Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    Argumentation for multi-party privacy management

    Fogues, R. L., Murukanniah, P., Such, J. M., Espinosa, A., Garcia-Fornes, A. & Singh, M., 05/2015, The Second International Workshop on Agents and CyberSecurity (ACySe). p. 3-6 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Arithmetic Block Coding to reduce error propagation

    Baichoo, S., Honary, B. & Soyjaudah, K. S., 07/2005, 8th International Symposium on Communication Theory and Applications. Lancaster: HW Communications Limited, p. 52-56 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Unpublished

    Artefact-Centred Analysis - Transect and Archaeological Approaches

    Dix, A., Ramduny-Ellis, D., Rayson, P. & Sommerville, I., 11/2001, (Unpublished) In: Team Ethno-online.

    Research output: Contribution to Journal/MagazineJournal article

  4. Published

    Artefacts as designed, Artefacts as used: resources for uncovering activity dynamics

    Ramduny-Ellis, D., Dix, A., Rayson, P., Onditi, V., Sommerville, I. & Ransom, J., 07/2005, In: Cognition, Technology and Work. 7, 2, p. 76-87 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Artefacts speak and artefacts to speak

    Dix, A., Ramduny-Ellis, D., Rayson, P., Onditi, V., Sommerville, I. & Mackenzie, A., 11/2002.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  6. Published

    Artefacts, sensemaking and catastrophic failure in railway systems

    Hibberd, R. E. & Busby, J. S., 2004, IEEE Conference on systems, man and cybernetics SMC2004 (The Hague ) - 2004. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Articulated Human Body Parts Detection Based on Cluster Background Subtraction and Foreground Matching

    Bhaskar, H., Mihaylova, L. & Maskell, S., 16/01/2013, In: Neurocomputing. 100, 1, p. 58-73 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    ARTOD: Autonomous Real Time Objects Detection by a moving camera using recursive density estimation

    Sadeghi Tehran, P. & Angelov, P., 28/01/2016, Novel applications of intelligent systems. Hadjiski, M., Kasabov, N., Filev, D. & Jotsov, V. (eds.). Cham: Springer Verlag, p. 123-138 16 p. (Studies in Computational Intelligence; vol. 586).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    ARTOT: Autonomous Real-Time Object detection and Tracking by a moving camera

    Angelov, P., Gude, C., Sadeghi-Tehran, P. & Ivanov, T., 09/2012, Intelligent Systems (IS), 2012 6th IEEE International Conference. IEEE, p. 446-452 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    AS relationships, customer cones, and validation

    Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V. & Claffy, K., 2013, IMC '13 Proceedings of the 2013 conference on Internet measurement conference. New York: ACM, p. 243-256 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    As useful as a bicycle to a fish: exploration versus constraint in creativity

    McKnight, L., Ormerod, T. C., Sas, C. & Dix, A., 2006, p. 291-291. 1 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  12. Published

    ASample: Adaptive spatial sampling in Wireless Sensor Networks

    Szczytowski, P., Khelil, A. & Suri, N., 7/06/2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Aspect identification in textual requirements with EA-Miner

    Weston, N., Chitchyan, R., Sampaio, A., Rashid, A. & Greenwood, P., 2013, Aspect-oriented requirements engineering. Moreira, A., Chitchyan, R., Araújo, J. & Rashid, A. (eds.). Berlin: Springer, p. 3-21 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  14. Published

    Aspect-oriented requirements engineering

    Moreira, A. (Editor), Chitchyan, R. (Editor), Araújo, J. (Editor) & Rashid, A. (Editor), 2013, Berlin: Springer. 383 p.

