Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2019
  2. Published

    Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks

    Hashem Eiza, M., Shi, Q., Marnerides, A., Owens, T. & Ni, Q., 01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 19-33 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Digital Subprime: Tracking the Credit Trackers

    Deville, J. E., 2019, The Sociology of Debt. Featherstone, M. (ed.). Policy Press, p. 145-174 30 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    Distributed Systems Security Knowledge Area: Issue 1.0

    Suri, N., 2019, The Cyber Security Body of Knowledge . Lupu, E. (ed.). University of Bristol, 38 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  6. Published

    Usable assured deletion in the cloud

    Ramokapane, K. M., 2019, Lancaster University. 190 p.

    Research output: ThesisDoctoral Thesis

  7. 2018
  8. Published

    Mental health outcomes at the end of the British involvement in the Iraq and Afghanistan conflicts: a cohort study

    Stevelink, S., Jones, M., Hull, L., Pernet, D., MacCrimmon, S., Goodwin, L., MacManus, D., Murphy, D., Jones, N., Greenberg, N., Rona, R., Fear, N. & Wessely, S., 31/12/2018, In: The British journal of psychiatry : the journal of mental science. 213, 6, p. 690-697 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Taking an intersectional approach to define latent classes of socioeconomic status, ethnicity and migration status for psychiatric epidemiological research.

    Goodwin, L., Gazard, B., Aschan, L., MacCrimmon, S., Hotopf, M. & Hatch, S., 31/12/2018, In: Epidemiology and psychiatric sciences. 27, 6, p. 589-600 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Robust Transmit Designs for Secrecy Rate Constrained MISO NOMA System

    Su, B., Ni, Q. & He, B., 20/12/2018, 29th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    UK to remain a hostile environment for immigration under nebulous new post-Brexit policy

    Consterdine, E., 20/12/2018

    Research output: Exhibits, objects and web-based outputsBlog

  14. Published

    Low Latency Driven Effective Capacity Analysis for Non-Orthogonal and Orthogonal Spectrum Access

    Yu, W., Musavian, L., Quddus, A. U., Ni, Q. & Xiao, P., 13/12/2018, 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Ethics, killing, and the Moral Machine

    Ryder, M., 10/12/2018

    Research output: Exhibits, objects and web-based outputsBlog

  16. Published

    Interference-Aware Radio Resource Allocation for 5G Ultra-Reliable Low-Latency Communication

    Malik, H., Alam, M. M., Le Moullec, Y. & Ni, Q., 9/12/2018, 2018 IEEE Globecom Workshops, GC Wkshps 2018 - Proceedings. IEEE, 6 p. 8644301

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Joint Antenna and User Selection for Untrusted Relay Networks

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 9/12/2018, 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings. IEEE, 6 p. 8647350

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B.-C., Li, S.-C., Huang, Y., Suri, N. & Wang, P.-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    FastFI: Accelerating software fault injections

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 193-202 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    On the detection of side-channel attacks

    Vateva-Gurova, T. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 185-186 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In: International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    On the sustainability of blockchain funding

    Zhang, B. & Balogun, H., 20/11/2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, p. 89-96 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Authors' reply to 'comments on 'researcher bias: The use of machine learning in software defect prediction''

    Shepperd, M., Hall, T. & Bowes, D., 1/11/2018, In: IEEE Transactions on Software Engineering. 44, 11, p. 1129-1131 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Feeling SketCHI? the lasting appeal of the drawn image in HCI

    Sturdee, M., Lewis, M. & Marquardt, N., 1/11/2018, Interactions, 25, 6, p. 64-69 6 p.

    Research output: Contribution to specialist publicationArticle

  26. Published

    How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code

    Schwahn, O., Winter, S., Coppik, N. & Suri, N., 1/11/2018, In: IEEE Transactions on Dependable and Secure Computing. 15, 6, p. 945-958 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Intensive care decision-making: Identifying the challenges and generating solutions to improve inter-specialty referrals to critical care

    Power, N., Plummer, N. R., Baldwin, J., James, F. R. & Laha, S., 1/11/2018, In: Journal of the Intensive Care Society. 19, 4, p. 287-298 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    SketchBlog #1: the rise and rise of the sketchnote

    Sturdee, M., Lewis, M. & Marquardt, N., 1/11/2018, Interactions, 25, 6, p. 6-8 3 p.

