Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    Evaluating and improving firewalls for ip-telephony environments

    Roedig, U., Ackermann, R. & Steinmetz, R., 1/04/2000, Proceedings of the 1st IP-Telephony Workshop (IPTel2000), Berlin, Germany. GMD-Forschungszentrum Informationstechnik GmbH, p. 161-166 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Verbesserte Systemsicherheit durch Kombination von IDS und Firewall

    Roedig, U., Ackermann, R., Tresse, M., Wolf, L. & Steinmetz, R., 1/03/2000, Proceedings of the Systemsicherheit Workshop (Systemsicherheit2000), Bremen, Germany. ITG, p. 117-128 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Unpublished

    Firewalls and their Impact on Multimedia Systems: Panel Discussion "Security Firewalls and their Impact on Multimedia Systems"

    Roedig, U., 1/01/2000, (Unpublished) p. 285-286. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  4. Published

    Next generation network management of heterogeneous mobile users

    Rocha Sa e Moura, J. A., Dunmore, M. & Edwards, C., 30/10/2008, MobiWac '08 Proceedings of the 6th ACM international symposium on Mobility management and wireless access. New York: ACM, p. 111-118 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    High-accuracy analysis of nanoscale semiconductor layers using beam-exit Ar-ion polishing and scanning probe microscopy

    Robson, A., Grishin, I., Young, R., Sanchez, A. M., Kolosov, O. & Hayne, M., 2013, In: ACS Applied Materials and Interfaces. 5, 8, p. 3241-3245 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Method of making an optically readable element

    Robinson, B. J. (Inventor) & Young, R. J. (Inventor), 23/05/2018, IPC No. G06K19/060646; G06K7/10; G06K9/00577, Patent No. GB2556278 (A), Priority date 7/02/2018

    Research output: Patent

  7. Published

    Determining a unique identifier for an optically read security element

    Robinson, B. J. (Inventor) & Young, R. J. (Inventor), 23/05/2018, IPC No. G06K19/06; G06K7/10; G06K9/00, Patent No. GB2556279, Priority date 7/02/2018

    Research output: Patent

  8. Published

    Method of making an optically readable element

    Robinson, B. (Inventor) & Young, R. (Inventor), 31/05/2022, IPC No. G06K19/00; G06K19/04; G06K/06; G06K/0646, Patent No. US11,347,987

    Research output: Patent

  9. Published

    Practical quantum light sources

    Roberts, J. & Young, R., 12/06/2013.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  10. Published

    Spectroscopy of single GaSb quantum rings: a route towards practical quantum communication

    Roberts, J., Young, M., Noori, Y., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R., 14/05/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  11. Published

    A route towards practical quantum communication

    Roberts, J., Young, M., Noori, Y., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R., 10/07/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  12. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  13. Published

    Quantum authentication

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 15/01/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  14. Published

    Atomic-scale authentication using resonant tunnelling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y. J., Young, M. P., Woodhead, C. S., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 23/02/2015, In: arxiv.org.

    Research output: Contribution to Journal/MagazineJournal article

  15. Published

    Atomic-scale authentication using imperfect semiconductor structures

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M. A., Missous, M., Roedig, U. & Young, R., 1/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  16. Published

    Atomic-scale authentication with Resonant Tunnelling Diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R., 27/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  17. Published

    Using quantum confinement to uniquely identify devices

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Young, M., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 10/11/2015, In: Scientific Reports. 5, 8 p., 16456 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Atomic-scale authentication with resonant tunneling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 2016, In: MRS Advances. 1, 22, p. 1625-1629 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Generating a Nondeterministic Response to a Challenge

    Roberts, J. (Inventor), Bernardo Gavito, R. (Inventor) & Young, R. J. (Inventor), 1/02/2018, IPC No. G06F7/58; H04L9/32, Patent No. GB1613003.1 GB2543126 (A) GB2543126 (B) WO2018020202, Priority date 27/07/2016, Priority No. GB20160013003 20160727

    Research output: Patent

  20. Published

    Optical Reading of a Security Element

    Roberts, J. (Inventor) & Young, R. J. (Inventor), 20/09/2017, IPC No. G06K19/06; G06K9/00, Patent No. GB2548493 (B) GB2548493 (A) , Priority date 17/03/2017, Priority No. GB20170004308 20170317

