    Leveraging SDN to provide an in-network QoE measurement framework

    Farshad, A., Georgopoulos, P., Broadbent, M., Mu, M. & Race, N., 2015, Computer Communications Workshops (INFOCOM WKSHPS), 2015 IEEE Conference on. IEEE, p. 239-244 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  9. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    Open challenges in relationship-based privacy mechanisms for social network services

    Fogues, R. L., Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2015, In : International Journal of Human-Computer Interaction. 31, 5, p. 350-370 21 p.

    Research output: Contribution to journalJournal article

  11. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  12. Published

    RDE with forgetting: an approximate solution for large values of k with an application to fault detection problems

    Bezerra, C. G., Costa, B., Guedes, L. A. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 169-178 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  13. Published

    Recursive SVM based on TEDA

    Kangin, D. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Cham: Springer, p. 156-168 13 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  14. Published

    Scenarios and use cases in Tweether: W-band for Internet Everywhere

    Paoloni, C., Letizia, R., Ni, Q., Krozer, V., Andre, F., Magne, F., Marilier, M., Zimmerman, R., Ramirez, A., Vilar, R. & Burciu, I., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  15. Published

    Social computing privacy and online relationships

    Misra, G. & Such, J. M., 2015, AISB Social Aspects of Cognition and Computing Symposium. p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  16. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  17. Published

    SPATA: Spatio-tangible tools for fabrication-aware design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 2015, TEI '15 Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. New York: ACM, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  18. Published

    Supply chain resilience: definition, review and theoretical foundations for further study

    Tukamuhabwa Rwakira, B., Stevenson, M., Busby, J. & Zorzini, M., 2015, In : International Journal of Production Research. 53, 18, p. 5592-5623 32 p.

    Research output: Contribution to journalJournal article

  19. Published

    Susceptibility to email fraud: a review of psychological perspectives, data-collection methods, and ethical considerations

    Jones, H., Towse, J. & Race, N., 2015, In : International Journal of Cyber Behavior, Psychology and Learning. 5, 3, p. 13-29 17 p.

    Research output: Contribution to journalJournal article

  20. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  21. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  22. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  23. Published

    Towards implicit contextual integrity

    Criado, N. & Such, J. M., 2015, The Second International Workshop on Agents and CyberSecurity (ACySE). p. 23-26 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  24. Published

    Video Clarity: High Speed Data Mining for Video

    Fisher, P., Alhabib, A., Giotsas, V. & Andreopoulos, I., 2015, IBC 2015. London: Institution of Engineering and Technology, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  25. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  26. 2014
  27. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  28. Published

    A fully autonomous data density based clustering algorithm

    Hyde, R. & Angelov, P., 9/12/2014, Evolving and Autonomous Learning Systems (EALS), 2014 IEEE Symposium on. Piscataway, N.J.: IEEE, p. 116-123 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  29. Published

    RTSDE: recursive total-sum-distances-based density estimation approach and its application for autonomous real-time video analytics

    Angelov, P. & Wilding, A., 9/12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE, p. 81-86 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  30. Published

    Editorial message: CrossCloud Brokers 2014

    Elkhatib, Y. & Walraven, S., 8/12/2014, CrossCloud Brokers 2014: proceedings of the 2nd International Workshop on Cross-Cloud Systems . New York: ACM

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  31. Published

    Event pattern discovery on IDS traces of cloud services

    Huang, S-Y., Huang, Y. & Suri, N., 3/12/2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. IEEE, p. 25-32 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  32. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In : Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to journalJournal article

  33. Published

    A multi-layer and multi-tenant cloud assurance evaluation methodology

    Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E. R., 12/2014, Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE, p. 386-393 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  34. Published

    A real-time approach for autonomous detection and tracking of moving objects from UAV

    Sadeghi Tehran, P., Clarke, C. & Angelov, P. P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Piscataway, N. J.: IEEE, p. 43-49 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  35. Published

    Anomaly detection based on eccentricity analysis

    Angelov, P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE Press, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  36. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  37. Published

    Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols

    Ghamari, M., Momahed Heravi, B., Roedig, U. & Honary, B., 12/2014, In : IET Networks. 3, 4, p. 284-292 9 p.

    Research output: Contribution to journalJournal article

  38. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In : Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to journalJournal article

  39. Published

    Using agent-based simulation to analyse the effect of broadcast and narrowcast on public perception: a case in social risk amplification

    Onggo, S., Busby, J. & Liu, Y., 12/2014, Proceedings of the 2014 Winter Simulation Conference. IEEE, p. 322-333 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  40. Published

    The future of mobile devices: security and mobility

    Fitton, O. & Prince, D., 17/11/2014, Lancaster: Lancaster University. 34 p.

