Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    Aspect identification in textual requirements with EA-Miner

    Weston, N., Chitchyan, R., Sampaio, A., Rashid, A. & Greenwood, P., 2013, Aspect-oriented requirements engineering. Moreira, A., Chitchyan, R., Araújo, J. & Rashid, A. (eds.). Berlin: Springer, p. 3-21 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  2. Published

    Research and teaching using a hydraulically-actuated nuclear decommissioning robot

    West, C., Burrell, T., Montazeri, A., Monk, S. D. & Taylor, C. J., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  3. Published

    A genetic algorithm approach for parameter optimization of a 7DOF robotic manipulator

    West, C., Montazeri, A., Monk, S. D. & Taylor, C. J., 28/06/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    A genetic algorithm approach for parameter optimization of a 7DOF robotic manipulator

    West, C., Montazeri, A., Monk, S. D. & Taylor, C. J., 2016, In: IFAC-PapersOnLine. 49, 12, p. 1261-1266 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A new approach to improve the parameter estimation accuracy in robotic manipulators using a multi-objective output error identification technique

    West, C., Montazeri, A., Monk, S. D., Duda, D. & Taylor, C. J., 14/12/2017, 26th IEEE International Symposium on Robot and Human Interactive Communication, Lisbon. IEEE, p. 1406-1411 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Fog Orchestration for Internet of Things Services

    Wen, Z., Yang, R., Garraghan, P., Lin, T., Xu, J. & Rovatsos, M., 1/03/2017, In: IEEE Internet Computing. 21, 2, p. 16-24 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Parallel computing of QC-LDPC codes on GPUs

    Wells, A. & Honary, B., 07/2009, IEEE 10th International Symposium on Communication Theory and Applications. Ambleside, UK

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Adaptive BCH Encoder/Decoder for DVB-S2 Applications Design and Implementation

    Wells, A. & Honary, B., 07/2007, 9th International Symposium on Communication Theory and Applications. Lancaster: HW Communications

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Crisis negotiation: from suicide to terrorism intervention

    Wells, S., Taylor, P. & Giebels, E., 2013, Handbook of research in negotiation. Olekalns, M. & Adair, W. (eds.). London: Edward Elgar, p. 473-498 26 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  10. Published

    Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    How to Improve the Security Skills of Mobile App Developers: Comparing and Contrasting Expert Views

    Weir, C., Rashid, A. & Noble, J., 22/06/2016, Proceedings of the 2016 ACM Workshop on Security Information Workers. Biddle, R., Chu, B., Lipford, H. & Murphy-Hill, E. (eds.). New York: USENIX Association, 7 p. 1

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Reaching the Masses: A New Subdiscipline of App Programmer Education

    Weir, C., Rashid, A. & Noble, J., 13/11/2016, FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York: ACM, p. 936-939 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    How to Improve the Security Skills of Mobile App Developers: An Analysis of Expert Knowledge

    Weir, C., 2017, Lancaster University. 135 p.

    Research output: ThesisMaster's Thesis

  14. Published

    I'd Like to Have an Argument, Please: Using Dialectic for Effective App Security

    Weir, C., Rashid, A. & Noble, J., 29/04/2017, EuroUSEC 2017: the 2nd European Workshop on Usable Security. Reston, VA: Internet Society, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Developer Essentials: Top Five Interventions to Support Secure Software Development

    Weir, C., Rashid, A. & Noble, J., 30/03/2017, Lancaster: Lancaster University. 9 p.

    Research output: Book/Report/ProceedingsCommissioned report

  16. Published

    Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

  17. Published

    Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC) 2018

    Weir, C. A. F. (Editor) & Mazurek, M. (Editor), 1/07/2018, Reston, VA: Internet Society.