    Research output: Patent

  21. Published

    Single-photon and entangled-photon sources for quantum information

    Ritchie, D. A., Stevenson, M., Young, R., Hudson, A., Salter, C., Ellis, D., Bennett, A., Atkinson, P., Cooper, K., Farrer, I., Nicoll, C. A. & Shields, A. J., 2010, 2010 Conference on Optoelectronic and Microelectronic Materials and Devices. IEEE, p. 229-230 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  22. Published

    Nonlinear filtering using measurements affected by stochastic, set-theoretic and association uncertainty

    Ristic, B., Gning, A. & Mihaylova, L., 5/07/2011, 2011 Proceedings of the 14th International Conference on Information Fusion (FUSION 2011). USA, p. 1069-1076 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Adaptive monitoring for mobile networks in challenging environments

    Richerzhagen, N., Stingl, D., Mauthe, A. U. & Steinmetz, R., 3/08/2015, Proceedings of 24th International Conference on Computer Communications and Networks, ICCCN 2015. IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Handbook of the History of Social Psychology. By Arie W. Kruglanski & Wolfgang Stroebe

    Richardson, B., 2012, In: History of Philosophy and Psychology. 14, 2

    Research output: Contribution to Journal/MagazineBook/Film/Article reviewpeer-review

  25. Published

    Language style matching and police interrogation outcomes

    Richardson, B., Taylor, P. J., Snook, B., Conchie, S. & Bennell, C., 08/2014, In: Law and Human Behavior. 38, 4, p. 357-366 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    The Cooperation Link: Power and Context Moderate Verbal Mimicry

    Richardson, B., McCulloch, K. C., Taylor, P. J. & Wall, H., 1/03/2019, In: Journal of Experimental Psychology: Applied. 25, 1, p. 62-76 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Mental health disorders and alcohol misuse among UK military veterans and the general population: a comparison study

    Rhead, R., MacManus, D., Jones, M., Greenberg, N., Fear, N. & Goodwin, L., 31/01/2022, In: Psychological Medicine. 52, 2, p. 292-302 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    A survey of requirements and standardization efforts for IP-telephony-security

    Rensing, C., Roedig, U., Ackermann, R. & Steinmetz, R., 1/09/2000, Sicherheit in Netzen und Medienströmen: Tagungsband des GI-Workshops “Sicherheit in Mediendaten„, Berlin, 19. September 2000. Schumacher, M. (ed.). Berlin: Springer Verlag, p. 50-60 11 p. (Informatik aktuell).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    VDMFA, eine verteilte dynamische Firewallarchitektur für Multimedia-Dienste

    Rensing, C., Roedig, U., Ackermann, R., Wolf, L. & Steinmetz, R., 1/03/1999, Kommunikation in Verteilten Systemen (KiVS): 11. ITG/GI-Fachtagung. Darmstadt, 2.-5. März 1999. Berlin: Springer Verlag, p. 144-157 14 p. (Informatik Aktuell).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Sicherheitsunterstützung für Internet Telefonie

    Rensing, C., Ackermann, R., Roedig, U., Wolf, L. & Steinmetz, R., 1/03/1999, Proceedings zur Arbeitskonferenz Sicherheitsinfrastrukturen 1999 (DuD-Fachbeiträge), Hamburg-Harburg, Germany. Vieweg Verlag, p. 285-296 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Towards Pseudonymous e-Commerce

    Rennhard, M., Rafaeli, S., Mathy, L., Plattner, B. & Hutchison, D., 2004, In: Electronic Commerce Research. 4, 1-2, p. 83-111 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Query processing for the internet-of-things: Coupling of device energy consumption and cloud infrastructure billing

    Renna, F., Doyle, J., Andreopoulos, Y. & Giotsas, V., 17/05/2016, Internet-of-Things Design and Implementation (IoTDI), 2016 IEEE First International Conference on. Institute of Electrical and Electronics Engineers Inc., p. 83-94 12 p. 7471353

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Media Query Processing for the Internet-of-Things: Coupling of Device Energy Consumption and Cloud Infrastructure Billing

    Renna, F., Doyle, J., Giotsas, V. & Andreopoulos, Y., 1/12/2016, In: IEEE Transactions on Multimedia. 18, 12, p. 2537-2552 16 p., 7544517.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    A Congestion Control Framework Based on In-Network Resource Pooling

