Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2020
  2. Published

    Transformers: Intrusion Detection Data In Disguise

    Boorman, J., Prince, D. & Green, B., 18/09/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  3. Published

    Energy Efficient Uplink Transmissions in LoRa Networks

    Su, B., Qin, Z. & Ni, Q., 1/08/2020, In : IEEE Transactions on Communications. 68, 8, p. 4960-4972 13 p.

    Research output: Contribution to journalJournal article

  4. Forthcoming

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 18/05/2020, (Accepted/In press) The 17th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2020). Springer

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  5. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, In : Journal of Cybersecurity. 30 p.

    Research output: Contribution to journalJournal article

  6. Published

    SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage

    Xiong, S., Ni, Q., Wang, L. & Wang, Q., 14/04/2020, In : IEEE Internet of Things Journal. 7, 4, p. 2914-2927 14 p.

    Research output: Contribution to journalJournal article

  7. Published

    UAV-Assisted Wireless Powered Cooperative Mobile Edge Computing: Joint Offloading, CPU Control, and Trajectory Optimization

    Liu, Y., Xiong, K., Ni, Q., Fan, P. & Letaief, K. B., 14/04/2020, In : IEEE Internet of Things Journal. 7, 4, p. 2777-2790 14 p.

    Research output: Contribution to journalJournal article

  8. Forthcoming

    Honeypots for Automatic Network-Level Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 13/03/2020, (Accepted/In press). 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  9. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In : IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to journalJournal article

  10. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In : Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to journalJournal article

  11. Published

    Secrecy Spectrum and Energy Efficiency Analysis in Massive MIMO-enabled Multi-Tier Hybrid HetNets

    Umer, A., Hassan, S. A., Pervaiz, H., Musavian, L., Ni, Q. & Imran, M. A., 1/03/2020, In : IEEE Transactions on Green Communications and Networking. 4, 1, p. 246-262 17 p.

    Research output: Contribution to journalJournal article

  12. Published

    SonarSnoop: active acoustic side-channel attacks

    Cheng, P., Bagci, I., Roedig, U. & Yan, J., 1/03/2020, In : International Journal of Information Security. 19, p. 213-228 16 p.

    Research output: Contribution to journalJournal article

  13. Forthcoming

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 28/02/2020, (Accepted/In press) USENIX Security '20 Proceedings. USENIX Association, 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  14. Published

    An analytical model of trilateration localization error

    Farooq-I-Azam, M., Ni, Q. & Dong, M., 27/02/2020, 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  15. Forthcoming

    HoneyPlant: A Distributed Hybrid Honeypot System for ICS Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 19/02/2020, (Accepted/In press).

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  16. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 1/01/2020, In : IEEE Transactions on Communications. 68, 1, p. 569-581 13 p.

    Research output: Contribution to journalJournal article

  17. Published

    Cognitive computing and wireless communications on the edge for healthcare service robots

    Wan, S., Gu, Z. & Ni, Q., 1/01/2020, In : Computer Communications. 149, p. 99-106 8 p.

    Research output: Contribution to journalJournal article

  18. Published

    Human and Organizational Issues for Resilient Communications

    Anderson, T., Busby, J., Gouglidis, A., Hough, K., Hutchison, D. & Rouncefield, M., 2020, Guide to Disaster-Resilient Communication Networks. Rak, J. & Hutchison, D. (eds.). Cham: Springer, p. 791-807 17 p. (Computer Communications and Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  19. 2019
  20. Published

    Effective Secrecy Rate for a Downlink NOMA Network

    Yu, W., Chorti, A., Musavian, L., Poor, H. V. & Ni, Q., 31/12/2019, In : IEEE Transactions on Wireless Communications. 18, 12, p. 5673-5690 18 p.

    Research output: Contribution to journalJournal article

  21. Published

    PRISM: An Experiment Framework for Straggler Analytics within Containerized Clusters

    Lindsay, D., Gill, S. & Garraghan, P., 1/12/2019, WoC 2019 Fifth International Workshop on Container Technologies and Container Clouds. ACM, p. 13-18 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  22. Published

    Stochastic Asymmetric Blotto Game Approach for Wireless Resource Allocation Strategies

    Chien, S. F., Zarakovitis, C. C., Ni, Q. & Xiao, P., 1/12/2019, In : IEEE Transactions on Wireless Communications. 18, 12, p. 5511 - 5528 18 p.

    Research output: Contribution to journalJournal article

  23. Published

    Transformative Effects of IoT, Blockchain and Artificial Intelligence on Cloud Computing: Evolution, Vision, Trends and Open Challenges

    Gill, S., Tuli, S., Xu, M., Singh, I., Singh, K., Lindsay, D., Tuli, S., Smirnova, D., Singh, M., Jain, U., Pervaiz, H., Sehgal, B., Kaila, S. S., Misra, S., Aslanpour, M. S., Mehta, H., Stankovski, V. & Garraghan, P., 1/12/2019, In : Internet of Things. 8, 26 p., 100118.

    Research output: Contribution to journalJournal article

  24. Published

    Local Optimality of Self-Organising Neuro-Fuzzy Inference Systems

    Gu, X., Angelov, P. P. & Rong, H., 30/11/2019, In : Information Sciences. 503, p. 351-380 30 p.

    Research output: Contribution to journalJournal article

  25. Published

    Weighted Tradeoff between Spectral Efficiency and Energy Efficiency in Energy Harvesting Systems

    Siddiqui, A. M., Musavian, L., Aissa, S. & Ni, Q., 21/11/2019, 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  26. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  27. Published

    Towards smarter SDN switches: revisiting the balance of intelligence in SDN networks

    Weekes, J., 30/09/2019, Lancaster University. 216 p.

    Research output: ThesisDoctoral Thesis

  28. Published

    3-D Hybrid VLC-RF Indoor IoT Systems with Light Energy Harvesting

    Pan, G., Lei, H., Ding, Z. & Ni, Q., 1/09/2019, In : IEEE Transactions on Green Communications and Networking. 3, 3, p. 853 - 865 13 p.

    Research output: Contribution to journalJournal article

  29. Published

    Proceedings of the 4th European Workshop on Usable Security

    Ur, B. (ed.) & Weir, C. (ed.), 1/09/2019, IEEE.

    Research output: Book/Report/ProceedingsProceedings

  30. Published

    Attention module-based spatial-temporal graph convolutional networks for skeleton-based action recognition

    Kong, Y., Li, L., Zhang, K., Ni, Q. & Han, J., 30/08/2019, In : Journal of Electronic Imaging. 28, 4, 043032.

    Research output: Contribution to journalJournal article

  31. Published

    Power Interchange Analysis for Reliable Vehicle-to-Grid Connectivity

    Al-Rubaye, S., Al-Dulaimi, A. & Ni, Q., 21/08/2019, In : IEEE Communications Magazine. 57, 8, p. 105-111 7 p., 8808171.

    Research output: Contribution to journalJournal article

  32. Published

    Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search

    Zhang, J., Zhang, B. & Lin, J., 19/08/2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 211-219 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  33. Published

    Hybrid self-organizing feature map (SOM) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics

    Stephanakis, I. M., Chochliouros, I. P., Sfakianakis, E., Shirazi, S. N. & Hutchison, D., 1/08/2019, In : Information Sciences. 494, p. 247-277 31 p.

    Research output: Contribution to journalJournal article

  34. Published

    A framework for privacy aware design in future mobile applications

    Kibirige Mukisa, S., 30/07/2019, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  35. Published

    Fool's Gold: Understanding the Linguistic Features of Deception and Humour Through April Fools’ Hoaxes

    Dearden, E. & Baron, A., 22/07/2019.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  36. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  37. Published

    Energy-Efficient Multi-User Mobile-Edge Computation Offloading in Massive MIMO Enabled HetNets

    Hao, Y., Ni, Q., Li, H. & Hou, S., 15/07/2019, IEEE International Conference on Communications (ICC 2019). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  38. Published

    Security Requirements Engineering in Safety-Critical Railway Signalling Networks.

    Heinrich, M., Vateva-Gurova, T., Arul, T., Katzenbeisser, S., Suri, N., Birkholz, H., Fuchs, A., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Tverdyshev, S. & Schlehuber, C., 14/07/2019, In : Security and Communication Networks. 2019, 14 p., 8348925.

    Research output: Contribution to journalJournal article

  39. Published

    Defending Adversarial Attacks on Cloud-aided Automatic Speech Recognition Systems

    Zhang, J., Zhang, B. & Zhang, B., 2/07/2019, SCC '19 Proceedings of the Seventh International Workshop on Security in Cloud Computing. New York: ACM, p. 23-31 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  40. Published

    Adversarial Machine Learning in Smart Energy Systems

    Bor, M., Marnerides, A., Molineux, A., Wattam, S. & Roedig, U., 25/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 413-415 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  41. Published

    Low-Power Wide-Area Networks for Sustainable IoT

    Qin, Z., Li, F. Y., Li, G. Y., A. Mccann, J. & Ni, Q., 1/06/2019, In : IEEE Wireless Communications. 26, 3, p. 140-145 6 p.

    Research output: Contribution to journalJournal article

  42. Published

    MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

    Demir, K., Nayyer, F. & Suri, N., 1/06/2019, In : International Journal of Critical Infrastructure Protection. 25, p. 84-101 18 p.

    Research output: Contribution to journalJournal article

  43. Published

    Proofs of Writing for Robust Storage

    Dobre, D., Karame, G., Li, W., Majuntke, M., Suri, N. & Vukolic, M., 27/05/2019, In : IEEE Transactions on Parallel and Distributed Systems. 30, 11, p. 2547-2566 20 p.

    Research output: Contribution to journalJournal article

  44. Published

    Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Blair, L., Becker, I., Noble, J., Sasse, A. & Rashid, A., 25/05/2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice Track. Sharpe, H. & Whalen, M. (eds.). IEEE, p. 41-50 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  45. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 23/05/2019, SafeThings 2019 : IEEE Workshop on the Internet of Safe Things. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  46. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X. & Ni, Q., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8762016. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  47. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I., Yan, J. & Roedig, U., 20/05/2019. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  48. Published

    Energy Efficient Resource Allocation in Hybrid Non-Orthogonal Multiple Access Systems

    Shi, J., Yu, W., Ni, Q., Liang, W., Li, Z. & Xiao, P., 1/05/2019, In : IEEE Transactions on Communications. 67, 5, p. 3496-3511 16 p.

    Research output: Contribution to journalJournal article

  49. Published

    A Framework for Measuring the Costs of Security at Runtime

    Ivkic, I., Pichler, H., Zsilak, M., Mauthe, A. & Tauber, M., 05/2019, CLOSER 2019 : International Conference on Cloud Computing and Services Science.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  50. Published

    Maximum Achievable Sum Rate in Highly Dynamic Licensed Shared Access

    Onidare, S., Navaie, K. & Ni, Q., 28/04/2019, 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring). IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  51. Published

    MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  52. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In : IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to journalJournal article

  53. Published

    To freeze or not to freeze: A culture-sensitive motion capture approach to detecting deceit

    Van der Zee, S., Poppe, R., Taylor, P. J. & Anderson, R., 12/04/2019, In : PLoS ONE. 14, 4, 18 p., e0215000.

    Research output: Contribution to journalJournal article

  54. Published

    Fool’s Errand: Looking at April Fools Hoaxes as Disinformation through the Lens of Deception and Humour

    Dearden, E. & Baron, A., 7/04/2019. 17 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  55. Published

    Relay Selections for Cooperative Underlay CR Systems with Energy Harvesting

    Ye, J., Liu, Z., Zhao, H., Pan, G., Ni, Q. & Alouini, M., 2/04/2019, In : IEEE Transactions on Cognitive Communications and Networking. 5, 2, p. 358-369 12 p.

    Research output: Contribution to journalJournal article

  56. Published

    A K-Anonymity Based Schema for Location Privacy Preservation

    Fei, F., Li, S., Dai, H., Hu, C., Dou, W. & Ni, Q., 1/04/2019, In : IEEE Transactions on Sustainable Computing. 4, 2, p. 156-167 12 p.

    Research output: Contribution to journalJournal article

  57. Published

    Energy efficiency using cloud management of LTE networks employing fronthaul and virtualized baseband processing pool

    Al-dulaimi, A., Al-rubaye, S. & Ni, Q., 1/04/2019, In : IEEE Transactions on Cloud Computing. 7, 2, p. 1-12 12 p.

    Research output: Contribution to journalJournal article

  58. Published

    Self-Organization and Resilience for Networked Systems: Design Principles and Open Research Issues

    Dobson, S., Hutchison, D., Mauthe, A. U., Schaeffer-Filho, A. E., Smith, P. & Sterbenz, J. PG., 1/04/2019, In : Proceedings of the IEEE . 107, 4, p. 819-834 16 p.

    Research output: Contribution to journalJournal article

  59. E-pub ahead of print

    Intelligent Multisensor Cooperative Localization Under Cooperative Redundancy Validation

    Yin, L., Ni, Q. & Deng, Z., 12/03/2019, In : IEEE Transactions on Cybernetics. 13 p.

    Research output: Contribution to journalJournal article

  60. Published

    A Reinforcement Learning-based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks

    Ling, M. H., Yau, K. A., Qadir, J. & Ni, Q., 1/03/2019, In : IEEE Transactions on Cognitive Communications and Networking. 5, 1, p. 28 - 43 17 p.

    Research output: Contribution to journalJournal article

  61. Published

    An offloading method using decentralized P2P-enabled mobile edge servers in edge computing

    Tang, W., Zhao, X., Rafique, W., Qi, L., Dou, W. & Ni, Q., 1/03/2019, In : Journal of Systems Architecture. 94, p. 1-13 13 p.

    Research output: Contribution to journalJournal article

  62. Published

    A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In : Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to journalJournal article

  63. Published

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 25/02/2019. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  64. Published

    Location Assisted Subcarrier and Power Allocation in Underlay Mobile Cognitive Radio Networks

    Farooq-I-Azam, M., Yu, W., Ni, Q., Dong, M. & Ul Quddus, A., 19/02/2019, 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 6 p. 8644427

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  65. Published

    InfoLeak: Scheduling-based information leakage

    Vateva-Gurova, T., Manzoor, S., Huang, Y. & Suri, N., 11/02/2019, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 44-53 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  66. Published

    Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency

    Al-rubaye, S., Kadhum, E., Ni, Q. & Anpalagan, A., 1/02/2019, In : IEEE Internet of Things Journal. 6, 1, p. 267-277 11 p.

    Research output: Contribution to journalJournal article

  67. Published

    Cooperative Non-Orthogonal Layered Multicast Multiple Access for Heterogeneous Networks

    Yang, L., Ni, Q., Lv, L., Chen, J., Xue, X., Zhang, H. & Jiang, H., 02/2019, In : IEEE Transactions on Communications. 67, 2, p. 1148 - 1165 18 p.

    Research output: Contribution to journalJournal article

  68. Published

    Coverage and Handoff Analysis of 5G Fractal Small Cell Networks

    Chen, J., Ge, X. & Ni, Q., 02/2019, In : IEEE Transactions on Wireless Communications. 18, 2, p. 1263 - 1276 14 p.

    Research output: Contribution to journalJournal article

  69. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  70. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  71. Published

    The Security of Smart Buildings - A Systematic Literature Review

    Ciholas, P., Lennie, A., Sadigova, P. & Such, J. M., 28/01/2019, In : arXiv. 50 p.

    Research output: Contribution to journalJournal article

  72. Published

    Email fraud: The search for psychological predictors of susceptibility

    Jones, H., Towse, J. N., Race, N. J. P. & Harrison, T., 16/01/2019, In : PLoS ONE. 14, 1, 15 p., e0209684.

