Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  2. Published

    Attention module-based spatial-temporal graph convolutional networks for skeleton-based action recognition

    Kong, Y., Li, L., Zhang, K., Ni, Q. & Han, J., 30/08/2019, In: Journal of Electronic Imaging. 28, 4, 043032.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices

    Komninos, N., Honary, B. & Darnell, M., 2001, Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 294-300 7 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Security enhancements for A5/1 without loosing hardware efficiency in future mobile systems

    Komninos, N., Honary, B. & Darnell, M., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 324-328 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Novel methods for enabling public key schemes in future mobile systems

    Komninos, N. & Honary, B., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 455–458 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Modified WAP for secure voice and video communication

    Komninos, N. & Honary, B., 03/2001, 3G Mobile Communication Technologies, 2001. Second International Conference on (Conf. Publ. No. 477). London, UK: IEEE, p. 33-37 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Cipher Appartus

    Komninos, N. (Inventor) & Honary, B. (Inventor), 09/2002, Patent No. 0222201.6

    Research output: Patent

  8. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Using a semantic annotation tool for the analysis of metaphor in discourse.

    Koller, V., Hardie, A., Rayson, P. & Semino, E., 2008, In: metaphorik.de. 15, p. 141-160 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    ARFA: automated real-time flight data analysis using evolving clustering, classifiers and recursive density estimation

    Kolev, D., Angelov, P., Markarian, G., Suvorov, M. & Lysanov, S., 2013, Evolving and Adaptive Intelligent Systems (EAIS), 2013 IEEE Conference on. Piscataway, N.J.: IEEE Press, p. 91-97 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Incremental anomaly identification in flight data analysis by adapted one-class SVM method

    Kolev, D., Suvorov, M., Morozov, E., Markarian, G. & Angelov, P., 2015, Artificial neural networks: methods and applications in bio-/neuroinformatics. Koprinkova-Hristova, P., Mladenov, V. & Kasabov, N. K. (eds.). Springer, p. 373-391 19 p. (Springer Series in Bio-/Neuroinformatics; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Ontology and Model Alignment as a Means for Requirements Validation

    Kof, L., Gacitua, R., Rouncefield, M. & Sawyer, P., 2010, ICSC '10: Proceedings of the 2010 IEEE Fourth International Conference on Semantic Computing. Washington, DC, USA: IEEE Computer Society, p. 46-51 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Concept mapping as a means of requirements tracing

    Kof, L., Gacitua, R., Rouncefield, M. & Sawyer, P., 1/09/2010, Managing Requirements Knowledge (MARK), 2010 Third International Workshop on. IEEE Computer Society, p. 22-31 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Perceptual Influences on Risk Assessments and the Challenges for Information Security and Network Management

    Knowles, W., Prince, D. & Hutchison, D., 2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2012). Liverpool: Liverpool John Moores University

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Introducing NextShareMobile, An Interactive Second Screen Application

    Knowles, W., Mu, M., Bamford, W., Race, N. & Needham, C., 2012, MobiSys '12 Proceedings of the 10th international conference on Mobile systems, applications, and services. New York: ACM, p. 489-490 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research

    Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P. & Jones, K., 2013.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  17. Published

    Trustworthy by design

    Knowles, B., Harding, M., Blair, L., Davies, N., Hannon, J., Rouncefield, M. & Walden, J., 2014, CSCW '14 Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. New York: ACM, p. 1060-1071 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Models and patterns of trust

    Knowles, B., Rouncefield, M., Harding, M., Davies, N., Blair, L., Hannon, J., Walden, J. & Wang, D., 03/2015, CSCW '15 Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. New York: ACM, p. 328-338 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Analysis and recommendations for standardisation in penetration testing and vulnerability assessment: penetration testing market survey

    Knowles, W., Baron, A. & McGarr, T., 26/05/2015, London: BSI. 20 p.

    Research output: Book/Report/ProceedingsCommissioned report

  20. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    The simulated security assessment ecosystem: Does penetration testing need standardisation?

    Knowles, W., Baron, A. & McGarr, T., 09/2016, In: Computers and Security. 62, p. 296-316 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In: IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Diasporas : concepts, intersections, identities

    Knott, K. (Editor) & McLoughlin, S. (Editor), 2010, London; New York: Zed Books. 319 p.

    Research output: Book/Report/ProceedingsBook

  25. Published

    The location of religion: a spatial analysis

    Knott, K., 2005, London: Oakville. 264 p.

