Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    Low Complexity Turbo Equalisation for Power Line Communications

    Adebisi, B., Lopez Giovaneli, C., Honary, B. & Mowlavi, M., 03/2007, Power Line Communications and Its Applications, 2007. ISPLC '07. IEEE International Symposium on. Pisa, Italy: IEEE, p. 385-389 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Experimental study of the interference of PLC transmission power levels on HF bands

    Adebisi, B., Stott, J. & Honary, B., 07/2006, The 10th Institution of Engineering and Technology International Conference on Ionospheric Radio Systems & Techniques (IRST 2006). London, UK : IEEE, p. 326-330 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Comparisons of Indoor PLC Emissions measurement Results and Regulation Standards

    Adebisi, B. & Honary, B., 03/2006, The ISPLC 2006 International Symposium on Powerline Communications and Its Applications. Florida, USA: IEEE, p. 319-324 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A hopping code for MMFSK in a power-line channel

    Adebisi, B., Ali, S. & Honary, B., 07/2009, In: Journal of Communications. 4, 6, p. 429-436 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Using DMIF for abstracting from IP-telephony signaling protocols

    Ackermann, R., Darlagiannis, V., Roedig, U. & Steinmetz, R., 1/10/2000, Interactive Distributed Multimedia Systems and Telecommunication Services: 7th International Workshop, IDMS 2000 Enschede, The Netherlands, October 17–20, 2000 Proceedings. Berlin: Springer Verlag, p. 104-115 12 p. (Lecture Notes in Computer Science; vol. 1905).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Associating network flows with user and application information

    Ackermann, R., Roedig, U., Zink, M., Griwodz, C. & Steinmetz, R., 1/10/2000, Proceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA. New York: ACM Press, p. 149-152 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Entwicklung und Nutzung von IP-Telefonie Anwendungen auf Unix-Systemen

    Ackermann, R., Roedig, U. & Steinmetz, R., 1/09/2000, In: GUUG-Nachrichten. 2000, 2, p. 37-41 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Vulnerabilities and security limitations of current IP telephony systems

    Ackermann, R., Schumacher, M., Roedig, U. & Steinmetz, R., 1/05/2001, Communications and multimedia security issues of the new century. Steinmetz, R., Dittman, J. & Steinebach, M. (eds.). Kluwer Academic Publishers, p. 53-66 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Developers Need Support, Too: A Survey of Security Advice for Software Developers

    Acar, Y., Stransky, C., Wermke, D., Weir, C. A. F., Mazurek, M. & Fahl, S., 24/09/2017, Proceedings of the IEEE Secure Development Conference 2017. Jaeger, T. (ed.). IEEE, p. 22-26 5 p. 17

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    An adaptive medium access control scheme for mobile ad hoc networks under self-similar traffic

    Abu-Tair, M., Min, G., Ni, Q. & Liu, H., 2010, In: Journal of Supercomputing. 53, 1, p. 212-230 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top