Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2014
  2. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    A systematic review of the comorbidity between PTSD and alcohol misuse

    Debell, F., Fear, N., Head, M., Batt-Rawden, S., Greenberg, N., Wessely, S. & Goodwin, L., 30/09/2014, In: Social Psychiatry and Psychiatric Epidemiology. 49, 9, p. 1401-1425 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Adaptation for the masses: towards decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A.-M., Maddock, C., Mauthe, A. & Taïani, F., 10/2014, ARM '14 Proceedings of 13th Workshop on Adaptive and Reflective Middleware. New York: ACM, 6 p. 4

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Assessing the impact of intra-cloud live migration on anomaly detection

    Shirazi, S. N. U. H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A. & Hutchison, D., 10/2014, Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE, p. 52-57 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Did Somebody See It? Applying the Verifiability Approach to Insurance Claim Interviews

    Nahari, G., Leal, S., Vrij, A., Warmelink, L. & Vernham, Z., 10/2014, In: Journal of Investigative Psychology and Offender Profiling. 11, 3, p. 237-243 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Gaze-touch: combining gaze with multi-touch for interaction on the same surface

    Pfeuffer, K., Alexander, J., Chong, M. K. & Gellersen, H., 10/2014, UIST '14 Proceedings of the 27th annual ACM symposium on User interface software and technology. New York: ACM, p. 509-518 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    User adaptive QoS aware selection method for cooperative heterogeneous wireless systems: a dynamic contextual approach

    Pervaiz, H., Ni, Q. & Zarakovitis, C. C., 10/2014, In: Future Generation Computer Systems. 39, p. 75-87 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence

    King, A., Brown, J. & Roedig, U., 1/10/2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, p. 45-50 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Accurate crab cavity modeling for the high luminosity Large Hadron Collider

    Brett, D. R., Appleby, R. B., De Maria, R., Barranco Garcia, J., Tomas Garcia, R., Hall, B. & Burt, G., 2/10/2014, In: Physical Review Special Topics: Accelerators and Beams. 17, 10, 12 p., 104001.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    How do we prevent radicalisation?

    Francis, M. (Artist), 7/10/2014

    Research output: Exhibits, objects and web-based outputsWeb publication/site

  12. Unpublished

    Data structuring and searching method and apparatus

    Angelov, P. (Inventor) & Sadeghi Tehran, P. (Inventor), 8/10/2014, (Unpublished) Patent No. GB1417807.3, priority date 8 October 2014, Priority date 8/10/2014, Priority No. GB1417807.3

    Research output: Patent

  13. Published

    Real-time novelty detection in video using background subtraction techniques: state of the art a practical review

    Morris, G. & Angelov, P., 8/10/2014, 2014 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE Press, p. 537-543 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    New energy efficiency metric with imperfect channel considerations for OFDMA systems

    C. Zarakovitis, C., Ni, Q. & Spiliotis, J., 9/10/2014, In: IEEE Wireless Communications Letters. 3, 5, p. 473-476 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Mitigating eclipse attacks in peer-to-peer networks

    Germanus, D., Roos, S., Strufe, T. & Suri, N., 29/10/2014, 2014 IEEE Conference on Communications and Network Security. Springer-Verlag, p. 400-408 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Characterising the physicality of everyday buttons

    Alexander, J., Hardy, J. & Wattam, S., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 205-208 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Evidence for hand-size constancy: the dominant hand as a natural perceptual metric

    Linkenauger, S., Geuss, M., Stefanucci, J., Leyrer, M., Richardson, B., Buelthoff, H., Mohler, B. J. & Proffitt, D., 11/2014, In: Psychological Science. 25, 11, p. 2086-2094 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Investigation of CSRR loaded waveguide for accelerator applications

    Sharples, E. & Letizia, R., 11/2014, In: Journal of Instrumentation. 13 p., P11017.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Just browsing? understanding user journeys in online TV

    Elkhatib, Y., Killick, R., Mu, M. & Race, N., 11/2014, MM '14 Proceedings of the ACM International Conference on Multimedia. New York: ACM, p. 965-968 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Photoluminescence studies of individual and few GaSb/GaAs quantum rings