    Research output: Contribution to journalJournal article

  73. Published

    User-Pair Selection in Multiuser Cooperative Networks With an Untrusted Relay

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 15/01/2019, In : IEEE Transactions on Vehicular Technology. 68, 1, p. 869-882 14 p.

    Research output: Contribution to journalJournal article

  74. E-pub ahead of print

    Resonant-Tunnelling Diodes as PUF Building Blocks

    Bagci, I. E., McGrath, T., Barthelmes, C., Dean, S., Bernardo Gavito, R., Young, R. J. & Roedig, U., 14/01/2019, In : IEEE Transactions on Emerging Topics in Computing. 6 p.

    Research output: Contribution to journalJournal article

  75. Published

    Towards a Security Cost Model for Cyber-Physical Systems

    Ivkic, I., Mauthe, A. & Tauber, M., 11/01/2019, 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  76. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In : TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to journalJournal article

  77. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  78. Published

    Usable assured deletion in the cloud

    Ramokapane, K. M., 2019, Lancaster University. 190 p.

    Research output: ThesisDoctoral Thesis

  79. 2018
  80. Published

    Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  81. Published

    Robust Transmit Designs for Secrecy Rate Constrained MISO NOMA System

    Su, B., Ni, Q. & He, B., 20/12/2018, 29th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  82. Published

    Low Latency Driven Effective Capacity Analysis for Non-Orthogonal and Orthogonal Spectrum Access

    Yu, W., Musavian, L., Quddus, A. U., Ni, Q. & Xiao, P., 13/12/2018, 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  83. Published

    Interference-Aware Radio Resource Allocation for 5G Ultra-Reliable Low-Latency Communication

    Malik, H., Alam, M. M., Le Moullec, Y. & Ni, Q., 9/12/2018, 2018 IEEE Globecom Workshops, GC Wkshps 2018 - Proceedings. IEEE, 6 p. 8644301

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  84. Published

    Joint Antenna and User Selection for Untrusted Relay Networks

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 9/12/2018, 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings. IEEE, 6 p. 8647350

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  85. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B-C., Li, S-C., Huang, Y., Suri, N. & Wang, P-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  86. Published

    FastFI: Accelerating software fault injections

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 193-202 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  87. Published

    On the detection of side-channel attacks

    Vateva-Gurova, T. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 185-186 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  88. Published

    Foreign Currency Exchange Rate Prediction using Neuro-Fuzzy Systems

    Yong, Y. L., Lee, Y., Gu, X., Angelov, P. P., Ling Ngo, D. C. & Shafipour Yourdshahi, E., 1/12/2018, Procedia Computer Science. Elsevier, Vol. 144. p. 232-238 7 p. (Procedia Computer Science; vol. 144).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  89. Published

    Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In : International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to journalJournal article

  90. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In : Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to journalJournal article

  91. Published

    On the sustainability of blockchain funding

    Zhang, B. & Balogun, H., 20/11/2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, p. 89-96 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  92. Published

    How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code

    Schwahn, O., Winter, S., Coppik, N. & Suri, N., 1/11/2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 6, p. 945-958 14 p.

    Research output: Contribution to journalJournal article

  93. Published

    A Photonic Device

    Young, R. J. & Noori, Y., 24/10/2018, Patent No. GB 2561590 (A), 24/10/2018, Priority date 19/04/2017, Priority No. GB1706216.7

    Research output: Patent

  94. Published

    Towards Reactive Acoustic Jamming for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 15/10/2018, 2nd International Workshop on Multimedia Privacy and Security. ACM Press, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  95. Published

    A Deep Rule-based Approach for Satellite Scene Image Analysis

    Gu, X. & Angelov, P. P., 7/10/2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, p. 2778-2783 6 p. (2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  96. Published

    A Generalized Methodology for Data Analysis

    Angelov, P. P., Gu, X. & Principe, J., 10/2018, In : IEEE Transactions on Cybernetics. 48, 10, p. 2981-2993 13 p.

    Research output: Contribution to journalJournal article

  97. Published

    Deep rule-based classifier with human-level performance and characteristics

    Angelov, P. P. & Gu, X., 10/2018, In : Information Sciences. 463-464, p. 196-213 18 p.

    Research output: Contribution to journalJournal article

  98. Published

    Stability of Evolving Fuzzy Systems based on Data Clouds

    Rong, H., Angelov, P. P., Gu, X. & Bai, J., 10/2018, In : IEEE Transactions on Fuzzy Systems. 26, 5, p. 2774-2784 11 p.

    Research output: Contribution to journalJournal article

  99. Published

    ReasoNet: Inferring Network Policies Using Ontologies

    Rotsos, C., Farshad, A., King, D. & Hutchison, D., 13/09/2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft). IEEE, p. 159-167 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  100. Published

    Quantum Confinement in Security Elements

    McGrath, T., Bernardo Gavito, R., Bagci, I. E., Wang, C., Astbury, B., Young, R. J. & Roedig, U., 9/09/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  101. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In : IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to journalJournal article

  102. Published

    A Method for Autonomous Data Partitioning

    Gu, X., Angelov, P. P. & Principe, J., 09/2018, In : Information Sciences. 460-461, p. 65-82 18 p.

    Research output: Contribution to journalJournal article

  103. Published

    The Benefits of a Self-Generated Cue Mnemonic for Timeline Interviewing

    Kontogianni, F., Hope, L., Vrij, A., Taylor, P. J. & Gabbert, F., 09/2018, In : Journal of Applied Research in Memory and Cognition. 7, 3, p. 454-461 8 p.

    Research output: Contribution to journalJournal article

  104. Published

    Flashlight: A novel monitoring path identification schema for securing cloud services

    Zhang, H., Luna, J., Suri, N. & Trapero, R., 27/08/2018, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 10 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  105. Published

    Design and Analysis of Secure Quantum Network System with Trusted Repeaters

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 511-514 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  106. Published

    Quantum Key Distribution Random Access Network

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 174-178 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  107. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  108. Published

    Autonomous learning multi-model systems from data streams

    Angelov, P. P., Gu, X. & Principe, J., 1/08/2018, In : IEEE Transactions on Fuzzy Systems. 26, 4, p. 2213-2224 12 p.

    Research output: Contribution to journalJournal article

  109. Published

    Computationally Intelligent Techniques for Resource Management in MmWave Small Cell Networks

    Munir, H., Pervaiz, H., Hassan, S. A., Musavian, L., Ni, Q., Imran, M. A. & Tafazolli, R., 08/2018, In : IEEE Wireless Communications. 25, 4, p. 32-39 8 p.

    Research output: Contribution to journalJournal article

  110. Published

    The influence of social reciprocity in the investigative interview

    Weiher, L., Winters, C., Taylor, P. J. & Luther, K., 11/07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  111. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  112. Published

    Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC) 2018

    Weir, C. A. F. (ed.) & Mazurek, M. (ed.), 1/07/2018, Reston, VA: Internet Society.

    Research output: Book/Report/ProceedingsBook

  113. Published

    Controlling the interview: The influencing techniques of suspects of control and coercion

    Watson, S., Luther, K., Taylor, P. J., Jackson, J. & Alison, L., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  114. Published

    Safe space: Examining the effect of interview location on self-disclosure

    Winters, C., Taylor, P. J. & Luther, K., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  115. Published

    Semi-supervised deep rule-based approach for image classification

    Gu, X. & Angelov, P. P., 07/2018, In : Applied Soft Computing. 68, p. 53-68 16 p.

    Research output: Contribution to journalJournal article

  116. Published

    A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems

    Birkholz, H., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Arul, T., Heinrich, M., Katzenbeisser, S., Suri, N., Vateva-Gurova, T. & Schlehuber, C., 25/06/2018. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  117. Published

    Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Gouglidis, A., Grompanopoulos, C. & Mavridou, A., 25/06/2018, Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018). Bliudze, S. & Bensalem, S. (eds.). EPTCS, p. 52-64 13 p. (EPTCS; vol. 272).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  118. Published

    Whetstone: Reliable monitoring of cloud services

    Zhang, H., Luna, J., Trapero, R. & Suri, N., 18/06/2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, p. 115-122 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  119. Published

    A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  120. Published

    ActuEating: Designing, Studying and Exploring Actuating Decorative Artefacts

    Nabil, S., Everitt, A., Sturdee, M. A., Alexander, J. M., Bowen, S., Wright, P. & Kirk, D., 8/06/2018, DIS '18 Proceedings of the 2018 Designing Interactive Systems Conference. New York: ACM, p. 327-339 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  121. Published

    Lancaster at SemEval-2018 Task 3: Investigating Ironic Features in English Tweets

    Dearden, E. & Baron, A., 6/06/2018, Proceedings of the 12th International Workshop on Semantic Evaluation (SemEval-2018). Association for Computational Linguistics, p. 587-593 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  122. Published

    Correntropy-Based Evolving Fuzzy Neural System

    Bao, R., Rong, H., Angelov, P. P., Chen, B. & Wong, P. K., 06/2018, In : IEEE Transactions on Fuzzy Systems. 26, 3, p. 1324-1338 14 p.

    Research output: Contribution to journalJournal article

  123. Published

    On the trajectory of video quality transition in HTTP adaptive video streaming

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 06/2018, In : Multimedia Systems. 24, 3, p. 327-340 14 p.

    Research output: Contribution to journalJournal article

  124. Published

    Self-Organising Fuzzy Logic Classifier

    Gu, X. & Angelov, P. P., 06/2018, In : Information Sciences. 447, p. 36-51 16 p.

    Research output: Contribution to journalJournal article

  125. Published

    Random Damage in Interconnected Networks

    König, S. & Gouglidis, A., 31/05/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  126. Published

    Siren: A platform for deploying virtual network services in the cloud to Fog continuum

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 31/05/2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, p. 202-207 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  127. Published

    Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

  128. Published

    Strong PUFs from arrays of resonant tunnelling diodes

    Astbury, B., Bagci, I. E., McGrath, T., Sexton, J., Missous, M., Roedig, U., Bernardo Gavito, R. & Young, R. J., 10/05/2018, In : arXiv.

    Research output: Contribution to journalLetter

  129. Published

    Anomalous behaviour detection based on heterogeneous data and data fusion

    Mohd Ali, A. & Angelov, P., 05/2018, In : Soft Computing. 22, 10, p. 3187-3201 15 p.

    Research output: Contribution to journalJournal article

  130. Published

    High-Stakes Conflicts and the Link between Theory and Practice: Celebrating the Work of Ellen Giebels

    Oostinga, M., Rispens, S., Taylor, P. J. & Ufkes, E., 05/2018, In : Negotiation and Conflict Management Research. 11, 2, p. 146-159 14 p.

    Research output: Contribution to journalJournal article

  131. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  132. Published

    Grand Challenges in Shape-Changing Interface Research

    Alexander, J., Roudaut, A., Steimle, J., Hornbaek, K., Bruns Alonso, M., Follmer, S. & Merritt, T., 23/04/2018, CHI '18 Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. New York: ACM, 14 p. 299

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  133. Published

    Sketch & The Lizard King: Supporting Image Inclusion in HCI Publishing

    Sturdee, M. A., Alexander, J. M., Coulton, P. & Carpendale, S., 23/04/2018, CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. New York: ACM, 10 p. alt15

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  134. Published

    Message from the IC2E 2018 General Chairs

    Hua, K. A., Suri, N., J., L. (ed.), A., C. (ed.), T., G. (ed.) & Y., C. (ed.), 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. xiii 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  135. Published

    Monitoring path discovery for supporting indirect monitoring of cloud services

    Zhang, H., Manzoor, S., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 274-277 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  136. Published

    Threat modeling and analysis for the cloud ecosystem

    Manzoor, S., Zhang, H., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 278-281 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  137. Published

    Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience

    Gouglidis, A. & Hutchison, D., 10/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  138. Published

    Internet traffic characterisation: Third-order statistics & higher-order spectra for precise traffic modelling

    Marnerides, A., Pezaros, D. & Hutchison, D., 7/04/2018, In : Computer Networks. 134, p. 183-201 19 p.

    Research output: Contribution to journalJournal article

  139. Published

    Increasing Light Absorption and Collection Using Engineered Structures

    Noori, Y., Woodhead, C. S. & Young, R. J., 4/04/2018, Two-dimensional Materials for Photodetector. Nayak, P. K. (ed.). InTech, p. 193-212 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  140. Published

    IoT-Driven Automated Object Detection Algorithm for Urban Surveillance Systems in Smart Cities

    Hu, L. & Ni, Q., 1/04/2018, In : IEEE Internet of Things Journal. 5, 2, p. 747-754 8 p.

    Research output: Contribution to journalJournal article

  141. Published

    Performance Analysis of Relaying Systems with Fixed and Energy Harvesting Batteries

    Siddiqui, A. M., Musavian, L., Aissa, S. & Ni, Q., 04/2018, In : IEEE Transactions on Communications. 66, 4, p. 1386-1398 14 p.

    Research output: Contribution to journalJournal article

  142. Published

    Appliance-level Short-term Load Forecasting using Deep Neural Networks

    Ud Din, G. M., Mauthe, A. U. & Marnerides, A., 8/03/2018, 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 53-57 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  143. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In : Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to journalJournal article

  144. Published

    A Massively Parallel Deep Rule-Based Ensemble Classifier for Remote Sensing Scenes

    Gu, X., Angelov, P. P., Zhang, C. & Atkinson, P. M., 03/2018, In : IEEE Geoscience and Remote Sensing Letters. 15, 3, p. 345-349 5 p.

    Research output: Contribution to journalJournal article

  145. Published

    Parsimonious Random Vector Functional Link Network for Data Streams

    Pratama, M., Angelov, P. P., Lughofer, E. & Joo Er, M., 03/2018, In : Information Sciences. 430-431, p. 519-537 19 p.

    Research output: Contribution to journalJournal article

  146. Published

    Large Area Heterostructures from Graphene and Silica Encapsulated Colloidal Quantum Dots via the Langmuir-Blodgett Method

    Black, A., Roberts, J., Acebron, M., Bernardo Gavito, R., Alsharif, G., J. Urbanos, F., Juarez, B. H., Kolosov, O. V., Robinson, B. J., Vázquez De Parga, A. L., Granados, D. & Young, R. J., 28/02/2018, In : ACS Applied Materials and Interfaces. 10, 8, p. 6805-6809 5 p., 10.

    Research output: Contribution to journalJournal article

  147. Published

    Optical reading of a security element [2]

    Young, R. J. & Roedig, U., 21/02/2018, IPC No. G06K19/06; G06K7/12; G06K9/00, Patent No. GB20170013634 20170824 , Priority date 24/08/2017, Priority No. GB20170013634 20170824

    Research output: Patent

  148. Published

    Generating a Nondeterministic Response to a Challenge

    Roberts, J., Bernardo Gavito, R. & Young, R. J., 1/02/2018, IPC No. G06F7/58; H04L9/32, Patent No. GB1613003.1 GB2543126 (A) GB2543126 (B) WO2018020202, Priority date 27/07/2016, Priority No. GB20160013003 20160727

    Research output: Patent

  149. Published

    Generating a unique response to a challenge

    Bernardo Gavito, R., Roberts, J., Roedig, U. & Young, R. J., 1/02/2018, IPC No. G06F21/73; H04L9/32, Patent No. GB1613002.3 WO2018020201 (A1) GB2543125 (A) GB2543125 (B) , Priority date 27/07/2016, Priority No. GB20160013002 20160727

    Research output: Patent

  150. Published

    Communication error management in law enforcement interactions: a receiver’s perspective

    Oostinga, M., Giebels, E. & Taylor, P. J., 02/2018, In : Psychology, Crime and Law. 24, 2, p. 134-155 22 p.

