Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    A Photonic Device

    Young, R. J. (Inventor) & Noori, Y. (Inventor), 24/10/2018, Patent No. GB 2561590 (A), 24/10/2018, Priority date 19/04/2017, Priority No. GB1706216.7

    Research output: Patent

  2. Published

    A portable energy-sensitive cosmic neutron detection instrument

    Monk, S., Joyce, M., Jarrah, Z., King, D. & Oppenheim, M., 02/2008, In: Review of Scientific Instruments. 79, 2, 8 p., 023301.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    A practical implementation of self-evolving cloud-based control of a pilot plant

    Costa, B., Skrjanc, I., Blazic, S. & Angelov, P., 2013, 2013 IEEE International Conference on Cybernetics, CYBCONF-2013, Lausanne, Switzerland13-15 June, 2013. Piscataway, N.J.: IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A practical soft decision feedback turbo equalizer for time varying channels

    Fagoonee, L., Clarke, P. & Honary, B., 07/2003, Proceedings of the Seventh International Symposium on Communications Theory and Applications held on 13-18 July 2003 at St. Martin's College, Ambleside, UK.. Lancaster: HW Communications Limited

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In: Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    A Preliminary Look into Unsolicited Mobile App Traffic

    Lyko, T. & Elkhatib, Y., 24/04/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  7. Published

    A probabilistic hypothesis density filter for traffic flow estimation in the presence of clutter

    Canaud, M., Mihaylova, L., El Faouzi, N.-E., Billot, R. & Sau, J., 4/09/2012, Sensor Data Fusion: Trends, Solutions, Applications (SDF), 2012 Workshop on. IEEE, p. 31-36 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A programmable SDN+NFV-based architecture for UAV telemetry monitoring

    White, K., Denney, E., Knudson, M. D., Marnerides, A. & Pezaros, D., 20/07/2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, p. 522-527 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A public ideation of shape-changing applications

    Sturdee, M., Hardy, J., Dunn, N. & Alexander, J., 2015, ITS '15 Proceedings of the 2015 International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 219-228 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In: Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    A qualitative comparison of the suitability of four theorem provers for basic auction theory

    Lange, C., Caminati, M. B., Kerber, M., Mossakowski, T., Rowat, C., Wenzel, M. & Windsteiger, W., 1/07/2013, Intelligent Computer Mathematics: MKM, Calculemus, DML, and Systems and Projects 2013, Held as Part of CICM 2013, Bath, UK, July 8-12, 2013. Proceedings 6. Springer, Vol. 7961. p. 200-215

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A Qualitative Evaluation of the Acceptability of a Tailored Smartphone Alcohol Intervention for a Military Population: Information About Drinking for Ex-Serving Personnel (InDEx) App

    Puddephatt, J.-A., Leightley, D., Palmer, L., Jones, N., Mahmoodi, T., Drummond, C., Rona, R. J., Fear, N. T., Field, M. & Goodwin, L., 24/05/2019, In: JMIR mHealth and uHealth. 7, 5, 15 p., e12267.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    A Qualitative Evaluation of the Acceptability of a Tailored Smartphone Alcohol Intervention for a Military Population: Information About Drinking for Ex-Serving Personnel (InDEx) App (Preprint)

    Puddephatt, J.-A., Leightley, D., Palmer, L., Jones, N., Mahmoodi, T., Drummond, C., Rona, R. J., Fear, N. T., Field, M. & Goodwin, L., 27/09/2018

    Research output: Other contribution

  14. Published

    A Rainbow of Corpora: Corpus Linguistics and the Languages of the World

    Wilson, A., Rayson, P. & McEnery, A. M., 2002, Munich: Lincom-Europa. 174 p. (Linguistics edition)

    Research output: Book/Report/ProceedingsBook

  15. Published

    A Ray-Tracing Technique for Ultra Wideband Channel Modelling

    Asif, H., Zeng, Y., Memari, B. & Honary, B., 07/2009, IEEE 10th International Symposium on Communication Theory and Applications”, (ISCTA’09). Ambleside, UK, p. 262–265 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    A Real-time Approach for Novelty Detection and Trajectories Analysis for Anomaly Recognition in Video Surveillance Systems

    Sadeghi-Tehran, P. & Angelov, P., 2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on . IEEE, p. 108-113 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems

    Birkholz, H., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Arul, T., Heinrich, M., Katzenbeisser, S., Suri, N., Vateva-Gurova, T. & Schlehuber, C., 25/06/2018. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    A Reinforcement Learning-based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks

    Ling, M. H., Yau, K.-L. A., Qadir, J. & Ni, Q., 1/03/2019, In: IEEE Transactions on Cognitive Communications and Networking. 5, 1, p. 28 - 43 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways

    Eiza, M. H. & Ni, Q., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1578-1585 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    A Resolution of Emissions-Estimate Confusion for Informing Flight Choice

    Kaivanto, K. K. & Zhang, P., 05/2016, Economics: Lancaster University, Department of Economics, (Economics working paper series).