    Research output: Contribution to specialist publicationArticle

  29. Published

    Temporary Migration Programmes: the Cause or Antidote of Migrant Worker Exploitation in UK Agriculture

    Consterdine, E. & Samuk, S., 1/11/2018, In: Journal of International Migration and Integration. 19, 4, p. 1005-1020 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Many Phish in the C : A Coexisting-Choice-Criteria Model of Security Behavior

    Embrey, I. & Kaivanto, K. K., 11/2018, Lancaster: Lancaster University, Department of Economics, (Economics Working Papers Series).

    Research output: Working paper

  31. Published

    O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs

    Nomikos, G., Kotronis, V., Sermpezis, P., Gigis, P., Manassakis, L., Dietzel, C., Konstantaras, S., Dimitropoulos, X. & Giotsas, V., 11/2018, IMC '18 Proceedings of the Internet Measurement Conference 2018. New York: Association for Computing Machinery (ACM), p. 265-278 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    A Photonic Device

    Young, R. J. (Inventor) & Noori, Y. (Inventor), 24/10/2018, Patent No. GB 2561590 (A), 24/10/2018, Priority date 19/04/2017, Priority No. GB1706216.7

    Research output: Patent

  33. Published

    Emergent Failures: Rethinking Cloud Reliability at Scale

    Garraghan, P., Yang, R., Wen, Z., Romanovsky, A., Xu, J., Buyya, R. & Ranjan, R., 18/10/2018, In: IEEE Cloud Computing. 5, 5, p. 12-21 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Genetic Risk for Psychiatric Disorders and Telomere Length

    Palmos, A., Breen, G., Goodwin, L., Frissa, S., Hatch, S., Hotopf, M., Thuret, S., Lewis, C. & Powell, T., 16/10/2018, In: Frontiers in Genetics. 9, 10 p., 468.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Towards Reactive Acoustic Jamming for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 15/10/2018, 2nd International Workshop on Multimedia Privacy and Security. ACM Press, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Measuring Human Values in Software Engineering

    Winter, E. R., Forshaw, S. W. & Ferrario, M. A. F. C., 12/10/2018, Proceedings of the 12th International Symposium on Empirical Software Engineering and Measurement: ESEM2018. ACM Press

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    The Power of Synchronisation: Formal Analysis of Power Consumption in Networks of Pulse-Coupled Oscillators

    Gainer, P., Linker, S., Dixon, C., Hustadt, U. & Fisher, M., 11/10/2018, Formal Methods and Software Engineering: 20th International Conference on Formal Engineering Methods, ICFEM 2018, Gold Coast, QLD, Australia, November 12-16, 2018, Proceedings. Sun, J. & Sun, M. (eds.). Cham: Springer, p. 160-176 17 p. (Lecture Notes in Computer Science; vol. 11232).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    How Effectively Is Defective Code Actually Tested? An Analysis of JUnit Tests in Seven Open Source Systems

    Petric, J., Hall, T. & Bowes, D., 10/10/2018, Proceedings of the 14th International Conference on Predictive Models and Data Analytics in Software Engineering. New York, NY, USA: ACM, p. 42-51 10 p. (PROMISE'18).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Mining communication patterns in software development: A GitHub analysis

    Ortu, M., Hall, T., Marchesi, M., Tonelli, R., Bowes, D. & Destefanis, G., 10/10/2018, PROMISE'18 Proceedings of the 14th International Conference on Predictive Models and Data Analytics in Software Engineering. New York: ACM, p. 70-79 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    The Secure Development Handbook

    Weir, C. & Ford, N. (Illustrator), 1/10/2018, 1.1 ed. London: Amazon Kindle. 47 p.

    Research output: Book/Report/ProceedingsBook

  41. Published

    Stability of Evolving Fuzzy Systems based on Data Clouds

    Rong, H., Angelov, P. P., Gu, X. & Bai, J., 10/2018, In: IEEE Transactions on Fuzzy Systems. 26, 5, p. 2774-2784 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    The Darkest Hour

    Ryder, M., 30/09/2018, Michael Ryder. 178 p.