    Rene, S., Ascigil, O., Psaras, I. & Pavlou, G., 30/04/2022, In: IEEE/ACM Transactions on Networking . 30, 2, p. 683-697 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Exploring Deep Mapping Concepts: Crosthwaite’s Map and West’s Picturesque Stations

    Reinhold, A., Donaldson, C. E., Gregory, I. N. & Rayson, P. E., 14/09/2017, Proceedings of Workshops and Posters at the 13th International Conference on Spatial Information Theory (COSIT 2017). Fogliaroni, P., Ballatore, A. & Clementini, E. (eds.). Cham: Springer, p. 265-273 9 p. (Lecture Notes in Geoinformation and Cartography).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    The human fetus preferentially engages with face-like visual stimuli

    Reid, V. M., Dunn, K. J., Young, R. J., Amu, J., Donovan, T. & Reissland, N., 19/06/2017, In: Current Biology. 27, 12, p. 1825-1828 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Exploring the VLI, for identifying priority neighbourhoods, in the context of multi-agency community safety initiatives.

    Reece -Smith, R. & Kirby, S., 03/2013, In: Policing: Journal of Policy and Practice. 7, 1, p. 42-52 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Constructs competition miner: process control-flow discovery of BP-domain constructs

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Business Process Management: 12th International Conference, BPM 2014, Haifa, Israel, September 7-11, 2014. Proceedings. Sadiq, S., Soffer, P. & Völzer, H. (eds.). Springer, p. 134-150 17 p. (Lecture Notes in Computer Science; vol. 8659).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Introducing a framework for scalable dynamic process discovery

    Redlich, D., Gilani, W., Molka, T., Drobek, M., Rashid, A. & Blair, G. S., 2014, Advances in Enterprise Engineering VIII : 4th Enterprise Engineering Working Conference, EEWC 2014, Funchal, Madeira Island, Portugal, May 5-8, 2014. Proceedings. Aveiro, D., Tribolet, J. & Gouveia, D. (eds.). Springer, p. 151-166 16 p. (Lecture Notes in Business Information Processing; vol. 174).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Scalable dynamic business process discovery with the constructs competition miner

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), Milan, Italy, November 19-21, 2014.. Accorsi, R., Ceravolo, P. & Russo, B. (eds.). p. 91-107 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Research challenges for business process models at run-time

    Redlich, D., Blair, G. S., Rashid, A., Molka, T. & Gilani, W., 2014, Models@run.time: foundations, applications, and roadmaps. Bencomo, N., France, R., Cheng, B. H. C. & Assmann, U. (eds.). Springer, p. 208-236 29 p. (Lecture Notes in Computer Science; vol. 8378).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Dynamic constructs competition miner - occurrence- vs. time-based ageing

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 19/11/2015, Data-Driven Process Discovery and Analysis: 4th International Symposium, SIMPDA 2014, Milan, Italy, November 19-21, 2014, Revised Selected Papers. Ceravolo, P., Russo, B. & Accorsi, R. (eds.). Springer, p. 79-106 28 p. (Lecture Notes in Business Information Processing; vol. 237).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Securing Communication in 6LoWPAN with Compressed IPsec

    Raza, S., Duquennoy, S., Chung, A., Yazar, D., Voigt, T. & Roedig, U., 1/06/2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Demo Abstract: Securing Communication in 6LoWPAN with Compressed IPsec

    Raza, S., Duquennoy, S., Chung, A. H. M., Yazar, D., Voigt, T. & Roedig, U., 1/06/2011, Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011 International Conference on. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In: Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    6LoWPAN Extension for IPsec

    Raza, S., Voigt, T. & Roedig, U., 25/03/2011, Proceedings of the IETF-IAB International Workshop on Interconnecting Smart Objects with the Internet. 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Self-Adaptive Power Control Mechanism in D2D Enabled Hybrid Cellular Network with mmWave Small Cells: An Optimization Approach

    Raza, S. A., Hassan, S. A., Pervaiz, H. B., Ni, Q. & Musavian, L., 4/12/2016, Globecom Workshops (GC Wkshps), 2016 IEEE. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Proceedings of the Corpus Linguistics 2001 conference

    Rayson, P. (Editor), Wilson, A. (Editor), McEnery, T. (Editor), Hardie, A. (Editor) & Khoja, S. (Editor), 04/2001, Lancaster: University Centre for Computer Corpus Research on Language Technical Papers. 635 p. (UCREL Technical Papers)