    Young, M. P., Woodhead, C. S., Roberts, J., Noori, Y. J., Noble, M. T., Krier, A., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R. J., 1/11/2014, In: AIP Advances. 4, 11, 6 p., 117127.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Robust and real-time communication on heterogeneous networks for smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 3/11/2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 386-391 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Inferring complex AS relationships

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 5/11/2014, IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Double corrugated waveguide for G-band traveling wave tubes

    Paoloni, C. & Mineo, M., 10/11/2014, In: IEEE Transactions on Electron Devices. 61, 12, p. 4259-4263 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Traffic anomaly diagnosis in Internet backbone networks: a survey

    Marnerides, A., Schaeffer-Filho, A. & Mauthe, A., 14/11/2014, In: Computer Networks. 73, p. 224-243 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    The future of mobile devices: security and mobility

    Fitton, O. & Prince, D., 17/11/2014, Lancaster: Lancaster University. 34 p.

    Research output: Book/Report/ProceedingsOther report

  27. Published

    A multi-layer and multi-tenant cloud assurance evaluation methodology

    Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E. R., 12/2014, Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE, p. 386-393 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    An investigation towards real time dose rate monitoring, and fuel rod detection in a First Generation Magnox Storage Pond (FGMSP)

    Jackson, S., Monk, S. & Riaz, Z., 12/2014, In: Applied Radiation and Isotopes. 94, p. 254-259 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Anomaly detection based on eccentricity analysis

    Angelov, P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE Press, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Compact backward wave oscillators for THz imaging systems

    Paoloni, C., Yue, L., Tang, X., Zhang, F., Popovic, B., Himes, L., Barchfeld, R., Gamzina, D., Letizia, R., Mineo, M. & Luhmann Jr., N. C., 12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  31. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  32. Published

    Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols

    Ghamari, M., Momahed Heravi, B., Roedig, U. & Honary, B., 12/2014, In: IET Networks. 3, 4, p. 284-292 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In: Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    The effect of decentralized behavioral decision making on system-level risk

    Kaivanto, K., 12/2014, In: Risk Analysis. 34, 12, p. 2121-2142 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Using agent-based simulation to analyse the effect of broadcast and narrowcast on public perception: a case in social risk amplification

    Onggo, S., Busby, J. & Liu, Y., 12/2014, Proceedings of the 2014 Winter Simulation Conference. IEEE, p. 322-333 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Event pattern discovery on IDS traces of cloud services

    Huang, S.-Y., Huang, Y. & Suri, N., 3/12/2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. IEEE, p. 25-32 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    A fast interpolation approach for the calculation of permittivity and conductivity to estimate the SAR

    Priyadarshi, S., Pitman, S., Glover, P., Shah, S., Ye, J., Hu, B. & Letizia, R., 8/12/2014, RF and Wireless Technologies for Biomedical and Healthcare Applications (IMWS-Bio), 2014 IEEE MTT-S International Microwave Workshop Series on. IEEE, p. 261-266 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Editorial message: CrossCloud Brokers 2014

    Elkhatib, Y. & Walraven, S., 8/12/2014, CrossCloud Brokers 2014: proceedings of the 2nd International Workshop on Cross-Cloud Systems . New York: ACM

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    RTSDE: recursive total-sum-distances-based density estimation approach and its application for autonomous real-time video analytics

    Angelov, P. & Wilding, A., 9/12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE, p. 81-86 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  42. Published

    Autonomous or 'driverless' cars and disability: a legal and ethical analysis

    Bradshaw-Martin, H. & Easton, C., 15/12/2014, In: Web Journal of Current Legal Issues. 20, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    Welfare that works? the Universal Credit information technology system and disabled people

    Easton, C., 15/12/2014, In: Web Journal of Current Legal Issues. 20, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    Mainstreaming domestic and gender-based violence into sociology and the criminology of violence

    Walby, S., Towers, J. & Francis, B., 18/12/2014, In: The Sociological Review. 62, S2, p. 187–214 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. 2015
  46. Published

