Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2015
  2. Published

    Photonic crystal-structures for THz vacuum electron devices

    Letizia, R., Mineo, M. & Paoloni, C., 01/2015, In: IEEE Transactions on Electron Devices. 62, 1, p. 178-183 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Power consumption profiling using energy time-frequency distributions in smart grids

    Marnerides, A., Schaeffer-Filho, A., Smith, P. & Mauthe, A., 01/2015, In: IEEE Communications Letters. 19, 1, p. 46-49 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Web technologies for environmental big data

    Vitolo, C., Elkhatib, Y., Reusser, D., Macleod, C. J. A. & Buytaert, W., 01/2015, In: Environmental Modelling and Software. 63, p. 185-198 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    “Return? It never left.”: exploring the "sacred" as a resource for bridging the gap between the religious and the secular

    Francis, M., Knott, K., Kutz, C. (Editor), Riss, H. (Editor) & Roy, O., 2015, Religious norms in the public sphere: proceedings of a conference held at UC Berkeley on May 6-7, 2011. Kutz, C., Riss, H. & Roy, O. (eds.). Florence, Italy: European University Institute, p. 48-57 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  6. Published

    A model for characterizing cyberpower

    Venables, A., Shaikh, S. & Shuttleworth, J., 2015, Critical Infrastructure Protection. USA: Springer, Vol. 9. p. 3-16 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    A public ideation of shape-changing applications

    Sturdee, M., Hardy, J., Dunn, N. & Alexander, J., 2015, ITS '15 Proceedings of the 2015 International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 219-228 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  9. Published

    An active learning technique enhanced with electronic polls

    Such, J. M., Criado Pacheco, N. & Garcia-Fornes, A., 2015, In: International Journal of Engineering Education. 31, 4, p. 1048-1057 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

    Stevenson, M. & Busby, J., 2015, In: International Journal of Operations and Production Management. 35, 1, p. 110-144 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Back to top