Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2016
  2. Published

    Action-specific effects in perception and their potential applications

    Witt, J. K., Linkenauger, S. & Wickens, C., 03/2016, In: Journal of Applied Research in Memory and Cognition. 5, 1, p. 69-76 8 p.

    Research output: Contribution to Journal/MagazineLiterature reviewpeer-review

  3. Published

    Geographic profiling survey: a preliminary examination of geographic profilers’ views and experiences

    Emeno, K., Bennell, C., Snook, B. & Taylor, P. J., 03/2016, In: International Journal of Police Science and Management. 18, 1, p. 3-12 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    How socially aware are social media privacy controls?

    Misra, G. & Such Aparicio, J. M., 03/2016, In: IEEE Computer. 49, 3, p. 96-99 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Malware detection in cloud computing infrastructures

    Watson, M., Shirazi, S. N. U. H., Marnerides, A., Mauthe, A. U. & Hutchison, D., 03/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 192-205 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Poster: The Role of Confirmation Bias in Potentially Undermining Speculative Cryptocurrency Decisions

    Craggs, B. & Rashid, A., 03/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  7. Published

    Sibyl: A Practical Internet Route Oracle

    Cunha, I., Marchetta, P., Calder, M., Chiu, Y.-C., Machado, B. V. A., Pescapè, A., Giotsas, V., Madhyastha, H. V. & Katz-Bassett, E., 03/2016, 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, p. 325-344 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Named Data Networking: A survey

    Saxena, D., Raychoudhury, V., Suri, N., Becker, C. & Cao, J., 28/02/2016, In: Computer Science Review. 19, p. 15-55 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Analysis and characterisation of botnet scan traffic

    Marnerides, A. & Mauthe, A. U., 15/02/2016, 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Hegemony in Chinese? Ba in Chinese international relations

    Nordin, A., 15/02/2016, Politics of the ‘other’ in India and China: western concepts in non-western contexts. König, L. & Chaudhuri, B. (eds.). London: Routledge, (Routledge Contemporary Asia).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Published

    Tangible Data, explorations in data physicalization

    Hogan, T., Hornecker, E., Stusak, S., Jansen, Y., Alexander, J. M., Van Moere, A., Hinrichs, U. & Nolan, K., 14/02/2016, Proceedings of the TEI '16: Tenth International Conference on Tangible, Embedded, and Embodied Interaction . New York: ACM, p. 753-756 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top