    “Return? It never left.”: exploring the "sacred" as a resource for bridging the gap between the religious and the secular

    Francis, M., Knott, K., Kutz, C. (Editor), Riss, H. (Editor) & Roy, O., 2015, Religious norms in the public sphere: proceedings of a conference held at UC Berkeley on May 6-7, 2011. Kutz, C., Riss, H. & Roy, O. (eds.). Florence, Italy: European University Institute, p. 48-57 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  47. Published

    A model for characterizing cyberpower

    Venables, A., Shaikh, S. & Shuttleworth, J., 2015, Critical Infrastructure Protection. USA: Springer, Vol. 9. p. 3-16 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    A public ideation of shape-changing applications

    Sturdee, M., Hardy, J., Dunn, N. & Alexander, J., 2015, ITS '15 Proceedings of the 2015 International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 219-228 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  50. Published

    An active learning technique enhanced with electronic polls

    Such, J. M., Criado Pacheco, N. & Garcia-Fornes, A., 2015, In: International Journal of Engineering Education. 31, 4, p. 1048-1057 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

    Stevenson, M. & Busby, J., 2015, In: International Journal of Operations and Production Management. 35, 1, p. 110-144 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  53. Published

    Anomaly detection in secure cloud environments using a Self-Organizing Feature Map (SOFM) model For clustering sets of R-ordered vector-structured features

    Shirazi, S. N. U. H., Stephanakis, I. M., Chochliouros , I. P. & Sfakianakis, E., 2015, EANN '15: Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS). Iliadis, L. (ed.). ACM, 9 p. 27

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    Are People Really Social on Porn 2.0?

    Tyson, G., Elkhatib, Y., Sastry, N. & Uhlig, S., 2015, Proceedings of the AAAI Conference on Web and Social Media (ICWSM). AAAI, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    At home with users: a comparative view of Living Labs

    Ley, B., Ogonowski, C., Mu, M., Hess, J., Race, N., Randall, D., Rouncefield, M. & Wulf, V., 2015, In: Interacting with Computers. 27, 1, p. 21-35 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    ATDT: Autonomous Template-based Detection and Tracking of objects from airborne camera

    Sadeghi Tehran, P. & Angelov, P., 2015, Intelligent Systems 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland, Volume 2: Tools, Architectures, Systems, Applications. Filev, D., Jabłkowski, J., Kacprzyk, J., Krawczak, M., Popchev, I., Rutkowski, L., Sgurev, V., Sotirova, E., Szynkarczyk, P. & Zadrozny, S. (eds.). Springer, p. 555-565 11 p. (Advances in Intelligent Systems and Computing; vol. 323).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    Characterisation of the TRIUMF neutron facility using a Monte Carlo simulation code

    Monk, S., Abram, T. & Joyce, M., 2015, In: Radiation Protection Dosimetry. 164, 3, p. 228-238 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Closing the seasonal agricultural workers scheme: a triple loss

    Consterdine, E. & Samuk, S., 2015, Sussex Centre for Migration Research Working Papers , p. 1-35, 35 p.

    Research output: Working paper

  59. Published

    Confidence-sourcing among amateur soccer players: interpreting time, place and stimulus-relevance

    Miller, P. K., George, R. & Nicholson, S., 2015, In: Open Sports Science Journal. 8, 1, p. 8-17 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Cyber security controls effectiveness: a qualitative assessment of cyber essentials

    Such, J. M., Vidler, J., Seabrook, T. & Rashid, A., 2015, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  61. Published

    Cybercrime: key issues and debates

    Gillespie, A., 2015, London: Routledge. 308 p.