    Research output: Working paper

  21. Published

    A retrospective analysis of QoS deployment, operation and use in enterprise and provider networks

    Mackay, M. & Edwards, C., 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Barolli, L., Xhafa, F., Takizawa, M., Enokido, T. & Hsu, H. H. (eds.). New York: IEEE, p. 583-588 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    A review and analysis of the recent literature on the Common European Asylum System

    Schweitzer, R., Consterdine, E. & Collyer, M., 30/06/2018, CEASEVAL Research on the Common European Asylum System.

    Research output: Working paper

  23. Published

    A Review of Negotiation Techniques in Component Based Software Engineering

    Hutchinson, J. & Kotonya, G., 2006, EUROMICRO '06: Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications. Washington, DC, USA: IEEE Computer Society, p. 152-159 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    A roadmap for autonomous robotic assembly

    Bruyninckx, H., Lefebvre, T., Mihaylova, L., Staffetti, E., De Schutter, J. & Xiao, J., 28/05/2001, Assembly and Task Planning, 2001, Proceedings of the IEEE International Symposium on. p. 49 - 54 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  26. Published

    A route towards practical quantum communication

    Roberts, J., Young, M., Noori, Y., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R., 10/07/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  27. Published

    A same kind of different: affordances, terrorism and the internet

    Taylor, P. J., Holbrook, D. & Joinson, A., 02/2017, In: Criminology and Public Policy. 16, 1, p. 127-133 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    A scalable user fairness model for adaptive video streaming over SDN-assisted future networks

    Mu, M., Broadbent, M., Farshad, A., Hart, N., Hutchison, D., Ni, Q. & Race, N., 1/08/2016, In: IEEE Journal on Selected Areas in Communications. 34, 8, p. 2168-2184 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    A Scenario-Based Review of IPv6 Transition Tools

    Mackay, M., Edwards, C., Dunmore, M., Chown, T. & Carvalho, G., 2003, In: IEEE Internet Computing. 7, 3, p. 27-35 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    A secure collaborative spectrum sensing strategy in cyber-physical systems

    Lin, H., Hu, J., Ma, J., Xu, L. & Yu, Z., 22/12/2017, In: IEEE Access. 5, p. 27679-27690 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system

    Kumar, A., Yadav, A. S., Gill, S. S., Pervaiz, H., Ni, Q. & Buyya, R., 30/11/2022, In: Simulation Modelling Practice and Theory. 120, 27 p., 102621.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    A Secure Group-Oriented Framework for Intelligent Virtual Environments

    Such, J. M., Alberola, J. M., Barella, A. & Garcia-Fornes, A., 2011, In: Computing and Informatics. 30, 6, p. 1225-1246 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    A secure ubiquitous healthcare system based on IMS and the HL7 standards

    Nikolidakis, S. A., Georgakakis, E., Giotsas, V., Vergados, D. D. & Douligeris, C., 2010, PETRA '10 Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments. New York: ACM, 42

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (Editor), Tonetta, S. (Editor) & Schoitsch, E. (Editor), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    A security metrics framework for the Cloud

    Luna, J., Ghani, H., Germanus, D. & Suri, N., 18/07/2011, Proceedings of the International Conference on Security and Cryptography 2011. IEEE, p. 245-250 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    A Selective Delayed Channel Access (SDCA) for the high-throughput IEEE 802.11n

    Skordoulis, D., Ni, Q. & C. Zarakovitis, C., 2009, Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE. New York: IEEE, p. 1173-1178 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    A semantic tagger for the Finnish language

    Löfberg, L., Piao, S., Rayson, P., Juntunen, J. P., Nykanen, A. & Varantola, K., 07/2005.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  38. Published

    A Semi-autonomic Framework for Intrusion Tolerance in Heterogeneous Networks

    D'Antonio, S., Romano, S., Simpson, S., Smith, P. & Hutchison, D., 10/2008, Self-Organizing Systems: Third International Workshop, IWSOS 2008, Vienna, Austria, December 10-12, 2008. Proceedings. Hummel, K. A. & Sterbenz, J. P. G. (eds.). Berlin: Springer, p. 230-241 12 p. (Lecture Notes in Computer Science; vol. 5343).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    A semiconductor source of triggered entangled photon pairs