    Research output: Book/Report/ProceedingsBook

  18. Published

    Light-touch Interventions to Improve Software Development Security

    Weir, C. A. F., Blair, L., Becker, I., Sasse, A. & Noble, J., 25/09/2018, Proceedings of the IEEE Cybersecurity Development Conference 2018. Yeo, D. & Chong, S. (eds.). IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Message from the Chairs EuroSandP Workshops

    Weir, C. & Fahl, S., 6/07/2018, Proceedings of IEEE European Symposium on Security and Privacy (EuroS&P) 2018. IEEE, p. x 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    The Secure Development Handbook

    Weir, C. & Ford, N. (Illustrator), 1/10/2018, 1.1 ed. London: Amazon Kindle. 47 p.

    Research output: Book/Report/ProceedingsBook

  21. Published

    Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Blair, L., Becker, I., Noble, J., Sasse, A. & Rashid, A., 25/05/2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice Track. Sharpe, H. & Whalen, M. (eds.). IEEE, p. 41-50 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In: Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 12/08/2020, USENIX Security '20 Proceedings. USENIX Association, p. 289-305 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, (E-pub ahead of print) In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Using Workshops to Improve Security in Software Development Teams

    Weir, C., 23/11/2020, Lancaster University. 206 p.

    Research output: ThesisDoctoral Thesis

  26. Published

    A Passion for Security: Intervening to Help Software Developers

    Weir, C., Becker, I. & Blair, L., 25/05/2021, 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, p. 21-30 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Infiltrating Security into Development: Exploring the World’s Largest Software Security Study

    Weir, C., Migues, S., Ware, M. & Williams, L., 28/08/2021, ESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. New York: ACM, p. 1326-1336 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. E-pub ahead of print

    A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software

    Weir, C., Dyson, A. & Prince, D., 25/09/2023, (E-pub ahead of print) Proceedings of the 2023 IEEE Secure Development Conference (SecDev). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    How multiple interviews and interview framing influence the development and maintenance of rapport

    Weiher, L., Watson, S. J., Taylor, P. J. & Luther, K., 31/05/2025, In: Psychology, Crime and Law. 31, 4, p. 414-438 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. E-pub ahead of print

    The effect of tailored reciprocity on information provision in an investigative interview

    Weiher, L., Winters, C., Taylor, P., Luther, K. & Watson, S. J., 19/08/2024, (E-pub ahead of print) In: Journal of Criminal Psychology.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    SPATA: Spatio-tangible tools for fabrication-aware design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 2015, TEI '15 Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. New York: ACM, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Connected tools in digital design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 1/04/2015, In: IEEE Pervasive Computing. 14, 2, p. 18-21 4 p.

    Research output: Contribution to Journal/MagazineJournal article

  33. Published

    Shape Display Shader Language (SDSL): a new programming model for shape changing displays

    Weichel, C., Alexander, J. & Hardy, J., 04/2015, CHI EA '15 Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. New York: ACM, p. 1121-1126 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    ReForm: integrating physical and digital design through bidirectional fabrication

    Weichel, C., Hardy, J., Alexander, J. & Gellersen, H., 11/2015, UIST '15 Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. New York: ACM, p. 93-102 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Towards smarter SDN switches: revisiting the balance of intelligence in SDN networks

    Weekes, J., 30/09/2019, Lancaster University. 216 p.

    Research output: ThesisDoctoral Thesis

  36. Published

    Securing by design

    Weber, C. & Lacy, M., 07/2011, In: Review of International Studies. 37, 3, p. 1021-1043 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    The English legal system

    Weare, S. & Gillespie, A., 06/2015, The English legal system. Gillespie, A. (ed.). 5th ed. Oxford: Oxford University Press

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  38. Published

    Temporal generalization among humans: three further studies

    Wearden, J. & Towse, J. N., 11/1994, In: Behavioural Processes. 32, 3, p. 247-264 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    Experiences with parallelisation of an existing NLP pipeline: tagging Hansard

    Wattam, S., Rayson, P., Alexander, M. & Anderson, J., 2014, LREC 2014, Ninth International Conference on Language Resources and Evaluation. Calzolari, N., Choukri, K., Declerck, T., Loftsson, H., Maegaard, B., Mariani, J., Moreno, A., Odijk, J. & Piperidis, S. (eds.). Paris: EUROPEAN LANGUAGE RESOURCES ASSOC-ELRA, p. 4093-4096 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Challenges with bearings only tracking for missile guidance systems and how to cope with them.