    Research output: Book/Report/ProceedingsBook

  43. Published

    Foldwatch: using origami-inspired paper prototypes to explore the extension of output space in smartwatches

    Fuchs, A., Sturdee, M. & Schöning, J., 29/09/2018, NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction. New York: ACM, p. 47-59 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    A Qualitative Evaluation of the Acceptability of a Tailored Smartphone Alcohol Intervention for a Military Population: Information About Drinking for Ex-Serving Personnel (InDEx) App (Preprint)

    Puddephatt, J.-A., Leightley, D., Palmer, L., Jones, N., Mahmoodi, T., Drummond, C., Rona, R. J., Fear, N. T., Field, M. & Goodwin, L., 27/09/2018

    Research output: Other contribution

  45. Published

    Light-touch Interventions to Improve Software Development Security

    Weir, C. A. F., Blair, L., Becker, I., Sasse, A. & Noble, J., 25/09/2018, Proceedings of the IEEE Cybersecurity Development Conference 2018. Yeo, D. & Chong, S. (eds.). IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    How Labour wants to overhaul the UK immigration system

    Consterdine, E., 18/09/2018

    Research output: Exhibits, objects and web-based outputsBlog

  47. Published

    Hazardous alcohol consumption among spouses or partners of military service personnel: a systematic review of the literature

    Gribble, R., Thandi, G., Goodwin, L. & Fear, N., 13/09/2018, In: Journal of the Royal Army Medical Corps. 164, 5, p. 380-388 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    ReasoNet: Inferring Network Policies Using Ontologies

    Rotsos, C., Farshad, A., King, D. & Hutchison, D., 13/09/2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft). IEEE, p. 159-167 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    A Smartphone App and Personalized Text Messaging Framework (InDEx) to Monitor and Reduce Alcohol Use in Ex-Serving Personnel: Development and Feasibility Study

    Leightley, D., Puddephatt, J.-A., Jones, N., Mahmoodi, T., Chui, Z., Field, M., Drummond, C., Rona, R. J., Fear, N. T. & Goodwin, L., 11/09/2018, In: JMIR mHealth and uHealth. 6, 9, e10074.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Quantum Confinement in Security Elements

    McGrath, T., Bernardo Gavito, R., Bagci, I. E., Wang, C., Astbury, B., Young, R. J. & Roedig, U., 9/09/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  51. Published

    Recording Murder: Videos depicting homicide and the law?

    Gillespie, A. A., 6/09/2018, Homicide in Criminal Law: A Research Companion. Reed, A. & Bohlander, M. (eds.). London: Routledge, p. 174-192 18 p. (Substantive issues in Criminal Law).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  52. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In: IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Published

    Bridging the Gap between Climate Change and Maritime Security: Towards a Comprehensive Framework for Planning

    Mazaris, A. & Germond, B. Y., 1/09/2018, In: Science of the Total Environment. 635C, p. 1076-1080 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    Reintroducing Friendship to International Relations: Relational Ontologies from China to the West

    Nordin, A. H. M. & Smith, G. M., 1/09/2018, In: International Relations of the Asia Pacific. 18, 3, p. 369-396 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Published

    From preparedness to risk: from the singular risk of nuclear war to the plurality of all hazards

    Deville, J. & Guggenheim, M., 09/2018, In: British Journal of Sociology. 69, 3, p. 799-824 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    The Benefits of a Self-Generated Cue Mnemonic for Timeline Interviewing

    Kontogianni, F., Hope, L., Vrij, A., Taylor, P. J. & Gabbert, F., 09/2018, In: Journal of Applied Research in Memory and Cognition. 7, 3, p. 454-461 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    The first direct replication on using verbal credibility assessment for the detection of deceptive intentions

    Kleinberg, B., Warmelink, L., Arntz, A. & Verschuere, B., 09/2018, In: Applied Cognitive Psychology. 32, 5, p. 592-599 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Code cleaning for software defect prediction: A cautionary tale

    Shippey, T., Bowes, D., Counsell, S. & Hall, T., 29/08/2018, 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE, p. 239-243 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    Flashlight: A novel monitoring path identification schema for securing cloud services

    Zhang, H., Luna, J., Suri, N. & Trapero, R., 27/08/2018, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 10 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    Giving a voice through design: adapting design methods to enhance the participation of people with communication difficulties

    McNaney , R., Wilson, C., Wallace, J., Brereton, M., Roper, A., Wilson, S. & Sturdee, M., 20/08/2018, PDC '18 Proceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial - Volume 2. New York: ACM, Vol. 2. 3 p. 40

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Design and Analysis of Secure Quantum Network System with Trusted Repeaters

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 511-514 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Quantum Key Distribution Random Access Network

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 174-178 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    Decision-making in intensive care medicine - a review

    James, F. R., Power, N. & Laha, S., 1/08/2018, In: Journal of the Intensive Care Society. 19, 3, p. 247-258 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    A Fuel-Payload Ratio Based Flight-Segmentation Benchmark

    Kaivanto, K. K. & Zhang, P., 08/2018, In: Transportation Research Part D: Transport and Environment. 63, p. 548–559 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    Computationally Intelligent Techniques for Resource Management in MmWave Small Cell Networks

    Munir, H., Pervaiz, H., Hassan, S. A., Musavian, L., Ni, Q., Imran, M. A. & Tafazolli, R., 08/2018, In: IEEE Wireless Communications. 25, 4, p. 32-39 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    Formalization and Automation of Quality Assurance Processes in Radiation Oncology

    Munbodh, R., Zaveri, H., Caminati, M. B. & Bowles, J., 31/07/2018, University of St Andrews.