    Research output: Book/Report/ProceedingsBook

  26. Published

    Spatial methods

    Knott, K., 2011, The Routledge handbook of research methods in the study of religion. Stausberg, M. & Engler, S. (eds.). London; New York: Routledge, p. 491-501 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  27. Published

    The Roots, Practices and Consequences of Terrorism: A Literature Review of Research in the Arts & Humanities, Final Report (for the Home Office)

    Knott, K., McFadyen, A., McLoughlin, S. & Francis, M., 2006, Leeds: University of Leeds. 92 p.

    Research output: Book/Report/ProceedingsCommissioned report

  28. Published

    Leeds Pilot Faiths Consultation Exercise on Restorative Justice and the Rehabilitation of Young Male Ex-Offenders

    Knott, K. & Francis, M., 2004, Community Religions Project and Leeds Church Institute for the Home Office. 51 p.

    Research output: Book/Report/ProceedingsBook

  29. Published

    Spatial theory for the study of religion

    Knott, K., 2011, In: Religion and Place.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Religion, space and contemporary media

    Knott, K., 2013, Religion across media: from early antiquity to late modernity. Lundby, K. (ed.). New York: Peter Lang, p. 105-120 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  31. Published

    Interrogating the secular: a spatial approach

    Knott, K., 11/2013, Secular and sacred: the Scandinavian case of religion in human rights, law and public space. Wyller, T., van Breemer, R. & Casanova, J. (eds.). Göttingen: Vandenhoeck & Ruprecht, p. 34-55 22 p. (Research in Contemporary Religion ; vol. 15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  32. Published

    Hinduism: a very short introduction

    Knott, K., 2016, 2nd ed. Oxford: Oxford University Press. 131 p. (Very Short Introductions)

    Research output: Book/Report/ProceedingsBook

  33. Published

    Geographies of the urban sacred

    Knott, K., 2016, The urban sacred : how religion makes and takes place in Amsterdam, Berlin and London. Lanwerd, S. (ed.). Berlin: Metropol Verlag, p. 51-57 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  34. Published

    How to study religion in the modern world

    Knott, K., 01/2016, Religion in the Modern World : Traditions and Transformations. Woodhead, L., Partridge, C. & Kawanami, H. (eds.). 3rd ed. ed. London: Routledge, p. 15-40 26 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  35. Published

    Religion, Raum und Ort: Der Spatial Turn in der Religionsforschung

    Knott, K., 2015, 103 Jahre Religionswissenschaft in Münster. Radermacher, M., Stander, J. & Wilke, A. (eds.). Münster: Lit Verlag, p. 199-225 27 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  36. Published

    Iconic religion in urban space

    Knott, K., Krech, V. & Meyer, B., 2016, In: Material Religion. 12, 2, p. 123-136 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Walls and other unremarkable boundaries in South London: impenetrable infrastructure or portals of time, space and cultural difference?

    Knott, K., 1/06/2015, In: New Diversities. 17, 2, p. 15-34 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Living religious practices

    Knott, K., 25/10/2016, Intersections of religion and migration: issues at the global crossroads. Saunders, J. B., Fiddian-Qasmiyeh, E. & Snyder, S. (eds.). London: Palgrave Macmillan, p. 71-90 20 p. (Religion and Global Migrations).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  39. Published

    The tactics of (in)visibility of religious communities in contemporary Europe

    Knott, K., 1/01/2017, Dynamics of religion: past and present. Bochinger, C. & Rüpke, J. (eds.). Berlin: de Gruyter, (Religionsgeschichtliche Versuche und Vorarbeiten; no. 67).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  40. Published

    Sunni and Shi’a Islam: differences and relationships

    Knott, K., 2016, 8 p. Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  41. Published

    Islam: the five pillars

    Knott, K., 2016, 8 p. Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  42. Published

    Tips for connecting your research with the media

    Knott, K. & Lefebvre, S., 2016, In: Bulletin for the Study of Religion. 45, 1

    Research output: Contribution to Journal/MagazineComment/debatepeer-review

  43. Published

    Religious differentiation and diversity in discourse and practice

    Knott, K., 2015, Routledge international handbook of diversity studies. Vertovec, S. (ed.). London: Routledge, p. 91-97 7 p. (Routledge International Handbooks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  44. Published

    The study of religion in the UK in its institutional context

    Knott, K., 11/04/2017, In: Nederlands Theologisch Tijdschrift. 71, 1, p. 44-57 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Why Transmission?