    Research output: Contribution to journalJournal article

  151. Published

    Empirical Fuzzy Sets

    Angelov, P. P. & Gu, X., 02/2018, In : International Journal of Intelligent Systems. 33, 2, p. 362-395 34 p.

    Research output: Contribution to journalJournal article

  152. Published

    Guest Editorial: Body Sensor Networks

    Koutsakis, P., Spachos, P. & Marnerides, A., 29/01/2018, In : IET Wireless Sensor Systems. 8, 1, p. 1-2 2 p.

    Research output: Contribution to journalEditorial

  153. Published

    IMPROVEMENTS RELATING TO THE AUTHENTICATION OF PHYSICAL ENTITIES

    Young, R. J. & Falko, V., 18/01/2018, IPC No. G06K19/10; G06K7/14; G06Q30/00; G07D7/12; B42D25/29, Patent No. US2018018846 (A1) AU2016211063 (A1) CN107810517 (A) EP3251103 (A1) GB2538181 (A) GB2538181 (B) , Priority date 27/01/2015, Priority No. GB20150001342 20150127 ; WO2016GB50164 20160126

    Research output: Patent

  154. Published

    Room temperature mid-infrared emission from faceted InAsSb multi quantum wells embedded in InAs nanowires

    Alhodaib, A., Noori, Y., Carrington, P. J., Sanchez, A., Thompson, M. D., Young, R. J., Krier, A. & Marshall, A. R. J., 10/01/2018, In : Nano Letters. 18, 1, p. 235-240 6 p.

    Research output: Contribution to journalJournal article

  155. Published

    Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research

    Sturdee, M. & Alexander, J., 3/01/2018, In : ACM Computing Surveys. 51, 1, p. 2:1-2:32 32 p., 2.

    Research output: Contribution to journalJournal article

  156. Published

    'An error is feedback’: the experience of communication error management in crisis negotiations

    Oostinga, M., Giebels, E. & Taylor, P. J., 01/2018, In : Police Practice and Research. 19, 1, p. 17-30 14 p.

    Research output: Contribution to journalJournal article

  157. Published

    Drone-Aided Communication as a Key Enabler for 5G and Resilient Public Safety Networks

    Naqvi, S. A. R., Hassan, S. A., Pervaiz, H. & Ni, Q., 01/2018, In : IEEE Communications Magazine. 56, 1, p. 36-42 7 p.

    Research output: Contribution to journalJournal article

  158. Published

    Self-organised direction aware data partitioning algorithm

    Gu, X., Angelov, P. P., Kangin, D. & Principe, J., 01/2018, In : Information Sciences. 423, p. 80-95 16 p.

    Research output: Contribution to journalJournal article

  159. E-pub ahead of print

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 2018, p. 1-34, 34 p.

    Research output: Working paper

  160. Published

    Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization

    Tian, D., Zhou, J., Chen, M., Sheng, Z., Ni, Q. & Leung, V. C. M., 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. IEEE, p. 90-98 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  161. Published

    CreativeTeams: exploring the creative performance of co-located and virtual teams

    Shreeve, B., 2018, Lancaster University. 185 p.

    Research output: ThesisDoctoral Thesis

  162. Published

    G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games

    Alshawish, A., Amine Abid, M., de Meer, H., Schauer, S., König, S., Gouglidis, A. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice . Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 129-156 28 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  163. Published

    Looking at the same interaction and seeing something different: The role of information, judgment perspective and behavioral coding on judgment 'accuracy'

    Wall, H., Taylor, P. J., Campbell, C., Heim, D. & Richardson, B., 2018, In : Journal of Individual Differences. 39, p. 123-141 19 p.

    Research output: Contribution to journalJournal article

  164. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  165. 2017
  166. Published

    Extracting random numbers from quantum tunnelling through a single diode

    Bernardo Gavito, R., Bagci, I. E., Roberts, J., Sexton, J., Astbury, B., Shokeir, H., Mcgrath, T., Noori, Y., Woodhead, C., Missous, M., Roedig, U. & Young, R. J., 19/12/2017, In : Scientific Reports. 7, 6 p., 17879.

    Research output: Contribution to journalJournal article

  167. Published
  168. Published

    Navigating Diverse Data Science Learning: Critical Reflections Towards Future Practice

    Elkhatib, Y., 11/12/2017, Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, p. 357-362 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  169. Published

    Using DSML for Handling Multi-tenant Evolution in Cloud Applications

    Jumagaliyev, A., Whittle, J. N. D. & Elkhatib, Y., 11/12/2017, Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, p. 272-279 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  170. Published

    Malware detection in migrated virtual machines

    El-Moussa, F., Mauthe, A. U., Marnerides, A. & Watson, M., 7/12/2017, Patent No. 20170351861

    Research output: Patent

  171. Published

    Supply chain resilience in a developing country context: A case study on the interconnectedness of threats, strategies, and outcomes

    Tukamuhabwa Rwakira, B., Stevenson, M. & Busby, J. S., 4/12/2017, In : Supply Chain Management: An International Journal. 22, 6, p. 486-505 20 p.

    Research output: Contribution to journalJournal article

  172. Published

    Adaptive management of cognitive radio networks employing femtocells

    Al-dulaimi, A., Anpalagan, A., Al-rubaye, S. & Ni, Q., 12/2017, In : IEEE Systems Journal. 11, 4, p. 2687-2698 12 p.

    Research output: Contribution to journalJournal article

  173. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In : IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to journalJournal article

  174. Published

    Empirical data analytics

    Angelov, P. P., Gu, X. & Kangin, D., 12/2017, In : International Journal of Intelligent Systems. 32, 12, p. 1261-1284 24 p.

    Research output: Contribution to journalJournal article

  175. Published

    NOMA-Enabled Cooperative Unicast–Multicast: Design and Outage Analysis

    Yang, L., Chen, J., Ni, Q., Shi, J. & Xue, X., 12/2017, In : IEEE Transactions on Wireless Communications. 16, 12, p. 7870-7889 20 p.

    Research output: Contribution to journalJournal article

  176. Published

    Charting an Intent Driven Network

    Elkhatib, Y., Coulson, G. & Tyson, G., 26/11/2017, 2017 13th International Conference on Network and Service Management (CNSM). IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  177. Published

    Modeling Server Workloads for Campus Email Traffic Using Recurrent Neural Networks

    Boukoros, S., Nugaliyadde, A., Marnerides, A., Vassilakis, C., Koutsakis, P. & Wai Wong, K., 14/11/2017, Neural Information Processing. ICONIP 2017. Liu, D., Xie, S., Li, Y., Zhou, D. & El-Alfy, E. S. (eds.). Cham: Springer, p. 57-66 10 p. (Lecture Notes in Computer Science; vol. 10638).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  178. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  179. Published

    Inferring BGP blackholing activity in the Internet

    Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A. & Berger, A., 1/11/2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 1-14 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  180. Published

    A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data

    Qi, L., Zhang, X., Dou, W. & Ni, Q., 11/2017, In : IEEE Journal on Selected Areas in Communications. 35, 11, p. 2616-2624 9 p.

    Research output: Contribution to journalJournal article

  181. Published

    A time-sensitive historical thesaurus-based semantic tagger for deep semantic annotation

    Piao, S. S., Dallachy, F., Baron, A., Demmen, J. E., Wattam, S., Durkin, P., McCracken, J., Rayson, P. E. & Alexander, M., 11/2017, In : Computer Speech and Language. 46, p. 113-135 23 p.

    Research output: Contribution to journalJournal article

  182. Published

    Adaptive bitrate selection: a survey

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 11/2017, In : Communications Surveys and Tutorials, IEEE Communications Society. 19, 4, p. 2985-3014 30 p.

    Research output: Contribution to journalJournal article

  183. Published

    Big Data and Natural Language Processing for Analysing Railway Safety

    Syeda, K. N., Shirazi, S. N. U. H., Naqvi, S. A. A., Parkinson, H. J. & Bamford, G., 11/2017, Innovative Applications of Big Data in the Railway Industry. Kohli, D. S., Kumar, D. A. V. S., Easton, D. J. M. & Roberts, P. C. (eds.). IGI Global Publishing, p. 240-267 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  184. Published

    Network service orchestration standardization: a technology survey

    Rotsos, C., King, D., Farshad, A., Bird, J., Fawcett, L., Georgalas, N., Gunkel, M., Shiomoto, K., Wang, A., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 11/2017, In : Computer Standards and Interfaces. 54, 4, p. 203-215 13 p.

    Research output: Contribution to journalJournal article

  185. Published

    On the Energy and Spectral Efficiency Tradeoff in Massive MIMO Enabled HetNets with Capacity-Constrained Backhaul Links

    Hao, Y., Ni, Q., Li, H. & Hou, S., 11/2017, In : IEEE Transactions on Communications. 65, 11, p. 4720-4733 14 p.

    Research output: Contribution to journalJournal article

  186. Published

    The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective

    Shirazi, S. N. U. H., Gouglidis, A., Farshad, A. & Hutchison, D., 11/2017, In : IEEE Journal on Selected Areas in Communications. 35, 11, p. 2586-2595 10 p.

    Research output: Contribution to journalJournal article

  187. Published

    A Stitch in Time: Supporting Android Developers in Writing Secure Code

    Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C. A. F. & Fahl, S., 30/10/2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1065-1077 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  188. Published

    Quick verification of concurrent programs by iteratively relaxed scheduling

    Metzler, P., Saissi, H., Bokor, P., Suri, N., T.N., N. (ed.), G., R. (ed.) & M., D. P. (ed.), 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 776-781 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  189. Published

    TrEKer: Tracing error propagation in operating system kernels

    Coppik, N., Schwahn, O., Winter, S., Suri, N., T.N., N. (ed.), G., R. & M., D. P., 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 377-387 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  190. Published

    A cascade of deep learning fuzzy rule-based image classifier and SVM

    Angelov, P. P. & Gu, X., 5/10/2017, Systems, Man, and Cybernetics (SMC), 2017 IEEE International Conference on: Human Intelligence for Systems and Cybernetics. IEEE, p. 746-751 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  191. Published

    Mobile Live Video Streaming Optimization via Crowdsourcing Brokerage

    Wu, T., Dou, W., Ni, Q., Yu, S. & Chen, G., 10/2017, In : IEEE Transactions on Multimedia. 19, 10, p. 2267-2281 15 p.

    Research output: Contribution to journalJournal article

  192. Published

    Self-organized Relay Selection for Cooperative Transmission in Vehicular Ad-hoc Networks

    Tian, D., Zhou, J., Sheng, Z., Chen, M., Ni, Q. & Leung, V. C. M., 10/2017, In : IEEE Transactions on Vehicular Technology. 66, 10, p. 9534-9549 16 p.

    Research output: Contribution to journalJournal article

  193. Published

    Optical identification using imperfections in 2D materials

    Cao, Y., Robson, A. J., Alharbi, A., Roberts, J., Woodhead, C., Noori, Y., Bernardo Gavito, R., Roedig, U., Falko, V. & Young, R. J., 28/09/2017, In : 2D Materials. 4, 4, 8 p., 045021.

    Research output: Contribution to journalJournal article

  194. Published

    Developers Need Support, Too: A Survey of Security Advice for Software Developers

    Acar, Y., Stransky, C., Wermke, D., Weir, C. A. F., Mazurek, M. & Fahl, S., 24/09/2017, Proceedings of the IEEE Secure Development Conference 2017. Jaeger, T. (ed.). IEEE, p. 22-26 5 p. 17

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  195. Published

    Nondeterministic response to a challenge

    Young, R. J. & Bernardo Gavito, R., 20/09/2017, IPC No. G06F7/58, Patent No. GB2548428 WO2018029440 (A1) , Priority date 8/08/2016, Priority No. GB20160013595 20160808

    Research output: Patent

  196. Published

    Optical Reading of a Security Element

    Roberts, J. & Young, R. J., 20/09/2017, IPC No. G06K19/06; G06K9/00, Patent No. GB2548493 (B) GB2548493 (A) , Priority date 17/03/2017, Priority No. GB20170004308 20170317

    Research output: Patent

  197. Published

    Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges

    Usama, M., Qadir, J., Raza, A., Arif, H., Yau, K-L. A., Elkhatib, Y., Hussain, A. & Al-Fuqaha, A., 19/09/2017, In : arxiv.org. 37 p.

    Research output: Contribution to journalJournal article

  198. Published

    Using Design Fiction to Inform Shape-Changing Interface Design and Use

    Sturdee, M., Coulton, P. & Alexander, J. M., 6/09/2017, In : The Design Journal. 20, Suppl. 1, p. S4146-S4157 12 p.

    Research output: Contribution to journalJournal article

  199. Published

    Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study

    Kibirige Mukisa, S. & Rashid, A., 4/09/2017, 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  200. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  201. Published

    A new type of distance metric and its use for clustering

    Gu, X., Angelov, P. P., Kangin, D. & Principe, J., 09/2017, In : Evolving Systems. 8, 3, p. 167-177 11 p.

    Research output: Contribution to journalJournal article

  202. Published

    An exact algorithm for a resource allocation problem in mobile wireless communications

    Letchford, A. N., Ni, Q. & Zhong, Z., 09/2017, In : Computational Optimization and Applications. 68, 2, p. 193-208 16 p.

    Research output: Contribution to journalJournal article

  203. Published

    N-state random switching based on quantum tunnelling

    Bernardo Gavito, R., J. Urbanos, F., Roberts, J., Sexton, J., Astbury, B., Shokeir, H., Mcgrath, T., Noori, Y., Woodhead, C. S., Missous, M., Roedig, U. & Young, R. J., 31/08/2017, In : Proceedings of SPIE. 10354, p. 103541T 7 p.

    Research output: Contribution to journalJournal article

  204. Published

    C'MON: Monitoring the compliance of cloud services to contracted properties

    Alboghdady, S., Winter, S., Taha, A., Zhang, H. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 6 36

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  205. Published

    Towards DDoS attack resilient wide area monitoring systems

    Demir, K. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 7 p. 99

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  206. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (ed.), Tonetta, S. (ed.) & Schoitsch, E. (ed.), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  207. Published

    Safety verification utilizing model-based development for safety critical cyber-physical systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 15/08/2017, In : Journal of Information Processing Systems. 25, p. 797-810 14 p.

    Research output: Contribution to journalJournal article

  208. Published

    Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

    Green, B., Le, A. T., Antrobus, R., Roedig, U., Hutchison, D. & Rashid, A., 14/08/2017. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  209. Published

    Detecting peering infrastructure outages in the wild

    Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A. & Aben, E., 7/08/2017, SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication. New York: Association for Computing Machinery, Inc, p. 446-459 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  210. E-pub ahead of print

    Experimental evaluation of the impact of mobility management protocols on HTTP adaptive streaming

    Sani, Y., Isah, M., Edwards, C. J. & Mauthe, A. U., 1/08/2017, In : IET Networks.

    Research output: Contribution to journalJournal article

  211. Published

    Panning for gold: automatically analysing online social engineering attack surfaces

    Edwards, M., Larson, R., Green, B., Rashid, A. & Baron, A., 08/2017, In : Computers and Security. 69, p. 18-34 17 p.

    Research output: Contribution to journalJournal article

  212. Published

    Soft Computing Applied to Swarm Robotics

    Nedjah, N., Angelov, P., Castillo, O., de Macedo Mourelle, L. & Wang, C., 08/2017, In : Applied Soft Computing. 57, p. 696-697 2 p.

    Research output: Contribution to journalEditorial

  213. Published

    Statistical Delay QoS Driven Energy Efficiency and Effective Capacity Tradeoff for Uplink Multi-User Multi-Carrier Systems

    Yu, W., Musavian, L. & Ni, Q., 08/2017, In : IEEE Transactions on Communications. 65, 8, p. 3494-3508 15 p.

