Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    A Cloud-based Virtual Observatory for Environmental Science

    Blair, G. S. & El-khatib, Y., 04/2011, OpenWater symposium 19th April, 2011, at UNESCO-IHE, Delft, The Netherlands : Extended abstracts. Delft: Unesco-IHE, p. 102-103 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A cognitive-perceptual model of symptom perception in males and females: the roles of negative affect, selective attention, health anxiety and psychological job demands

    Goodwin, L., Fairclough, SH. & Poole, HM., 1/06/2013, In: Journal of Health Psychology. 18, 6, p. 848-857 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    A collaborative AAA architecture to enable secure real-world network mobility

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2011, NETWORKING'11: 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part I. Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A. & Scoglio, C. (eds.). Berlin: Springer-Verlag, p. 212-226 15 p. (Lecture Notes in Computer Science; vol. 6640).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A commitment to clubbing

    Moore, K., 2004, In: Peace Review. 16, 4, p. 459-465 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A Common Architecture for Cross Layer and Network Context Awareness

    Sifalakis, M., Fry, M. & Hutchison, D., 08/2007, Self-Organizing Systems. 2007 ed. Springer-Verlag, Vol. 4725. p. 103-118 16 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    A comparative performance study of IPv6 transitioning mechanisms - NAT-PT vs. TRT vs. DSTM

    Mackay, M., Edwards, C., Boavida, F. (ed.), Plagemann, T. (ed.), Stiller, B. (ed.), Westphal, C. (ed.) & Monteiro, E. (ed.), 2006, p. 1125-1131. 7 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  7. Published

    A comparative study of architecture knowledge management tools

    Tang, A., Avgeriou, P., Jansen, A., Capilla, R. & Babar, M. A., 03/2010, In: Journal of Systems and Software. 83, 3, p. 352-370 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A comparative study of autonomous learning outlier detection methods applied to fault detection

    Bezerra, C. G., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 08/2015, Proceedings of the 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) . IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A comparative study of data transport protocols in wireless sensor networks

    Shaikh, F. K., Khelil, A. & Suri, N., 23/06/2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A Comparative Study of DECT and WLAN Signals for Indoor Localization

    Kranz, M., Fischer, C. & Schmidt, A., 2010, IEEE International Conference on Pervasive Computing and Communications (PerCom), 2010. IEEE, p. 235-243 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top