    Research output: Book/Report/ProceedingsOther report

  41. Published

    Traffic anomaly diagnosis in Internet backbone networks: a survey

    Marnerides, A., Schaeffer-Filho, A. & Mauthe, A., 14/11/2014, In : Computer Networks. 73, p. 224-243 20 p.

    Research output: Contribution to journalJournal article

  42. Published

    Inferring complex AS relationships

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 5/11/2014, IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  43. Published

    Robust and real-time communication on heterogeneous networks for smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 3/11/2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 386-391 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  44. Published

    Photoluminescence studies of individual and few GaSb/GaAs quantum rings

    Young, M. P., Woodhead, C. S., Roberts, J., Noori, Y. J., Noble, M. T., Krier, A., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R. J., 1/11/2014, In : AIP Advances. 4, 11, 6 p., 117127.

    Research output: Contribution to journalJournal article

  45. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  46. Published

    Characterising the physicality of everyday buttons

    Alexander, J., Hardy, J. & Wattam, S., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 205-208 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  47. Published

    Just browsing? understanding user journeys in online TV

    Elkhatib, Y., Killick, R., Mu, M. & Race, N., 11/2014, MM '14 Proceedings of the ACM International Conference on Multimedia. New York: ACM, p. 965-968 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  48. Published

    Mitigating eclipse attacks in peer-to-peer networks

    Germanus, D., Roos, S., Strufe, T. & Suri, N., 29/10/2014, 2014 IEEE Conference on Communications and Network Security. Springer-Verlag, p. 400-408 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  49. Published

    New energy efficiency metric with imperfect channel considerations for OFDMA systems

    C. Zarakovitis, C., Ni, Q. & Spiliotis, J., 9/10/2014, In : IEEE Wireless Communications Letters. 3, 5, p. 473-476 4 p.

    Research output: Contribution to journalJournal article

  50. Unpublished

    Data structuring and searching method and apparatus

    Angelov, P. & Sadeghi Tehran, P., 8/10/2014, (Unpublished) Patent No. GB1417807.3, priority date 8 October 2014, Priority date 8/10/2014, Priority No. GB1417807.3

    Research output: Patent

  51. Published

    Real-time novelty detection in video using background subtraction techniques: state of the art a practical review

    Morris, G. & Angelov, P., 8/10/2014, 2014 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE Press, p. 537-543 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  52. Published

    DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence

    King, A., Brown, J. & Roedig, U., 1/10/2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, p. 45-50 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  53. Published

    Adaptation for the masses: towards decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A-M., Maddock, C., Mauthe, A. & Taïani, F., 10/2014, ARM '14 Proceedings of 13th Workshop on Adaptive and Reflective Middleware. New York: ACM, 6 p. 4

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  54. Published

    Assessing the impact of intra-cloud live migration on anomaly detection

    Shirazi, S. N. U. H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A. & Hutchison, D., 10/2014, Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE, p. 52-57 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  55. Published

    Gaze-touch: combining gaze with multi-touch for interaction on the same surface

    Pfeuffer, K., Alexander, J., Chong, M. K. & Gellersen, H., 10/2014, UIST '14 Proceedings of the 27th annual ACM symposium on User interface software and technology. New York: ACM, p. 509-518 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  56. Published

    User adaptive QoS aware selection method for cooperative heterogeneous wireless systems: a dynamic contextual approach

    Pervaiz, H., Ni, Q. & Zarakovitis, C. C., 10/2014, In : Future Generation Computer Systems. 39, p. 75-87 13 p.

    Research output: Contribution to journalJournal article

  57. Published

    5G communications: race for more capacity triggers LTE in unlicensed band

    Al-Dulaimi, A., Al-Rubaye, S., Ni, Q. & Sousa, E., 24/09/2014, 33rd Wireless World Research Forum Proceedings. Guildford, Surrey: WWRF, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  58. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  59. Published

    Semiconductor devices for quantum technologies

    Young, R., 22/09/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  60. Published

    Socio-technical security analysis of Industrial Control Systems (ICS)

    Green, B., Prince, D., Roedig, U., Busby, J. & Hutchison, D., 11/09/2014, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. Janicke, H. (ed.). Swindon: BCS Learning and Development Limited, p. 10-14 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  61. Published

    Data density based clustering

    Hyde, R. & Angelov, P., 8/09/2014, Computational Intelligence (UKCI), 2014 14th UK Workshop on. IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  62. Published

    Estimating packet reception rate in noisy environments

    Brown, J., Roedig, U., Boano, C. A. & Roemer, K., 8/09/2014, Proceedings of the 39rd IEEE Conference on Local Computer Networks, 2014. LCN 2014. IEEE, p. 583-591 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  63. Published

    Cyber policing in the North West: regional and local co-ordination

    Prince, D. D. C., 4/09/2014, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  64. Published

    AMAB: automated measurement and analysis of body motion

    Poppe, R., Van der Zee, S., Heylen, D. & Taylor, P. J., 09/2014, In : Behavior Research Methods. 46, 3, p. 625-633 9 p.