    Watson, A., Mihaylova, L. & Vorley, D., 19/10/2010. 9 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  41. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Determinants of unlawful file sharing: a scoping review

    Watson, S., Zizzo, D. & Fleming, P., 2015, In: PLoS ONE. 10, 6, 23 p., e0127921.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    Utilising motion capture technology to identify nonverbal indicators of trust judgements

    Watson, S., Conchie, S., Taylor, P. J. & Poppe, R., 23/08/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  44. Published

    Perceptions of legal risk do not predict behaviour in unlawful file sharing: an empirical analysis

    Watson, S., Fleming, P. & Zizzo, D., 3/09/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  45. Published

    Malware detection in cloud computing infrastructures

    Watson, M., Shirazi, S. N. U. H., Marnerides, A., Mauthe, A. U. & Hutchison, D., 03/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 192-205 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Systematic review of the health and societal effects of medication organisation devices

    Watson, S. J., Aldus, C., Bond, C. & Bhattacharya, D., 6/07/2016, In: BMC Health Services Research. 16, 202, 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Risk, benefit and moderators of the affect heuristic in a widespread unlawful activity: evidence from a survey of unlawful file sharing behavior

    Watson, S. J., Zizzo, D. & Fleming, P., 06/2017, In: Risk Analysis. 37, 6, p. 1146-1156 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Utilising motion capture technology to identify trusted testimony in military encounters

    Watson, S. J., Conchie, S. M., Taylor, P. J. & Poppe, R., 2/11/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  49. Published
  50. Published

    The Manipulative Presentation Techniques of Controlling and Coercive Offenders

    Watson, S. J., Luther, K., Jackson, J., Taylor, P. J. & Alison, L., 25/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  51. Published

    Controlling the interview: The influencing techniques of suspects of control and coercion

    Watson, S., Luther, K., Taylor, P. J., Jackson, J. & Alison, L., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  52. Published

    The influence strategies of interviewees suspected of controlling or coercive behavior

    Watson, S. J., Luther, K., Taylor, P. J., Bracksieker, A.-L. & Jackson, J., 30/09/2024, In: Psychology, Crime and Law. 30, 9, p. 1060-1086 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    Menstrual Cycle Phase, Hormonal Contraception, and Alcohol Consumption in Premenopausal Females: A Systematic Review

    Warren, J., Fallon, V., Goodwin, L., Gage, S. & Rose, A., 12/10/2021, In: Frontiers in global women's health. 2, 12 p., 745263.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Published

    Thermal Imaging as a Lie Detection Tool at Airports

    Warmelink, L., Vrij, A., Mann, S., Leal, S., Forrester, D. & Fisher, R. P., 02/2011, In: Law and Human Behavior. 35, 1, p. 40-48 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    The effect of question expectedness and experience on lying about intentions

    Warmelink, L., Vrij, A., Mann, S., Jundi, S. & Granhag, P. A., 10/2012, In: Acta Psychologica. 141, 2, p. 178-183 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    The Effects of Unexpected Questions on Detecting Familiar and Unfamiliar Lies

    Warmelink, L., Vrij, A., Mann, S., Leal, S. & Poletiek, F. H., 2013, In: Psychiatry, Psychology and Law. 20, 1, p. 29-35 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Spatial and Temporal Details in Intentions: A Cue to Detecting Deception

    Warmelink, L., Vrij, A., Mann, S. & Granhag, P. A., 01/2013, In: Applied Cognitive Psychology. 27, 1, p. 101-106 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    A Fast Model of a 1-D Nonlinear Beam-Wave Interaction for a 225GHz TWT

