Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2015
  2. Published

    SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications

    Granby, B., Askwith, R. & Marnerides, A., 10/11/2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP). IEEE, p. 463-466 4 p. (2015 IEEE 23rd International Conference on Network Protocols (ICNP)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Using quantum confinement to uniquely identify devices

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Young, M., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 10/11/2015, In: Scientific Reports. 5, 8 p., 16456 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Detecting broken pointcuts using structural commonality and degree of interest

    Khatchadourian, R., Rashid, A., Masuhara, H. & Watanabe, T., 9/11/2015, 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015) November 9–13, 2015 Lincoln, Nebraska, USA. IEEE, p. 641-646 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Trust-based approaches to safety and production

    Conchie, S. M., Woodcock, H. E. & Taylor, P. J., 6/11/2015, The Wiley Blackwell handbook of the psychology of occupational safety and workplace health. Clarke, S., Probst, T., Guldenmund, F. & Passmore, J. (eds.). Chichester: Wiley-Blackwell, p. 111-132 22 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  6. Unpublished

    (Invited) High-power, high-efficiency klystrons

    Lingwood, C. J., 4/11/2015, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  7. Published

    Assessing privacy capabilities of cloud service providers

    Del Alamo, J. M., Trapero, R., Martin, Y. S., Yelmo, J. C. & Suri, N., 1/11/2015, In: IEEE Latin America Transactions. 13, 11, p. 3634-3641 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    The feet in human--computer interaction: a survey of foot-based interaction

    Velloso, E., Schmidt, D., Alexander, J., Gellersen, H. & Bulling, A., 1/11/2015, In: ACM Computing Surveys. 48, 2, p. 1-35 35 p., 21.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    "Trust me, it's only for me": 'revenge porn' and the criminal law

    Gillespie, A., 11/2015, In: Criminal Law Review. 2015, 11, p. 866-880 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Double corrugated waveguide for Ka-Band traveling wave tube

    Paoloni, C., Mineo, M., Henry, M. & Huggard, P. G., 11/2015, In: IEEE Transactions on Electron Devices. 62, 11, p. 3851-3856 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    From responsibility to accountability: working creatively with distributed agency in office energy metering and management

    Whittle, R. K., Ellis, R. J., Marshall, I., Alcock, P., Hutchison, D. & Mauthe, A. U., 11/2015, In: Energy Research and Social Science. 10, p. 240-249 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top