    Research output: Contribution to journalJournal article

  65. Published

    Dataset on usage of a live & VoD P2P IPTV service

    Elkhatib, Y., Mu, M. & Race, N., 09/2014, 14th IEEE International Conference on Peer-to-Peer Computing (P2P). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  66. Published

    Organizational sensemaking about risk controls: the case of offshore hydrocarbons production

    Busby, J. & Collins, A., 09/2014, In : Risk Analysis. 34, 9, p. 1738-1752 15 p.

    Research output: Contribution to journalJournal article

  67. Published

    A survey of rural Wireless Mesh Network (WMN) deployments

    Ajayi, A. O., Roedig, U., Edwards, C. & Race, N., 28/08/2014, Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, p. 119-125 7 p. 14664869

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  68. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  69. Published

    Practical use of formal verification for safety critical cyber-physical systems: A case study

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 25/08/2014, 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications. IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  70. Published

    Constructing schedules for time-critical data delivery in wireless sensor networks

    Pöttner, W-B., Seidel, H., Brown, J., Roedig, U. & Wolf, L., 15/08/2014, In : ACM Transactions on Sensor Networks. 10, 3, 31 p., 44.

    Research output: Contribution to journalJournal article

  71. Published

    DEC: dynamically evolving clustering autonomous and its application to structure

    Dutta Baruah, R. & Angelov, P., 14/08/2014, In : IEEE Transactions on Cybernetics. 44, 9, p. 1619-1631 13 p.

    Research output: Contribution to journalJournal article

  72. Published

    Designing Mobile Augmented Reality interfaces for locative games and playful experiences

    Burnett, D., Coulton, P., Murphy, E. & Race, N., 6/08/2014, Proceedings of Digital Games Research Conference 2014. Digital Games Research Association - DiGRA, 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  73. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 08/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  74. Published
  75. Published

    Language style matching and police interrogation outcomes

    Richardson, B., Taylor, P. J., Snook, B., Conchie, S. & Bennell, C., 08/2014, In : Law and Human Behavior. 38, 4, p. 357-366 10 p.

    Research output: Contribution to journalJournal article

  76. Published

    Real-time fault detection using recursive density estimation

    Costa, B. S. J., Angelov, P. & Guedes, L. A., 08/2014, In : Journal of Control, Automation and Electrical Systems. 25, 4, p. 428-437 10 p.

    Research output: Contribution to journalJournal article

  77. Published

    Towards continuous cloud service assurance for critical infrastructure IT

    Hudic, A., Hecht, T., Mauthe, A. & Tauber, M., 08/2014, Proceedings of 2nd International Conference on Future Internet of Things and Cloud (FiCloud-2014. IEEE, p. 175-182 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  78. Published

    Short paper: gathering tamper evidence in wi-fi networks based on channel state information

    Bagci, I. E., Roedig, U., Schulz, M. & Hollick, M., 23/07/2014, WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. New York: ACM Press, p. 183-188 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  79. Published

    An empirical study of injected versus actual interface errors

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 21/07/2014, Proceedings of the 2014 International Symposium on Software Testing and Analysis. ACM, p. 397-408 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  80. Published

    A route towards practical quantum communication

    Roberts, J., Young, M., Noori, Y., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R., 10/07/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  81. Published

    Photoluminescence studies of single GaSb quantum rings

    Young, M., Roberts, J., Woodhead, C., Noori, Y., Sanchez, A., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R., 10/07/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  82. Published

    Dynamically evolving fuzzy classifier for real-time classification of data streams

    Dutta Baruah, R., Angelov, P. & Baruah, D., 6/07/2014, Fuzzy Systems (FUZZ-IEEE), 2014 IEEE International Conference on. IEEE, p. 383-389 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  83. Published

    A new unsupervised approach to fault detection and identification

    Costa, B., Angelov, P. & Guedes, L. A., 07/2014, Neural Networks (IJCNN), 2014 International Joint Conference on. IEEE, p. 1557-1564 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  84. Published

    Network resilience with reusable management patterns

    Schaeffer-Filho, A., Smith, P., Mauthe, A. & Hutchison, D., 07/2014, In : IEEE Communications Magazine. 52, 7, p. 105-115 11 p.