    Stevenson, R. M., Young, R. J., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 12/01/2006, In: Nature. 439, 7073, p. 179-182 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    A Sensor Fusion Method for Smart phone Orientation Estimation

    Ayub, S., Bahraminasab, A. & Honary, B., 06/2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting . Liverpool

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    A Sequential Monte Carlo Approach for Extended Object Tracking in the Presence of Clutter

    Petrov, N., Mihaylova, L., Gning, A. & Angelova, D., 1/10/2011, Lecture Notes from Informatics. Berlin, Germany, p. 1-11 11 p. (Lecture Notes in Informatics; vol. P192).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Unpublished

    A service model for component-based development

    Hutchinson, J., Kotonya, G., Sommerville, I. & Hall, S., 09/2004, (Unpublished)

    Research output: Other contribution

  43. Published

    A service-independent model for linking online user profile information

    Edwards, M., Rashid, A. & Rayson, P., 2014, IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE, p. 280-283 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    A Service-Indepenent Model for Linking Online User Profile Information

    Edwards, M. J., Rashid, A. & Rayson, P., 09/2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    A Service-Oriented Approach for Specifying Component-Based Systems

    Kotonya, G. & Hutchinson, J., 2007, ICCBSS '07: Proceedings of the Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems. Washington, DC, USA: IEEE Computer Society, p. 150-162 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Unpublished

    A Service-oriented Method for Supporting Development with Reuse

    Kotonya, G. & Hutchinson, J., 12/2003, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  47. Published

    A Simple Soft-Input/Soft-Output Decoder for Hamming Codes

    Hirst, S. A. & Honary, B., 2001, Cryptography and Coding : 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 38-43 6 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published
  49. Published

    A site-controlled quantum dot system offering both high uniformity and spectral purity

    Mereni, L. O., Dimastrodonato, V., Young, R. J. & Pelucchi, E., 1/06/2009, In: Applied Physics Letters. 94, 22, p. - 3 p., 223121.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    A Situation Aware Information Infrastructure (SAI^2) Framework

    Marnerides, A., Pezaros, D., Jose, J., Mauthe, A. U. & Hutchison, D., 2017, Smart Objects and Technologies for Social Good Second International Conference, GOODTECHS 2016, Venice, Italy, November 30 – December 1, 2016, Proceedings. Gaggi, O., Manzoni, P., Palazzi, C., Bujari, A. & Marquez-Barja, J. (eds.). Cham: Springer, p. 186-194 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 195).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    A situational analysis of how barriers to systemic failure are undermined during accident sequences

    Busby, J. S., Chung, P. W. H. & Wen, Q., 2004, In: Journal of Risk Research. 7, 7/8, p. 811-826 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    A Smart approach for GPT cryptosystem based on rank codes

    Rashwan, H., Gabidulin, E. M. & Honary, B., 2010, Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on. IEEE, p. 2463-2467 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    A Smartphone App and Personalized Text Messaging Framework (InDEx) to Monitor and Reduce Alcohol Use in Ex-Serving Personnel: Development and Feasibility Study

    Leightley, D., Puddephatt, J.-A., Jones, N., Mahmoodi, T., Chui, Z., Field, M., Drummond, C., Rona, R. J., Fear, N. T. & Goodwin, L., 11/09/2018, In: JMIR mHealth and uHealth. 6, 9, e10074.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    A Smartphone App and Personalized Text Messaging Framework (InDEx) to Monitor and Reduce Alcohol Use in Ex-Serving Personnel: Development and Feasibility Study (Preprint)

    Leightley, D., Puddephatt, J.-A., Jones, N., Mahmoodi, T., Chui, Z., Field, M., Drummond, C., Rona, R. J., Fear, N. T. & Goodwin, L., 8/02/2018

    Research output: Other contribution

  55. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Unpublished

    A State-based Join Point Model for AOP

    Rashid, A. & Ali, N. M., 01/2005, (Unpublished)

    Research output: Other contribution

  57. Published

    A Stitch in Time: Supporting Android Developers in Writing Secure Code

    Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C. A. F. & Fahl, S., 30/10/2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1065-1077 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    A study of LBS accuracy in the UK and a novel approach to inferring the positioning technology employed.

    Mohr, M., Edwards, C. & McCarthy, B., 18/04/2008, In: Computer Communications. 31, 6, p. 1148 - 1159

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    A survey of key management for secure group communications.