    Knott, K., 30/01/2017, CREST Security Review, 3, p. 3-4 2 p.

    Research output: Contribution to specialist publicationEditorial

  46. Published

    Ideological Transmission: Mind map

    Knott, K. & Lee, B. J., 30/01/2017, CREST Security Review, 3, p. 30-31 2 p.

    Research output: Contribution to specialist publicationArticle

  47. Published

    Islam: Conversion

    Knott, K., 23/01/2017, 9 p. Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  48. Published

    Creating CorCenCC (Corpws Cenedlaethol Cymraeg Cyfoes - The National Corpus of Contemporary Welsh)

    Knight, D., Fitzpatrick, T., Morris, S., Evas, J., Rayson, P. E., Spasic, I., Stonelake, M., Mon Thomas, E., Neale, S., Needs, J., Piao, S. S., Rees, M., Watkins, G., Anthony, L., Michael Cobb, T., Deuchar, M., Donnelly, K., McCarthy, M. & Scannell, K., 24/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  49. Published

    Emergent behaviour in collaborative indoor localisation: an example of self-organisation in ubiquitous sensing systems

    Kloch, K., Pirkl, G., Lukowicz, P. & Fischer, C., 2011, Architecture of Computing Systems - ARCS 2011 24th International Conference, Como, Italy, February 24-25, 2011. Proceedings. Berekovic , M., Fornaciari, W., Brinkschulte , U. & Silvano, C. (eds.). Berlin, Heidelberg: Springer Verlag, p. 207-218 12 p. (Lecture Notes in Computer Science; vol. 6566).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Collaborative PDR Localisation with Mobile Phones

    Kloch, K., Lukowicz, P. & Fischer, C., 1/06/2011, Wearable Computers (ISWC), 2011 15th Annual International Symposium on. IEEE, p. 37-40 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    The first direct replication on using verbal credibility assessment for the detection of deceptive intentions

    Kleinberg, B., Warmelink, L., Arntz, A. & Verschuere, B., 09/2018, In: Applied Cognitive Psychology. 32, 5, p. 592-599 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Sensor and Data Fusion: Taxonomy, Challenges and Applications

    Klein, L., Mihaylova, L. & El Faouzi, N.-E., 01/2012, Handbook on Soft Computing for Video Surveillance. Pal, S. K., Petrosino, A. & Maddalena, L. (eds.). USA: Chapman & Hall, p. 139-183 45 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  53. Published

    LifeNet: an Ad-hoc Sensor Network and Wearable System to Provide Firefighters with Navigation Support

    Klann, M., Riedel, T., Gellersen, H., Fischer, C., Oppenheim, M., Lukowicz, P., Pirkl, G., Kunze, K., Beuster, M., Beigl, M., Visser, O. & Gerling, M., 09/2007, p. 124-127. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  54. Published

    Playful Research Fiction: A Fictional Conference

    Kirman, B., Lindley, J. G., Blythe, M., Coulton, P., Lawson, S., Linehan, C., Maxwell, D., O'Hara, D., Sturdee, M. & Thomas, V., 07/2018, Funology 2: From Usability to Enjoyment. Blythe, M. & Monk, A. (eds.). Springer, p. 157-173 17 p. (Human-Computer Interaction Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  55. Published

    From reducing fear to improving community confidence - a change of emphasis for practitioners.

    Kirby, S. & McPherson, I., 2009, In: Safer Communities. 8, 3, p. 21-27 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    From Helmand to the high street : a 4 year study to systematically prioritise and map illicit drug markets in Lancashire.

    Kirby, S., Billsborough, I. & Steele, L., 12/2009, In: Drugs and Alcohol Today. 9, 4, p. 22-28 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    Integrating the National Intelligence Model with a 'problem solving' approach.

    Kirby, S. & McPherson, I., 04/2004, In: Community Safety Journal. 3, 2, p. 36-46 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Reducing misery and saving money : how partners can make a difference in reducing the incidence of young runaways

    Kirby, S. & Middleham, N., 2005, In: Community Safety Journal. 4, 4, p. 10-13 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Improving the effectiveness of partnerships in community safety.

    Kirby, S., 2003, In: Community Safety Journal. 2, 2

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Policing mobile criminality : towards a situational crime prevention approach to organised crime.