    Research output: Other contribution

  68. Published

    Youth mobility scheme after Brexit won’t fill gaps left by end to free movement

    Consterdine, E., 16/07/2018

    Research output: Exhibits, objects and web-based outputsBlog

  69. Published

    Britain’s Brexit plan revealed: experts react

    Consterdine, E., 12/07/2018

    Research output: Exhibits, objects and web-based outputsBlog

  70. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  71. Published

    Message from the Chairs EuroSandP Workshops

    Weir, C. & Fahl, S., 6/07/2018, Proceedings of IEEE European Symposium on Security and Privacy (EuroS&P) 2018. IEEE, p. x 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation

    Saeed, A., Garraghan, P., Craggs, B., van der Linden, D., Rashid, A. & Asad Hussain, S., 2/07/2018, 2018 IEEE International Conference on Cloud Computing (CLOUD). IEEE, p. 606-613 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    ROSE: Cluster Resource Scheduling via Speculative Over-subscription

    Sun, X., Hu, C., Yang, R., Garraghan, P., Wo, T., Xu, J., Zhu, J. & Li, C., 2/07/2018, 38th IEEE International Conference on Distributed Systems Computing Systems. IEEE, p. 949-960 12 p. (2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC) 2018

    Weir, C. A. F. (Editor) & Mazurek, M. (Editor), 1/07/2018, Reston, VA: Internet Society.

    Research output: Book/Report/ProceedingsBook

  75. Published

    Reproducibility and replicability of software defect prediction studies

    Mahmood, Z., Bowes, D., Hall, T., Lane, P. C. R. & Petrić, J., 1/07/2018, In: Information and Software Technology. 99, p. 148-163 16 p.

    Research output: Contribution to Journal/MagazineReview articlepeer-review

  76. Published

    Controlling the interview: The influencing techniques of suspects of control and coercion

    Watson, S., Luther, K., Taylor, P. J., Jackson, J. & Alison, L., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  77. Published

    Open Access Publishing and the Future of the University

    Deville, J. E., 07/2018, The Commons and Care. Moore, S. & , M. P. (eds.). Coventry: Post Office Press and Rope Press, p. 6-15 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  78. Published

    Playful Research Fiction: A Fictional Conference

    Kirman, B., Lindley, J. G., Blythe, M., Coulton, P., Lawson, S., Linehan, C., Maxwell, D., O'Hara, D., Sturdee, M. & Thomas, V., 07/2018, Funology 2: From Usability to Enjoyment. Blythe, M. & Monk, A. (eds.). Springer, p. 157-173 17 p. (Human-Computer Interaction Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  79. Published

    A review and analysis of the recent literature on the Common European Asylum System

    Schweitzer, R., Consterdine, E. & Collyer, M., 30/06/2018, CEASEVAL Research on the Common European Asylum System.

    Research output: Working paper

  80. Published

    A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems

    Birkholz, H., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Arul, T., Heinrich, M., Katzenbeisser, S., Suri, N., Vateva-Gurova, T. & Schlehuber, C., 25/06/2018. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  81. Published

    Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Gouglidis, A., Grompanopoulos, C. & Mavridou, A., 25/06/2018, Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018). Bliudze, S. & Bensalem, S. (eds.). EPTCS, p. 52-64 13 p. (EPTCS; vol. 272).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Sequent Calculus for Euler Diagrams

    Linker, S., 18/06/2018, Diagrammatic Representation and Inference: 10th International Conference, Diagrams 2018, Edinburgh, UK, June 18-22, 2018, Proceedings. Chapman, P., Stapleton, G., Moktefi, A., Perez-Kriz, S. & Bellucci, F. (eds.). Cham: Springer, p. 399-407 9 p. (Lecture Notes in Computer Science; vol. 10871).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  83. Published

    Whetstone: Reliable monitoring of cloud services

    Zhang, H., Luna, J., Trapero, R. & Suri, N., 18/06/2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, p. 115-122 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    ActuEating: Designing, Studying and Exploring Actuating Decorative Artefacts

