Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2015
  2. Published

    Scenarios and use cases in Tweether: W-band for Internet Everywhere

    Paoloni, C., Letizia, R., Ni, Q., Krozer, V., Andre, F., Magne, F., Marilier, M., Zimmerman, R., Ramirez, A., Vilar, R. & Burciu, I., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  3. Published

    Security, technology and global politics: thinking with Virilio

    Lacy, M. J., 2015, London: Routledge. 168 p. (Prio New Security Studies)

    Research output: Book/Report/ProceedingsBook

  4. Published

    Sexual exploitation

    Gillespie, A., 2015, International child law. Buck, T. (ed.). 3rd ed. London: Routledge, p. 333-383 51 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    Social computing privacy and online relationships

    Misra, G. & Such, J. M., 2015, AISB Social Aspects of Cognition and Computing Symposium. p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Software engineering for privacy in-the-large

    Anthonysamy, P. & Rashid, A., 2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on (Volume:2 ). IEEE Press, p. 947-948 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    SPATA: Spatio-tangible tools for fabrication-aware design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 2015, TEI '15 Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. New York: ACM, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Supply chain resilience: definition, review and theoretical foundations for further study

    Tukamuhabwa Rwakira, B., Stevenson, M., Busby, J. & Zorzini, M., 2015, In: International Journal of Production Research. 53, 18, p. 5592-5623 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Susceptibility to email fraud: a review of psychological perspectives, data-collection methods, and ethical considerations

    Jones, H., Towse, J. & Race, N., 2015, In: International Journal of Cyber Behavior, Psychology and Learning. 5, 3, p. 13-29 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  12. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  13. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    The role of the privacy impact assessment in IT innovation in crises: an example

    Easton, C. & Buscher, M., 2015, The 12th International Conference on Information Systems for Crisis Response and Management. Palen, L., Buscher, M., Comes, T. & Hughes, A. (eds.). ISCRAM, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    THz Wakefield radiation generation via dielectric Bragg waveguide

    Sharples, E. & Letizia, R., 2015, Advanced Electromagnetic Materials in Microwaves and Optics (METAMATERIALS), 2015 9th International Congress on. IEEE, p. 289-291 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Time for a Change: Examining Temporality in Shape-Changing Interfaces

    Sturdee, M. A. & Alexander, J. M., 2015, 11 p.

    Research output: Book/Report/ProceedingsOther report

  17. Published

    Towards implicit contextual integrity

    Criado, N. & Such, J. M., 2015, The Second International Workshop on Agents and CyberSecurity (ACySE). p. 23-26 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Vickrey-clarke-groves (vcg) auctions

    Caminati, M., Kerber, M., Lange, C. & Rowat, C., 2015, In: College Inf. Sci. Technol., Pennsylvania State Univ., State College, PA, USA.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Video Clarity: High Speed Data Mining for Video

    Fisher, P., Alhabib, A., Giotsas, V. & Andreopoulos, I., 2015, IBC 2015. London: Institution of Engineering and Technology, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    What can we learn about immediate memory from the development of children's free recall?

    Jarrold, C., Hall, D., Harvey, C. E., Tam, H., Towse, J. N. & Zarandi, A. L., 2015, In: The Quarterly Journal of Experimental Psychology . 68, 9, p. 1871-1894 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    When are capital structure decisions nonseparable from production planning? the case of generalized royalty-based hybrid finance

    Kaivanto, K. & Zinober, A., 2015, Lancaster: Lancaster University, Department of Economics, 13 p. (Economics working paper series).

    Research output: Working paper

  23. 2014
  24. Published

    Mainstreaming domestic and gender-based violence into sociology and the criminology of violence

    Walby, S., Towers, J. & Francis, B., 18/12/2014, In: The Sociological Review. 62, S2, p. 187–214 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Autonomous or 'driverless' cars and disability: a legal and ethical analysis

    Bradshaw-Martin, H. & Easton, C., 15/12/2014, In: Web Journal of Current Legal Issues. 20, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Welfare that works? the Universal Credit information technology system and disabled people

    Easton, C., 15/12/2014, In: Web Journal of Current Legal Issues. 20, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  28. Published

    RTSDE: recursive total-sum-distances-based density estimation approach and its application for autonomous real-time video analytics

    Angelov, P. & Wilding, A., 9/12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE, p. 81-86 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    A fast interpolation approach for the calculation of permittivity and conductivity to estimate the SAR

    Priyadarshi, S., Pitman, S., Glover, P., Shah, S., Ye, J., Hu, B. & Letizia, R., 8/12/2014, RF and Wireless Technologies for Biomedical and Healthcare Applications (IMWS-Bio), 2014 IEEE MTT-S International Microwave Workshop Series on. IEEE, p. 261-266 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Editorial message: CrossCloud Brokers 2014