    Rafaeli, S. & Hutchison, D., 1/09/2003, In: ACM Computing Surveys. 35, 3, p. 309-329 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  61. Published

    A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems

    Chuah, E., Jhumka, A., Malek, M. & Suri, N., 29/12/2022, In: IEEE Access. 10, p. 133487-133503 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In: Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    A survey of pervasive displays for information presentation

    Clinch, S. E., Alexander, J. M. & Gehring, S., 07/2016, In: IEEE Pervasive Computing. 15, 3, p. 14-22 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Published

    A survey of privacy in multi-agent systems

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 06/2014, In: Knowledge Engineering Review. 29, 3, p. 314-344 31 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    A survey of QoS enhancements for IEEE 802.11 wireless LAN

    Ni, Q., Romdhani, L. & Turletti, T., 2004, In: Wireless Communications and Mobile Computing. 4, 5, p. 547-566 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    A survey of requirements and standardization efforts for IP-telephony-security

    Rensing, C., Roedig, U., Ackermann, R. & Steinmetz, R., 1/09/2000, Sicherheit in Netzen und Medienströmen: Tagungsband des GI-Workshops “Sicherheit in Mediendaten„, Berlin, 19. September 2000. Schumacher, M. (ed.). Berlin: Springer Verlag, p. 50-60 11 p. (Informatik aktuell).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    A survey of rural Wireless Mesh Network (WMN) deployments

    Ajayi, A. O., Roedig, U., Edwards, C. & Race, N., 28/08/2014, Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, p. 119-125 7 p. 14664869

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    A Survey-based Study of Grid Traffic

    El khatib, Y., Edwards, C. & EC-GIN (Funder), 17/10/2007.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  69. Published

    A Symmetric Key Generation and Pre-Distribution Scheme for WSN Using MRD Codes

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 06/2011, 12th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting . Liverpool, UK: Liverpool John Moores University, p. 135-140 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    A systematic literature review on fault prediction performance in software engineering

    Hall, T., Beecham, S., Bowes, D., Gray, D. & Counsell, S., 2012, In: IEEE Transactions on Software Engineering. 38, 6, p. 1276-1304 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    A systematic review of evaluation of variability management approaches in software product lines

    Chen, L. & Babar, M. A., 04/2011, In: Information and Software Technology. 53, 4, p. 344-362 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    A systematic review of the comorbidity between PTSD and alcohol misuse

    Debell, F., Fear, N., Head, M., Batt-Rawden, S., Greenberg, N., Wessely, S. & Goodwin, L., 30/09/2014, In: Social Psychiatry and Psychiatric Epidemiology. 49, 9, p. 1401-1425 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Published

    A systematic review of the potential hurdles to interoperability to the emergency services in major incidents: recommendations for solutions and alternatives

    House, A., Power, N. & Alison, L., 08/2014, In: Cognition, Technology and Work. 16, 3, p. 319-335 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  74. Published

    A systematic survey of online data mining technology intended for law enforcement

    Edwards, M., Rashid, A. & Rayson, P., 09/2015, In: ACM Computing Surveys. 48, 1

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. Published

    A taxonomy of endogenous and exogenous uncertainty in high-risk high-impact contexts

    Alison, L., Power, N., van den Heuvel, C. & Waring, S., 07/2015, In: Journal of Applied Psychology. 100, 4, p. 1309-1318 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  76. Published

    A taxonomy of tool-related issues affecting the adoption of model-driven engineering

    Whittle, J. N. D., Hutchinson, J., Rouncefield, M. F., Burden, H. & Heldal, R., 05/2017, In: Software and Systems Modeling. 16, 2, p. 313-331 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    A theoretical and empirical analysis of three slice-based metrics for cohesion

    Counsell, S., Hall, T. & Bowes, D., 2010, In: International Journal of Software Engineering and Knowledge Engineering. 20, 5, p. 609-636 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  78. Published

    A time-sensitive historical thesaurus-based semantic tagger for deep semantic annotation

    Piao, S. S., Dallachy, F., Baron, A., Demmen, J. E., Wattam, S., Durkin, P., McCracken, J., Rayson, P. E. & Alexander, M., 11/2017, In: Computer Speech and Language. 46, p. 113-135 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Published

    A tool for assisting translators using automatic semantic annotation

    Sharoff, S., Rayson, P., Mudraya, O., Wilson, A. & McEnery, T., 01/2004. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  80. Published