    Waring, R., Hu, Y. & Paoloni, C., 23/06/2015, 8th UK-Europe-China Workshop on mm-waves and THz Technologies . IEEE, 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    Multimedia over massive MIMO wireless systems

    Wang, H., Ge, X., Zi, R., Zhang, J. & Ni, Q., 28/08/2015, Wireless Communications and Mobile Computing Conference (IWCMC), 2015 International. IEEE, p. 1492-1497 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    6G-Enabled Short-Term Forecasting for Large-Scale Traffic Flow in Massive IoT Based on Time-Aware Locality-Sensitive Hashing

    Wang, F., Zhu, M., Wang, M., Khosravi, M. R., Ni, Q., Yu, S. & Qi, L., 1/04/2021, In: IEEE Internet of Things Journal. 8, 7, p. 5321-5331 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    A Novel Wireless Leaf Area Index Sensor Based on a Combined U-Net Deep Learning Model

    Wang, H., Wu, Y., Ni, Q. & Liu, W., 15/08/2022, In: IEEE Sensors Journal. 22, 16, p. 16573 - 16585 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    Online Service Migration in Mobile Edge with Incomplete System Information: A Deep Recurrent Actor-Critic Learning Approach

    Wang, J., Hu, J., Min, G., Ni, Q. & El-Ghazawi, T., 1/11/2023, In: IEEE Transactions on Mobile Computing. 22, 11, p. 6663-6675 13 p., 11.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Forthcoming

    User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits

    Wang, W., Yu, W., Foh, C. H., Gao, D. & Ni, Q., 19/09/2022, (Accepted/In press) Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    Cross-layer Framework for Energy Harvesting-LPWAN Resource Management based on Fuzzy Cognitive Maps and Adaptive Glowworm Swarm Optimization for Smart Forest

    Wang, H., Wu, Y., Ni, Q. & Liu, W., 15/05/2024, In: IEEE Sensors Journal. 24, 10, p. 17067 - 17079

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network

    Wang, Y., Wang, X., Ni, Q., Yu, W. & Huang, M., 31/10/2024, In: IEEE Transactions on Network and Service Management. 21, 5, p. 5873-5887 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    Cognitive computing and wireless communications on the edge for healthcare service robots

    Wan, S., Gu, Z. & Ni, Q., 1/01/2020, In: Computer Communications. 149, p. 99-106 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    The customizable fault/error model for dependable distributed systems

    Walter, C. J. & Suri, N., 2/01/2003, In: Theoretical Computer Science. 290, 2, p. 1223-1251 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    Rich contexts do not always enrich the accuracy of personality judgements

    Wall, H., J. Taylor, P., Dixon, J., Conchie, S. & Ellis, D., 11/2013, In: Journal of Experimental Social Psychology. 49, 6, p. 1190-1195 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    Getting the balance right? a mismatch in interaction demands between target and judge impacts on judgement accuracy for some traits but not others

    Wall, H., Taylor, P. J. & Campbell, C., 01/2016, In: Personality and Individual Differences. 88, p. 66-72 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    Looking at the same interaction and seeing something different: The role of information, judgment perspective and behavioral coding on judgment 'accuracy'

    Wall, H., Taylor, P. J., Campbell, C., Heim, D. & Richardson, B., 2018, In: Journal of Individual Differences. 39, p. 123-141 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    A framework for P2P application development

    Walkerdine, J., Hughes, D., Rayson, P., Simms, J., Gilleade, K., Mariani, J. & Sommerville, I., 2008, In: Computer Communications. 31, 2, p. 387-401 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Published

    Forensics Software for Detecting Online Paedophile Activity

    Walkerdine, J., Greenwood, P., Rashid, A., Rayson, P., May-Chahal, C., Duquenoy, P., Watson, P., Jones, M. & Brennan, M., 11/2009. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  74. Published