    Nabil, S., Everitt, A., Sturdee, M. A., Alexander, J. M., Bowen, S., Wright, P. & Kirk, D., 8/06/2018, DIS '18 Proceedings of the 2018 Designing Interactive Systems Conference. New York: ACM, p. 327-339 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    Lancaster at SemEval-2018 Task 3: Investigating Ironic Features in English Tweets

    Dearden, E. & Baron, A., 6/06/2018, Proceedings of the 12th International Workshop on Semantic Evaluation (SemEval-2018). Association for Computational Linguistics, p. 587-593 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    Book Review: Trading Barriers: Immigration and the Remaking of Globalization

    Consterdine, E., 2/06/2018, In: International Migration Review. 52, 2, p. 641-642 2 p.

    Research output: Contribution to Journal/MagazineBook/Film/Article reviewpeer-review

  88. Published

    Holistic virtual machine scheduling in cloud datacenters towards minimizing total energy

    Li, X., Garraghan, P., Jiang, X., Wu, Z. & Xu, J., 1/06/2018, In: IEEE Transactions on Parallel and Distributed Systems. 29, 6, p. 1317-1331 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    Software defect prediction: do different classifiers find the same defects?

    Bowes, D., Hall, T. & Petrić, J., 1/06/2018, In: Software Quality Journal. 26, 2, p. 525-552 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. Published

    Design of 71-76 GHz Double-Corrugated Waveguide Traveling-Wave Tube for Satellite Downlink

    Li, X., Huang, X., Mathisen, S., Letizia, R. & Paoloni, C., 06/2018, In: IEEE Transactions on Electron Devices. 65, 6, p. 2195-2200 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    On the trajectory of video quality transition in HTTP adaptive video streaming

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 06/2018, In: Multimedia Systems. 24, 3, p. 327-340 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    Self-Organising Fuzzy Logic Classifier

    Gu, X. & Angelov, P. P., 06/2018, In: Information Sciences. 447, p. 36-51 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    Integrating electronic healthcare records of armed forces personnel: Developing a framework for evaluating health outcomes in England, Scotland and Wales

    Leightley, D., Chui, Z., Jones, M., Landau, S., McCrone, P., Hayes, R., Wessely, S., Fear, N. & Goodwin, L., 31/05/2018, In: International Journal of Medical Informatics. 113, p. 17-25 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    Random Damage in Interconnected Networks

    König, S. & Gouglidis, A., 31/05/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  95. Published

    Siren: A platform for deploying virtual network services in the cloud to Fog continuum

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 31/05/2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, p. 202-207 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    State-of-the-art report on public attitudes, political discourses and media coverage on the arrival of refugees

    Consterdine, E., 30/05/2018, CEASEVAL Research on the Common European Asylum System.

    Research output: Working paper

  97. Published

    An Analysis of Reporting and Monitoring in Relation to the United Nations Convention on the Rights of Persons with Disabilities, the Right to Participation in Cultural Life and Intellectual Property

    Easton, C. R., 29/05/2018, Dance, Disability and Law : InVisible Difference. Whatley, S., Waelde, C., Harmon, S., Brown, A., Wood, K. & Blades, H. (eds.). Intellect

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  98. Published

    Opening or closing borders to international students? Convergent and divergent dynamics in France, Spain and the UK

    Levatino, A., Eremenko, T., Molinero Gerbeau, Y., Consterdine, E., Kabbanji, L., Gonzalez-Ferrer, A., Jolivet-Guetta, M. & Beauchemin, C., 27/05/2018, In: Globalisation, Societies and Education. 16, 3, p. 366-380 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

  100. Published

    Determining a unique identifier for an optically read security element

    Robinson, B. J. (Inventor) & Young, R. J. (Inventor), 23/05/2018, IPC No. G06K19/06; G06K7/10; G06K9/00, Patent No. GB2556279, Priority date 7/02/2018

    Research output: Patent

  101. Published

    Method of making an optically readable element

    Robinson, B. J. (Inventor) & Young, R. J. (Inventor), 23/05/2018, IPC No. G06K19/060646; G06K7/10; G06K9/00577, Patent No. GB2556278 (A), Priority date 7/02/2018

    Research output: Patent

  102. Published

    Strong PUFs from arrays of resonant tunnelling diodes

    Astbury, B., Bagci, I. E., McGrath, T., Sexton, J., Missous, M., Roedig, U., Bernardo Gavito, R. & Young, R. J., 10/05/2018, In: arXiv.

    Research output: Contribution to Journal/MagazineLetter

Previous 12 3 4 5 6 7 8 9 ...36 Next

Back to top