    Research output: Book/Report/ProceedingsBook

  49. Published

    Grammatical word class variation within the British National Corpus sampler

    Rayson, P., Wilson, A. & Leech, G., 2002, New frontiers of corpus research: papers from the 21st international conference on English language research on computerised corpora. Peters, P., Collins, P. & Smith, A. (eds.). 36 ed. Amsterdam: Rodopi, p. 295-306 12 p. (Language and computers).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  50. Published

    Matrix: a statistical method and software tool for linguistic analysis through corpus comparison

    Rayson, P., 02/2003, Lancaster University.

    Research output: ThesisDoctoral Thesis

  51. Published

    Tracker: a framework to support reducing rework through decision management

    Rayson, P., Sharp, B., Alderson, A., Cartmell, J., Chibelushi, C., Clarke, R., Dix, A., Onditi, V., Quek, A., Ramduny-Ellis, D., Salter, A., Shah, H., Sommerville, I. & Windridge, P., 04/2003, p. 344-351. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  52. Published

    Extending the Cochran rule for the comparison of word frequencies between corpora

    Rayson, P., Berridge, D. & Francis, B., 03/2004, p. 926-936. 11 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  53. Published

    VARD versus WORD: A comparison of the UCREL variant detector and modern spellcheckers on English historical corpora

    Rayson, P., Archer, D. & Smith, N., 07/2005.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  54. Published

    Building a Corpus of Professional English

    Rayson, P., Tono, Y., Morita, Y., Hoshino, M., Nakamura, T., Aizawa, H. & Watanabe, R., 07/2005.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  55. Published

    AHRC e-Science Scoping Study Final report: Findings of the Expert Seminar for Linguistics

    Rayson, P., 01/2006, http://www.ahds.ac.uk/e-science/e-science-scoping-study.htm: AHRC e-Science Scoping Study (eSSS) project report.

    Research output: Working paper

  56. Published

    The key domain method for the study of language varieties

    Rayson, P. & Smith, N., 06/2006.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  57. Published

    Sense and semantic tagging

    Rayson, P. & Stevenson, M., 2008, Corpus Linguistics: An international handbook. Lüdeling, A. & Kytö, M. (eds.). Berlin: Mouton de Gruyter, (Handbooks of Linguistics and Communication Science Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  58. Published

    The UCREL semantic analysis system.

    Rayson, P., Archer, D., Piao, S. & McEnery, A. M., 2004, Proceedings of the beyond named entity recognition semantic labelling for NLP tasks workshop, Lisbon, Portugal, 2004. Lisbon, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    New trends in corpus linguistics for translation studies

    Rayson, P., 2008. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  60. Published

    Quantitative analysis of translation revision: contrastive corpus research on native English and Chinese translationese

    Rayson, P., Xu, X., Xiao, J., Wong, A. & Yuan, Q., 2008. 10 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  61. Published

    Key domain analysis: mining text in the humanities and social sciences

    Rayson, P. & Archer, D., 2008. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  62. Published

    Multiword expressions: hard going or plain sailing?

    Rayson, P., Piao, S., Sharoff, S., Evert, S. & Moiron, B. V., 2010, In: Language Resources and Evaluation. 44, 1-2, p. 1-5 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    From key words to key semantic domains

    Rayson, P., 2008, In: International Journal of Corpus Linguistics. 13, 4, p. 519-549 31 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Published

    Who said what? Methodological issues in applying corpus-based methods to analyse online chat data

    Rayson, P., Greenwood, P., Rashid, A. & Walkerdine, J., 07/2009, CL2009 Proceedings of the Corpus Linguistics Conference.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    Visualising corpus linguistics

    Rayson, P. & Mariani, J., 2009, CL2009 Proceedings of the Corpus Linguistics Conference. p. n/a

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Annotated Web as corpus

    Rayson, P., Walkerdine, J., Fletcher, W. & Kilgarriff, A., 04/2006, WAC '06 Proceedings of the 2nd International Workshop on Web as Corpus. p. 27-33 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    Large-scale time-sensitive semantic analysis of historical corpora

    Rayson, P., Baron, A., Piao, S. & Wattam, S., 27/05/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  68. Published

