Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2020
  2. Published

    Transformers: Intrusion Detection Data In Disguise

    Boorman, J., Prince, D. & Green, B., 18/09/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  3. Published

    Energy Efficient Uplink Transmissions in LoRa Networks

    Su, B., Qin, Z. & Ni, Q., 1/08/2020, In : IEEE Transactions on Communications. 68, 8, p. 4960-4972 13 p.

    Research output: Contribution to journalJournal article

  4. Forthcoming

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 18/05/2020, (Accepted/In press) The 17th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2020). Springer

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  5. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, In : Journal of Cybersecurity. 30 p.

    Research output: Contribution to journalJournal article

  6. Published

    SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage

    Xiong, S., Ni, Q., Wang, L. & Wang, Q., 14/04/2020, In : IEEE Internet of Things Journal. 7, 4, p. 2914-2927 14 p.

    Research output: Contribution to journalJournal article

  7. Published

    UAV-Assisted Wireless Powered Cooperative Mobile Edge Computing: Joint Offloading, CPU Control, and Trajectory Optimization

    Liu, Y., Xiong, K., Ni, Q., Fan, P. & Letaief, K. B., 14/04/2020, In : IEEE Internet of Things Journal. 7, 4, p. 2777-2790 14 p.

    Research output: Contribution to journalJournal article

  8. Forthcoming

    Honeypots for Automatic Network-Level Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 13/03/2020, (Accepted/In press). 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  9. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In : IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to journalJournal article

  10. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In : Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to journalJournal article

  11. Published

    Secrecy Spectrum and Energy Efficiency Analysis in Massive MIMO-enabled Multi-Tier Hybrid HetNets

    Umer, A., Hassan, S. A., Pervaiz, H., Musavian, L., Ni, Q. & Imran, M. A., 1/03/2020, In : IEEE Transactions on Green Communications and Networking. 4, 1, p. 246-262 17 p.

    Research output: Contribution to journalJournal article

  12. Published

    SonarSnoop: active acoustic side-channel attacks

    Cheng, P., Bagci, I., Roedig, U. & Yan, J., 1/03/2020, In : International Journal of Information Security. 19, p. 213-228 16 p.

    Research output: Contribution to journalJournal article

  13. Forthcoming

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 28/02/2020, (Accepted/In press) USENIX Security '20 Proceedings. USENIX Association, 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  14. Published

    An analytical model of trilateration localization error

    Farooq-I-Azam, M., Ni, Q. & Dong, M., 27/02/2020, 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  15. Forthcoming

    HoneyPlant: A Distributed Hybrid Honeypot System for ICS Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 19/02/2020, (Accepted/In press).

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  16. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 1/01/2020, In : IEEE Transactions on Communications. 68, 1, p. 569-581 13 p.

    Research output: Contribution to journalJournal article

  17. Published

    Cognitive computing and wireless communications on the edge for healthcare service robots

    Wan, S., Gu, Z. & Ni, Q., 1/01/2020, In : Computer Communications. 149, p. 99-106 8 p.

    Research output: Contribution to journalJournal article

  18. Published

    Human and Organizational Issues for Resilient Communications

    Anderson, T., Busby, J., Gouglidis, A., Hough, K., Hutchison, D. & Rouncefield, M., 2020, Guide to Disaster-Resilient Communication Networks. Rak, J. & Hutchison, D. (eds.). Cham: Springer, p. 791-807 17 p. (Computer Communications and Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  19. 2019
  20. Published

    Effective Secrecy Rate for a Downlink NOMA Network

    Yu, W., Chorti, A., Musavian, L., Poor, H. V. & Ni, Q., 31/12/2019, In : IEEE Transactions on Wireless Communications. 18, 12, p. 5673-5690 18 p.

    Research output: Contribution to journalJournal article

  21. Published

    PRISM: An Experiment Framework for Straggler Analytics within Containerized Clusters

    Lindsay, D., Gill, S. & Garraghan, P., 1/12/2019, WoC 2019 Fifth International Workshop on Container Technologies and Container Clouds. ACM, p. 13-18 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  22. Published

    Stochastic Asymmetric Blotto Game Approach for Wireless Resource Allocation Strategies

    Chien, S. F., Zarakovitis, C. C., Ni, Q. & Xiao, P., 1/12/2019, In : IEEE Transactions on Wireless Communications. 18, 12, p. 5511 - 5528 18 p.

    Research output: Contribution to journalJournal article

  23. Published

    Transformative Effects of IoT, Blockchain and Artificial Intelligence on Cloud Computing: Evolution, Vision, Trends and Open Challenges

    Gill, S., Tuli, S., Xu, M., Singh, I., Singh, K., Lindsay, D., Tuli, S., Smirnova, D., Singh, M., Jain, U., Pervaiz, H., Sehgal, B., Kaila, S. S., Misra, S., Aslanpour, M. S., Mehta, H., Stankovski, V. & Garraghan, P., 1/12/2019, In : Internet of Things. 8, 26 p., 100118.

    Research output: Contribution to journalJournal article

  24. Published

    Local Optimality of Self-Organising Neuro-Fuzzy Inference Systems

    Gu, X., Angelov, P. P. & Rong, H., 30/11/2019, In : Information Sciences. 503, p. 351-380 30 p.

    Research output: Contribution to journalJournal article

  25. Published

    Weighted Tradeoff between Spectral Efficiency and Energy Efficiency in Energy Harvesting Systems

    Siddiqui, A. M., Musavian, L., Aissa, S. & Ni, Q., 21/11/2019, 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  26. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  27. Published

    Towards smarter SDN switches: revisiting the balance of intelligence in SDN networks

    Weekes, J., 30/09/2019, Lancaster University. 216 p.

    Research output: ThesisDoctoral Thesis

Previous 1 2 3 4 5 6 7 8 ...78 Next

Back to top