    Research output: Book/Report/ProceedingsBook

  62. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  63. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (Editor), Herrera-Joancomartí, J. (Editor), Lupu, E. (Editor), Posegga, J. (Editor), Aldini, A. (Editor), Martinelli, F. (Editor) & Suri, N. (Editor), 2015, Springer. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  64. Published

    Delta doping and positioning effects of type II GaSb quantum dots in GaAs solar cell

    James Asirvatham, J. S., Fujita, H., Fernández-Delgado, N., Herrera, M., Molina, S. I., Marshall, A. R. J. & Krier, A., 2015, In: Materials Research Innovations. 19, 7, p. 512-516 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    Determinants of unlawful file sharing: a scoping review

    Watson, S., Zizzo, D. & Fleming, P., 2015, In: PLoS ONE. 10, 6, 23 p., e0127921.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  67. Published

    Everyday debt and credit

    Deville, J. & Seigworth, G., 2015, In: Cultural Studies. 29, 5-6, p. 615-629 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    Exploring fine-grained sentiment values in online product reviews

    Teh, P. L., Rayson, P., Pak, I. & Piao, S., 2015, 2015 IEEE Conference on Open Systems. IEEE, p. 114-118 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published
  70. Published

    Foreword from the QASA 2014 program chairs

    Aldini, A., Martinelli, F., Suri, N., J., P. (Editor), N., S., E., L. (Editor), J., H.-J. (Editor), J., G.-A., F., M. & A., A., 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Springer-Verlag, Vol. 8872. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  71. Published

    Fraglight: shedding light on broken pointcuts in evolving aspect-oriented software

    Khatchadourian, R., Rashid, A., Masuhara, H. & Watanabe, T., 2015, SPLASH Companion 2015 Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity . New York: ACM, p. 17-18 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Gaze+RST: integrating Gaze and multitouch for remote Rotate-Scale-Translate tasks

    Turner, J., Alexander, J., Bulling, A. & Gellersen, H., 2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 4179-4188 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    Gaze-supported gaming: MAGIC techniques for first person shooters

    Velloso, E., Fleming, A., Alexander, J. & Gellersen, H., 2015, CHI PLAY '15 Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. New York: ACM, p. 343-347 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Geographically distributed sensemaking: developing understanding in forum-based software development teams

    Shreeve, B., Sawyer, P., Ralph , P. & Stacey, P., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  75. Published

    Geoparsing, GIS and textual analysis: current developments in spatial humanities research

    Gregory, I., Donaldson, C., Murrieta-Flores, P. & Rayson, P., 2015, In: International Journal of Humanities and Arts Computing. 9, 1, p. 1-14 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  76. Published

    Hate and harm: the law on hate speech

    Gillespie, A., 2015, Research handbook on EU internet law. Savin, A. & Trzaskowski, J. (eds.). Cheltenham: Edward Elgar, p. 488-507 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  77. Published

    Horizon 2020 TWEETHER project for W-band high data rate wireless communications

    Paoloni, C., Letizia, R., Napoli, F., Ni, Q., Rennie, A., Zimmerman, R., Andre, F., Pham, K., Krozer, V., Magne, F., Burciu, I., Ramirez, A., Rocchi, M., Marilier, M. & Vilar, R., 2015, Vacuum Electronics Conference (IVEC), 2015 IEEE International . IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Implicit trust and automatic attitude activation

    Burns, C. & Conchie, S., 2015, Handbook of research methods on trust . 2nd ed. UK: Edward Elgar, p. 292-301 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  79. Published

    In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

    Pellegrino, G., Balzarotti, D., Winter, S. & Suri, N., 2015. 16 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  80. Published

    Incremental anomaly identification in flight data analysis by adapted one-class SVM method

    Kolev, D., Suvorov, M., Morozov, E., Markarian, G. & Angelov, P., 2015, Artificial neural networks: methods and applications in bio-/neuroinformatics. Koprinkova-Hristova, P., Mladenov, V. & Kasabov, N. K. (eds.). Springer, p. 373-391 19 p. (Springer Series in Bio-/Neuroinformatics; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    Intelligent Systems' 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland

    Angelov, P. (Editor), T. Atanassov, K. (Editor), Doukovska, L. (Editor), Hadjiski, M. (Editor), Jotsov, V. (Editor), Kacprzyk, J. (Editor), Kasabov, N. (Editor), Sotirov, S. (Editor), Szmidt, E. (Editor) & Zadrozny, S. (Editor), 2015, Springer. 863 p. (Advances in Intelligent Systems and Computing; vol. 322)

    Research output: Book/Report/ProceedingsProceedings

  82. Published

    Inter-cell collaborative spectrum monitoring for cognitive cellular networks in fading environment