    Research output: Contribution to journalJournal article

  214. Published

    Distributed, multi-level network anomaly detection for datacentre networks

    Iordache, M., Jouet, S., Marnerides, A. & Pezaros, D., 31/07/2017, IEEE International Conference on Communications (ICC) 2017. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  215. Published

    Fake it till you make it: Fishing for Catfishes

    Magdy, W., Elkhatib, Y., Tyson, G., Joglekar, S. & Sastry, N., 31/07/2017, ASONAM '17 Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017. New York: ACM, p. 497-504 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  216. Published

    Fiction and Physicality: a designerly approach towards complexities of emerging technologies

    Hur, Y., Sturdee, M., Alonso, M. B., Markopoulos, P. & Alexander, J., 28/07/2017, In : The Design Journal. 20, Suppl. 1, p. S3849-S3862 14 p.

    Research output: Contribution to journalJournal article

  217. Published

    Brief announcement: statement voting and liquid democracy

    Zhang, B. & Zhou, H., 25/07/2017, PODC '17 Proceedings of the ACM Symposium on Principles of Distributed Computing. New York: ACM, p. 359-361 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  218. Published

    The Manipulative Presentation Techniques of Controlling and Coercive Offenders

    Watson, S. J., Luther, K., Jackson, J., Taylor, P. J. & Alison, L., 25/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  219. Published

    SDQ: Enabling rapid QoE experimentation using Software Defined Networking

    Fawcett, L., Mu, M., Broadbent, M. H., Hart, N. P. & Race, N. J. P., 24/07/2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon, Portugal: IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  220. Published

    A multi-disciplinary perspective on emergent and future innovations in peer review

    Tennant, J. P., Dugan, J. M., Graziotin, D., Jacques, D. C., Waldner, F., Mietchen, D., Elkhatib, Y., B. Collister, L., Pikas, C. K., Crick, T., Masuzzo, P., Caravaggi, A., Berg, D. R., Niemeyer, K. E., Ross-Hellauer, T., Mannheimer, S., Rigling, L., Katz, D. S., Greshake Tzovaras, B., Pacheco-Mendoza, J. & 13 others, Fatima, N., Poblet, M., Isaakidis, M., Irawan, D. E., Renaut, S., Madan, C. R., Matthias, L., Nørgaard Kjær, J., O'Donnell, D. P., Neylon, C., Kearns, S., Selvaraju, M. & Colomb, J., 20/07/2017, In : F1000Research. 6, 53 p., 1151.

    Research output: Contribution to journalJournal article

  221. Published

    A programmable SDN+NFV-based architecture for UAV telemetry monitoring

    White, K., Denney, E., Knudson, M. D., Marnerides, A. & Pezaros, D., 20/07/2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, p. 522-527 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  222. Published

    Multi-level resilience in networked environments: concepts and principles

    Ariffin, M. A. M., Marnerides, A. & Mauthe, A. U., 20/07/2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, p. 272-275 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  223. Published

    Silicon-based single quantum dot emission in the telecoms C‑band

    Orchard, J., Woodhead, C., Wu, J., Tang, M., Beanland, R., Noori, Y., Liu, H., Mowbray, D. & Young, R. J., 19/07/2017, In : ACS Photonics. 4, 7, p. 1740-1746 7 p.

    Research output: Contribution to journalJournal article

  224. Published

    "I feel stupid I can't delete...": a study of users' cloud deletion practices and coping strategies

    Ramokapane, K. M., Rashid, A. & Such, J., 12/07/2017, Proceedings of SOUPS 2017 Thirteenth Symposium on Usable Privacy and Security. USENIX Association, p. 241-256 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  225. Published

    The shadow warriors: in the no man’s land between industrial control systems and enterprise IT systems

    Zanutto, A., Shreeve, B. O., Follis, K., Busby, J. S. & Rashid, A., 12/07/2017, 3rd Workshop on Security Information Workers (WSIW 2017): In conjunction with 13th Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  226. Published

    LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems

    Le, A. T., Roedig, U. & Rashid, A., 4/07/2017, Engineering Secure Software and Systems: 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings. Bodden, E., Payer, M. & Athanasopoulos, E. (eds.). Cham: Springer, p. 36-52 17 p. (Lecture Notes in Computer Science; vol. 10379).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  227. Published

    SPM characterisation of nanomechanical proprieties of C60 monolayer formed by LB

    Lamantia, A., Robson, A. J., Pinter, G., Underwood, K. L., Roberts, J., Cao, Y., Young, R. J. & Robinson, B. J., 4/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  228. Published

    Human action recognition using transfer learning with deep representations

    Bux, A., Wang, X., Angelov, P. P. & Habib, Z., 3/07/2017, 2017 International Joint Conference on Neural Networks (IJCNN). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  229. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In : Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to journalJournal article

  230. Published

    Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In : IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to journalJournal article

  231. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In : Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to journalJournal article

  232. Published

    REF: Enabling Rapid Experimentation of Contextual Network Traffic Management using Software Defined Networking

    Fawcett, L., Mu, M., Hareng, B. & Race, N. J. P., 07/2017, In : IEEE Communications Magazine. 55, 7, p. 144-150 7 p.

    Research output: Contribution to journalJournal article

  233. Published

    Statistical CSIT Aided User Scheduling for Broadcast MU-MISO System

    Cao, Q., Sun, Y., Ni, Q., Li, S. & Tan, Z., 07/2017, In : IEEE Transactions on Vehicular Technology. 66, 7, p. 6102-6114 13 p.

    Research output: Contribution to journalJournal article

  234. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  235. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  236. Published

    DeQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

    Zhang, H., Trapero, R., Luna, J., Suri, N., X., L. & U., B., 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  237. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (ed.) & M., L. (ed.), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  238. Published

    MICE: Multi-layer multi-model images classifier ensemble

    Angelov, P. P. & Gu, X., 22/06/2017, The 3rd IEEE International Conference on Cybernetics. IEEE, p. 436-443 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  239. Published

    Increasing the bit density from a quantum-confinement physically unclonable function

    Shokeir, H., Bernardo Gavito, R., Manuel, R-O., Granados, D. & Young, R. J., 21/06/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  240. Published

    The human fetus preferentially engages with face-like visual stimuli

    Reid, V. M., Dunn, K. J., Young, R. J., Amu, J., Donovan, T. & Reissland, N., 19/06/2017, In : Current Biology. 27, 12, p. 1825-1828 4 p.

    Research output: Contribution to journalJournal article

  241. Published

    Countering contextual bias in TV watching behavior: introducing social trend as external contextual factor in TV recommenders

    Lorenz, F., Yuan, J., Lommatzsch, A., Mu, M., Race, N., Hopfgartner, F. & Albayrak, S., 14/06/2017, Proceedings of the 2017 ACM International Conference on Interactive Experiences for TV and Online Video. New York, NY, USA: ACM, p. 21-30 10 p. (TVX '17).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  242. Published

    SketchingDIS: Hand-drawn Sketching in HCI

    Lewis, M., Sturdee, M. A., Alexander, J. M., Van Dijk, J., Kirkegård Rasmussen, M. & Hoang, T., 14/06/2017, DIS '17 Companion Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems. New York: ACM, p. 356-359 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  243. Published

    PolySurface: a design approach for rapid prototyping of shape-changing displays using semi-solid surfaces

    Everitt, A. & Alexander, J., 10/06/2017, p. 1283-1294. 12 p.

    Research output: Contribution to conference - Without ISBN/ISSN Other

  244. Published

    Culture moderates changes in linguistic self-presentation and detail provision when deceiving others

    Taylor, P. J., Larner, S., Conchie, S. M. & Menacere, T., 7/06/2017, In : Royal Society Open Science. 4, 11 p., 170128.

    Research output: Contribution to journalJournal article

  245. Published

    LoRa Transmission Parameter Selection

    Bor, M. & Roedig, U., 5/06/2017, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  246. Published

    Application of non-orthogonal multiple access in cooperative spectrum-sharing networks over Nakagami-m fading channels

    Lv, L., Ni, Q., Ding, Z. & Chen, J., 06/2017, In : IEEE Transactions on Vehicular Technology. 66, 6, p. 5506-5511 6 p.

    Research output: Contribution to journalJournal article

  247. Published

    Design of Cooperative Non-Orthogonal Multicast Cognitive Multiple Access for 5G Systems: User Scheduling and Performance Analysis

    Lv, L., Chen, J., Ni, Q. & Ding, Z., 06/2017, In : IEEE Transactions on Communications. 65, 6, p. 2641-2656 16 p.

    Research output: Contribution to journalJournal article

  248. Published

    Dynamic User Grouping and Joint Resource Allocation with Multi-Cell Cooperation for Uplink Virtual MIMO Systems

    Lu, X., Ni, Q., Li, W. & Zhang, H., 06/2017, In : IEEE Transactions on Wireless Communications. 16, 6, p. 3854-3869 15 p.

    Research output: Contribution to journalJournal article

  249. Published

    Autonomous anomaly detection

    Gu, X. & Angelov, P. P., 31/05/2017, IEEE Conference on Evolving and Adaptive Intelligent Systems. p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  250. Published

    Autonomous Learning Multi-Model Classifier of 0-Order (ALMMo-0)

    Angelov, P. P. & Gu, X., 31/05/2017, IEEE Conference on Evolving and Adaptive Intelligent Systems 2017. p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  251. Published
  252. Published

    A randomized neural network for data streams

    Pratama, M., Angelov, P. P., Lu, J., Lughofer, E., Seera, M. & Lim, C. P., 19/05/2017, Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN). USA: IEEE, p. 3423-3430 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  253. Published

    Fast feedforward non-parametric deep learning network with automatic feature extraction

    Angelov, P. P., Gu, X. & Principe, J., 14/05/2017, p. 534-541. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  254. Published

    Hybrid 2D Membrane-Nanoparticle Heterostructures via Langmuir-Blodgett Deposition

    Black, A., Roberts, J., Acebron, M., Bernardo Gavito, R., Alsharif, G., J. Urbanos, F., Juarez, B. H., Granados, D., Robinson, B. J., Vázquez De Parga, A. L. & Young, R. J., 13/05/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  255. E-pub ahead of print

    Game Theory Based Correlated Privacy Preserving Analysis in Big Data

    Wu, X., Wu, T., Khan, M., Ni, Q. & Dou, W., 5/05/2017, In : IEEE Transactions on Big Data.

    Research output: Contribution to journalJournal article

  256. Published

    An Efficient E2E Verifiable E-voting System without Setup Assumptions

    Kiayias, A., Zacharias, T. & Zhang, B., 1/05/2017, In : IEEE Security and Privacy Magazine. 15, 3, p. 14-23 10 p.

    Research output: Contribution to journalJournal article

  257. Published

    A Characterization of Actuation Techniques for Generating Movement in Shape-Changing Interfaces

    Taher, F., Vidler, J. & Alexander, J., 05/2017, In : International Journal of Human-Computer Interaction. 33, 5, p. 385-398 14 p.

    Research output: Contribution to journalJournal article

  258. Published

    AURORA: autonomous real-time on-board video analytics

    Angelov, P., Sadeghi Tehran, P. & Clarke, C., 05/2017, In : Neural Computing and Applications. 28, 5, p. 855-865 11 p.

    Research output: Contribution to journalJournal article

  259. Published

    I'd Like to Have an Argument, Please: Using Dialectic for Effective App Security

    Weir, C., Rashid, A. & Noble, J., 29/04/2017, EuroUSEC 2017: the 2nd European Workshop on Usable Security. Reston, VA: Internet Society, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  260. Published

    Resource Optimization in Multi-Tier HetNets Exploiting Multi-Slope Path Loss Model

    Munir, H., Hassan, S. A., Pervaiz, H., Ni, Q. & Musavian, L., 28/04/2017, In : IEEE Access. 5, p. 8714-8726 13 p.

    Research output: Contribution to journalJournal article

  261. Published

    Challenges and approaches in securing safety-relevant railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S. & Suri, N., 26/04/2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 139-145 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  262. Published

    Large-Area 2D-0D Heterostructures via Langmuir-Blodgett Film Deposition

    Black, A., Roberts, J., Acebron, M., Bernardo Gavito, R., Alsharif, G., J. Urbanos, F., Juarez, B. H., Granados, D., Robinson, B. J., Vázquez De Parga, A. L. & Young, R. J., 26/04/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  263. Published

    A Preliminary Look into Unsolicited Mobile App Traffic

    Lyko, T. & Elkhatib, Y., 24/04/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  264. Published

    Modeling social risk amplification during recall crises

    Liu, Y., Busby, J. S. & Onggo, B. S. S., 23/04/2017, ADS '17 Proceedings of the Agent-Directed Simulation Symposium. San Diego: Society for Computer Simulation International, 12 p. 4

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  265. Published

    Siren: a platform for deployment of VNFs in distributed infrastructures

    Fawcett, L. & Race, N. J. P., 3/04/2017, SOSR '17 Proceedings of the Symposium on SDN Research. New York: ACM, p. 201-202 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  266. Published

    Cybernetics of the mind: learning individual's perceptions autonomously

    Angelov, P. P., Gu, X., Iglesias, J., Ledezma, A., Sanchis, A., Sipele, O. & Ramezani, R., 04/2017, In : IEEE Systems, Man, and Cybernetics Magazine. 3, 2, p. 6-17 12 p.

    Research output: Contribution to journalJournal article

  267. Published

    Developer Essentials: Top Five Interventions to Support Secure Software Development

    Weir, C., Rashid, A. & Noble, J., 30/03/2017, Lancaster: Lancaster University. 9 p.

    Research output: Book/Report/ProceedingsCommissioned report

  268. Published

    Reordering Webpage Objects for Optimizing Quality-of-Experience

    Li, W., Zhao, Z., Min, G., Duan, H., Ni, Q. & Zhao, Z., 29/03/2017, In : IEEE Access. 5, p. 6626-6635 10 p.

    Research output: Contribution to journalJournal article

  269. Published

    Verification of Resilience Policies that Assist Attribute Based Access Control

    Gouglidis, A., Hu, V. C., Busby, J. S. & Hutchison, D., 24/03/2017, ABAC '17 Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control. New York: ACM, p. 43-52 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  270. Published

    Lessons from the extreme: what business negotiators can learn from hostage negotiations

    Taylor, P. J. & Donohue, W. A., 15/03/2017, The negotiator's desk reference. Honeymoon, C. & Schneider, A. (eds.). DRI Press, ( Negotiator's Desk Reference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  271. Published

    IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants

    Chan, A., Winter, S., Saissi, H., Pattabiraman, K. & Suri, N., 13/03/2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, p. 184-195 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  272. Published

    Towards zero packet loss with LISP Mobile Node

    Isah, M., Simpson, S., Sani, Y. & Edwards, C. J., 13/03/2017, 2017 International Conference on Computing, Networking and Communications (ICNC): Wireless Networks. IEEE, p. 265-271 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  273. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In : Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to journalJournal article

  274. Published

    P2P routing table poisoning: A quorum-based sanitizing approach

    Ismail, H., Germanus, D. & Suri, N., 1/03/2017, In : Computers and Security. 65, p. 283-299 17 p.

    Research output: Contribution to journalJournal article

  275. Published

    Ceremonies for end-to-end verifiable elections

    Kiayias, A., Zacharias, T. & Zhang, B., 03/2017, PKC 2017: Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Editors (view affiliations). Springer, p. 305-334 30 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  276. Published

    Fully online clustering of evolving data streams into arbitrarily shaped clusters

    Hyde, R., Angelov, P. & MacKenzie, A. R., 03/2017, In : Information Sciences. 382-383, p. 96-114 19 p.