    P2P-4-DL: Digital Library over Peer-to-Peer

    Walkerdine, J. & Rayson, P., 08/2004, Peer-to-Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    A Faceted Approach to Service Specification

    Walkerdine, J., Hutchinson, J., Sawyer, P., Dobson, G. & Onditi, V., 05/2007, Internet and Web Applications and Services, 2007. ICIW '07. Second International Conference on. IEEE, p. 20 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    The size-brightness correspondence: evidence for crosstalk among aligned conceptual feature dimensions

    Walker, P., Walker, L. & Francis, B., 11/2015, In: Attention, Perception, and Psychophysics. 77, 8, p. 2694-2710 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Overview of the worldwide best practices for rape prevention and for assisting women victims of rape

    Walby, S., Olive, P., Towers, J., Francis, B., Strid , S., Krizsán , A., Lombardo , E., May-Chahal, C., Franzway , S., Sugarman, D. & Agarwal , B., 10/10/2013, European Parliament. 212 p.

    Research output: Book/Report/ProceedingsCommissioned report

  78. Published

    The decline in the rate of domestic violence has stopped: removing the cap on repeat victimisation reveals more violence

    Walby, S., Towers, J. & Francis, B., 2014, Lancaster: Lancaster University. 4 p.

    Research output: Book/Report/ProceedingsOther report

  79. Published

    Mainstreaming domestic and gender-based violence into sociology and the criminology of violence

    Walby, S., Towers, J. & Francis, B., 18/12/2014, In: The Sociological Review. 62, S2, p. 187–214 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    Stopping rape: towards a comprehensive policy

    Walby, S., Olive, P., Towers, J., Francis, B., Strid , S., Krizsan, A., Lombardo , E., May-Chahal, C., Franzway , S., Sugarman, D., Aganwal, B. & Armstrong, J., 22/07/2015, Bristol: Policy Press. 308 p.

    Research output: Book/Report/ProceedingsBook

  81. Published

    Study on the gender dimension of trafficking in human beings

    Walby, S., Apitzsch, B., Armstrong, J. E., Balderston, S., Szmagalska-Follis, K., Francis, B. J., Kelly, L., May-Chahal, C. A., Rashid, A., Shire, K., Towers, J. & Tunte, M., 16/03/2016, 240 p. Luxembourg : European Commission.

    Research output: Other contribution

  82. Published

    Study on comprehensive policy review of anti-trafficking projects funded by the European Commission: HOME/2014/ISFP/PR/THBX/0052

    Walby, S., Towers, J., Francis, B. J., Shire, K., Kelly, L., Apitzsch, B., Armstrong, J. E., Balderston, S., Fish, A. R., Hardaker, C., Kirby, S., May-Chahal, C. A. & Palmer, C. E., 17/10/2016, Luxembourg: Publications Office of the European Union. 106 p.

    Research output: Book/Report/ProceedingsCommissioned report

  83. Published

    Crisis

    Walby, S., 10/2015, Cambridge: Polity Press. 211 p.

    Research output: Book/Report/ProceedingsBook

  84. Published

    The concept and measurement of violence against women and men

    Walby, S., Towers, J., Balderston, S., Corradi, C., Francis, B. J., Heiskanen, M., Helweg-Larsen, K., Mergaert, L., Olive, P., Palmer, C. E., Stockl, H. & Strid, S., 14/02/2017, Policy Press.

    Research output: Book/Report/ProceedingsBook

  85. Published

    Measuring violence to end violence: mainstreaming gender

    Walby, S. & Towers, J. S., 1/05/2017, In: Journal of Gender-Based Violence. 1, 1, p. 11-31 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    The cost of domestic violence: Up-date 2009

    Walby, S., 2009, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  87. Published

    Untangling the concept of coercive control: Theorizing domestic violent crime

    Walby, S. & Towers, J. S., 1/02/2018, In: Criminology and Criminal Justice. 18, 1, p. 7-28 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    Estimating the costs of gender-based violence in the European Union

    Walby, S. & Olive, P., 19/06/2015, Luxembourg: European Institute for Gender Equality.