    Deepak, G. C., Navaie, K. & Ni, Q., 2015, IEEE International Conference on Communications (ICC), 2015 . IEEE, p. 7498-7503 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    IPv6 AS relationships, cliques, and congruence

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 2015, Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Mirkovic, J. & Liu, Y. (eds.). Berlin: Springer, p. 111-122 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Leveraging SDN to provide an in-network QoE measurement framework

    Farshad, A., Georgopoulos, P., Broadbent, M., Mu, M. & Race, N., 2015, Computer Communications Workshops (INFOCOM WKSHPS), 2015 IEEE Conference on. IEEE, p. 239-244 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Lived economies of default: consumer credit, debt collection, and the capture of affect

    Deville, J., 2015, London: Routledge. 212 p. (CRESC Culture, Economy and the Social)

    Research output: Book/Report/ProceedingsBook

  86. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  87. Published

    Open challenges in relationship-based privacy mechanisms for social network services

    Fogues, R. L., Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2015, In: International Journal of Human-Computer Interaction. 31, 5, p. 350-370 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    Optimization studies on CSRR loaded waveguide for particle accelerator applications

    Sharples, E. & Letizia, R., 2015, Abstracts 2015 IEEE International Conference on Plasma Sciences (ICOPS). IEEE, 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  90. Published

    Problem set for first order theorem provers in the TPTP format

    Caminati, M. B., Kerber, M. & Rowat, C., 2015

    Research output: Exhibits, objects and web-based outputsSoftware

  91. Published

    Proofs for Traffic Safety: Combining Diagrams and Logic

    Linker, S., 2015

    Research output: ThesisDoctoral Thesis

  92. Published

    ProTec - A Normal-Conducting Cyclinac for Proton Therapy Research and Radioisotope Production

    Apsimon, R. J., Burt, G. C., Mitchell, J., Pitman, S., Owen, H. & Degiovanni, A., 2015, Proceedings of the 6th International Particle Accelerator Conference. JACoW, p. 3883-3885 3 p. THPF084

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    RDE with forgetting: an approximate solution for large values of k with an application to fault detection problems

    Bezerra, C. G., Costa, B., Guedes, L. A. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 169-178 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    Recursive SVM based on TEDA

    Kangin, D. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Cham: Springer, p. 156-168 13 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Religion, Raum und Ort: Der Spatial Turn in der Religionsforschung

    Knott, K., 2015, 103 Jahre Religionswissenschaft in Münster. Radermacher, M., Stander, J. & Wilke, A. (eds.). Münster: Lit Verlag, p. 199-225 27 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  96. Published

    Religious differentiation and diversity in discourse and practice

    Knott, K., 2015, Routledge international handbook of diversity studies. Vertovec, S. (ed.). London: Routledge, p. 91-97 7 p. (Routledge International Handbooks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  97. Published

    Research and teaching using a hydraulically-actuated nuclear decommissioning robot

    West, C., Burrell, T., Montazeri, A., Monk, S. D. & Taylor, C. J., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  98. Published

    Review of autonomous navigation for indoor aerial robots within a nuclear decommissioning context

    Burrell, T., Montazeri, A., Monk, S. D. & Taylor, C. J., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  99. Published

    Scenarios and use cases in Tweether: W-band for Internet Everywhere

    Paoloni, C., Letizia, R., Ni, Q., Krozer, V., Andre, F., Magne, F., Marilier, M., Zimmerman, R., Ramirez, A., Vilar, R. & Burciu, I., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  100. Published

    Security, technology and global politics: thinking with Virilio

    Lacy, M. J., 2015, London: Routledge. 168 p. (Prio New Security Studies)

    Research output: Book/Report/ProceedingsBook

  101. Published

    Sexual exploitation

    Gillespie, A., 2015, International child law. Buck, T. (ed.). 3rd ed. London: Routledge, p. 333-383 51 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  102. Published

    Social computing privacy and online relationships

    Misra, G. & Such, J. M., 2015, AISB Social Aspects of Cognition and Computing Symposium. p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top