    Research output: Contribution to journalJournal article

  277. Published

    On using micro-clouds to deliver the fog

    Elkhatib, Y., Porter, B. F., B. Ribeiro, H., Zhani, M. F., Qadir, J. & Rivière, E., 03/2017, In : IEEE Internet Computing. 21, 2, p. 8-15 8 p.

    Research output: Contribution to journalJournal article

  278. Published

    Protection against Cyber Attacks: Introducing Resilience for SCADA Networks

    Gouglidis, A. & Hutchison, D., 03/2017, 1 p. AIT Austrian Institute of Technology GmbH.

    Research output: Other contribution

  279. Published

    Mitigating Inter-Network Interference in LoRa Networks

    Voigt, T., Bor, M., Roedig, U. & Alonso, J., 20/02/2017, EWSN ’17 Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks. New York: ACM Press, p. 323-328 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  280. Published

    Distributed Resource Allocation Assisted by Intercell Interference Mitigation in Downlink Multicell MC DS-CDMA Systems

    Shi, J., Song, Z. & Ni, Q., 9/02/2017, In : IEEE Transactions on Wireless Communications. 16, 2, p. 1250-1266 17 p.

    Research output: Contribution to journalJournal article

  281. Published

    Directing self-assembly to grow adaptive physical structures

    Blaney, A., Dunn, N. S., Alexander, J. M., Richards, D., Rennie, A. E. W. & Anwar, J., 8/02/2017, In : International Journal of Rapid Manufacturing. 6, 2-3, p. 114-133 20 p.

    Research output: Contribution to journalJournal article

  282. Published

    The cultural dimension of uncertainty avoidance impacts police-civilian interaction

    Giebels, E., Oostinga, M., Taylor, P. J. & Curtis, J. L., 1/02/2017, In : Law and Human Behavior. 41, 1, p. 93-102 10 p.

    Research output: Contribution to journalJournal article

  283. Published

    A same kind of different: affordances, terrorism and the internet

    Taylor, P. J., Holbrook, D. & Joinson, A., 02/2017, In : Criminology and Public Policy. 16, 1, p. 127-133 7 p.

    Research output: Contribution to journalJournal article

  284. Published

    Closing the gap: human factors in cross-device media synchronization

    Mu, M., Fawcett, L., Bird, J., Trench-Jellicoe, J. M. E., Simpson, S., Stokking, H. & Race, N. J. P., 02/2017, In : IEEE Journal of Selected Topics in Signal Processing. 11, 1, p. 180-195 16 p.

    Research output: Contribution to journalJournal article

  285. Published

    Interference-aware energy efficiency maximization in 5G ultra-dense networks

    Yang, C., Li, J., Ni, Q., Anpalagan, A. & Guizani, M., 02/2017, In : IEEE Transactions on Communications. 65, 2, p. 728-739 12 p.

    Research output: Contribution to journalJournal article

  286. Published

    Look together: using gaze for assisting co-located collaborative search

    Zhang, Y., Pfeuffer, K., Chong, M. K., Alexander, J. M., Bulling, A. & Gellersen, H-W. G., 02/2017, In : Personal and Ubiquitous Computing. 21, 1, p. 173-186 14 p.

    Research output: Contribution to journalJournal article

  287. Published

    Norm monitoring under partial action observability

    Criado, N. & Such, J. M., 02/2017, In : IEEE Transactions on Cybernetics. 47, 2, p. 270-282 13 p.

    Research output: Contribution to journalJournal article

  288. Published

    Short term power load forecasting using Deep Neural Networks

    Ud Din, G. M. & Marnerides, A., 26/01/2017, 2017 International Conference on Computing, Networking and Communications (ICNC). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  289. Published

    A comprehensive review on handcrafted and learning-based action representation approaches for human activity recognition

    Bux, A., Angelov, P. P. & Habib, Z., 23/01/2017, In : Applied Sciences. 7, 1, 37 p., 110.

    Research output: Contribution to journalJournal article

  290. Published

    SeReCP: A secure and reliable communication platform for the smart grid

    Demir, K., Suri, N., M., K. (ed.), D.S., K. (ed.) & V., V. (ed.), 22/01/2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 175-184 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  291. Published

    Gaussian integers and interleaved rank codes for space-time block codes

    Asif, H., Honary, B. & Hamyun, M. T., 10/01/2017, In : International Journal of Communication Systems. 30, 1, e2943.

    Research output: Contribution to journalJournal article

  292. Published

    Novel Intercell Interference Mitigation Algorithms for Multicell OFDMA Systems with Limited Base Station Cooperation

    Shi, J., Yang, L. & Ni, Q., 10/01/2017, In : IEEE Transactions on Vehicular Technology. 66, 1, p. 406-420 15 p.

    Research output: Contribution to journalJournal article

  293. Published

    Robust QoS-aware communication in the smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 1/01/2017, In : Peer-to-Peer Networking and Applications. 10, 1, p. 193-207 15 p.

    Research output: Contribution to journalJournal article

  294. Published

    Co-ordinated Airborne Studies in the Tropics (CAST)

    Harris, N. R. P., Carpenter, L. J., Lee, J. D., Vaughan, G., Filus, M. T., Jones, R. L., OuYang, B., Pyle, J. A., Robinson, A. D., Andrews, S. J., Lewis, A. C., Minaeian, J., Vaughan, A., Dorsey, J. R., Gallagher, M. W., Le Breton, M., Newton, R., Percival, C. J., Ricketts, H. M. A., Baugitte, S. J-B. & 17 others, Nott, G. J., Wellpott, A., Ashfold, M. J., Flemming, J., Butler, R., Palmer, P. I., Kaye, P. H., Stopford, C., Chemel, C., Boesch, H., Humpage, N., Vick, A., MacKenzie, A. R., Hyde, R., Angelov, P., Meneguz, E. & Manning, A. J., 01/2017, In : Bulletin of the American Meteorological Society. 98, 1, p. 145-162 18 p.

    Research output: Contribution to journalJournal article

  295. Published

    Investigating the use of a dynamic physical bar chart for data exploration and presentation

    Taher, F., Jansen, Y., Woodruff, J., Hardy, J., Hornbaek, K. & Alexander, J., 01/2017, In : IEEE Transactions on Visualization and Computer Graphics. 23, 1, p. 451-460 10 p.

    Research output: Contribution to journalJournal article

  296. Published

    Look-a-like: a fast content-based image retrieval approach using a hierarchically nested dynamically evolving image clouds and recursive local data density

    Angelov, P. & Sadeghi Tehran, P., 01/2017, In : International Journal of Intelligent Systems. 32, 1, p. 82-103 22 p.

    Research output: Contribution to journalJournal article

  297. Published

    A Situation Aware Information Infrastructure (SAI^2) Framework

    Marnerides, A., Pezaros, D., Jose, J., Mauthe, A. U. & Hutchison, D., 2017, Smart Objects and Technologies for Social Good Second International Conference, GOODTECHS 2016, Venice, Italy, November 30 – December 1, 2016, Proceedings. Gaggi, O., Manzoni, P., Palazzi, C., Bujari, A. & Marquez-Barja, J. (eds.). Cham: Springer, p. 186-194 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 195).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  298. Published

    Anomaly detection for resilience in cloud computing infrastructures

    Shirazi, S. N. U. H., 2017, Lancaster University. 205 p.

    Research output: ThesisDoctoral Thesis

  299. Published

    How to Improve the Security Skills of Mobile App Developers: An Analysis of Expert Knowledge

    Weir, C., 2017, Lancaster University. 135 p.

    Research output: ThesisMaster's Thesis

  300. Published

    Resource Allocation for Weighted Sum-Rate Maximization in Multi-User Full-Duplex Deviceto-Device Communications: Approaches for Perfect and Statistical CSIs

    Li, S., Ni, Q., Sun, Y. & Min, G., 2017, In : IEEE Access. 5, p. 27229-27241 13 p.

    Research output: Contribution to journalJournal article

  301. Published

    The relationship between risk control imperative and perceived causation: the case of product counterfeiting in China

    Ding, B., Stevenson, M. & Busby, J. S., 2017, In : Journal of Risk Research. 20, 6, p. 800-826 27 p.

    Research output: Contribution to journalJournal article

  302. Published

    Towards Interactive Multidimensional Visualisations for Corpus Linguistics

    Rayson, P. E., Mariani, J. A., Anderson-Cooper, B., Baron, A., Gullick, D. S., Moore, A. & Wattam, S., 2017, In : Journal for Language Technology and Computational Linguistics. 31, 1, p. 27-49 23 p.

    Research output: Contribution to journalJournal article

  303. 2016
  304. Published

    On the security of machine learning in malware C & C detection: a survey

    Gardiner, J. & Nagaraja, S., 18/12/2016, In : ACM Computing Surveys. 49, 3, 39 p., 59.

    Research output: Contribution to journalJournal article

  305. Published

    A Distributed Caching Approach for Improved Data Availability in Rural Wireless Mesh Networks

    Ajayi, A. O., Edwards, C. J. & Roedig, U., 16/12/2016, Computational Science and Computational Intelligence (CSCI), 2016 International Conference on. 16772962: IEEE, p. 904 - 910 7 p. 16772962

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  306. Published

    Baguette: towards end-to-end service orchestration in heterogeneous networks

    Rotsos, C., Farshad, A., Hart, N. P., Aguado, A., Bidkar, S., Sideris, K., King, D., Fawcett, L., Bird, J., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 15/12/2016, International Conference on Ubiquitous Computing and Communications (IUCC'16). IEEE, p. 196-203 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  307. Published

    GazeArchers: playing with individual and shared attention in a two-player look&shoot tabletop game

    Pfeuffer, K., Alexander, J. & Gellersen, H., 12/12/2016, MUM '16 : Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia. New York: ACM, p. 213-216 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  308. Published

    Local modes-based free-shape data partitioning

    Angelov, P. P. & Gu, X., 9/12/2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  309. Published

    Quantum Physical Unclonable Function

    Young, R. J., Roberts, J. & Roedig, U., 9/12/2016, IPC No. G09C1/00; H04L9/32, Patent No. GB1611554.5 KR20160141813 (A) CN106537484 (A) EP3108470 (A1) GB2537543 (A) GB2537543 (B) JP2017519350 (A) WO2015150739 (A1), Priority date 3/04/2014, Priority No. GB20140006002 20140403

    Research output: Patent

  310. Published

    Using context switches for VM scaling

    Hadley, J., Roedig, U. & Elkhatib, Y., 9/12/2016. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  311. Published

    Increasing the light extraction and longevity of TMDC monolayers using liquid formed micro-lenses

    Woodhead, C., Roberts, J., Noori, Y., Cao, Y., Bernardo Gavito, R., Tovee, P. D., Kozikov, A., Novoselov, K. S. & Young, R. J., 7/12/2016, In : 2D Materials. 4, 1, 8 p., 015032.

    Research output: Contribution to journalJournal article

  312. Published

    Indistinguishable proofs of work or knowledge

    Baldimtsi, F., Kiayias, A., Zacharias, T. & Zhang, B., 4/12/2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. Cheon, J. H. & Takagi, T. (eds.). Heidelberg: Springer, p. 902-933 32 p. (Lecture Notes in Computer Science; vol. 10032).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  313. Published

    Self-Adaptive Power Control Mechanism in D2D Enabled Hybrid Cellular Network with mmWave Small Cells: An Optimization Approach

    Raza, S. A., Hassan, S. A., Pervaiz, H. B., Ni, Q. & Musavian, L., 4/12/2016, Globecom Workshops (GC Wkshps), 2016 IEEE. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  314. Published

    Media Query Processing for the Internet-of-Things: Coupling of Device Energy Consumption and Cloud Infrastructure Billing

    Renna, F., Doyle, J., Giotsas, V. & Andreopoulos, Y., 1/12/2016, In : IEEE Transactions on Multimedia. 18, 12, p. 2537-2552 16 p., 7544517.

    Research output: Contribution to journalJournal article

  315. Published

    Energy efficient green wireless communication systems with imperfect CSI and data outage

    Zarakovitis, C. C., Ni, Q. & Spiliotis, J., 12/2016, In : IEEE Journal on Selected Areas in Communications. 34, 12, p. 3108-3126 19 p.

    Research output: Contribution to journalJournal article

  316. Published

    Intelligent energy efficient localization using variable range beacons in industrial wireless sensor networks

    Farooq-I-Azam, M., Ni, Q. & Ansari, E., 12/2016, In : IEEE Transactions on Industrial Informatics. 12, 6, p. 2206-2216 11 p.

    Research output: Contribution to journalJournal article

  317. Published

    Learning to be energy-efficient in cooperative networks

    Tian, D., Zhou, J., Sheng, Z. & Ni, Q., 12/2016, In : IEEE Communications Letters. 20, 12, p. 2518-2521 4 p.

    Research output: Contribution to journalJournal article

  318. Published

    MultiLog: a tool for the control and output merging of multiple logging applications

    Woodruff, J. & Alexander, J., 12/2016, In : Behavior Research Methods. 48, 4, p. 1296-1307 12 p.

    Research output: Contribution to journalJournal article

  319. Published

    Photonic crystals for enhanced light extraction from 2D materials

    Noori, Y., Cao, Y., Roberts, J., Woodhead, C., Bernardo Gavito, R., Tovee, P. & Young, R. J., 12/2016, In : ACS Photonics. 3, 12, p. 2515-2520 6 p.

    Research output: Contribution to journalJournal article

  320. Published

    An evolving approach to unsupervised and Real-Time fault detection in industrial processes

    Gomes Bezerra, C., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 30/11/2016, In : Expert Systems with Applications. 63, p. 134-144 11 p.

    Research output: Contribution to journalJournal article

  321. Published

    Flash mobs, Arab Spring and protest movements: can we analyse group identities in online conversations?

    Criado Pacheco, N., Rashid, A. & Leite, L., 15/11/2016, In : Expert Systems with Applications. 62, p. 212-224 13 p.

    Research output: Contribution to journalJournal article

  322. Published

    project SENSE – multimodal simulation with full-body real-time verbal and nonverbal interactions

    Miri, H., Kolkmeier, J., Taylor, P. J., Poppe, R. & Heylen, D., 15/11/2016, Intelligent Technologies for Interactive Entertainment: 8th International Conference, INTETAIN 2016, Utrecht, The Netherlands, June 28–30, 2016, Revised Selected Papers. Poppe, R., Meyer, J-J., Veltkamp, R. & Dastani, M. (eds.). Springer, p. 279-284 6 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 178).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  323. Published

    BGPStream: A software framework for live and historical BGP data analysis

    Orsini, C., King, A., Giordano, D., Giotsas, V. & Dainotti, A., 14/11/2016, IMC '16 Proceedings of the 2016 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 429-444 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  324. Published

    Do LoRa low-power wide-area networks scale?

    Bor, M., Roedig, U., Voigt, T. & Alonso, J., 14/11/2016, MSWiM '16 Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York: ACM Press, p. 59-67 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  325. Published

    Reaching the Masses: A New Subdiscipline of App Programmer Education

    Weir, C., Rashid, A. & Noble, J., 13/11/2016, FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York: ACM, p. 936-939 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  326. Published

    Combined cloud: a mixture of voluntary cloud and reserved instance marketplace

    Shen, W., Dou, W., Wu, F., Tang, S. & Ni, Q., 5/11/2016, In : Journal of Computer Science and Technology. 31, 6, p. 1110-1123 14 p.