    Research output: Contribution to journalJournal article

  85. Published

    Agile sink selection in wireless sensor networks

    Mahmudimanesh, M. & Suri, N., 30/06/2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, p. 390-398 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  86. Published

    Dynamically evolving clustering for data streams

    Dutta Baruah, R., Angelov, P. & Baruah, D., 2/06/2014, Proceedings 2014 IEEE Symposium on Evolving and Intelligent Systems, EAIS2014. IEEE Xplore, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  87. Published

    Robust evolving cloud-based PID control adjusted by gradient learning method

    Skrjanc, I., Blazic, S. & Angelov, P., 2/06/2014, Proceedings 2014 IEEE Symposium on Evolving and Intelligent Systems, EAIS-2014. IEEE Xplore, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  88. Published

    A survey of privacy in multi-agent systems

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 06/2014, In : Knowledge Engineering Review. 29, 3, p. 314-344 31 p.

    Research output: Contribution to journalJournal article

  89. Published

    Can SPDY really make the web faster?

    Elkhatib, Y., Tyson, G. & Welzl, M., 06/2014, Networking Conference, 2014 IFIP. IFIP, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  90. Published

    Delay-QoS-driven spectrum and energy efficiency tradeoff

    Musavian, L. & Ni, Q., 06/2014, IEEE International Conference on Communications (ICC 2014). IEEE, p. 4981-4986 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  91. Published

    Proceedings of the 2014 IEEE Conference on Evolving and Adaptive Intelligent Systems

    Angelov, P. (ed.), Filev, D. (ed.), Kasabov, N. (ed.), Lughofer, E. (ed.), Klement, E. P. (ed.) & Saminger-Platz, S. (ed.), 06/2014, Piscataway, N.J.: IEEE. 150 p.

    Research output: Book/Report/ProceedingsProceedings

  92. Published

    Symbol recognition with a new autonomously evolving classifier autoclass

    Angelov, P., Kangin, D., Xiaowei, Z. & Kolev, D., 06/2014, 2014 IEEE Conference on Evolving and Adaptive Intelligent Systems. 9781479933471: IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  93. Published

    The relational aspect to high reliability organization

    Busby, J. & Iszatt-White, M., 06/2014, In : Journal of Contingencies and Crisis Management. 22, 2, p. 69-80 12 p.

    Research output: Contribution to journalJournal article

  94. Published

    Efficient agile sink selection in wireless sensor networks based on compressed sensing

    Mahmudimanesh, M., Naseri, A. & Suri, N., 26/05/2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, p. 193-200 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  95. Published

    Robust compressive data gathering in wireless sensor networks with linear topology

    Mahmudimanesh, M. & Suri, N., 26/05/2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, p. 179-186 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  96. Published

    Spectroscopy of single GaSb quantum rings: a route towards practical quantum communication

    Roberts, J., Young, M., Noori, Y., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R., 14/05/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  97. Published

    OpenCL as Wireless Sensor Network programming abstraction

    Bor, M. & Roedig, U., 12/05/2014. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  98. Published

    Cyber-security challenges of agent technology in intelligent transportation systems

    Kibirige Mukisa, S. & Rashid, A., 6/05/2014, ACySE '14 Proceedings of the 1st International Workshop on Agents and CyberSecurity. New York: ACM, 4 p. 9

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  99. Published

    Normalising the corpus of English dialogues (1560-1760) using VARD2: decisions and justifications

    Archer, D., Kytö, M., Baron, A. & Rayson, P., 4/05/2014, p. 23. 1 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  100. Published

    Management patterns: SDN-enabled network resilience management

    Smith, P., Schaeffer-Filho, A., Hutchison, D. & Mauthe, A., 1/05/2014, Network Operations and Management Symposium (NOMS), 2014 IEEE. IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  101. Published

    Beyond content delivery: can ICNs help emergency scenarios?

    Tyson, G., Bodanese, E., Bigham, J. & Mauthe, A., 05/2014, In : IEEE Network. 28, 3, p. 44-49 6 p.

    Research output: Contribution to journalJournal article

  102. Published

    Redundancy, diversity, and connectivity to achieve multilevel network resilience, survivability, and disruption tolerance

    Sterbenz, J. P. G., Hutchison, D., Çetinkaya, E. K., Jabbar, A., Rohrer, J. P., Scholler, M. R. & Smith, P., 05/2014, In : Telecommunication Systems. 56, 1, p. 17-31 15 p.

    Research output: Contribution to journalJournal article

Previous 1...3 4 5 6 7 8 9 10 ...20 Next

Back to top