    Elkhatib, Y. & Walraven, S., 8/12/2014, CrossCloud Brokers 2014: proceedings of the 2nd International Workshop on Cross-Cloud Systems . New York: ACM

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Event pattern discovery on IDS traces of cloud services

    Huang, S.-Y., Huang, Y. & Suri, N., 3/12/2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. IEEE, p. 25-32 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    A multi-layer and multi-tenant cloud assurance evaluation methodology

    Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E. R., 12/2014, Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE, p. 386-393 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    An investigation towards real time dose rate monitoring, and fuel rod detection in a First Generation Magnox Storage Pond (FGMSP)

    Jackson, S., Monk, S. & Riaz, Z., 12/2014, In: Applied Radiation and Isotopes. 94, p. 254-259 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Anomaly detection based on eccentricity analysis

    Angelov, P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE Press, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Compact backward wave oscillators for THz imaging systems

    Paoloni, C., Yue, L., Tang, X., Zhang, F., Popovic, B., Himes, L., Barchfeld, R., Gamzina, D., Letizia, R., Mineo, M. & Luhmann Jr., N. C., 12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  37. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  38. Published

    Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols

    Ghamari, M., Momahed Heravi, B., Roedig, U. & Honary, B., 12/2014, In: IET Networks. 3, 4, p. 284-292 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In: Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    The effect of decentralized behavioral decision making on system-level risk

    Kaivanto, K., 12/2014, In: Risk Analysis. 34, 12, p. 2121-2142 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    Using agent-based simulation to analyse the effect of broadcast and narrowcast on public perception: a case in social risk amplification

    Onggo, S., Busby, J. & Liu, Y., 12/2014, Proceedings of the 2014 Winter Simulation Conference. IEEE, p. 322-333 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    The future of mobile devices: security and mobility

    Fitton, O. & Prince, D., 17/11/2014, Lancaster: Lancaster University. 34 p.

    Research output: Book/Report/ProceedingsOther report

  43. Published

    Traffic anomaly diagnosis in Internet backbone networks: a survey

    Marnerides, A., Schaeffer-Filho, A. & Mauthe, A., 14/11/2014, In: Computer Networks. 73, p. 224-243 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    Double corrugated waveguide for G-band traveling wave tubes

    Paoloni, C. & Mineo, M., 10/11/2014, In: IEEE Transactions on Electron Devices. 61, 12, p. 4259-4263 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Inferring complex AS relationships

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 5/11/2014, IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Robust and real-time communication on heterogeneous networks for smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 3/11/2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 386-391 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Photoluminescence studies of individual and few GaSb/GaAs quantum rings

    Young, M. P., Woodhead, C. S., Roberts, J., Noori, Y. J., Noble, M. T., Krier, A., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R. J., 1/11/2014, In: AIP Advances. 4, 11, 6 p., 117127.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Characterising the physicality of everyday buttons

    Alexander, J., Hardy, J. & Wattam, S., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 205-208 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Evidence for hand-size constancy: the dominant hand as a natural perceptual metric

    Linkenauger, S., Geuss, M., Stefanucci, J., Leyrer, M., Richardson, B., Buelthoff, H., Mohler, B. J. & Proffitt, D., 11/2014, In: Psychological Science. 25, 11, p. 2086-2094 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    Investigation of CSRR loaded waveguide for accelerator applications

    Sharples, E. & Letizia, R., 11/2014, In: Journal of Instrumentation. 13 p., P11017.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Just browsing? understanding user journeys in online TV

    Elkhatib, Y., Killick, R., Mu, M. & Race, N., 11/2014, MM '14 Proceedings of the ACM International Conference on Multimedia. New York: ACM, p. 965-968 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Mitigating eclipse attacks in peer-to-peer networks

    Germanus, D., Roos, S., Strufe, T. & Suri, N., 29/10/2014, 2014 IEEE Conference on Communications and Network Security. Springer-Verlag, p. 400-408 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    New energy efficiency metric with imperfect channel considerations for OFDMA systems

    C. Zarakovitis, C., Ni, Q. & Spiliotis, J., 9/10/2014, In: IEEE Wireless Communications Letters. 3, 5, p. 473-476 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Unpublished

    Data structuring and searching method and apparatus

    Angelov, P. (Inventor) & Sadeghi Tehran, P. (Inventor), 8/10/2014, (Unpublished) Patent No. GB1417807.3, priority date 8 October 2014, Priority date 8/10/2014, Priority No. GB1417807.3

    Research output: Patent

  56. Published

    Real-time novelty detection in video using background subtraction techniques: state of the art a practical review

    Morris, G. & Angelov, P., 8/10/2014, 2014 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE Press, p. 537-543 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    How do we prevent radicalisation?