    Towards Interactive Multidimensional Visualisations for Corpus Linguistics

    Rayson, P. E., Mariani, J. A., Anderson-Cooper, B., Baron, A., Gullick, D. S., Moore, A. & Wattam, S., 2017, In: Journal for Language Technology and Computational Linguistics. 31, 1, p. 27-49 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    The Case for Adaptive Security Interventions

    Rauf, I., Petre, M., Tun, T. T., Lopez, T., Lunn, P., van der Linden, D., Towse, J., Sharp, H., Levine, M., Rashid, A. & Nuseibeh, B., 31/01/2022, In: ACM Transactions on Software Engineering and Methodology. 31, 1, p. 1-52 52 p., 9.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    Influences of developers' perspectives on their engagement with security in code

    Rauf, I., Lopez, T., Sharp, H., Petre, M., Tun, T. T., Levine, M., Towse, J., van der Linden, D., Rashid, A. & Nuseibeh, B., 19/07/2022, CHASE '22: Proceedings of the 15th International Conference on Cooperative and Human Aspects of Software Engineering. New York: Association for Computing Machinery, Inc, p. 86-95 10 p. (Proceedings - 15th International Conference on Cooperative and Human Aspects of Software Engineering, CHASE 2022).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Security of the GPT cryptosystem and its applications to cryptography

    Rashwan, H., Gabidulin, E. M. & Honary, B., 08/2011, In: Security and Communication Networks. 4, 8, p. 937-946 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    The GPT Cryptosystems for Secure Broadband Communication

    Rashwan, H. & Honary, B., 07/2010, 4th International Symposium on Broadband Communications (ISBC 2010) . Melaka, Malaysia

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    On security of GPT cryptosystems

    Rashwan, H., Gabidulin, E. M. & Honary, B., 07/2009, International Symposium on Communication Theory and Applications (ISCTA) . Ambleside, UK: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    On improving security of GPT cryptosystems

    Rashwan, H., Honary, B. & Gabidulin, E. M., 06/2009, Information Theory, 2009. ISIT 2009. IEEE International Symposium on. Seoul, Korea: IEEE, p. 1110–1114 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    A Smart approach for GPT cryptosystem based on rank codes

    Rashwan, H., Gabidulin, E. M. & Honary, B., 2010, Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on. IEEE, p. 2463-2467 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Unpublished

    Risk Management in Component Based Development:: A Separation of Concerns Perspective

    Rashid, A. & Kotonya, G., 06/2001, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  77. Unpublished

    PROBE: From Requirements and Design to Proof Oligations for Aspect-Oriented Systems

    Rashid, A. & Katz, S., 03/2004, (Unpublished).

    Research output: Working paper

  78. Unpublished

    A Pattern for Designing Component-Based Frameworks

    Rashid, A., Parsons, D., Telea, A. & Speck, A., 01/2005, (Unpublished)

    Research output: Other contribution

  79. Unpublished

    A State-based Join Point Model for AOP

    Rashid, A. & Ali, N. M., 01/2005, (Unpublished)

    Research output: Other contribution

  80. Published

    Aspect-oriented software development in practice: tales from AOSD-Europe

    Rashid, A., Cottenier, T., Greenwood, P., Chitchyan, R., Meunier, R., Coelho, R., Südholt, M. & Joosen, W., 02/2010, In: Computer. 43, 2, p. 19-26 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    Software engineering ethics in a digital world

    Rashid, A., Weckert, J. & Lucas, R., 2009, In: Computer. 42, 6, p. 34-41 8 p.

    Research output: Contribution to Journal/MagazineJournal article

  82. Published

    Technological solutions to offending

    Rashid, A., Greenwood, P., Walkerdine, J., Baron, A. & Rayson, P., 03/2012, Understanding and preventing online sexual exploitation of children. Quayle, E. & Ribisl, K. (eds.). London: Willan, p. 228-243

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  83. Published

    Isis: Protecting Children in Online Social Networks

    Rashid, A., Rayson, P., Greenwood, P., Walkerdine, J., Duquenoy, P., Watson, P., Brennan, M. & Jones, M., 2/06/2009, International Conference Advances in the Analysis of Online Paedophile Activity. Seifi, M. (ed.). Paris: Antipaedo Project, p. 33-38 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Modularisation and composition of aspectual requirements