    A Tool Suite for Aspect-Oriented Requirements Engineering

    Chitchyan, R., Sampaio, A., Rashid, A. & Rayson, P., 05/2006, EA '06 Proceedings of the 2006 international workshop on Early aspects at ICSE. ACM, p. 19-26 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    A trace-driven analysis of caching in content-centric networks

    Tyson, G., Kaune, S., Miles, S., El-khatib, Y., Mauthe, A. & Taweel, A., 07/2012, Computer Communications and Networks (ICCCN), 2012 21st International Conference on . IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    A traveling wave tube for 92 - 95 GHz band wireless applications

    Paoloni, C., Andre, F., Kohler, S., Krozer, V., Quang, T. L., Letizia, R., Sabaawi, A., Ulisse, G. & Zimmerman, R., 25/09/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  83. Published

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 25/02/2019. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  84. E-pub ahead of print

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 2018, (E-pub ahead of print) p. 1-34, 34 p.

    Research output: Working paper

  85. Published

    A tunable add-on diagnostic protocol for time-triggered systems

    Serafini, M., Suri, N., Vinter, J., Ademaj, A., Brandstätter, W., Tagliabò, F. & Koch, J., 25/06/2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07). IEEE, p. 164-173 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    A unified model for holistic power usage in cloud datacenter servers

    Garraghan, P., Al-Anii, Y., Summers, J., Thompson, H., Kapur, N. & Djemame, K., 6/12/2016, UCC '16 Proceedings of the 9th International Conference on Utility and Cloud Computing. New York: ACM, p. 11-19 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published
  88. Published

    A use-based approach for enhancing UCON

    Grompanopoulos, C., Gouglidis, A. & Mavridis, I., 1/12/2013, Security and Trust Management. Jøsang, A., Samarati, P. & Petrocchi, M. (eds.). Berlin: Springer Verlag, p. 81-96 16 p. (Lecture Notes in Computer Science ; vol. 7783 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    A verified algorithm enumerating event structures

    Bowles, J. & Caminati, M. B., 28/06/2017, Intelligent Computer Mathematics. Springer, Vol. 10383.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    A Visual Exploration of Cybersecurity Concepts

    Sturdee, M., Thornton, L., Wimasaliri, B. & Patil, S., 22/06/2021, C&C '21: Creativity and Cognition. New York: ACM, 10 p. 46

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    A working memory test battery: Java-based collection of seven working memory tasks

    Stone, J. M. & Towse, J., 5/06/2015, In: Journal of Open Research Software. 3, 9 p., e5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    Abortable fork-linearizable storage

    Majuntke, M., Dobre, D., Serafini, M. & Suri, N., 2009, Principles of Distributed Systems: 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. Springer, Vol. 5923 LNCS. p. 255-269 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  93. Unpublished

    Accomplishing 'Just-in-Time' Production

    Rouncefield, M., Hartswood, M., Procter, R., Slack, R., Voss, A. & Williams, R., 07/2002, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  94. Published

    Accounting for leadership

    Kelly, S., Iszatt-White, M., Randall, D. & Rouncefield, M. F., 2005, 4th International Critical Management Studies Conference (University of Cambridge) - 2005. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Accurate Backward-Wave Interaction Impedance Computation for Corrugated Rectangular Waveguides

    Paoloni, C., 09/2012, 5th UK/Europe-China Workshop on Millimeter Waves and Terahertz Technologies. China

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Accurate crab cavity modeling for the high luminosity Large Hadron Collider

    Brett, D. R., Appleby, R. B., De Maria, R., Barranco Garcia, J., Tomas Garcia, R., Hall, B. & Burt, G., 2/10/2014, In: Physical Review Special Topics: Accelerators and Beams. 17, 10, 12 p., 104001.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    ACFM - Reactionary Democracy

    Winter, A. (Speaker) & Mondon , A. (Speaker), 5/05/2024

    Research output: Exhibits, objects and web-based outputsPodcast

  98. Published

    Achieving ICS resilience and security through granular data flow management

    Green, B., Krotofil, M. & Hutchison, D., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 93-101 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    Acoustic-channel attack and defence methods for personal voice assistants

    Cheng, P., 2020, Lancaster University. 232 p.

    Research output: ThesisDoctoral Thesis

  100. Published

    Action-specific effects in perception and their potential applications: a reply to commentaries

    Witt, J. K., Linkenauger, S. A. & Wickens, C., 03/2016, In: Journal of Applied Research in Memory and Cognition. 5, 1, p. 88-93 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...36 Next

Back to top