    Kirby, S. & Penna, S., 2010, Situational prevention of organised crimes. Bullock, K., Clarke, R. V. & Tilley, N. (eds.). Cullompton: Willan, p. 193-212 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  61. Published

    Intelligence-led and traditional policing approaches to drug markets - a comparison of offenders.

    Kirby, S., Quinn, A. & Keay, S., 2010, In: Drugs and Alcohol Today. 10, 4, p. 13-19 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    The impact of the Licensing Act 2003 on drinking habits, offences of crime and disorder, and policing in England's newest city.

    Kirby, S. & Hewitt, L., 01/2011, In: Safer Communities. 10, 1, p. 31-38 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    The effectiveness of the ASBO - a practitioner perspective

    Kirby, S. & Edmondson, A., 04/2012, In: Safer Communities. 11, 2, p. 96-104 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Published

    Can the FIFA world cup football (soccer) tournament be associated with an increase in domestic abuse?

    Kirby, S., Francis, B. & O'Flahery, R., 08/2014, In: Journal of Research in Crime and Delinquency. 51, 3, p. 259-276 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    Effective policing? implementation in theory and practice

    Kirby, S., 9/10/2013, Basingstoke: Palgrave Macmillan. 224 p.

    Research output: Book/Report/ProceedingsBook

  66. Published

    The Cumbria spree killing: how mobility affects the policing of critical incidents

    Kirby, S., Graham, J. & Green, M., 2014, In: International Journal of Emergency Services. 3, 1, p. 34-48 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    The changing pattern of domestic cannabis cultivation in the UK and its impact on the cannabis market

    Kirby, S. & Peal, K., 07/2015, In: Journal of Drug Issues. 45, 3, p. 279-292 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    The relationship between evolutionary coupling and defects in large industrial software (journal-first abstract)

    Kirbas, S., Caglayan, B., Hall, T., Counsell, S., Bowes, D., Sen, A. & Bener, A., 2/04/2018, 25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 471 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    The relationship between evolutionary coupling and defects in large industrial software

    Kirbas, S., Caglayan, B., Hall, T., Counsell, S., Bowes, D., Sen, A. & Bener, A., 1/04/2017, In: Journal of Software: Evolution and Process. 29, 4, e1842.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    Evolutionary coupling measurement: Making sense of the current chaos

    Kirbas, S., Hall, T. & Sen, A., 15/02/2017, In: Science of Computer Programming. 135, p. 4-19 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    On the Introduction of Automatic Program Repair in Bloomberg

    Kirbas, S., Windels, E., McBello, O., Kells, K., Pagano, M., Szalanski, R., Nowack, V., Winter, E., Counsell, S., Bowes, D., Hall, T., Haraldsson, S. & Woodward, J., 31/07/2021, In: IEEE Software. 38, 4, p. 43-51 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence

    King, A., Brown, J. & Roedig, U., 1/10/2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, p. 45-50 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    Ubiquitous technologies, cultural logics and paternalism in industrial workplaces

    Kinder, K. E., Ball, L. J. & Busby, J. S., 2008, In: Poiesis and Praxis. 5, 3-4, p. 265-290 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  74. Published

    Pervasive technologies, risk and accountability

    Kinder, K. E., Boos, D., Grote, G. & Busby, J. S., 2010, Annual SRA-Europe Meeting, Society for Risk Analysis Europe (London) - 2010. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    Why Have Progresses in Real-Time Fault Tolerant Computing Been Slow?

    Kim, K. H., Ezhilchelvan, P. D., Kaiser, J., Moser, L. E., Nett, E. & Suri, N., 2004, IEEE Symposium on Reliable Distributed Systems . IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  76. Published

    Cyber-security challenges of agent technology in intelligent transportation systems

    Kibirige Mukisa, S. & Rashid, A., 6/05/2014, ACySE '14 Proceedings of the 1st International Workshop on Agents and CyberSecurity. New York: ACM, 4 p. 9

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study

    Kibirige Mukisa, S. & Rashid, A., 4/09/2017, 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    A framework for privacy aware design in future mobile applications

    Kibirige Mukisa, S., 30/07/2019, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  79. Published

    DEMOS-2: scalable E2E verifiable elections without random oracles

    Kiayias, A., Zacharias, T. & Zhang, B., 12/10/2015, CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 352-363 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    End-to-end verifiable elections in the standard model