    Research output: Book/Report/ProceedingsBook

  15. Published

    Aspect-oriented software development in practice: tales from AOSD-Europe

    Rashid, A., Cottenier, T., Greenwood, P., Chitchyan, R., Meunier, R., Coelho, R., Südholt, M. & Joosen, W., 02/2010, In: Computer. 43, 2, p. 19-26 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Assert use and defectiveness in industrial code

    Counsell, S., Hall, T., Shippey, T., Bowes, D., Tahir, A. & MacDonell, S., 14/11/2017, Proceedings - 2017 IEEE 28th International Symposium on Software Reliability Engineering Workshops, ISSREW 2017. Institute of Electrical and Electronics Engineers Inc., p. 20-23 4 p. 8109241

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Assessing computational reproducibility in Behavior Research Methods

    Ellis, D., Towse, J., Brown, O., Cork, A., Davidson, B., Devereux, S., Hinds, J., Ivory, M., Nightingale, S., Parry, D., Piwek, L., Shaw, H. & Towse, A., 31/12/2024, In: Behavior Research Methods. 56, p. 8745-8760 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Assessing inter-modular error propagation in distributed software

    Jhumka, A., Hiller, M. & Suri, N., 31/10/2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems. IEEE, p. 152-161 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Assessing privacy capabilities of cloud service providers

    Del Alamo, J. M., Trapero, R., Martin, Y. S., Yelmo, J. C. & Suri, N., 1/11/2015, In: IEEE Latin America Transactions. 13, 11, p. 3634-3641 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Assessing the comparative effectiveness of map construction protocols in wireless sensor networks

    Khelil, A., Chang, H. & Suri, N., 17/11/2011, 30th IEEE International Performance Computing and Communications Conference. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Assessing the contributions of childhood maltreatment subtypes and depression case-control status on telomere length reveals a specific role of physical neglect

    Vincent, J., Hovatta, I., Frissa, S., Goodwin, L., Hotopf, M., Hatch, S., Breen, G. & Powell, T., 15/04/2017, In: Journal of Affective Disorders. 213, p. 16-22 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Assessing the Impact of Aspects on Exception Flows: An Exploratory Study

    Coelho, R., Rashid, A., Garcia, A., Ferrari, F., Cacho, N., Kulesza, U., von Staa, A. & Lucena, C., 2008, Proceedings of the 22nd European Conference on Object-Oriented Programming (ECOOP 2008). Berlin: Springer, p. 207-234 27 p. (Lecture Notes in Computer Science; vol. 5142).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Assessing the impact of intra-cloud live migration on anomaly detection

    Shirazi, S. N. U. H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A. & Hutchison, D., 10/2014, Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE, p. 52-57 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  25. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    ASSIST: Automated Semantic Assistance for Translators

    Sharoff, S., Babych, B., Rayson, P., Mudraya, O. & Piao, S., 04/2006, EACL '06 Proceedings of the Eleventh Conference of the European Chapter of the Association for Computational Linguistics: Posters & Demonstrations. p. 139-142 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Associating network flows with user and application information

    Ackermann, R., Roedig, U., Zink, M., Griwodz, C. & Steinmetz, R., 1/10/2000, Proceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA. New York: ACM Press, p. 149-152 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Associations between childhood maltreatment and inflammatory markers.

    Palmos, A., Watson, S., Hughes, T., Finkelmeyer, A., McAllister-Williams, R., Ferrier, N., Anderson, I., Nair, R., Young, A., Strawbridge, R., Cleare, A., Chung, R., Frissa, S., Goodwin, L., Hotopf, M., Hatch, S. L., Wang, H., Collier, D. A., Thuret, S. & Breen, G. & 1 others, Powell, T. R., 31/01/2019, In: BJPsych Open. 5, 1, 7 p., e3.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Associations between interrelated dimensions of socio-economic status, higher risk drinking and mental health in South East London: A cross-sectional study

    Boniface, S., Lewer, D., Hatch, S. & Goodwin, L., 14/02/2020, In: PLoS ONE. 15, 2, 12 p., e0229093.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Associations of alcohol use, mental health and socioeconomic status in England: Findings from a representative population survey

    Puddephatt, J., Jones, A., Gage, S., Fear, N., Field, M., McManus, S., McBride, O. & Goodwin, L., 1/02/2021, In: Drug and Alcohol Dependence. 219, 8 p., 108463.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Associations of common mental disorder with alcohol use in the adult general population: a systematic review and meta-analysis