    Francis, M. (Artist), 7/10/2014

    Research output: Exhibits, objects and web-based outputsWeb publication/site

  58. Published

    Accurate crab cavity modeling for the high luminosity Large Hadron Collider

    Brett, D. R., Appleby, R. B., De Maria, R., Barranco Garcia, J., Tomas Garcia, R., Hall, B. & Burt, G., 2/10/2014, In: Physical Review Special Topics: Accelerators and Beams. 17, 10, 12 p., 104001.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence

    King, A., Brown, J. & Roedig, U., 1/10/2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, p. 45-50 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    Adaptation for the masses: towards decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A.-M., Maddock, C., Mauthe, A. & Taïani, F., 10/2014, ARM '14 Proceedings of 13th Workshop on Adaptive and Reflective Middleware. New York: ACM, 6 p. 4

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Assessing the impact of intra-cloud live migration on anomaly detection

    Shirazi, S. N. U. H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A. & Hutchison, D., 10/2014, Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE, p. 52-57 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Did Somebody See It? Applying the Verifiability Approach to Insurance Claim Interviews

    Nahari, G., Leal, S., Vrij, A., Warmelink, L. & Vernham, Z., 10/2014, In: Journal of Investigative Psychology and Offender Profiling. 11, 3, p. 237-243 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    Gaze-touch: combining gaze with multi-touch for interaction on the same surface

    Pfeuffer, K., Alexander, J., Chong, M. K. & Gellersen, H., 10/2014, UIST '14 Proceedings of the 27th annual ACM symposium on User interface software and technology. New York: ACM, p. 509-518 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    User adaptive QoS aware selection method for cooperative heterogeneous wireless systems: a dynamic contextual approach

    Pervaiz, H., Ni, Q. & Zarakovitis, C. C., 10/2014, In: Future Generation Computer Systems. 39, p. 75-87 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    A systematic review of the comorbidity between PTSD and alcohol misuse

    Debell, F., Fear, N., Head, M., Batt-Rawden, S., Greenberg, N., Wessely, S. & Goodwin, L., 30/09/2014, In: Social Psychiatry and Psychiatric Epidemiology. 49, 9, p. 1401-1425 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    5G communications: race for more capacity triggers LTE in unlicensed band

    Al-Dulaimi, A., Al-Rubaye, S., Ni, Q. & Sousa, E., 24/09/2014, 33rd Wireless World Research Forum Proceedings. Guildford, Surrey: WWRF, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    Semiconductor devices for quantum technologies

    Young, R., 22/09/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  69. Published

    Fault-tolerant dynamic deduplication for utility computing

    Leesakul, W., Townend, P. & Garraghan, P., 18/09/2014, 2014 IEEE 17th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing. IEEE, p. 397-404 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    Socio-technical security analysis of Industrial Control Systems (ICS)

    Green, B., Prince, D., Roedig, U., Busby, J. & Hutchison, D., 11/09/2014, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. Janicke, H. (ed.). Swindon: BCS Learning and Development Limited, p. 10-14 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Data density based clustering

    Hyde, R. & Angelov, P., 8/09/2014, Computational Intelligence (UKCI), 2014 14th UK Workshop on. IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Estimating packet reception rate in noisy environments

    Brown, J., Roedig, U., Boano, C. A. & Roemer, K., 8/09/2014, Proceedings of the 39rd IEEE Conference on Local Computer Networks, 2014. LCN 2014. IEEE, p. 583-591 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    Cyber policing in the North West: regional and local co-ordination

    Prince, D. D. C., 4/09/2014, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  74. Published

    Model-driven engineering practices in industry: social, organizational and managerial factors that lead to success or failure

    Hutchinson, J., Whittle, J. & Rouncefield, M., 1/09/2014, In: Science of Computer Programming. 89, Part B, p. 144-161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. Published

    A Service-Indepenent Model for Linking Online User Profile Information

    Edwards, M. J., Rashid, A. & Rayson, P., 09/2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    AMAB: automated measurement and analysis of body motion

    Poppe, R., Van der Zee, S., Heylen, D. & Taylor, P. J., 09/2014, In: Behavior Research Methods. 46, 3, p. 625-633 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Dataset on usage of a live & VoD P2P IPTV service

    Elkhatib, Y., Mu, M. & Race, N., 09/2014, 14th IEEE International Conference on Peer-to-Peer Computing (P2P). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Fast design method for THz backward wave amplifiers

    Paoloni, C., David, J.-F., Durand, A. & Mineo, M., 09/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  79. Published

    Organizational sensemaking about risk controls: the case of offshore hydrocarbons production

    Busby, J. & Collins, A., 09/2014, In: Risk Analysis. 34, 9, p. 1738-1752 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    W-band PARC klystron

