Home > Research > Networking > Publications & Outputs
View graph of relations
  1. Published

    From old to new: Assessing cybersecurity risks for an evolving smart grid

    Langer, L., Skopik, F., Smith, P. & Kammerstetter, M., 30/09/2016, In: Computers and Security. 62, p. 165-176 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles.

    Schmittner, C., Ma, Z. & Smith, P., 2014, Computer Safety, Reliability, and Security. SAFECOMP 2014. : Lecture Notes in Computer Science. Springer, Vol. 8696. p. 282-288 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Fault diagnosis in DSL networks using support vector machines

    Marnerides, A., Malinowski, S., Morla, R. & Kim, H. S., 15/05/2015, In: Computer Communications. 62, p. 72-84 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Faithful reproduction of network experiments

    Pediaditakis, D., Rotsos, C. & Moore, A. W., 20/10/2014, Proceedings of the Tenth ACM/IEEE Symposium on Architectures for networking and communications systems. New York: ACM, p. 41-52 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Failure mitigation in software defined networking employing load type prediction

    Bouacida, N., Alghadhban, A., Alalmaei, S., Mohammed, H. & Shihada, B., 28/07/2017, 2017 IEEE International Conference on Communications, ICC 2017. Institute of Electrical and Electronics Engineers Inc., 7 p. 7997295

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. E-pub ahead of print

    Experimental evaluation of the impact of mobility management protocols on HTTP adaptive streaming

    Sani, Y., Isah, M., Edwards, C. J. & Mauthe, A. U., 1/08/2017, (E-pub ahead of print) In: IET Networks.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Experience in Porting a Seismic Imaging Kernel to Multiple GPUs

    Alalmaei, S., Feki, S. & Keyes, D., 2017.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  8. Published

    Evidential Network Modeling for Cyber-Physical System State Inference.

    Friedberg, I., Hong, X., McLaughlin, K., Smith, P. & Miller, P. C., 31/12/2017, In: IEEE Access. 5, p. 17149-17164 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Evaluation of CMAF in live streaming scenarios

    Lyko, T., Broadbent, M., Race, N., Nilsson, M., Farrow, P. & Appleby, S., 10/06/2020, NOSSDAV '20: Proceedings of the 30th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video. New York: ACM, p. 21-26 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience

    Shirazi, S. N. U. H., Gouglidis, A., Syeda, K. N., Simpson, S., Mauthe, A. U., Stephanakis, I. M. & Hutchison, D., 16/08/2016, Resilience Week (RWS), 2016. IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Evaluating the Real-World Performance of 5G Fixed Wireless Broadband in Rural Areas

    Abozariba, R., Davies, E., Broadbent, M. & Race, N., 28/11/2019, 2019 IEEE 2nd 5G World Forum (5GWF). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Ethical challenges in collaborative storytelling

    Mu, M., Rouncefield, M. F., El Khatib, Y., Simpson, S., Race, N. J. P. & Taal, J., 08/2015, NS Ethics '15 Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research. New York: ACM, p. 29-32 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Enhancing Anomaly Detection Techniques for Emerging Threats

    Mills, R., 15/10/2022, Lancaster University. 176 p.

    Research output: ThesisDoctoral Thesis

  14. Published

    Enhancing and Protecting Intrusion Detection Systems Using P4-Enabled Data Planes

    Lewis, B., 2024, Lancaster University. 207 p.

    Research output: ThesisDoctoral Thesis

  15. Published

    Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods

    Althobaiti, A., Jindal, A., Marnerides, A. & Roedig, U., 30/11/2021, In: IEEE Access. 9, p. 159291-159312 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Enabling performance evaluation beyond 10 Gbps

    Antichi, G., Rotsos, C. & Moore, A. W., 17/08/2015, Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. New York, NY, USA: ACM, p. 369-370 2 p. (SIGCOMM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Enabling exercises, education and research with a comprehensive cyber range

    Leitner, M., Frank, M., Langner, G., Landauer, M., Skopik, F., Smith, P., Akhras, B., Hotwagner, W., Kucek, S., Pahi, T., Reuter, L. & Warum, M., 31/12/2021, In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 12, 4, p. 37-61 25 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Email fraud: The search for psychological predictors of susceptibility

    Jones, H., Towse, J. N., Race, N. J. P. & Harrison, T., 16/01/2019, In: PLoS ONE. 14, 1, 15 p., e0209684.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks

    Hashem Eiza, M., Shi, Q., Marnerides, A., Owens, T. & Ni, Q., 01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 19-33 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Efficient mobility and multihoming support for mountain rescue

    Alsukayti, I. & Edwards, C., 5/10/2015, 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, p. 128-135 8 p. 1570179155

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Efficient access of mobile flows to heterogeneous networks under flash crowds

    Moura, J. & Edwards, C. J., 9/10/2016, In: Computer Networks. 107, 2, p. 163-177 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Dynamic Spectrum Sharing Optimization and Post-optimization Analysis with Multiple Operators in Cellular Networks

    Asaduzzaman, M., Abozariba, R. & Patwary, M. N., 03/2018, In: IEEE Transactions on Wireless Communications. 17, 3, p. 1589-1603 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Don’t get Stung, Cover your ICS in Honey: How do Honeypots fit within Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 31/03/2022, In: Computers and Security. 114, 25 p., 102598.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Do LoRa low-power wide-area networks scale?

    Bor, M., Roedig, U., Voigt, T. & Alonso, J., 14/11/2016, MSWiM '16 Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York: ACM Press, p. 59-67 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Distributed, multi-level network anomaly detection for datacentre networks

    Iordache, M., Jouet, S., Marnerides, A. & Pezaros, D., 31/07/2017, IEEE International Conference on Communications (ICC) 2017. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top