    Research output: Contribution to journalJournal article

  327. Published

    Utilising motion capture technology to identify trusted testimony in military encounters

    Watson, S. J., Conchie, S. M., Taylor, P. J. & Poppe, R., 2/11/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  328. Published

    Achieving ICS resilience and security through granular data flow management

    Green, B., Krotofil, M. & Hutchison, D., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 93-101 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  329. Published

    Assured deletion in the cloud: requirements, challenges and future directions

    Ramokapane, M., Rashid, A. & Such, J. M., 28/10/2016, CCSW '16 Proceedings of the 2016 ACM on Cloud Computing Security Workshop. New York: ACM, p. 97-108 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  330. Published

    Parallel computing TEDA for high frequency streaming data clustering

    Gu, X., Angelov, P. P., Gutierrez, G., Iglesias, J. A. & Sanchi, A., 23/10/2016, Advances in Big Data: Proceedings of the 2nd INNS Conference on Big Data, October 23-25, 2016, Thessaloniki, Greece. Angelov, P., Manolopoulos, Y., Iliadis, L., Roy, A. & Vellasco, M. (eds.). Cham: Springer, p. 238-253 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  331. Published

    Human action recognition from multiple views based on view-invariant feature descriptor using support vector machines

    Bux, A., Angelov, P. P. & Habib, Z., 21/10/2016, In : Applied Sciences. 6, 10, 14 p., 309.

    Research output: Contribution to journalJournal article

  332. Published

    Autonomously evolving classifier TEDAClass

    Kangin, D., Angelov, P. & Iglesias, J. A., 20/10/2016, In : Information Sciences. 366, p. 1-11 11 p.

    Research output: Contribution to journalJournal article

  333. Published

    Malicious peers eviction for P2P overlays

    Ismail, H., Germanus, D. & Suri, N., 17/10/2016, 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, p. 216-224 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  334. Published

    Evolving multi-tenant SaaS cloud applications using model-driven engineering

    Jumagaliyev, A., Whittle, J. N. D. & Elkhatib, Y. S. S. A., 13/10/2016, 10th International Workshop on Models and Evolution. CEUR-WS.org, p. 60-64 5 p. (CEUR Workshop Proceedings; vol. 1706).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  335. Published

    Combinatorial Auction-Based Resource Allocation in the Fog

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 10/10/2016, Fifth European Workshop on Software Defined Networks (EWSDN), 2016. IEEE, p. 62-67 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  336. Published

    Autonomous data-driven clustering for live data stream

    Gu, X. & Angelov, P. P., 9/10/2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2016). IEEE, p. 1128-1135 8 p. 1303

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  337. Published

    Efficient access of mobile flows to heterogeneous networks under flash crowds

    Moura, J. & Edwards, C. J., 9/10/2016, In : Computer Networks. 107, 2, p. 163-177 15 p.

    Research output: Contribution to journalJournal article

  338. Published

    Empirical data analysis: a new tool for data analytics

    Angelov, P. P., Gu, X., Principe, J. & Kangin, D., 9/10/2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, p. 52-59 8 p. 1008

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  339. Published

    Modelling security risk in critical utilities: the system at risk as a three player game and agent society

    Busby, J. S., Gouglidis, A., Rass, S. & König, S., 9/10/2016, Proceedings of SMC 2016. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  340. Published

    Cooperative non-orthogonal multiple access in cognitive radio

    Lv, L., Chen, J. & Ni, Q., 10/2016, In : IEEE Communications Letters. 20, 10, p. 2059-2062 4 p.

    Research output: Contribution to journalJournal article

  341. Published

    Energy and spectral efficiency tradeoff with user association and power coordination in massive MIMO enabled HetNets

    Hao, Y., Ni, Q., Li, H. & Hou, S., 10/2016, In : IEEE Communications Letters. 20, 10, p. 2091-2094 4 p.

    Research output: Contribution to journalLetter

  342. Published

    Fusion: coalesced confidential storage and communication framework for the IoT

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T., 10/2016, In : Security and Communication Networks. 9, 15, p. 2656-2673 18 p.

    Research output: Contribution to journalJournal article

  343. Published

    Secure and privacy-aware cloud-assisted video reporting service in 5G enabled vehicular networks

    Hashem Eiza, M., Ni, Q. & Shi, Q., 10/2016, In : IEEE Transactions on Vehicular Technology. 65, 10, p. 7868-7881 14 p.

    Research output: Contribution to journalJournal article

  344. Published

    Intelligent Cybersecurity Agents [Guest editors' introduction]

    Such, J. M., Criado Pacheco, N., Vercouter, L. & Rehak, M., 29/09/2016, In : IEEE Intelligent Systems. 31, 5, p. 3-7 5 p.

    Research output: Contribution to journalEditorial

  345. Published

    Trusting Quantum Physics: lighting the way to secure communications

    Young, R. J., 28/09/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  346. Published

    Efficient verification of program fragments: Eager POR

    Metzler, P., Saissi, H., Bokor, P., Hess, R., Suri, N., Artho, C. (ed.), Peled, D. (ed.) & Legay, A. (ed.), 22/09/2016, Automated Technology for Verification and Analysis: 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings. Springer-Verlag, Vol. 9938 LNCS. p. 375-391 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  347. Published

    Energy Efficient Resource Allocation in 5G Hybrid Heterogeneous Networks: A Game Theoretic Approach

    Munir, H., Hassan, S. A., Pervaiz, H. B., Ni, Q. & Musavian, L., 18/09/2016, 2016 IEEE 84th Vehicular Technology Conference (VTC2016-Fall). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  348. Published

    Technology-related disasters: a survey towards disaster-resilient software defined networks

    Machuca, C. M., Secci, S., Vizaretta, P., Kuipers, F., Gouglidis, A., Hutchison, D., Jouet, S., Pezaros, D., Elmokashfi, A., Heegaard, P., Ristov, S. & Gusev, M., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on . IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  349. Published

    Threat awareness for critical infrastructures resilience

    Gouglidis, A., Green, B., Busby, J. S., Rouncefield, M. F., Hutchison, D. & Schauer, S., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on. 9781467390248: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  350. Published

    Towards policy refinement for resilience management in cloud

    Shirazi, S. N. U. H., Simpson, S., Syeda, K. N., Mauthe, A. U. & Hutchison, D., 13/09/2016, 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM). IEEE, p. 260-266 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  351. Published

    Advances in Computational Intelligence Systems: Contributions Presented at the 16th UK Workshop on Computational Intelligence, September 7–9, 2016, Lancaster, UK

    Angelov, P. P., Shen, Q., Jayne, C. & Gegov, A., 7/09/2016, Springer. 508 p. (Advances in Intelligent Systems and Computing; vol. 513)

    Research output: Book/Report/ProceedingsBook

  352. Published

    Detecting anomalous behaviour using heterogeneous data

    Mohd Ali, A., Angelov, P. P. & Gu, X., 7/09/2016, Advances in Computational Intelligence Systems: Contributions Presented at the 16th UK Workshop on Computational Intelligence, September 7–9, 2016, Lancaster, UK. Angelov, P., Gegov, A., Jayne, C. & Shen, Q. (eds.). Springer, p. 253-276 24 p. (Advances in Intelligent Systems and Computing; vol. 513).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  353. Published

    Vision based human activity recognition: a review

    Bux, A., Angelov, P. P. & Habib, Z., 7/09/2016, Advances in Computational Intelligence Systems: Contributions Presented at the 16th UK Workshop on Computational Intelligence, September 7–9, 2016, Lancaster, UK. Angelov, P., Gegov, A., Jayne, C. & Shen, Q. (eds.). Springer, p. 341-371 30 p. (Advances in Intelligent Systems and Computing; vol. 513).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  354. Published

    A privacy preserving approach to energy theft detection in smart grids

    Richardson, C., Race, N. & Smith, P., 1/09/2016, 2016 IEEE International Smart Cities Conference (ISC2). IEEE, p. 1-4 4 p. (Smart Cities Conference (ISC2), 2016 IEEE International).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  355. Published

    Novel efficient techniques for real-time cloud security assessment

    Modic, J., Trapero, R., Taha, A., Luna, J., Stopar, M. & Suri, N., 1/09/2016, In : Computers and Security. 62, p. 1-18 18 p.

    Research output: Contribution to journalJournal article

  356. Published

    Efficient interference mitigation in mmWave backhaul network for high data rate 5G wireless communications

    Shi, J., Ni, Q., Paoloni, C. & Magne, F., 09/2016, Proceedings of the 12th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2016). London: IET Press, p. 382-387 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  357. Published

    On the spectral-energy efficiency and rate fairness tradeoff in relay-aided cooperative OFDMA systems

    Song, Z., Ni, Q., Navaie, K., Hou, S. & Wu, S., 09/2016, In : IEEE Transactions on Wireless Communications. 15, 9, p. 6342-6355 14 p.

    Research output: Contribution to journalJournal article

  358. Published

    The simulated security assessment ecosystem: Does penetration testing need standardisation?

    Knowles, W., Baron, A. & McGarr, T., 09/2016, In : Computers and Security. 62, p. 296-316 21 p.

    Research output: Contribution to journalJournal article

  359. Published

    Practical Formal Verification for Model Based Development of Cyber-Physical Systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  360. Published

    Reliable Memory Efficient Name Forwarding in Named Data Networking

    Saxena, D., Raychoudhury, V., Becker, C. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 48-55 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  361. Published

    IMPROVE: Identifying Minimal PROfile VEctors for similarity based access control

    Misra, G., Such, J. M. & Balogun, H., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/I​SPA. IEEE, p. 868-875 8 p. (2016 IEEE Trustcom/BigDataSE/I​SPA).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  362. Published

    SENTRY: A novel approach for mitigating application layer DDoS threats

    Zhang, H., Taha, A., Trapero, R., Luna, J. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 465-472 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  363. Published

    Trust validation of cloud IaaS: A customer-centric approach

    Manzoor, S., Taha, A. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 97-104 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  364. Published

    Two-dimensional materials for quantum light sources and authentication

    Young, R. J., 23/08/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  365. Published

    Mimicry in online conversations: an exploratory study of linguistic analysis techniques

    Carrick, T., Rashid, A. & Taylor, P. J., 18/08/2016, Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  366. Published

    Non-sharing communities? an empirical study of community detection for access control decisions

    Misra, G., Such, J. M. & Balogun, H., 18/08/2016, Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  367. Published

    5G multimedia massive MIMO communications systems

    Ge, X., Wang, H., Zi, R., Li, Q. & Ni, Q., 16/08/2016, In : Wireless Communications and Mobile Computing. 16, 11, p. 1377-1388 12 p.

    Research output: Contribution to journalJournal article

  368. Published

    Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience

    Shirazi, S. N. U. H., Gouglidis, A., Syeda, K. N., Simpson, S., Mauthe, A. U., Stephanakis, I. M. & Hutchison, D., 16/08/2016, Resilience Week (RWS), 2016. IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  369. Published

    A novel 3D analytical scattering model for air-to-ground fading channels

    Gulfam, S. M., Nawaz, S. J., Ahmed, A., Patwary, M. N. & Ni, Q., 4/08/2016, In : Applied Sciences. 6, 8, 21 p., 207.

    Research output: Contribution to journalJournal article

  370. Published

    A scalable user fairness model for adaptive video streaming over SDN-assisted future networks

    Mu, M., Broadbent, M., Farshad, A., Hart, N., Hutchison, D., Ni, Q. & Race, N., 1/08/2016, In : IEEE Journal on Selected Areas in Communications. 34, 8, p. 2168-2184 17 p.

    Research output: Contribution to journalJournal article

  371. Published

    A general purpose intelligent surveillance system for mobile devices using deep learning

    Antoniou, A. & Angelov, P. P., 24/07/2016, 2016 International Joint Conference on Neural Networks (IJCNN). Vancouver Canada: IEEE, p. 2879-2886 8 p. (Neural Networks (IJCNN), 2016 International Joint Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  372. Published

    Autonomous data density based clustering method

    Angelov, P. P., Gu, X., Gutierrez, G., Iglesias, J. A. & Sanchis, A., 24/07/2016, p. 2405-2413. 9 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  373. Published

    Unsupervised classification of data streams based on typicality and eccentricity data analytics

    Costa, B. S. J., Bezerra, C. G., Guedes, L. A. & Angelov, P. P., 24/07/2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ). Vancouver Canada: IEEE, p. 58-63 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  374. Published

    A bio-inspired HTTP-based Adaptive Streaming Player

    Sani, Y., Mauthe, A. U., Edwards, C. J. & Mu, M., 11/07/2016, Multimedia & Expo Workshops (ICMEW), 2016 IEEE International Conference on. IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  375. Published

    RECODIS: resilient communication services protecting end-user applications from disaster-based failures

    Rak, J., Hutchison, D., Calle, E., Gomes, T. & Gunkel, M., 10/07/2016, 2016 18th International Conference on Transparent Optical Networks (ICTON). IEEE, 4 p. (2016 18th International Conference on Transparent Optical Networks (ICTON)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  376. Published

    Beamforming optimization for full-duplex cooperative cognitive radio networks

    Hu, S., Ding, Z., Ni, Q. & Yuan, Y., 3/07/2016, Signal Processing Advances in Wireless Communications (SPAWC), 2016 IEEE 17th International Workshop on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  377. Published

    Run Time Application Repartitioning in Dynamic Mobile Cloud Environments

    Yang, L., Cao, J., Tang, S., Han, D. & Suri, N., 1/07/2016, In : IEEE Transactions on Cloud Computing. 4, 3, p. 336-348 13 p.

    Research output: Contribution to journalJournal article

  378. Published

    A survey of pervasive displays for information presentation

    Clinch, S. E., Alexander, J. M. & Gehring, S., 07/2016, In : IEEE Pervasive Computing. 15, 3, p. 14-22 9 p.

    Research output: Contribution to journalJournal article

  379. Published

    Efficient light extraction from 2D materials using rod-based photonic crystals

    Noori, Y., Cao, Y., Woodhead, C., Roberts, J., Bernardo Gavito, R. & Young, R. J., 07/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  380. Published

    Information assurance techniques: perceived cost effectiveness

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 07/2016, In : Computers and Security. 60, p. 117-133 17 p.

    Research output: Contribution to journalJournal article

  381. Published

    Maximizing energy efficiency in multiuser multicarrier broadband wireless systems: convex relaxation and global optimization techniques

    Zarakovitis, C. C. & Ni, Q., 07/2016, In : IEEE Transactions on Vehicular Technology. 65, 7, p. 5275-5286 12 p.

    Research output: Contribution to journalJournal article

  382. Published

    Light Extraction From 2D Materials Using Photonic Crystals

    Noori, Y., Cao, Y., Woodhead, C., Roberts, J., Bernardo Gavito, R. & Young, R. J., 30/06/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  383. Published

    Anomaly detection in the cloud using data density

    Shirazi, S. N. U. H., Simpson, S., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 27/06/2016, Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on. IEEE, p. 616-623 8 p. 7820324. (Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  384. Published

    D-DEMOS: a distributed, end-to-end verifiable, internet voting system

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 27/06/2016, Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016) . IEEE, p. 711-720 10 p. (2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  385. Published

    How to Improve the Security Skills of Mobile App Developers: Comparing and Contrasting Expert Views

    Weir, C., Rashid, A. & Noble, J., 22/06/2016, Proceedings of the 2016 ACM Workshop on Security Information Workers. Biddle, R., Chu, B., Lipford, H. & Murphy-Hill, E. (eds.). New York: USENIX Association, 7 p. 1

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  386. Published

    Enabling crowdsourced live event coverage with adaptive collaborative upload strategies

    Richerzhagen, B., Wulfheide, J., Koeppl, H., Mauthe, A. U., Nahrstedt, K. & Steinmetz, R., 21/06/2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  387. Published

    Mapping cross-cloud systems: challenges and opportunities

    Elkhatib, Y. S. S. A., 20/06/2016, The 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '16). USENIX Association, 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  388. Published

    Agent-based computational modelling of social risk responses

    Busby, J. S., Onggo, B. S. S. & Liu, Y., 16/06/2016, In : European Journal of Operational Research. 251, 3, p. 1029-1042 14 p.