    Puddephatt, J., Irizar, P., Jones, A., Gage, S. & Goodwin, L., 30/06/2022, In: Addiction (Abingdon, England). 117, 6, p. 1543-1572 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Assured deletion in the cloud: requirements, challenges and future directions

    Ramokapane, M., Rashid, A. & Such, J. M., 28/10/2016, CCSW '16 Proceedings of the 2016 ACM on Cloud Computing Security Workshop. New York: ACM, p. 97-108 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Asymmetric dual axis energy recovery linac for ultrahigh flux sources of coherent x-ray and THz radiation: investigations towards its ultimate performance

    Ainsworth, R., Burt, G. C., Konoplev, I. V. & Seryi, A., 18/08/2016, In: Physical Review Accelerators and Beams. 19, 8, 15 p., 083502.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Asymmetrical Body Perception: A Possible Role for Neural Body Representations

    Linkenauger, S. A., Witt, J. K., Bakdash, J. Z., Stefanucci, J. K. & Proffitt, D. R., 11/2009, In: Psychological Science. 20, 11, p. 1373-1380 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    At home with users: a comparative view of Living Labs

    Ley, B., Ogonowski, C., Mu, M., Hess, J., Race, N., Randall, D., Rouncefield, M. & Wulf, V., 2015, In: Interacting with Computers. 27, 1, p. 21-35 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    ATDT: Autonomous Template-based Detection and Tracking of objects from airborne camera

    Sadeghi Tehran, P. & Angelov, P., 2015, Intelligent Systems 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland, Volume 2: Tools, Architectures, Systems, Applications. Filev, D., Jabłkowski, J., Kacprzyk, J., Krawczak, M., Popchev, I., Rutkowski, L., Sgurev, V., Sotirova, E., Szynkarczyk, P. & Zadrozny, S. (eds.). Springer, p. 555-565 11 p. (Advances in Intelligent Systems and Computing; vol. 323).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    ATHENE: Assistive technologies for healthy living in elders: needs assessment by ethnography.

    Greenhalgh, T., Procter, R., Wherton, J. & Rouncefield, M., 2011. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  40. Published

    Atomic-scale authentication using imperfect semiconductor structures

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M. A., Missous, M., Roedig, U. & Young, R., 1/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  41. Published

    Atomic-scale authentication using resonant tunnelling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y. J., Young, M. P., Woodhead, C. S., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 23/02/2015, In: arxiv.org.

    Research output: Contribution to Journal/MagazineJournal article

  42. Published

    Atomic-scale authentication with resonant tunneling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 2016, In: MRS Advances. 1, 22, p. 1625-1629 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    Atomic-scale authentication with Resonant Tunnelling Diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R., 27/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  44. Published

    Attack pattern recognition through correlating cyber situational awareness in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 1/03/2014, Cyberpatterns: unifying design patterns with security and attack patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 125-134 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  45. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Attacks and Threats of Value Added Service Charging Mechanisms in Third Generation Networks

    Katsaros, I., Martin, I. & Honary, B., 12/2004, First International Symposium on Broadband Communications. Harrogate, p. 71

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Attacks and Vulnerabilities of Trust and Reputation Models

    Such, J. M., 2013, Agreement Technologies. Ossowski, S. (ed.). Dordrecht: Springer Verlag, p. 467-477 11 p. (Law, Governance and Technology Series; vol. 8).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  48. Published

    Attention module-based spatial-temporal graph convolutional networks for skeleton-based action recognition

    Kong, Y., Li, L., Zhang, K., Ni, Q. & Han, J., 30/08/2019, In: Journal of Electronic Imaging. 28, 4, 043032.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Forthcoming

    Attributes and Dimensions of Trust in Secure Systems

    Bradbury, M., Prince, D., Marcinkiewicz, V. & Watson, T., 7/10/2022, (Accepted/In press) STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. Delft, Netherlands, (ACM Transactions on Internet of Things).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Auction based models for ticket allocation problem in IT service delivery industry

    Deshpande, P. M., Garg, D. & Suri, N., 7/07/2008, 2008 IEEE International Conference on Services Computing. IEEE, p. 111-118 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Auction Theory Toolbox