    Rashid, A., Moreira, A. & Araújo, J., 2003, AOSD '03: Proceedings of the 2nd international conference on Aspect-oriented software development. New York: ACM, p. 11-20 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Who am I? Analysing Digital Personas in Cybercrime Investigations

    Rashid, A., Baron, A., Rayson, P., May-Chahal, C., Greenwood, P. & Walkerdine, J., 04/2013, In: Computer. 46, 4, p. 54-61 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    Transactions on aspect-oriented software development V

    Rashid, A. (Editor) & Ossher, H. (Editor), 2009, Berlin: Springer. (Lecture Notes in Computer Science; vol. 5490)

    Research output: Book/Report/ProceedingsBook

  87. Published

    Managing emergent ethical concerns for software engineering in society

    Rashid, A., Moore, K., May-Chahal, C. & Chitchyan, R., 16/06/2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on (Volume:2 ) . IEEE, p. 523-526 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    Discovering “unknown known” security requirements

    Rashid, A., Naqvi, A., Ramdhany, R., Edwards, M., Chitchyan, R. & Ali Babar, M., 14/05/2016, ICSE '16 Proceedings of the 38th International Conference on Software Engineering Austin, TX, May 14 - 22, 2016. New York: ACM, p. 866-876 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published
  90. Published

    Detecting and Preventing Data Exfiltration

    Rashid, A., Ramdhany, R., Edwards, M., Kibirige Mukisa, S., Ali Babar, M., Hutchison, D. & Chitchyan, R., 04/2014, Lancaster: Lancaster University. 40 p.

    Research output: Book/Report/ProceedingsOther report

  91. Forthcoming

    <del>Security-by-design</del> Securing a compromised system

    Rashid, A., Belguith, S., Bradbury, M., Creese, S., Flechais, I. & Suri, N., 7/01/2025, (Accepted/In press) In: Rossfest Symposium.

    Research output: Contribution to Journal/MagazineConference articlepeer-review

  92. Published

    Fieldwork for Design: Theory and Practice

    Randall, D., Harper, R. & Rouncefield, M., 2007, London: Springer. 330 p. (Computer Supported Cooperative Work)

    Research output: Book/Report/ProceedingsBook

  93. Published

    'Memories are made of this': explicating organisational knowledge and memory

    Randall, D., Hughes, J., O'Brien, J., Rouncefield, M. & Tolmie, P., 06/2001, In: European Journal of Information Systems. 10, 2, Sp., p. 113-121 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    The antisocial model of disability

    Randall, D., Clarke, K., Rouncefield, M. F., Dewsbury, G. & Sommerville, I., 2004, In: Disability and Society. 19, 2, p. 145-158 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    Fieldwork and Ethnography: A Perspective From CSCW

    Randall, D., Harper, R. & Rouncefield, M., 11/2005, In: Ethnographic Praxis in Industry Conference. 2005, 1, p. 81-99 19 p.

    Research output: Contribution to Journal/MagazineJournal article

  96. Published

    Assured deletion in the cloud: requirements, challenges and future directions

    Ramokapane, M., Rashid, A. & Such, J. M., 28/10/2016, CCSW '16 Proceedings of the 2016 ACM on Cloud Computing Security Workshop. New York: ACM, p. 97-108 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    "I feel stupid I can't delete...": a study of users' cloud deletion practices and coping strategies

    Ramokapane, K. M., Rashid, A. & Such, J., 12/07/2017, Proceedings of SOUPS 2017 Thirteenth Symposium on Usable Privacy and Security. USENIX Association, p. 241-256 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Usable assured deletion in the cloud

    Ramokapane, K. M., 2019, Lancaster University. 190 p.

    Research output: ThesisDoctoral Thesis

  99. Published

    A fast approach to novelty detection in video streams using recursive density estimation.

    Ramezani, R., Angelov, P. & Zhou, X., 8/09/2008, Intelligent Systems, 2008. IS '08. 4th International IEEE Conference. IEEE, p. 14-2 - 14-7 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  100. Published

    Artefacts as designed, Artefacts as used: resources for uncovering activity dynamics

    Ramduny-Ellis, D., Dix, A., Rayson, P., Onditi, V., Sommerville, I. & Ransom, J., 07/2005, In: Cognition, Technology and Work. 7, 2, p. 76-87 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1...6 7 8 9 10 11 12 13 ...36 Next

Back to top