    Paoloni, C., 09/2014, 7th European/UK-China Workshop on Millimeter Waves and Terahertz Technologies (UCMMT 2014).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    Sexual and general offending trajectories of men referred for civil commitment

    Francis, B., Harris, D., Wallace, S., Soothill, K. & Knight, R., 31/08/2014, In: Sexual Abuse. 26, 4, p. 311-329 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  82. Published

    A survey of rural Wireless Mesh Network (WMN) deployments

    Ajayi, A. O., Roedig, U., Edwards, C. & Race, N., 28/08/2014, Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, p. 119-125 7 p. 14664869

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Practical use of formal verification for safety critical cyber-physical systems: A case study

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 25/08/2014, 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications. IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Ready, aim, click: we need new laws to govern cyberwarfare

    Chatterjee, B. B., 21/08/2014, The Conversation.

    Research output: Other contribution

  86. Published

    Ready, aim, click – digital weapons of destruction

    Chatterjee, B. B., 21/08/2014

    Research output: Other contribution

  87. Published

    Unmanned weapons systems and just wars: the psychological dimensions

    Power, N., Alison, L. & Ralph, J., 18/08/2014, Precision strike warfare and international intervention: strategic, ethico-legal and decisional implications. Aaronson, M., Aslam, W., Dyson, T. & Rauxloh, R. (eds.). London: Routledge, p. 188-205 18 p. (Routledge Global Security Studies).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  88. Published

    Constructing schedules for time-critical data delivery in wireless sensor networks

    Pöttner, W.-B., Seidel, H., Brown, J., Roedig, U. & Wolf, L., 15/08/2014, In: ACM Transactions on Sensor Networks. 10, 3, 31 p., 44.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    DEC: dynamically evolving clustering autonomous and its application to structure

    Dutta Baruah, R. & Angelov, P., 14/08/2014, In: IEEE Transactions on Cybernetics. 44, 9, p. 1619-1631 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. Published

    Designing Mobile Augmented Reality interfaces for locative games and playful experiences

    Burnett, D., Coulton, P., Murphy, E. & Race, N., 6/08/2014, Proceedings of Digital Games Research Conference 2014. Digital Games Research Association - DiGRA, 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    Owning an overweight or underweight body: distinguishing the physical, experienced and virtual body

    Piryankova, I., Wong, H. Y., Linkenauger, S., Stinson, C., Longo, M., Buelthoff, H. H. & Mohler, B. J., 1/08/2014, In: PLoS ONE. 9, 8, 13 p., e103428.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    A systematic review of the potential hurdles to interoperability to the emergency services in major incidents: recommendations for solutions and alternatives

    House, A., Power, N. & Alison, L., 08/2014, In: Cognition, Technology and Work. 16, 3, p. 319-335 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 08/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  94. Published

    Can the FIFA world cup football (soccer) tournament be associated with an increase in domestic abuse?

    Kirby, S., Francis, B. & O'Flahery, R., 08/2014, In: Journal of Research in Crime and Delinquency. 51, 3, p. 259-276 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published
  96. Published

    Discovering affect-laden requirements to achieve system acceptance

    Sutcliffe, A., Rayson, P., Bull, C. & Sawyer, P., 08/2014, 22nd IEEE International Requirements Engineering Conference (RE'14). IEEE, p. 173-182 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Language style matching and police interrogation outcomes

    Richardson, B., Taylor, P. J., Snook, B., Conchie, S. & Bennell, C., 08/2014, In: Law and Human Behavior. 38, 4, p. 357-366 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    Real-time fault detection using recursive density estimation

    Costa, B. S. J., Angelov, P. & Guedes, L. A., 08/2014, In: Journal of Control, Automation and Electrical Systems. 25, 4, p. 428-437 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Some code smells have a significant but small effect on faults

    Hall, T., Bowes, D., Sun, Y. & Zhang, M., 08/2014, In: ACM Transactions on Software Engineering and Methodology. 23, 4, 39 p., 33.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Tackling the requirements jigsaw puzzle

    Albuquerque, M. P. & Rashid, A., 08/2014, Requirements Engineering Conference (RE), 2014 IEEE 22nd International. IEEE Computer Society, p. 233-242 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  101. Published

    Towards continuous cloud service assurance for critical infrastructure IT

    Hudic, A., Hecht, T., Mauthe, A. & Tauber, M., 08/2014, Proceedings of 2nd International Conference on Future Internet of Things and Cloud (FiCloud-2014. IEEE, p. 175-182 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  102. Published

    Short paper: gathering tamper evidence in wi-fi networks based on channel state information

    Bagci, I. E., Roedig, U., Schulz, M. & Hollick, M., 23/07/2014, WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. New York: ACM Press, p. 183-188 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top