    Lange, C., Rowat, C., Kerber, M., Wenzel, M., Caminati, M., Mossakowski, T. & Windsteiger, W., 2013

    Research output: Exhibits, objects and web-based outputsSoftware

  52. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Published

    AUKUS: The realisation of ‘Global Maritime Britain’

    Germond, B., 20/09/2021

    Research output: Exhibits, objects and web-based outputsBlog

  54. Published

    AURORA: autonomous real-time on-board video analytics

    Angelov, P., Sadeghi Tehran, P. & Clarke, C., 05/2017, In: Neural Computing and Applications. 28, 5, p. 855-865 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Published

    Authentic First Impressions Relate to Interpersonal, Social, and Entrepreneurial Success

    Markowitz, D. M., Kouchaki, M., Gino, F., Hancock, J. T. & Boyd, R. L., 1/03/2023, In: Social Psychological and Personality Science. 14, 2, p. 107-116 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    Authentication in stealth distributed hash tables

    MacQuire, A., Brampton, A., Rai, I. A., Race, N. J. P. & Mathy, L., 06/2008, In: Journal of Systems Architecture. 54, 6, p. 607 - 618 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    Authentication in stealth distributed hash tables

    MacQuire, A., Brampton, A., Rai, I., Race, N. J. P. & Mathy, L., 28/08/2006, 32nd Euromicro Conference on Software Engineering and Advanced Applications, 2006. IEEE, p. 348-355 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Authors' reply to 'comments on 'researcher bias: The use of machine learning in software defect prediction''

    Shepperd, M., Hall, T. & Bowes, D., 1/11/2018, In: IEEE Transactions on Software Engineering. 44, 11, p. 1129-1131 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Automated buyer profiling control based on human privacy attitudes

    Such, J. M., Garcia-Fornes, A. & Botti, V., 11/2013, In: Electronic Commerce Research and Applications. 12, 6, p. 386-396 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Automatic extraction of Chinese multiword expressions with a statistical tool

    Piao, S., Sun, G., Rayson, P. & Yuan, Q., 04/2006.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  61. Published

    Automatic mobile photographer and picture diary

    Angelov, P., Andreu, J. & Vong, T., 05/2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on. IEEE, p. 102-107

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Automatic object detection based on adaptive background subtraction using symmetric alpha stable distribution

    Bhaskar, H., Mihaylova, L. & Maskell, S., 15/04/2008, Target Tracking and Data Fusion: Algorithms and Applications, 2008 IET Seminar on. p. 197 - 203 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    Automatic Optimization of a Klystron Interaction Structure

    Lingwood, C., Burt, G., Gunn, K., Carter, R., Marchesin, R. & Jensen, E., 08/2013, In: IEEE Transactions on Electron Devices. 60, 8, p. 2671-2676 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Published

    Automatic scene recognition for low-resource devices using evolving classifiers

    Andreu, J., Dutta Baruah, R. & Angelov, P., 09/2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ). IEEE, p. 2779-2785 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    Automatic Target Detection Based on Background Modeling Using Adaptive Cluster Density Estimation

    Bhaskar, H., Mihaylova, L. & Maskell, S., 09/2007, Proceedings from the 3rd German Workshop on Sensor Data Fusion: Trends, Solutions, Applications. Koschke, R. (ed.). Bonn: Gesellschaft für Informatik, p. 130-134 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Automatically analysing large texts in a GIS environment: the Registrar General’s reports and cholera in the nineteenth century

    Murrieta-Flores, P., Baron, A., Gregory, I. N., Hardie, A. & Rayson, P. E., 04/2015, In: Transactions in GIS. 19, 2, p. 296-320 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    Automatically Identifying Code Features for Software Defect Prediction: Using AST N-grams

    Shippey, T., Bowes, D. & Hall, T., 02/2019, In: Information and Software Technology. 106, p. 142-160 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    Autonomic diagnosis of anomalous network traffic.