    Research output: Contribution to journalJournal article

  389. Published

    Three-point interaction: combining bi-manual direct touch with gaze

    Simeone, A. L., Bulling, A., Alexander, J. & Gellersen, H., 7/06/2016, AVI '16 Proceedings of the International Working Conference on Advanced Visual Interfaces. New York: ACM, p. 168-175 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  390. Published

    Cloud instance management and resource prediction for computation-as-a-service platforms

    Doyle, J., Giotsas, V., Anam, M. A. & Andreopoulos, Y., 2/06/2016, Proceedings - 2016 IEEE International Conference on Cloud Engineering, IC2E 2016: Co-located with the 1st IEEE International Conference on Internet-of-Things Design and Implementation, IoTDI 2016. Institute of Electrical and Electronics Engineers Inc., p. 89-98 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  391. Published

    Resolving multi-party privacy conflicts in social media

    Such, J. M. & Criado Pacheco, N., 2/06/2016, In : IEEE Transactions on Knowledge and Data Engineering. 28, 7, p. 1851-1863 13 p.

    Research output: Contribution to journalJournal article

  392. Published

    Quantifiably Trusting the Cloud: Putting Metrics to Work

    Trapero, R., Luna, J. & Suri, N., 1/06/2016, In : IEEE Security and Privacy Magazine. 14, 3, p. 73-77 5 p.

    Research output: Contribution to journalJournal article

  393. Published

    Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  394. Published

    Online evolving fuzzy rule-based prediction model for high frequency trading financial data stream

    Gu, X., Angelov, P. P., Mohd Ali, A., Gruver, W. A. & Gaydadjiev, G., 25/05/2016, Evolving and Adaptive Intelligent Systems (EAIS), 2016 IEEE Conference on. IEEE, p. 169-175 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  395. Published

    Performance analysis of hybrid 5G cellular networks exploiting mmWave capabilities in suburban areas

    Omar, M. S., Anjum, M. A., Hassan, S. A., Pervaiz, H. B. & Ni, Q., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, p. 1-6 6 p. (2016 IEEE International Conference on Communications (ICC)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  396. Published

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Hashem-Eiza, M., Shi, Q., Marnerides, A. & Owens, T., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, 6 p. 7510934

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  397. Published

    Query processing for the internet-of-things: Coupling of device energy consumption and cloud infrastructure billing

    Renna, F., Doyle, J., Andreopoulos, Y. & Giotsas, V., 17/05/2016, Internet-of-Things Design and Implementation (IoTDI), 2016 IEEE First International Conference on. Institute of Electrical and Electronics Engineers Inc., p. 83-94 12 p. 7471353

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  398. Published

    A game theoretical network-assisted user-centric design for resource allocation in 5G heterogeneous networks

    Munir, H., Hassan, S. A., Pervaiz, H. B. & Ni, Q., 15/05/2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  399. Published

    On the role of latent design conditions in cyber-physical systems security

    Frey, S., Rashid, A., Zanutto, A., Busby, J. S. & Szmagalska-Follis, K., 14/05/2016, SEsCPS '16 Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systemss, SEsCPS 2015, Austin, Texas. New York: ACM, p. 43-46 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  400. Unpublished

    Toward a Practice of User-Centred Design for Shape-Changing Interfaces

    Sturdee, M. A. & Alexander, J. M., 14/05/2016, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  401. Published

    Partially-indirect Bimanual Input with Gaze, Pen, and Touch for Pan, Zoom, and Ink Interaction

    Pfeuffer, K., Alexander, J. & Gellersen, H., 7/05/2016, CHI '16 Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. New York: ACM Press, p. 2845-2856 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  402. Published

    ShapeCanvas: an exploration of shape-changing content generation by members of the public

    Everitt, A., Taher, F. & Alexander, J., 7/05/2016, CHI '16 Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. New York: ACM Press, p. 2778-2782 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  403. Published

    Beamforming optimisation in energy harvesting cooperative full-duplex networks with self-energy recycling protocol

    Hu, S., Ding, Z. & Ni, Q., 5/05/2016, In : IET Communications. 10, 7, p. 848-853 6 p.

    Research output: Contribution to journalJournal article

  404. Published

    On choosing server-or client-side solutions for BFT

    Platania, M., Obenshain, D., Tantillo, T., Amir, Y. & Suri, N., 1/05/2016, In : ACM Computing Surveys. 48, 4, 30 p., 61.

    Research output: Contribution to journalJournal article

  405. Published

    Social telemedia: the relationship between social information and networked media

    Niamut, O., Mu, M., Denazis, S. & Race, N., 1/05/2016, In : Computer. 49, 5, p. 92-97 6 p.

    Research output: Contribution to journalJournal article

  406. Published

    Tradeoff analysis and joint optimization of link-layer energy efficiency and effective capacity toward green communications

    Yu, W., Musavian, L. & Ni, Q., 05/2016, In : IEEE Transactions on Wireless Communications. 15, 5, p. 3339-3353 15 p.

    Research output: Contribution to journalJournal article

  407. Published

    Daleel: simplifying cloud instance selection using machine learning

    Samreen, F., El Khatib, Y., Rowe, M. C. & Blair, G. S., 25/04/2016, Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP. IEEE, (Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  408. Published

    Providing producer mobility support in NDN through proactive data replication

    Lehmann, M., Barcellos, M. & Mauthe, A. U., 25/04/2016, 2016 IEEE/IFIP Network Operations and Management Symposium 2016 (NOMS 2016). NOMS 2016 will be held 25-29 April 2016 in Istanbul, Turkey. Oktug, S., Ulema, M., Cavdar, C., Zambenedetti Granville, L. & dos Santos, C. R. P. (eds.). IEEE, p. 383-391 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  409. Published

    Towards resilience metrics for future cloud applications

    Novak, M., Shirazi, S. N. U. H., Hudic, A., Hecht, T., Tauber, M., Hutchison, D., Maksuti, S. & Bicaku, A., 23/04/2016, Proceedings of the 6th International Conference on Cloud Computing and Services Science. Cardoso, J., Ferguson, D., Méndez Muñoz, V. & Helfert, M. (eds.). SCITEPRESS – Science and Technology Publications, p. 295-301 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  410. Published

    Charting an intent driven network

    Elkhatib, Y., Tyson, G. & Coulson, G., 20/04/2016, In : arxiv.org.

    Research output: Contribution to journalJournal article

  411. Published

    Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  412. Published

    Harmonized monitoring for high assurance clouds

    Bicaku, A., Balaban, S., Tauber, M., Hudic, A., Mauthe, A. U. & Hutchison, D., 8/04/2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). IEEE, p. 118-123 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  413. Published

    Composite vulnerabilities in Cyber Physical Systems

    Ciholas, P. & Such, J. M., 6/04/2016, p. 4-7. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  414. Published

    Testbed diversity as a fundamental principle for effective ICS security research

    Green, B., Frey, S. A. F., Rashid, A. & Hutchison, D., 6/04/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  415. Published

    Increasing quantum light extraction from TMDC's

    Woodhead, C., Young, R. J., Noori, Y., Roberts, J., Cao, Y., Bernardo Gavito, R., Kozikov, A. & Novoselov, K., 22/03/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  416. Published

    Pillar-based photonic crystals for light extraction from 2D materials

    Noori, Y., Cao, Y., Woodhead, C., Roberts, J. & Young, R. J., 22/03/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  417. Published

    Shielding noises from spins

    Cao, Y., Bennett, A. J., Ellis, D., Farrer, I., Ritchie, D. A., Shields, A. J., Noori, Y., Roberts, J., Woodhead, C. & Young, R. J., 22/03/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  418. Published

    Handbook in computational intelligence

    Angelov, P. (ed.), 21/03/2016, World Scientific. 964 p.

    Research output: Book/Report/ProceedingsBook

  419. Published

    It bends but would it break? topological analysis of BGP infrastructures in Europe

    Frey, S. A. F., El Khatib, Y., Rashid, A., Szmagalska-Follis, K., Vidler, J. E., Race, N. J. P. & Edwards, C. J., 21/03/2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, p. 423-438 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  420. Published

    Analysing radiative and non-radiative recombination in InAs quantum dots grown on Si substrates for integrated laser applications

    Orchard, J., Woodhead, C., Shutts, S., Wu, J., Sobiesierski, A., Young, R. J., Beanland, R., Liu, H., Smowton, P. & Mowbray, D., 15/03/2016, Proceedings Volume 9758, Quantum Dots and Nanostructures: Growth, Characterization, and Modeling XIII. Huffaker, D. L., Eisele, H. & Dick, K. A. (eds.). SPIE, Vol. 9758. 7 p. 975809. (Proceedings of SPIE).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  421. Published

    Geographic profiling survey: a preliminary examination of geographic profilers’ views and experiences

    Emeno, K., Bennell, C., Snook, B. & Taylor, P. J., 03/2016, In : International Journal of Police Science and Management. 18, 1, p. 3-12 10 p.

    Research output: Contribution to journalJournal article

  422. Published

    How socially aware are social media privacy controls?

    Misra, G. & Such Aparicio, J. M., 03/2016, In : IEEE Computer. 49, 3, p. 96-99 4 p.

    Research output: Contribution to journalJournal article

  423. Published

    Malware detection in cloud computing infrastructures

    Watson, M., Shirazi, S. N. U. H., Marnerides, A., Mauthe, A. U. & Hutchison, D., 03/2016, In : IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 192-205 14 p.

    Research output: Contribution to journalJournal article

  424. Published

    Sibyl: A Practical Internet Route Oracle

    Cunha, I., Marchetta, P., Calder, M., Chiu, Y-C., Machado, B. V. A., Pescapè, A., Giotsas, V., Madhyastha, H. V. & Katz-Bassett, E., 03/2016, 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, p. 325-344 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  425. Published

    Named Data Networking: A survey

    Saxena, D., Raychoudhury, V., Suri, N., Becker, C. & Cao, J., 28/02/2016, In : Computer Science Review. 19, p. 15-55 41 p.

    Research output: Contribution to journalJournal article

  426. Published

    Analysis and characterisation of botnet scan traffic

    Marnerides, A. & Mauthe, A. U., 15/02/2016, 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  427. Published

    LoRa for the Internet of Things

    Bor, M., Vidler, J. E. & Roedig, U., 15/02/2016, EWSN '16 Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. Canada: Junction Publishing, p. 361-366 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  428. Published

    Tangible Data, explorations in data physicalization

    Hogan, T., Hornecker, E., Stusak, S., Jansen, Y., Alexander, J. M., Van Moere, A., Hinrichs, U. & Nolan, K., 14/02/2016, Proceedings of the TEI '16: Tenth International Conference on Tangible, Embedded, and Embodied Interaction . New York: ACM, p. 753-756 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  429. Published

    Prediction of the attention area in ambient intelligence tasks

    Shafi, J., Angelov, P. P. & Umair, M., 3/02/2016, Innovative issues in intelligent systems. Sgurev, V., Yager, R., Kacprzyk, J. & Jotsov, V. (eds.). Berlin: Springer, p. 33-56 24 p. (Studies in Computational Intelligence; vol. 623).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  430. Published

    Heterodimensional charge-carrier confinement in stacked submonolayer InAs in GaAs

    Harrison, S., Young, M., Hodgson, P. D., Young, R. J., Hayne, M., Danos, E., Schliwa, A., Strittmatter, A., Lenz, A., Eisele, H., Pohl, U. & Bimberg, D., 2/02/2016, In : Physical review B. 93, 9 p., 085302.

    Research output: Contribution to journalJournal article

  431. Published

    SBVLC: Secure Barcode-based Visible Light Communication for Smartphones

    Zhang, B., Ren, K., Xing, G., Fu, X. & Wang, C., 1/02/2016, In : IEEE Transactions on Mobile Computing. 15, 2, p. 432-446 15 p.

    Research output: Contribution to journalJournal article

  432. Published

    Privacy policy negotiation in social media

    Such, J. M. & Rovatsos, M., 02/2016, In : ACM Transactions on Autonomous and Adaptive Systems. 11, 1, 29 p., 4.

    Research output: Contribution to journalJournal article

  433. Published

    Novel security mechanisms for wireless sensor networks

    Bagci, I. E., 29/01/2016, Lancaster University. 128 p.

    Research output: ThesisDoctoral Thesis

  434. Published

    ARTOD: Autonomous Real Time Objects Detection by a moving camera using recursive density estimation

    Sadeghi Tehran, P. & Angelov, P., 28/01/2016, Novel applications of intelligent systems. Hadjiski, M., Kasabov, N., Filev, D. & Jotsov, V. (eds.). Cham: Springer Verlag, p. 123-138 16 p. (Studies in Computational Intelligence; vol. 586).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  435. Published

    Curriculum innovation: reflection on MSci Integrated Masters with Industrial Experience

    Sas, C., Mauthe, A. U., Mills, S., McLaughlin, C. I., Finney, J. & Fish, S. A., 28/01/2016. 7 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  436. Published

    The North West cyber security industry: export potential assessment

    Prince, D. D. C. & Fitton, O. J., 27/01/2016, Lancaster: Lancaster University. 60 p.

    Research output: Book/Report/ProceedingsCommissioned report

  437. Published

    Review and analysis of networking challenges in cloud computing

    Moura, J. A. & Hutchison, D., 11/01/2016, In : Journal of Network and Computer Applications. 60, p. 113-129 17 p., JNCA-D-15-00722R1.

    Research output: Contribution to journalJournal article

  438. Published

    CRS interference cancellation algorithm for heterogeneous network

    Luo, H., Li, W., Huang, L-K., Cosmas, J. & Ni, Q., 8/01/2016, In : Electronics Letters. 52, 1, p. 77-79 3 p.

    Research output: Contribution to journalJournal article

  439. Published

    FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes

    Ali, A., Khelil, A. & Suri, N., 7/01/2016, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  440. Published

    Using quantum effects in nanomaterials for unique identification

    Young, R. J., Roberts, J. & Speed, P., 5/01/2016, In : SPIE Newsroom. 3 p.

    Research output: Contribution to journalJournal article

  441. Published

    QoE-aware inter-stream synchronization in open N-Screens cloud

    Mu, M., Simpson, S., Stokking, H. & Race, N., 1/01/2016, 2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC). IEEE, p. 907-915 9 p. (Consumer Communications & Networking Conference (CCNC), 2016 13th IEEE Annual).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  442. Published

    Getting the balance right? a mismatch in interaction demands between target and judge impacts on judgement accuracy for some traits but not others

    Wall, H., Taylor, P. J. & Campbell, C., 01/2016, In : Personality and Individual Differences. 88, p. 66-72 7 p.

    Research output: Contribution to journalJournal article

  443. Published
  444. Published

    Measurements and analysis of a major adult video portal

    Tyson, G., El Khatib, Y., Sastry, N. & Uhlig, S., 01/2016, In : ACM Transactions on Multimedia Computing, Communications, and Applications. 12, 2, 25 p., 35.

    Research output: Contribution to journalJournal article

  445. Published

    Rationalizing violation: ordered accounts of intentionality in the making and breaking of safety rules

    Busby, J. S. & Iszatt-White, M., 01/2016, In : Organization Studies. 37, 1, p. 35-53 19 p.

    Research output: Contribution to journalJournal article

  446. Published

    Secure and robust multi-constrained QoS aware routing algorithm for VANETs

    Hashem Eiza, M., Owens, T. & Ni, Q., 01/2016, In : IEEE Transactions on Dependable and Secure Computing. 13, 1, p. 32-45 14 p.