    Research output: Book/Report/ProceedingsOther report

  89. Published

    Ensuring data collection and research on violence against women and domestic violence: Article 11 of the Istanbul Convention

    Walby, S., 2016, Council of Europe. 46 p.

    Research output: Book/Report/ProceedingsOther report

  90. Published

    In-depth study on all forms of violence against women: Report of the Secretary General

    Walby, S., 2006, United Nations Division for the Advancement of Women.

    Research output: Book/Report/ProceedingsOther report

  91. Published

    Adaptive transmission power control and coding for wireless sensor networks

    Wadekar, R., Stankovic, L. & Honary, B., 12/2007, The IET Communications Conference on Wireless, Mobile and Sensor Networks 2007. Shanghai, China: IET Press, p. 1063-1066 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Improved Error Protection using Adaptive PUM Codes

    Wadekar, R., Fagoonee, L. & Honary, B., 07/2007, 9th International Symposium on Communication Theory and Applications. Lancaster: HW Communications

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    Drawings as an Innovative and Successful Lie Detection Tool

    Vrij, A., Leal, S., Mann, S., Warmelink, L., Granhag, P. A. & Fisher, R. P., 05/2010, In: Applied Cognitive Psychology. 24, 4, p. 587-594 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    Collective interviewing of suspects

    Vrij, A., Jundi, S., Hope, L., Hillmann, J., Gahr, E., Leal, S., Warmelink, L., Mann, S., Vernham, Z. & Granhag, P. A., 03/2012, In: Journal of Applied Research in Memory and Cognition. 1, 1, p. 41-44 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    Verbal lie detection

    Vrij, A., Taylor, P. J. & Picornell, I., 13/11/2015, Communication in investigative and legal contexts: integrated approaches from forensic psychology, linguistics and law enforcement. Oxburgh, G., Myklebust, T., Grant, T. & Milne, R. (eds.). Wiley, (Psychology of Crime, Policing and Law).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  96. Published

    Dependable red hot action

    Voss, A., Martin, D., Fitzpatrick, G., Hughes, J., Hartswood, M., Slack, R., Procter, R. N., Sommerville, I., Rouncefield, M. F., Clarke, K. & Dourish, P., 2003, European Conference on Computer Supported Cooperative Work (Helsinki ) - 2003. N/A: unknown, p. 61-80 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Production management and ordinary action: an investigation of situated, resourceful action in production planning and control

    Voss, A., Procter, R., Slack, R., Hartswood, M., Williams, R. & Rouncefield, M., 12/2001, PLANSIG 2001: proceedings of the twentieth workshop of the UK Planning and Scheduling Special Interest Group, 13th-14th December 2001. Levine, J. (ed.). PLANSIG, p. 230-243 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Integration of visual and auditory stimuli in the perception of emotional expression in virtual characters

    Volkova, E. P., Linkenauger, S. A., Alexandrova, I., Buelthoff, H. H. & Mohler, B. J., 2011, In: Perception. 40, ECVP Abstract Supplement, p. 138-138 1 p.

    Research output: Contribution to Journal/MagazineMeeting abstractpeer-review

  99. Published

    On the applicability of network coding in wireless sensor networks

    Voigt, T., Roedig, U., Landsiedel, O., Samarasinghe, K. & Prasad, M. B. S., 07/2012, In: ACM SIGBED Review. 9, 3, p. 46-48 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Mitigating Inter-Network Interference in LoRa Networks

    Voigt, T., Bor, M., Roedig, U. & Alonso, J., 20/02/2017, EWSN ’17 Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks. New York: ACM Press, p. 323-328 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...36 Next

Back to top