    Marnerides, A., Pezaros, D. P. & Hutchison, D., 14/06/2010. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  69. Published

    Autonomous data-driven clustering for live data stream

    Gu, X. & Angelov, P. P., 9/10/2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2016). IEEE, p. 1128-1135 8 p. 1303

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    Autonomous Learning Systems: From Data to Knowledge in Real Time

    Angelov, P., 1/12/2012, Chichester: John Willey and Sons. 288 p.

    Research output: Book/Report/ProceedingsMonograph

  71. Published

    Autonomous Machine Learning (ALMA): generating rules from data streams

    Angelov, P., 19/09/2011, Proceedings of the Special International Conference on Complex Systems, COSY-2011: 16-19 September 2011. Ohrid, FYR of Macedonia, p. 249-256 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  72. Published

    Autonomous or 'driverless' cars and disability: a legal and ethical analysis

    Bradshaw-Martin, H. & Easton, C., 15/12/2014, In: Web Journal of Current Legal Issues. 20, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Published

    Autonomous visual self-localization in completely unknown environment

    Sadeghi-Tehran, P., Behera, S., Angelov, P. & Andreu, J., 05/2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on. IEEE, p. 90-95 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Unpublished

    Autonomous/uncrewed fleet: Implications for the Royal Navy

    Soare, S., Germond, B. & Burton, J., 29/10/2023, (Unpublished) 9 p.

    Research output: Book/Report/ProceedingsCommissioned report

  75. Published

    AWAKE readiness for the study of the seeded self-modulation of a 400 GeV proton bunch

    AWAKE Collaboration, 01/2018, In: Plasma Physics and Controlled Fusion. 60, 1, 12 p., 014046.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  76. Published

    AWAKE, The Advanced Proton Driven Plasma Wakefield Acceleration Experiment at CERN

    Burt, G. C. & AWAKE Collaboration, 1/09/2016, In: Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 829, p. 76-82 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Background modeling using adaptive cluster density estimation for automatic human detection

    Mihaylova, L., Maskell, S. & Bhaskar, H., 24/09/2007, INFORMATIK 2007 Informatik trifft Logistik Band 2 Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V. (GI) 24. - 27. September 2007 in Bremen. Herog, O., Rödiger, K.-H., Ronthaler , M. & Koschke, R. (eds.). Bonn: Gesellschaft für Informatik, p. 130-134 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Backward Wave Amplifier Realisation at 1000 GHz Progress whitin EU FP7 OPTHER Project

    Paoloni, C., Di Carlo, A., Brunetti, F., Mineo, M., Ulisse, G., Durand, A. J., Krozer, V., Kotiranta, M., Fiorello, A. M., Dispenza, M., Secchi, A., Zhurbenko, V., Boumrane, F., Bouvet, T., Megtert, S., Cojocaru, C.-S. & Gohier, A., 1/09/2011, 5th UK-China Workshop on Millimetre-Waves and Terahertz Technologies 2011. Glasgow

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  79. Published

    Backward wave mode interaction impedance at THz frequencies for corrugated waveguide

    Mineo, M. & Paoloni, C., 04/2012, In: Microwave and Optical Technology Letters. 54, 4, p. 837-839 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    Backward wave oscillator for high power generation at THz frequencies

    Gamzina, D., Li, X., Tang, Y., Huang, X., Zheng, Y., Himes, L., Gonzalez, M., Li, H., Pan, P., Letizia, R., Feng, J., Luhmann Jr., N. C. & Paoloni, C., 6/08/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  81. Published

    Backward Wave Oscillator for THz Frequency Range Based on Double Corrugation Slow-Wave Structure

    Mineo, M., Bariou, D., David, J. F., Durand, A. J. & Paoloni, C., 2010, 35TH INTERNATIONAL CONFERENCE ON INFRARED, MILLIMETER, AND TERAHERTZ WAVES (IRMMW-THZ 2010). New York: IEEE, p. - 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Backward wave oscillators for THz applications based on corrugated waveguide

    Mineo, M. & Paoloni, C., 1/02/2011, Vacuum Electronics Conference (IVEC), 2011 IEEE International. IEEE, p. 265-266 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    Backward-wave vacuum amplifier for THz amplification