    Research output: Contribution to journalJournal article

  447. Published

    A Multi-commodity network flow model for cloud service environments

    Stephanakis, I. M., Shirazi, S. N. U. H., Gouglidis, A. & Hutchison, D., 2016, Engineering Applications of Neural Networks: 17th International Conference, EANN 2016, Aberdeen, UK, September 2-5, 2016, Proceedings. Jayne, C. & Iliadis, L. (eds.). Cham: Springer, p. 186-197 12 p. (Communications in Computer and Information Science; vol. 629).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  448. Published

    A Multi-Level Approach to Resilience of Critical Infrastructures and Services

    Gouglidis, A., Shirazi, S. N. U. H., Simpson, S., Smith, P. & Hutchison, D., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  449. Published

    Atomic-scale authentication with resonant tunneling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 2016, In : MRS Advances. 1, 22, p. 1625-1629 5 p.

    Research output: Contribution to journalJournal article

  450. Published

    Competition: ContikiMAC with differentiating clear channel assessment

    King, A., Hadley, J. & Roedig, U., 2016, Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. USA: Junction Publishing, p. 301-302 2 p. (EWSN '16).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  451. Published

    Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Livraga, G. (ed.), Torra, V. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2016, Springer.

    Research output: Book/Report/ProceedingsProceedings

  452. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  453. Published

    Digital channels diminish SME barriers: the case of the UK

    Stankovska, I., Josimovski, S. & Edwards, C. J., 2016, In : Economic Research-Ekonomska Istraživanja. 29, 1, p. 217-232 16 p.

    Research output: Contribution to journalJournal article

  454. Published

    Evidence for face-like preferences during visual processing of stimuli by the human fetus in utero

    Dunn, K. J., Reid, V. M., Young, R. J., Amu, J. & Reissland, N., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  455. Published

    Foreword from the QASA 2016 program chairs

    Aldini, A., Martinelli, F., Suri, N., G., L. (ed.), A., A. (ed.), V., T. (ed.), F., M. (ed.) & N., S., 2016, Springer-Verlag.

    Research output: Book/Report/ProceedingsBook

  456. Published

    Measurement of video quality

    Andreopoulos, Y., Fisher, P., Deligiannis, N. & Giotsas, V., 2016, Patent No. US20160021376A1, Priority date 17/07/2014

    Research output: Patent

  457. Published

    OpenCache: a content delivery platform for the modern internet

    Broadbent, M. H., 2016, Lancaster University. 191 p.

    Research output: ThesisDoctoral Thesis

  458. Published

    Periscope: Unifying looking glass querying

    Giotsas, V., Dhamdhere, A. & Claffy, K. C., 2016, PAM 2016: Passive and Active Measurement : 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings. Karagiannis, T. & Dimitropoulos, X. (eds.). Cham: Springer, p. 177-189 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9631).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  459. Published

    Poster: RI-MAC enhancements for interference resilience

    King, A. & Roedig, U., 2016, Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. USA: Junction Publishing, p. 283-284 2 p. (EWSN '16).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  460. Published

    The prenatal concept of number: further evidence of visual processing of stimuli before birth

    Dunn, K. J., Reissland, N., Young, R. J., Amu, J. & Reid, V. M., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  461. 2015
  462. Published

    Implicit contextual integrity in online social networks

    Criado, N. & Such, J. M., 20/12/2015, In : Information Sciences. 325, p. 48-69 22 p.

    Research output: Contribution to journalJournal article

  463. Published

    Detecting and mitigating P2P eclipse attacks

    Ismail, H., Germanus, D. & Suri, N., 14/12/2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 224-231 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  464. Published

    Improving interactive TV experience using second screen mobile applications

    Mu, M., Knowles, W., Mauthe, A. U., Sani, Y. & Race, N. J. P., 14/12/2015, Proceedings of IEEE International Symposium on Multimedia, ISM 2015. IEEE, p. 373-376 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  465. Published

    Modelling video rate evolution in adaptive bitrate selection

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 14/12/2015, Proceedings of IEEE International Symposium on Multimedia, ISM 2015. IEEE, p. 89-94 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  466. Published

    Resilience support in software-defined networking: a survey

    da Silva, A., Smith, P., Mauthe, A. U. & Schaeffer-Filho, A., 9/12/2015, In : Computer Networks. 92, 1, p. 189-207 19 p.

    Research output: Contribution to journalJournal article

  467. Published

    Holons: Towards a systematic approach to composing systems of systems

    Blair, G. S., Bromberg, Y-D., Coulson, G., El Khatib, Y., Réveillère, L., B. Ribeiro, H., Rivière, E. & Taïani, F. G. D., 7/12/2015, ARM 2015 Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware. New York: ACM, p. 5:1 5 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  468. Published

    Using Channel State Information for Tamper Detection in the Internet of Things

    Bagci, I. E., Roedig, U., Martinovic, I., Schulz, M. & Hollick, M., 5/12/2015, ACSAC 2015 Proceedings of the 31st Annual Computer Security Applications Conference. New York: ACM, p. 131-140 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  469. Published

    Analysis of adaptation law of the robust evolving cloud-based controller

    Andonovski, G., Blazic, S., Angelov, P. P. & Skrjanc, I., 3/12/2015, Proceedings 2015 IEEE International Conference on Evolving and Adaptive Intelligent Systems (EAIS). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  470. Published

    Program and abstracts of 2015 IEEE International Conference on Evolving and Adaptive Intelligent Systems (EAIS)

    Sayed-Mouchaweh, M. (ed.), Fleury, A. (ed.), Angelov, P. P. (ed.), Lughofer, E. (ed.) & Iglesias, J. A. (ed.), 3/12/2015, IEEE. 26 p.

    Research output: Book/Report/ProceedingsProceedings

  471. Published

    Adaptive hybrid compression for wireless sensor networks

    Ali, A., Khelil, A., Suri, N. & Mahmudimanesh, M., 1/12/2015, In : ACM Transactions on Sensor Networks. 11, 4, 36 p., 53.

    Research output: Contribution to journalJournal article

  472. Published

    Mapping peering interconnections to a facility

    Giotsas, V., Smaragdakis, G., Huffaker, B., Luckie, M. & Claffy, K. C., 1/12/2015, CoNEXT '15 Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. New York: Association for Computing Machinery, Inc, 13 p. 37

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  473. Published

    Metaphor, popular science and semantic tagging: distant reading with the Historical Thesaurus of English

    Alexander, M., Dallachy, F., Piao, S., Baron, A. & Rayson, P., 1/12/2015, In : Digital Scholarship in the Humanities. 30, Suppl. 1, p. i16-i27 12 p.

    Research output: Contribution to journalJournal article

  474. Published

    Adaptive materials: utilising additive manufactured scaffolds to control self-organising material aggregation

    Blaney, A., Alexander, J. M., Dunn, N. S., Richards, D. C., Rennie, A. E. W. & Anwar, J., 12/2015, Proceedings of the 14th Rapid Design, Prototyping and Manufacturing Conference. Rennie, A. & Bibb, R. (eds.). Loughborough: Lancaster University, p. 49-57 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  475. Published

    An overview on fault diagnosis and nature-inspired optimal control of industrial process applications

    Precup, R-E., Angelov, P., Jales Costa, B. S. & Sayed-Mouchaweh, M., 12/2015, In : Computers in Industry. 74, p. 75-94 20 p.

    Research output: Contribution to journalJournal article

  476. Published

    Application of reinforcement learning for security enhancement in cognitive radio networks

    Ling, M. H., Yau, K. A., Qadir, J., Poh, G. S. & Ni, Q., 12/2015, In : Applied Soft Computing. 37, p. 809-829 21 p.

    Research output: Contribution to journalJournal article

  477. Published

    Situation-aware QoS routing algorithm for vehicular ad hoc networks

    Hashem Eiza, M., Owens, T., Ni, Q. & Shi, Q., 12/2015, In : IEEE Transactions on Vehicular Technology. 64, 12, p. 5520-5535 16 p.

    Research output: Contribution to journalJournal article

  478. Published

    Synergy of computers, cognition, communication and control with industrial applications

    Precup, R-E. (ed.), Hellendoorn, H. (ed.) & Angelov, P. (ed.), 12/2015, In : Computers in Industry. 74, p. 71-74 4 p.

    Research output: Contribution to journalEditorial

  479. Published

    Building cloud applications for challenged networks

    El Khatib, Y., 21/11/2015, Embracing Global Computing in Emerging Economies: First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. Horne, R. (ed.). Cham: Springer Verlag, p. 1-10 10 p. (Communications in Computer and Information Science; vol. 514).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  480. Published

    MultiBox: lightweight containers for vendor-independent multi-cloud deployments

    Hadley, J., El Khatib, Y., Blair, G. & Roedig, U., 21/11/2015, Embracing Global Computing in Emerging Economies: First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. Horne, R. (ed.). Springer Verlag, p. 79-90 12 p. (Communications in Computer and Information Science ; vol. 514).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  481. Forthcoming

    Apparatus and method for projecting light through a light dispersive medium

    Young, R. J. & Reid, V. M., 13/11/2015, (Accepted/In press) Priority date 13/11/2015, Priority No. GB1520076.9

    Research output: Patent

  482. Published

    Verbal lie detection

    Vrij, A., Taylor, P. J. & Picornell, I., 13/11/2015, Communication in investigative and legal contexts: integrated approaches from forensic psychology, linguistics and law enforcement. Oxburgh, G., Myklebust, T., Grant, T. & Milne, R. (eds.). Wiley, (Psychology of Crime, Policing and Law).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  483. Published

    SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications

    Granby, B., Askwith, R. & Marnerides, A., 10/11/2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP). IEEE, p. 463-466 4 p. (2015 IEEE 23rd International Conference on Network Protocols (ICNP)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  484. Published

    Using quantum confinement to uniquely identify devices

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Young, M., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 10/11/2015, In : Scientific Reports. 5, 8 p., 16456 .

    Research output: Contribution to journalJournal article

  485. Published

    Trust-based approaches to safety and production

    Conchie, S. M., Woodcock, H. E. & Taylor, P. J., 6/11/2015, The Wiley Blackwell handbook of the psychology of occupational safety and workplace health. Clarke, S., Probst, T., Guldenmund, F. & Passmore, J. (eds.). Chichester: Wiley-Blackwell, p. 111-132 22 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  486. Published

    Assessing privacy capabilities of cloud service providers

    Del Alamo, J. M., Trapero, R., Martin, Y. S., Yelmo, J. C. & Suri, N., 1/11/2015, In : IEEE Latin America Transactions. 13, 11, p. 3634-3641 8 p.

    Research output: Contribution to journalJournal article

  487. Published

    The feet in human--computer interaction: a survey of foot-based interaction

    Velloso, E., Schmidt, D., Alexander, J., Gellersen, H. & Bulling, A., 1/11/2015, In : ACM Computing Surveys. 48, 2, p. 1-35 35 p., 21.

    Research output: Contribution to journalJournal article

  488. Published

    From responsibility to accountability: working creatively with distributed agency in office energy metering and management

    Whittle, R. K., Ellis, R. J., Marshall, I., Alcock, P., Hutchison, D. & Mauthe, A. U., 11/2015, In : Energy Research and Social Science. 10, p. 240-249 10 p.

    Research output: Contribution to journalJournal article

  489. Published

    Gaze-shifting: direct-indirect input with pen and touch modulated by gaze

    Pfeuffer, K., Alexander, J., Chong, M. K., Zhang, Y. & Gellersen, H., 11/2015, UIST '15 Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. New York: ACM, p. 373-383 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  490. Published

    ReForm: integrating physical and digital design through bidirectional fabrication

    Weichel, C., Hardy, J., Alexander, J. & Gellersen, H., 11/2015, UIST '15 Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. New York: ACM, p. 93-102 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  491. Published

    Perspectives on software-defined networks: interviews with five leading scientists from the networking community

    Batista, D. M., Blair, G. S., Kon, F., Boutaba, R., Hutchison, D., Jain, R., Ramjee, R. & Rothenberg, C. E., 30/10/2015, In : Journal of Internet Services and Applications. 6, 22, 10 p., 22.

    Research output: Contribution to journalJournal article

  492. Published

    Prospects for software defined networking and network function virtualization in media and broadcast

    Ellerton, J., Lord, A., Gunning, P., Farrow, K., Wright, P., King, D. & Hutchison, D., 27/10/2015, Annual Technical Conference and Exhibition, SMPTE 2015. Hollywood, California: IEEE, 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  493. Published

    Energy-efficient location estimation using variable range beacons in wireless sensor networks

    Farooq-I-Azam, M., Ni, Q. & Pervaiz, H. B., 26/10/2015, Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on. IEEE, p. 1074-1079 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  494. Published

    Estimating node lifetime in interference environments

    King, A., Brown, J., Vidler, J. & Roedig, U., 26/10/2015, Local Computer Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th. IEEE, p. 796-803 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  495. Published

    Performance of a tiered architecture to support end-host mobility in a locator identity split environment

    Mungur, A. & Edwards, C. J., 26/10/2015, Local Computer Networks (LCN), 2015 IEEE 40th Conference on . Florida: IEEE, p. 446-449 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  496. Published

    The impact of hypervisor scheduling on compromising virtualized environments

    Vateva-Gurova, T., Suri, N., Mendelson, A., Atzori, L. (ed.), Jin, X. (ed.), Jarvis, S. (ed.), Liu, L. (ed.), Calvo, R. A. (ed.), Hu, J. (ed.), Min, G. (ed.), Georgalas, N. (ed.) & Wu, Y. (ed.), 26/10/2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, p. 1910-1917 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  497. Published

    Towards a context aware multipath-TCP

    Withnell, R. & Edwards, C. J., 26/10/2015, Local Computer Networks (LCN), 2015 IEEE 40th Conference on. IEEE, p. 225-228 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  498. Published

    DEMOS-2: scalable E2E verifiable elections without random oracles

    Kiayias, A., Zacharias, T. & Zhang, B., 12/10/2015, CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 352-363 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  499. Published

    HABOS: an exploratory study of haptic-audio based online shopping for the visually impaired

    Wong, E. J., Yap, K. M., Alexander, J. M. & Karnik, A., 11/10/2015, Haptic, Audio and Visual Environments and Games (HAVE), 2015 IEEE International Symposium on . Ottawa, Ontario: IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  500. Published

    Edge flow

    Morris, G. & Angelov, P. P., 9/10/2015, Proceedings of the 2015 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, p. 1942-1948 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  501. Published

    Efficient mobility and multihoming support for mountain rescue

    Alsukayti, I. & Edwards, C., 5/10/2015, 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, p. 128-135 8 p. 1570179155

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  502. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In : IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to journalJournal article

  503. Published

    Area energy and area spectrum efficiency trade-off in 5G heterogeneous networks

    Pervaiz, H. B., Musavian, L. & Ni, Q., 1/10/2015, Communication Workshop (ICCW), 2015 IEEE International Conference on . IEEE, p. 1178-1183 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  504. Published

    Energy and spectrum efficiency trade-off for green small cell networks

    Pervaiz, H. B., Musavian, L. & Ni, Q., 1/10/2015, IEEE International Conference on Communications (ICC), 2015. IEEE, p. 5410-5415 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  505. Published

    SYSTEM STATE CLASSIFIER: United States Patent Application 20150278711

    Angelov, P. P., Kolev, D. G. & Markarian, G., 1/10/2015, IPC No. G06N99/00; G06N7/00 , Patent No. 14/677269, Priority date 10/10/2012, Priority No. GB1218209.3

    Research output: Patent

  506. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

Previous 1 2 3 4 Next

Back to top