    Kiayias, A., Zacharias, T. & Zhang, B., 17/03/2015, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Oswald, E. & Fischlin, M. (eds.). Springer, Vol. II. p. 468-498 31 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  82. Published

    An Efficient E2E Verifiable E-voting System without Setup Assumptions

    Kiayias, A., Zacharias, T. & Zhang, B., 1/05/2017, In: IEEE Security and Privacy Magazine. 15, 3, p. 14-23 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  83. Published

    Ceremonies for end-to-end verifiable elections

    Kiayias, A., Zacharias, T. & Zhang, B., 03/2017, PKC 2017: Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Editors (view affiliations). Springer, p. 305-334 30 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  85. Published

    Wireless Sensor Cooperation for a Sustainable Quality of Information

    Khelil, A., Reinl, C., Ayari, B., Shaikh, F. K., Szczytowski, P., Ali, A. & Suri, N., 2011, Pervasive Computing and Networking. John Wiley and Sons, p. 71-100 30 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  86. Published

    Map-based design for autonomic wireless sensor networks

    Khelil, A., Shaikh, F. K., Szczytowski, P., Ayari, B. & Suri, N., 2009, Autonomic Communication. Tsinghua University Press & Springer-Verlag, p. 309-326 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  87. Published

    Gossiping: Adaptive and reliable broadcasting in MANETs

    Khelil, A. & Suri, N., 2007, Dependable Computing: Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings. Springer, Vol. 4746 LNCS. p. 123-141 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  88. Published

    gMAP: Efficient construction of global maps for mobility-assisted wireless sensor networks

    Khelil, A., Shaikh, F. K., Ali, A. & Suri, N., 2/02/2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services. IEEE, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    Towards benchmarking of P2P technologies from a SCADA systems protection perspective

    Khelil, A., Jeckel, S., Germanus, D. & Suri, N., 2010, Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Springer, Vol. 45 LNICST. p. 400-414 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  90. Published

    Assessing the comparative effectiveness of map construction protocols in wireless sensor networks

    Khelil, A., Chang, H. & Suri, N., 17/11/2011, 30th IEEE International Performance Computing and Communications Conference. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    MWM: A map-based world model for wireless sensor networks

    Khelil, A., Shaikh, F. K., Ayari, B. & Suri, N., 23/09/2011, Autonomics: 2nd International ICST Conference on Autonomic Computing and Communication Systems. EUDL, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    Khelil, A., Germanus, D. & Suri, N., 2012, Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer, Vol. 7130. p. 177-196 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  93. Published

    Pointcut rejuvenation: recovering pointcut expressions in evolving aspect-oriented software

    Khatchadourian, R., Greenwood, P., Rashid, A. & Xu, G., 2012, In: IEEE Transactions on Software Engineering. 38, 3, p. 642-657 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    Rejuvenate pointcut: a tool for pointcut expression recovery in evolving aspect-oriented software

    Khatchadourian, R. & Rashid, A., 2008, Source Code Analysis and Manipulation, 2008 Eighth IEEE International Working Conference on. IEEE, p. 261-262 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Fraglight: shedding light on broken pointcuts in evolving aspect-oriented software

    Khatchadourian, R., Rashid, A., Masuhara, H. & Watanabe, T., 2015, SPLASH Companion 2015 Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity . New York: ACM, p. 17-18 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Detecting broken pointcuts using structural commonality and degree of interest

    Khatchadourian, R., Rashid, A., Masuhara, H. & Watanabe, T., 9/11/2015, 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015) November 9–13, 2015 Lincoln, Nebraska, USA. IEEE, p. 641-646 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Monte Carlo GPS based Solution for speed limit indicator.

    Khan, E., Shaukat, S. F. & Monk, S. D., 2009, In: World Applied Sciences Journal. 6, 12, p. 1691-1697 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 1/06/2012, In: IET Wireless Sensor Systems. 2, 2, p. 108-114 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Modified Niederreiter type of GPT cryptosystem based on reducible rank codes

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 01/2014, In: Designs Codes and Cryptography. 70, 1-2, p. 231-239 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Improving Security of Niederreiter Type GPT Cryptosystem Based on Reducible Rank Codes

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 09/2011, 3rd International Castle Meeting on Coding Theory and Applications (ICMCTA). Borges, J. & Villanueva, M. (eds.). Barcelona: Servei de Publicacions de la Universitat Autònoma de Barcelona, p. 161-168 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top