    Mineo, M., Paoloni, C., Bariou, D., David, J.-F. & Durand, A. J., 1/02/2011, Vacuum Electronics Conference (IVEC), 2011 IEEE International. IEEE, p. 267 -268 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Baguette: towards end-to-end service orchestration in heterogeneous networks

    Rotsos, C., Farshad, A., Hart, N. P., Aguado, A., Bidkar, S., Sideris, K., King, D., Fawcett, L., Bird, J., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 15/12/2016, International Conference on Ubiquitous Computing and Communications (IUCC'16). IEEE, p. 196-203 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Balanced spatio-temporal compressive sensing for multi-hop wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 8/10/2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012). IEEE, p. 389-397 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    Balancing prescriptions with constraint solvers

    Bowles, J. & Caminati, M. B., 12/06/2019, Automated Reasoning for Systems Biology and Medicine. Springer, Vol. 30.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  87. Published

    Bandwidth Measurements of ALM Trees for Content Distribution

    Lopes, R. J., Mathy, L. & Hutchison, D., 2001, Protocols for Multimedia Systems 6th International Conference, PROMS 2001 Enschede, The Netherlands, October 17–19, 2001 Proceedings. van Sinderen , M. J. & Nieuwenhuis, L. J. M. (eds.). Berlin: Springer Verlag, p. 89-102 14 p. (Lecture Notes in Computer Science; vol. 2213).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    Barring teachers: the new vetting arrangements

    Gillespie, A., 2007, In: Education and the Law. 19, 1, p. 1-18 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    Baseband processing for SDR

    Lund, D. & Honary, B., 2002, Software defined radio : enabling technology. Tuttlebee, W. H. W. (ed.). New York: Wiley, p. 201-232 32 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  90. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In: IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    Basic first-order model theory in Mizar

    Caminati, M. B., 17/12/2010, In: Journal of Formalized Reasoning. 3, 1

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network

    Wang, Y., Wang, X., Ni, Q., Yu, W. & Huang, M., 31/10/2024, In: IEEE Transactions on Network and Service Management. 21, 5, p. 5873-5887 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    Beamforming optimisation in energy harvesting cooperative full-duplex networks with self-energy recycling protocol

    Hu, S., Ding, Z. & Ni, Q., 5/05/2016, In: IET Communications. 10, 7, p. 848-853 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    Beamforming optimization for full-duplex cooperative cognitive radio networks

    Hu, S., Ding, Z., Ni, Q. & Yuan, Y., 3/07/2016, Signal Processing Advances in Wireless Communications (SPAWC), 2016 IEEE 17th International Workshop on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Bearings-Only Tracking with Particle Filtering for Joint Parameter Learning and State Estimation

    Nemeth, C., Fearnhead, P., Mihaylova, L. & Vorley, D., 7/07/2012, Information Fusion (FUSION), 2012 15th International Conference on. IEEE, p. 824-831 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Because it's there! Why some children count, rather than infer numerical relationships.

    Muldoon, K. P., Lewis, C. & Towse, J. N., 07/2005, In: Cognitive Development. 20, 3, p. 472-491 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    Behavioral consistency in the digital age

    Shaw, H., Taylor, P., Ellis, D. & Conchie, S., 1/03/2022, In: Psychological Science. 33, 3, p. 364-370 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    Being an IT in IT : gendered identities in the IT workplace.

    Keogh, C., Adam, A., Griffiths, M., Moore, K., Richardson, H. & Tattersall, A., 08/2006, In: European Journal of Information Systems. 15, 4, p. 358-368 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Bell-Inequality Violation with a Triggered Photon-Pair Source

    Young, R. J., Stevenson, R. M., Hudson, A. J., Nicoll, C. A., Ritchie, D. A. & Shields, A. J., 23/01/2009, In: Physical review letters. 102, 3, p. - 4 p., 030406.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Benchmarking cloud security level agreements using quantitative policy trees

    Luna, J., Langenberg, R. & Suri, N., 19/10/2012, Proceedings of the 2012 ACM Workshop on Cloud computing security workshop. ACM, p. 103-112 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 12 3 4 5 6 7 8 9 ...36 Next

Back to top